Computer Science ›› 2021, Vol. 48 ›› Issue (11): 372-377.doi: 10.11896/jsjkx.210400061

• Computer Network • Previous Articles    

Study on Performance Optimization of Edge Devices Based on Two-layer Virtualization

TAO Zhi-yong1,2, ZHANG Jin2,3, YANG Wang-dong2, CHEN Wei-man1,3   

  1. 1 Software School,Changsha Social Work College,Changsha 410004,China
    2 College of Computer Science and Electronic Engineering,Changsha 410082,China
    3 College of Computer Science and Electronic Engineering,Hunan Normal University,Changsha 410012,China
  • Received:2021-04-06 Revised:2021-07-01 Online:2021-11-15 Published:2021-11-10
  • About author:TAO Zhi-yong,born in 1980,postgra-duate,associate professor,is a member of China Computer Federation.His main research interests include network communication and cloud computing.
    ZHANG Jin,born in 1979,postgra-duate,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include network communication,cloud computing and software engineering.
  • Supported by:
    National Natural Science Foundation of China(61872127),Research Foundation of the Education Department of Hunan Province(19C0106,17C0084)and Achievements of “Various College-level Cultivation Projects” of Changsha Social Work College(21mypy86).

Abstract: With the continuous increase in the number of users which access to ISP's edge devices,the amount of data needs to be processed has doubled,which causes the edge device to be overloaded,and affects the normal interaction of the virtual private network data constructed by the multi-protocol label switching and the border gateway protocol.At this stage,the MCE,HOPE and SDN solutions all have certain limitations in solving this problem:the MCE mode edge device interface does not support the creation of logical channels,the solution cannot be used;the HOPE mode causes problems such as routing loops;the number of concurrent sessions processed by a single SDN controller in the SDN mode cannot exceed 64 000.In response to the above problems,an edge device optimization solution based on dual-layer virtualization is proposed.This solution includes the following three basic steps:edge device virtualization,virtual private network tunnel establishment,and virtual private network information isolation.On this basis,the solution is optimized from the network model,the construction of the network resource pool and the splitting of the network resource pool.The performance of the solution is evaluated based on the experimental environment,and compared with the virtual private network constructed in the traditional way in terms of packet forwarding rate,manageability,and sca-lability.The analysis results show that the dual-layer virtual solution which is designed to construct a network resource pool can realize the unified scheduling and management of resources,effectively solve the overloaded problem of ISP's edge equipment,and also be an effective solution for building a virtual private network.

Key words: Border gateway protocol, Edge device, Multi-protocol label switching, Virtual private network, Virtualization

CLC Number: 

  • TP393
[1]QIAN X D.Application of MPLS VPN technology in JiangyinCity Emergency Broadcasting System Network [J].China Cable TV,2021(3):241-244.
[2]LI J,CHEN Z,SUN W.The concept of MPLS-based VPN tech-nology applied to enterprise network outgoing line backup[J].Communication Technology,2019,52(5):1167-1173.
[3]WANG H Y.Research on the Application of MPLS in Military Informatization Construction[D].Dalian:Dalian University of Technology,2010:72-84.
[4]LI Y F.Simulation design of enterprise cross-domain networking based on BGP MPLS VPN[J].Laboratory Research and Exploration,2021,40(3):121-128.
[5]SONG G J,HU C,ZHOU F.MPLS-VPN architecture optimization based on layered PE technology[J].Computer Engineering,2017,43(6):66-72.
[6]SHENG W S,ZHOU C,SUN Y W.The application of MPLS VPN in enterprise networks [J].Computer Technology and Development,2020,30(11):117-122.
[7]DONG X Y,CHANG P,WANG B L,et al.Design and research of campus network MPLS VPN system[J].Computer Applications and Software,2017,34(10):209-213.
[8]WANG G Z,WANG P,LUO Z Y,et al.An MPLS VPN-based model for building education network of decentralized campus library[J].Journal of Harbin University of Science and Technology,2017,22(3):31-35.
[9]ZHANG X Y,WEI G W.Research and Implementation ofMPLS L2 Layer VPN Technology Based on GRE and IPSec[J].Cyberspace Security,2020,11(5):85-90.
[10]KANG B H,BALITANAS M O.Vulnerabilities of VPN using IPSec and defensive measures[J].International Journal of Advanced Science and Technology,2009,8(7):9-18.
[11]SHENG W S,ZHOU C,SUN Y W.Application of MPLS VPN in Enterprise Networks[J].Computer Technology and Development,2020,30(11):117-122.
[12]HONG X J.The Application of Virtual Network Technology in Computer Network Security[J].Network Security Technology and Application,2020(10):41-43.
[13]HUANG S P,XIE J,KAN H Y.Research on the Application of IRF Virtualization Technology in the Network[J].Experimental Technology and Management,2014,31(11):124-126.
[14]BAO L L,TANG H S,JIANG S Y,et al.Research on the design of meteorological network based on IRF2 and LACP MAD[J].Computer Applications and Software,2019,36(1):37-141.
[15]CHEN M,TAO X M,HU C,et al.Design and implementation of network test platform based on network function virtualization[J].Chinese Journal of Computers,2018,41(9):2016-2028.
[16]ABENI L,KIRALY C,LI N,et al.On the performance of KVM-based virtual routers[J].Computer Communications,2015,38(5):40-53.
[17]WANG J W,ZHANG X L,LI Q,et al.Research progress of network function virtualization technology[J].Chinese Journal of Computers,2019,42(2):185-206.
[18]ZHOU W L,YANG X,XU M W.Overview of Research on Network Function Virtualization Technology[J].Computer Research and Development,2018,55(4):675-688.
[1] SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251.
[2] ZHU Guo-hui, ZHANG Yin, LIU Xiu-xia, SUN Tian-ao. Energy Efficient Virtual Network Mapping Algorithms Based on Node Topology Awareness [J]. Computer Science, 2020, 47(9): 270-274.
[3] WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254.
[4] LI Peng-fei, CHEN Ming, DENG Li, QIAN Hong-yan. NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol [J]. Computer Science, 2019, 46(6A): 343-347.
[5] CHEN Hao, LUO Lei, LI Yun, CHEN Li-rong. Study on Formal Verification of Secure Virtual Machine Monitor [J]. Computer Science, 2019, 46(3): 170-179.
[6] MA Xiao-jin, RAO Guo-bin, XU Hua-hu. Research on Task Scheduling in Cloud Computing [J]. Computer Science, 2019, 46(3): 1-8.
[7] XUE Hao, CHEN Ming, QIAN Hong-yan. NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller [J]. Computer Science, 2019, 46(10): 135-140.
[8] LI Zhen-tao, MENG Xiang-ru , ZHAO Zhi-yuan, SU Yu-ze. Virtual Network Reconfiguration Algorithm for Nodes Load Balancing [J]. Computer Science, 2018, 45(7): 95-98.
[9] ZHUANG Xiao-zhao, WAN Ji-guang, ZHANG Yi-wen, QU Xiao-yang. Energy Consumption Optimization Scheme for New Energy-driven Storage System [J]. Computer Science, 2018, 45(7): 66-72.
[10] TANG Hong-mei and ZHENG Gang. Design and Optimization on Virtual Desktop Infrastructure Based on KVM [J]. Computer Science, 2017, 44(Z6): 560-562.
[11] KE Wen-jun, DONG Bi-dan and GAO Yang. Survey of Virtualization Access Control Research Based on Xen [J]. Computer Science, 2017, 44(Z6): 24-28.
[12] WANG Xue-shun, YU Shao-hua and DAI Jin-you. Virtualization Deep Packet Inspection Deployment Method [J]. Computer Science, 2017, 44(8): 90-94.
[13] WU Ze-hui, WEI Qiang and WANG Qing-xian. Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network [J]. Computer Science, 2017, 44(6): 121-132.
[14] WU Guo, FANG Li-guo and XU Xiao-hui. Node Reusable Virtual Network Embedding Algorithm Based on Network Shrinking [J]. Computer Science, 2017, 44(6): 91-93.
[15] DIAO Ming-zhi, ZHOU Yuan, LI Zhou-jun and ZHAO Yu-fei. Windows Security Mechanisms Simulation and Sandbox System Implementation Based on Wine [J]. Computer Science, 2017, 44(11): 246-252.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!