Computer Science ›› 2023, Vol. 50 ›› Issue (9): 357-362.doi: 10.11896/jsjkx.220800252

• Computer Network • Previous Articles    

Solution to Cross-domain VPN Based on Virtualization

TAO Zhiyong1,2, ZHANG Jin2,3, YANG Wangdong2   

  1. 1 Software School,Changsha Social Work College,Changsha 410004,China
    2 College of Computer Science and Electronic Engineering,Hunan University,Changsha 410082,China
    3 College of Computer Science and Electronic Engineering,Hunan Normal University,Changsha 410012,China
  • Received:2022-08-27 Revised:2023-01-18 Online:2023-09-15 Published:2023-09-01
  • About author:TAO Zhiyong,born in 1980,master,associate professor,is a member of China ComputerFederation.His main research interests include network communication and cloud computing.
    ZHANG Jin,born in 1979,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include network communication,cloud computing,and software engineering.
  • Supported by:
    National Natural Science Foundation of China(61872127),Research Foundation of the Education Department of Hunan Province(22C1433),Natural Science Foundation of Hunan Province,China(2020JJ7089)and Horizontal Project of Changsha Social Work College(HX2023025).

Abstract: To address the problems of complex implementation of cross-domain virtual private networks built in current carrier networks,excessive load on devices at the border of autonomous systems,and the existence of single points of failure,this paper proposes a solution for building cross-domain virtual private networks by virtualization.The scheme consists of four fundamental steps:the establishment of public network tunnels,the establishment of local VPN instances,the virtualization of autonomous system border devices,and the interaction of private network routes of border devices.To evaluate the feasibility and superiority of the scheme,comparative experiments are conducted with the cross-domain virtual private network constructed by the tradi-tional multi-hop EBGP approach in the dimensions of switching capacity,route entries,and label entries.Experimental results show that the cross-domain virtual private network constructed by this scheme enhances the data processing capability of the autonomous system boundary devices and reduces the amount of data to be processed by the autonomous system boundary devices.In general,this improved scheme is advanced and effective for building cross-domain virtual private networks.

Key words: Virtualization, Multi-protocol label switching, Border gateway routing protocol, Autonomous system boundary sevice, Virtual private network

CLC Number: 

  • TP393
[1]MA P Y,YANG G M,MAO D F,et al.Realization of intelligent routing based on SRv6+MPLS dual forwarding plane [J].Optical Communication Research,2022(1):67-70.
[2]CHEN F Q,DOU J,ZHANG D.VRF configuration design and simulation based on BGP/MPLS VPN [J].Journal of Chengdu University of Information Technology,2020,35(4):378-381.
[3]LIN D S.Dual-machine hot standby function design of VPNgateway of industrial control system [J].Computing Technology and Automation,2020,39(1):74-78.
[4]WEN T,ZHANG Q B,AN W T.Construction of cross-regional technology video conference network based on VPN technology [J].Journal of Liaoning University of Technology(Natural Science Edition),2019,39(3):164-168.
[5]XU Y Y,SU XU Z,LIU Y Q,et al.Remote monitoring system for slub yarn production based on VPN technology [J].Manufacturing Automation,2022,44(2):16-19.
[6]SHENG W S,ZHOU C,SUN Y W.The application of MPLSVPN in enterprise networks [J].Computer Technology and Development,2020,30(11):117-122.
[7]SUN G Y,JIAO J.Simulation design of routing filtering based on multiple autonomous systems [J].Journal of Capital Normal University(Natural Science Edition),2022,43(2):20-28.
[8]SUN G Y,JIA Y X.Multi-Autonomous System Routing Simulation Based on GNS3 [J].Laboratory Research and Exploration,2019,38(4):123-128.
[9]LI Y F.Simulation design of enterprise cross-domain networkingbased on BGP MPLS VPN[J].Laboratory Research and Exploration,2021,40(3):121-128.
[10]DENG C R.Analysis on the principle of cross-domain VPN networking for power dispatching data network [J].Journal of Shandong Electric Power College,2022,25(2):20-24.
[11]SONG G J,HU C,ZHOU F.MPLS-VPN architecture optimization based on layered PE technology[J].Computer Engineering,2017,43(6):66-72.
[12]TAO Z Y,ZHANG J,YANG W D,et al.Research on perfor-mance optimization of edge devices based on double-layervirtua-lization idea [J].Computer Science,2021,48(11):372-377.
[13]SUN C.Ship navigation information service platform based oncloud computing virtualization technology [J].Ship Science and Technology,2022,44(6):141-144.
[14]HU Z Y.Design of intelligent ship automation information ser-vice platform based on cloud computing virtualization technology[J].Ship Science and Technology,2021,43(22):151-153.
[15]HUANG S P,XIE J,KAN H Y.Research on the Application of IRF Virtualization Technology in the Network[J].Experimental Technology and Management,2014,31(11):124-126.
[16]BAO L L,TANG H S,JIANG S Y,et al.Research on the design of meteorological network based on IRF2 and LACP MAD[J].Computer Applications and Software,2019,36(1):37-141.
[17]WANG J W,ZHANG X L,LI Q,et al.Research progress of network function virtualization technology[J].Chinese Journal of Computers,2019,42(2):185-206.
[18]SUN T,ZHAG J X.A review of virtualization technology re-search in network experimental beds [J].Journal of Inner Mongolia University(Natural Science Edition),2018,49(5):554-560.
[1] CHEN Yiyang, WANG Xiaoning, LU Shasha, XIAO Haili. Survey of Container Technology for High-performance Computing System [J]. Computer Science, 2023, 50(2): 353-363.
[2] CHEN Gang, MENG Xiang-ru, KANG Qiao-yan, ZHAI Dong. vSDN Fault Recovery Algorithm Based on Minimum Spanning Tree [J]. Computer Science, 2022, 49(11A): 211200034-7.
[3] TAO Zhi-yong, ZHANG Jin, YANG Wang-dong, CHEN Wei-man. Study on Performance Optimization of Edge Devices Based on Two-layer Virtualization [J]. Computer Science, 2021, 48(11): 372-377.
[4] SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251.
[5] ZHU Guo-hui, ZHANG Yin, LIU Xiu-xia, SUN Tian-ao. Energy Efficient Virtual Network Mapping Algorithms Based on Node Topology Awareness [J]. Computer Science, 2020, 47(9): 270-274.
[6] WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254.
[7] LI Peng-fei, CHEN Ming, DENG Li, QIAN Hong-yan. NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol [J]. Computer Science, 2019, 46(6A): 343-347.
[8] MA Xiao-jin, RAO Guo-bin, XU Hua-hu. Research on Task Scheduling in Cloud Computing [J]. Computer Science, 2019, 46(3): 1-8.
[9] CHEN Hao, LUO Lei, LI Yun, CHEN Li-rong. Study on Formal Verification of Secure Virtual Machine Monitor [J]. Computer Science, 2019, 46(3): 170-179.
[10] XUE Hao, CHEN Ming, QIAN Hong-yan. NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller [J]. Computer Science, 2019, 46(10): 135-140.
[11] ZHUANG Xiao-zhao, WAN Ji-guang, ZHANG Yi-wen, QU Xiao-yang. Energy Consumption Optimization Scheme for New Energy-driven Storage System [J]. Computer Science, 2018, 45(7): 66-72.
[12] LI Zhen-tao, MENG Xiang-ru , ZHAO Zhi-yuan, SU Yu-ze. Virtual Network Reconfiguration Algorithm for Nodes Load Balancing [J]. Computer Science, 2018, 45(7): 95-98.
[13] KE Wen-jun, DONG Bi-dan and GAO Yang. Survey of Virtualization Access Control Research Based on Xen [J]. Computer Science, 2017, 44(Z6): 24-28.
[14] TANG Hong-mei and ZHENG Gang. Design and Optimization on Virtual Desktop Infrastructure Based on KVM [J]. Computer Science, 2017, 44(Z6): 560-562.
[15] WANG Xue-shun, YU Shao-hua and DAI Jin-you. Virtualization Deep Packet Inspection Deployment Method [J]. Computer Science, 2017, 44(8): 90-94.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!