Computer Science ›› 2021, Vol. 48 ›› Issue (11): 372-377.doi: 10.11896/jsjkx.210400061
• Computer Network • Previous Articles
TAO Zhi-yong1,2, ZHANG Jin2,3, YANG Wang-dong2, CHEN Wei-man1,3
CLC Number:
[1]QIAN X D.Application of MPLS VPN technology in JiangyinCity Emergency Broadcasting System Network [J].China Cable TV,2021(3):241-244. [2]LI J,CHEN Z,SUN W.The concept of MPLS-based VPN tech-nology applied to enterprise network outgoing line backup[J].Communication Technology,2019,52(5):1167-1173. [3]WANG H Y.Research on the Application of MPLS in Military Informatization Construction[D].Dalian:Dalian University of Technology,2010:72-84. [4]LI Y F.Simulation design of enterprise cross-domain networking based on BGP MPLS VPN[J].Laboratory Research and Exploration,2021,40(3):121-128. [5]SONG G J,HU C,ZHOU F.MPLS-VPN architecture optimization based on layered PE technology[J].Computer Engineering,2017,43(6):66-72. [6]SHENG W S,ZHOU C,SUN Y W.The application of MPLS VPN in enterprise networks [J].Computer Technology and Development,2020,30(11):117-122. [7]DONG X Y,CHANG P,WANG B L,et al.Design and research of campus network MPLS VPN system[J].Computer Applications and Software,2017,34(10):209-213. [8]WANG G Z,WANG P,LUO Z Y,et al.An MPLS VPN-based model for building education network of decentralized campus library[J].Journal of Harbin University of Science and Technology,2017,22(3):31-35. [9]ZHANG X Y,WEI G W.Research and Implementation ofMPLS L2 Layer VPN Technology Based on GRE and IPSec[J].Cyberspace Security,2020,11(5):85-90. [10]KANG B H,BALITANAS M O.Vulnerabilities of VPN using IPSec and defensive measures[J].International Journal of Advanced Science and Technology,2009,8(7):9-18. [11]SHENG W S,ZHOU C,SUN Y W.Application of MPLS VPN in Enterprise Networks[J].Computer Technology and Development,2020,30(11):117-122. [12]HONG X J.The Application of Virtual Network Technology in Computer Network Security[J].Network Security Technology and Application,2020(10):41-43. [13]HUANG S P,XIE J,KAN H Y.Research on the Application of IRF Virtualization Technology in the Network[J].Experimental Technology and Management,2014,31(11):124-126. [14]BAO L L,TANG H S,JIANG S Y,et al.Research on the design of meteorological network based on IRF2 and LACP MAD[J].Computer Applications and Software,2019,36(1):37-141. [15]CHEN M,TAO X M,HU C,et al.Design and implementation of network test platform based on network function virtualization[J].Chinese Journal of Computers,2018,41(9):2016-2028. [16]ABENI L,KIRALY C,LI N,et al.On the performance of KVM-based virtual routers[J].Computer Communications,2015,38(5):40-53. [17]WANG J W,ZHANG X L,LI Q,et al.Research progress of network function virtualization technology[J].Chinese Journal of Computers,2019,42(2):185-206. [18]ZHOU W L,YANG X,XU M W.Overview of Research on Network Function Virtualization Technology[J].Computer Research and Development,2018,55(4):675-688. |
[1] | SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251. |
[2] | ZHU Guo-hui, ZHANG Yin, LIU Xiu-xia, SUN Tian-ao. Energy Efficient Virtual Network Mapping Algorithms Based on Node Topology Awareness [J]. Computer Science, 2020, 47(9): 270-274. |
[3] | WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254. |
[4] | LI Peng-fei, CHEN Ming, DENG Li, QIAN Hong-yan. NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol [J]. Computer Science, 2019, 46(6A): 343-347. |
[5] | CHEN Hao, LUO Lei, LI Yun, CHEN Li-rong. Study on Formal Verification of Secure Virtual Machine Monitor [J]. Computer Science, 2019, 46(3): 170-179. |
[6] | MA Xiao-jin, RAO Guo-bin, XU Hua-hu. Research on Task Scheduling in Cloud Computing [J]. Computer Science, 2019, 46(3): 1-8. |
[7] | XUE Hao, CHEN Ming, QIAN Hong-yan. NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller [J]. Computer Science, 2019, 46(10): 135-140. |
[8] | LI Zhen-tao, MENG Xiang-ru , ZHAO Zhi-yuan, SU Yu-ze. Virtual Network Reconfiguration Algorithm for Nodes Load Balancing [J]. Computer Science, 2018, 45(7): 95-98. |
[9] | ZHUANG Xiao-zhao, WAN Ji-guang, ZHANG Yi-wen, QU Xiao-yang. Energy Consumption Optimization Scheme for New Energy-driven Storage System [J]. Computer Science, 2018, 45(7): 66-72. |
[10] | TANG Hong-mei and ZHENG Gang. Design and Optimization on Virtual Desktop Infrastructure Based on KVM [J]. Computer Science, 2017, 44(Z6): 560-562. |
[11] | KE Wen-jun, DONG Bi-dan and GAO Yang. Survey of Virtualization Access Control Research Based on Xen [J]. Computer Science, 2017, 44(Z6): 24-28. |
[12] | WANG Xue-shun, YU Shao-hua and DAI Jin-you. Virtualization Deep Packet Inspection Deployment Method [J]. Computer Science, 2017, 44(8): 90-94. |
[13] | WU Ze-hui, WEI Qiang and WANG Qing-xian. Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network [J]. Computer Science, 2017, 44(6): 121-132. |
[14] | WU Guo, FANG Li-guo and XU Xiao-hui. Node Reusable Virtual Network Embedding Algorithm Based on Network Shrinking [J]. Computer Science, 2017, 44(6): 91-93. |
[15] | DIAO Ming-zhi, ZHOU Yuan, LI Zhou-jun and ZHAO Yu-fei. Windows Security Mechanisms Simulation and Sandbox System Implementation Based on Wine [J]. Computer Science, 2017, 44(11): 246-252. |
|