CN101277303A - Control method for reliable controllable network architecture - Google Patents
Control method for reliable controllable network architecture Download PDFInfo
- Publication number
- CN101277303A CN101277303A CNA2008101007483A CN200810100748A CN101277303A CN 101277303 A CN101277303 A CN 101277303A CN A2008101007483 A CNA2008101007483 A CN A2008101007483A CN 200810100748 A CN200810100748 A CN 200810100748A CN 101277303 A CN101277303 A CN 101277303A
- Authority
- CN
- China
- Prior art keywords
- layer
- network
- resource
- decision
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A controllable dependable network system structure and a control method thereof are disclosed, which realizes effective control of network resources and user behavior on the basis of current network structure hierarchy, the system structure has four layers like a decision layer, an observation layer, a resource layer and a controllable interface layer, wherein the controllable interface layer achieves the interaction between the current network system and the resource layer in a manner of protocol cross-layer, the resource layer provides the observation layer with a resource stream via the protocol of the controllable interface layer, the observation layer extracts properties from a dependability stream and a logic stream to provide a view with better consistence and observability for the decision layer; the decision layer, on the ground of the observable view and in terms of current situation of the system and the overall profit maximization, sets forth a control proposal which is provided for the network through the dependable interface layer, for the purpose of control; meanwhile, dependability of each component at this moment is given out to be provided for the observation layer via the dependable interface layer in a form of dependability stream.
Description
Technical field
The present invention relates to network security and field of network management, specifically a kind of credible controlled network architecture and control method thereof, be used to realize to the expecting, can manage of network and constituent element and user behavior, for the credible controlled network of the next generation provides architecture.Belong to networking technology area.
Background technology
Nineteen eighty-three International Standards Organization (ISO:International Standardization Organizaition) has formulated Open System Interconnection (OSI:Open System Interconnection) reference model, and this model is being got irreplaceable effect aspect the standard computer network architectures.The ICP/IP protocol model comes from network architecture and the consensus standard of U.S. Department of Defense for its Advanced Research Projects Agency Network wide area network exploitation, with it serves as that the INTERNET that the basis is set up is present largest in the world computer network, just because of INTERNET's is widely-used, make TCP/IP become actual internet architecture standard, what adopt is connectionless end-to-end packet exchange, and " doing one's best " (best effort) is provided the design mechanism of service model.Along with Internet development, people follow the natural evolution of the Internet, have begun the research of next generation network.The main research contents that these network architecture and network control management are relevant is as follows:
1.OSI seven layer architectures
OSI is the abbreviation of Open System Interconnect, and it is interconnected to mean open system.International Standards Organization (International Standards Organization) has formulated osi model.This model is divided into 7 layers to the work of network service, is respectively physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.1 to 4 layer is considered to low layer, and these layers move closely related with data.5 to 7 layers is high-rise, comprises the data of application-level.Each layer is responsible for a concrete job, then data is sent to down one deck.
The 1st layer is that physical layer (also being the ground floor in the osi model) in fact is exactly that wiring, optical fiber, network interface card and other are used for two network communication equipments are linked together.The 2nd layer is data link layer, and agreements such as operation Ethernet convert Frame to binary digit for 1 layer of processing.About MAC Address, switch or network interface card and driver, belong to the 2nd layer category.The 3rd layer is network layer, may also may also will pass through a lot of communication subnets through a lot of data links between two computers that communicate in computer network.The task of network layer is exactly to select route and routing node between suitable net, guarantees that data in time transmit.Network layer is formed packet with the frame that data link layer provides, and is packaged with network layer packet header in the bag, wherein contains logical address--the network address of Source Site and point of destination dot address.The 4th layer is the transport layer of process information, and the 4th layer data cell is also referred to as packet (packets), is responsible for obtaining full detail, and end-to-end telecommunication management is provided.The 5th layer is session layer, session layer and above high-level in, the unit that data transmit is referred to as message.Session layer does not participate in concrete transmission, and it provides the mechanism of communicating by letter between the foundation that comprises visit checking and session management and the maintenance application.As server authentication user login etc.The 6th layer is presentation layer, and this one deck mainly solves the syntactic representation problem of support information.It with the data of desire exchange from being suitable for a certain user's abstract syntax, being converted to being suitable for the transfer syntax that the OSI internal system is used.Formative expression and switched data services promptly are provided.The compression and decompression of data, work such as encryption and decryption all are responsible for by presentation layer.The 7th layer is also referred to as " application layer ", is specifically designed to application program.If application layer determine the character of communicating by letter between the process with satisfy user's needs and network is provided and user application software between the data of your a kind of concrete form of program needs of interface service.SMTP, DNS and FTP are TCP/IP four layer architectures of 7 layer protocols, 2. the Internets
This agreement of TCP/IP is observed one four layers model concept: application layer, transport layer, network layer and physical interface layer.Wherein, physical interface layer is the basic unit of model, is responsible for the transmission and the reception of Frame, and frame is network information transfer unit independently.Physical interface layer is placed on frame on the net, or from network frame is taken off.The network layer interconnection protocol is dressed up the Internet datagram with data envelope, and the necessary routing algorithm of operation.Four interconnection protocols are arranged: Internet protocol IP here: be responsible for addressing and route data packets between main frame and network.ARP: obtain the hardware host address in the same physical network.Internet control messages agreement ICMP: send message, and the transmission mistake of report relevant data bag.Interconnected igmpinternet IGMP: brought to local multiplex broadcasting router report host groups member by the IP main frame.The transport layer host-host protocol provides communication session between computer.The selection of host-host protocol is decided according to data transfer mode.Two host-host protocol: transmission control protocol TCP: communicate to connect for application program provides reliably.Be suitable for once transmitting the situation of bulk data.And be applicable to and require the application program meet with a response.User Datagram Protoco (UDP) UDP: connectionless communication is provided, and has not guaranteed reliably to transmitting bag.Be suitable for once transmitting small amount of data, reliability then is responsible for by application layer.The application layer applications program is by this one deck accesses network.
Four layers of corresponding relation with seven layer architectures of OSI of ICP/IP protocol stack are: physical interface layer (corresponding OSI physical layer, data link layer), network layer (OSI network layer), transport layer (with the transport layer of OSI), application layer (OSI session layer, presentation layer, application layer)
3. the evolution of the Internet
In recent years, along with developing rapidly of Internet, the Internet has become network with fastest developing speed in three macroreticulars (the Internet, telecommunications network, television network).Four layer architectures (comprising physical interface layer, network layer, transport layer and application layer) of TCP/IP are deferred in the Internet, adopt towards connectionless packet-switch technology transmission data and the service of " doing one's best " is provided.Because it is towards connectionless characteristic, make the Internet in single transfer of data, have other networks incomparable advantage: the message transmission rate height; In addition, four layer architectures that the Internet adopted make it can carry out the interconnection of heterogeneous network, but this connectionless characteristic also is that the Internet is from the bottleneck of single data transmission network to the evolution of multiple service supporting net, " doing one's best " service characteristic that the Internet provides can not guarantee the reliability transmitted at all, and the retransmission delay time of being introduced by the transmission control protocol (TCP) of transport layer is for voice, videos etc. also are insupportable concerning the exigent business of real-time, though introduced the problem that some service quality (QoS) mechanism solves the internet transmission real time business, but these mechanism implement all to exist many problems on large scale network, can not fundamentally solve the problem of the Internet.In addition, be the fixed terminal service at the beginning of the Internet design, it is the mobility of support terminal well.
Therefore existing information network adopts the network service system structure of service-oriented, layering is built and is managed, newly-increased important service and technology all are to adopt one by one independently network level enforcement, every kind of business all has the network platform of oneself, not only the networking cost is very high, and because the management of each layer is to grow up under different historical conditions and applied environment with control method, there is very big difference in the control method of each layer, it is very complicated that the control of whole network and management become, and operation cost is very high.
Along with the differentiation of network architecture and the development of wide band multi-business mobile network technology, legacy network is to next generation network evolution.Next generation network is not a new network, merge and be based on existing multiple network evolution, current Telecoms has different views with computer bound pair next generation network, because original network foundation is obstructed, the route of evolution is obstructed, emphasis in the standard formulation process also has different with solution more, at Telecoms, the research contents of next generation network concentrates on transport layer and operation layer, on transport layer, mainly concentrate on ASON (ASON), on operation layer, mainly concentrate on soft switch, at computer circle next generation network is exactly NGI (Next Generation Internet), NGI does not have specific (special) requirements to transport layer, only need transport layer that high bandwidth as much as possible is provided, focus is at service bearer layer and operation layer, and the standard on the service bearer layer concentrates on the IPV6 agreement, concentrates on the intelligent terminal that adopts end-to-end control in the standard of operation layer.
In order to accelerate the standardized process of next generation network, ITU-T has set up next generation network focal group (FGNGN) in Geneva on May 6th, 2004, divide into business demand, architectural framework and mobility, the paraplasm amount, control and signaling, safety, network evolution, following 7 each working group such as packet network, held a meeting in average per 2 months, the standard that research and the formulation industry relevant with next generation network press for, now release comparatively concrete draft standard " the function structure model of FRA-NGN " draft standard and tentatively proposed some functional entitys of next generation network service layer and transport layer, this draft defines and analyzes the model of next generation network from the angle of logical functional entity, " FRMOB mobility functions demand " draft standard is divided between net the mobility of next generation network mobile, move in the net with Access Network is interior and move three kinds of situations, and proposed requirement and functional architecture mobile management; The business that " the manageable user network ability of CMIP " draft standard has proposed the IP network of management is to provide Internet resources control and management to the user, but managing I P net should have user grouping and multiple functions such as professional diversity, information access control and safety, mobile control and management, allocated bandwidth and SLA negotiation, end-to-end QoS configuration and priority profiles.
Computer circle standardization honor representative IETF also formulated a series of standard for next generation network, IPv6 is grouped in obstructed medium bearing mode still, comprises Ethernet, point-to-point protocol (P2P) link, Fiber Distributed Data Interface (FDDI), token ring, ARCnet etc.; The IPv6 basic agreement comprises RFC2460 (internet protocol version 6), RFC2675 (the huge bag of IPv6), RFC2507 (compression of IPv6 head), IPv6 address related protocol, comprise RFC3513 (IPv6 address structure), RFC2374 (IPv6 polymerizable global unicast address), RFC1887 (distribution of IPv6 unicast address), RFC2375 (distribution of IPv6 multicast address) etc., professional related protocol comprises the SIP that is used to set up voice or video session, is used to control the Media Gateway Control Protocol of media gateway etc.
4.GENI plan and FIND plan
The American National Natural Science Fund is planning fundamentally to redesign the Internet at present, to solve existing variety of issue, make a Next Generation Internet that is more suitable for following computer environment, and announced " global network environmental survey " project (GENI) by name on August 22nd, 2005, National Science Foundation thinks that the research emphasis of Next Generation Internet is a networking security, mobile phone, wireless and sensor network is formed general calculation entironment jointly, therefore the GENI project mainly comprises a project and builds a test environment, the project of GENI mainly comprises: set up new Core Feature, design rebaptism mechanism, address and conforming architecture, design new network management example, strengthen the fail safe of existing architecture, designed for greater reliability, the security mechanism of accountability, design a new architecture, this architecture can with new wireless technology, optical communication technique, the general fit calculation technology is worked in coordination, design higher level service and extract structure, as information object, location-based service, identity network etc.; Set up new service and application, as safer, healthy and strong, controlled Distributed Application on a large scale, the principle and the pattern of design Distributed Application are set up new network architecture principle, the complexity of research network, scalability.
In December, 2005, at the Internet FIND (Future Internet Network Design) plan has been proposed, basic thought is that two tasks of the connectedness that provides and guarantee to submit of service are separated, network edge is separated the management and the use of resource user's control and management and network core, by defining the seamless link that suitable mapping service realizes the two.The same with the GENI plan, FIND intends the information network of fundamentally redesign a new generation, to solve the serious drawback that existing network exists at aspects such as fail safe, mobility, controllabilitys.
5. the 4D structure of network management
The major function that the CMU of the U.S. (CMU) proposes in the router now is reclassified as 4 planes, data (Data), distribution (Dissemination), finds (Discovery) and make a strategic decision (Decision), i.e. 4D.State information in the network is collected by the discovery plane, is responsible for these information is published to decision-making platform by the distribution plane then; Make a strategic decision the plane according to these information calculations suitable route and network configuration, and these results of decision are dealt into datum plane.Its elementary object is by centralized management and reorganizes key function, is expected to reach the complexity of simplifying network management and the purpose that makes the status discovery automation.
CONMan has further emphasized separating of control and management function and data forwarding function on the basis of 4D, expanded the thinking of the management channels of physical separation in its signaling system, though make and logically separate data and the shared physical link of management channels among the CONMan.
On the whole, the continuous development of new technology, network system more sophisticated isomery, also variation day by day of the unusual and attack of network, the demand of service quality also constantly develops, everything makes the credible controlled network system of structure ensure that fail safe, credibility and the extensibility of network have great importance, yet, above-mentioned architecture or be based on edge opinion and towards disconnected design philosophy, make packet transmission path uncontrollable, be the architectural framework of redesign existing network, costly.And the present invention is intended to utilize the existing network architecture, a kind of credible controlled network system of the member of logic thereon, and provide corresponding control methods, and make network have fail safe when satisfying convenient the management, realize expecting, can manage to network behavior and user behavior.
Summary of the invention
Technical problem: in order to overcome the deficiencies in the prior art, the invention provides a kind of credible controlled network architecture and control method thereof, be used for realizing to user behavior, the effective control and the management of network operation state and Internet resources, be subjected at network under the situation of internal and external interference, the detection that network state is also continued user behavior, analysis and decision, and then to equipment, the Control Parameter of agreement and mechanism is carried out the adaptive optimization configuration, make the transfer of data of network, resource allocation and user's service can reach the degree of expection, the credible controlled architecture that provides for network, solve the credible controlling technology problem of current network on the whole, guaranteeing provides believable service to network operation person and user.
Technical scheme: the technical scheme that realizes the object of the invention is from increasing a credible controlled four-layer structure in logic on the basis of the TCP/IP of existing network four layer architectures, it comprises " decision-making level ", " observation layer ", " resource layer " and " credible interface layer " four levels, wherein " credible interface layer " mode of striding layer with agreement realize existing network system and resource layer alternately, resource layer will obtain based on the seasonal effect in time series user behavior by the interface layer agreement, network state and Internet resources, interface layer offers observation layer with the resource information of sequential and by the historical reliability of the relevant constituent element of decision-making level's service with the form of " logic flow ", observation layer is from abstract, extract feature in the discrete logic flow, and provide a view with better consistency and ornamental by analyzing to decision-making level, decision-making level is according to considerable view, from current situation of system and the maximized angle of interests of the whole, provide the reliability of each constituent element of logic flow, and proposition controlling schemes, offer network by credible interface layer, reach the purpose of control.
" resource layer " carries out timely perception to the various states during the network operation, this perception not only comprises the timely perception to network state, transfer of data and resource allocation etc., also comprise the monitoring that user behavior is continued, and the result of perception and monitoring offered interface layer with the form based on seasonal effect in time series resource stream, be transmitted to observation layer by interface layer;
The purpose of " observation layer " is to comprising the timely detection and Identification of degradation anomaly and user's abnormal behaviour under fault, attack and the service quality, its means are to converge from the network element resources stream of resource layer and the reliability value of giving about the network element historical behavior from decision-making level, form consistent logic flow, and from logic flow extraction feature, according to feature detection or identify unusual and situation of change, be transmitted to decision-making level by interface layer with certain considerable simple and clear form;
" decision-making level " is the formation stage of control command, result according to observation, employing is based on multiple means such as game, voting, collaborative, competitions, according to the current situation of system, provide the measure of control, this measure still is the renewal to abstract logic flow, and its renewal still offers network system by interface layer;
" credible interface layer " playing the part of the important layer mutual role that stride in this four-layer structure, decision-making, observation and three abstract logic aspects of resource have not been advanced to link up, finished the mutual of resource layer and decision-making level and network system simultaneously, this is designed into a plurality of aspects of legacy network system alternately, credible interface layer becomes the platform of all indispensable agreement of basic management various network resources, make any agreement, retransmission technique on this platform, to coexist, and finish mutual with new credible controlled system.
Network control processing under the body series is as follows:
A kind of control method of reliable controllable network architecture comprises decision-making level, observation layer, resource layer, four levels of credible interface layer; The mode that wherein credible interface layer is striden layer with agreement realizes the mutual of existing network network system and resource layer, resource layer provides resource stream by the agreement of credible interface layer for observation layer, observation layer is from comprising resource stream and trusting the logic flow that flows and extract feature, for decision-making level provides one to have better consistency and considerable view, decision-making level is according to considerable view, from current situation of system and the maximized angle of interests of the whole, controlling schemes is proposed, offer network by credible interface layer, reach the purpose of control; Provide the reliability of this each constituent element of moment simultaneously, offer by credible interface layer with the form of trusting stream and observe layer, the mutual basic element of each interlayer is a logic flow in these the four layers credible controlled architecture; The controllability that supports network system down based on the control method of reliable controllable network architecture with monitoring, detect, analyze, decision-making, control a plurality of links and the control system of a closed loop self feed back of adaptive formation, realize the complete controllability of network system in the mode of closed loop.
The various states of resource layer during to the network operation carry out timely perception, and the result of perception and monitoring is converted into based on the seasonal effect in time series resource flows, this resource stream also comprises based on seasonal effect in time series user behavior information except comprising the timing variations of network state, transfer of data and resource allocation etc.
Observation layer provides the view of the logic flow with consistency and ornamental to the upper strata, timely detection and Identification to degradation anomaly under fault, attack and the service quality and user's abnormal behaviour, from the logic flow of forming by resource stream and trust stream, extract abnormal information, judge or identify to reach situation of change unusually.
Decision-making level is the formation stage of control command, according to the result of observation, adopts based on multiple means such as game, voting, collaborative, competitions, and the current situation of coupling system provides the measure of control, and being characterized as that this measure is implemented upgraded abstract logic flow.
Credible interface layer is being played the part of the important layer mutual role that stride, and to stride the mutual shared platform pattern of layer, has linked up decision-making, observation and three abstract logic aspects of resource, finishes the mutual of resource layer and decision-making level and network system simultaneously.
The mutual basic element of each interlayer is a logic flow in four layers of credible controlled architecture, the essential characteristic of this logic flow is to have the signal fluid existing network network parameter and the service operation situation based on sequential of consistency pattern, this signal flow comprises that trusting stream is the indispensable part of this logic flow by the reliability situation of change of interface layer agreement acquisition based on seasonal effect in time series user behavior, network state and Internet resources and each network component.
Described trust stream is based on the network element reliability change sequence of sequential, and decision-making level gives its certain reliability value according to the network element historical behavior, and this reliability value can reflect ruuning situation, the invasion situation of service and resource.
Logic flow runs through decision-making level, observation layer, resource layer, credible interface layer four levels; Form a plurality of controlling units such as monitoring, detection, analysis, decision-making, control, form the control system of a closed loop self feed back adaptively.
Beneficial effect: effective part of the present invention is:
In the new credible controlled architecture,, take identical channel simultaneously, logically realized both separation though data flow and control flows both realize transmission by the credible controlled protocol layer of striding layer; In the new credible controlled architecture, all are all described with the logic flow of abstract aspect based on seasonal effect in time series network state parameter, user behavior parameter, service operation situation, realize consistent on describing of resource stream and service flow, for the ornamental of description provides the foundation; New control method based on new architecture, make whole network system move in the mode of closed loop self feed back, avoided inbreak-tolerated " graceful degradation " brought of third generation safe practice, make network system can self diagnosis, recover certainly, return stable state.
The present invention compared with prior art has the following advantages:
(1) organically merged credibility and controllability, can satisfy various network operation target, set up accurately network in time and connect view, implemented the direct control of convenient colleges and universities, be to the refinement of each aspect function of 4D network control system and replenish;
(2) set up the consistency principle based on credible considerable view, and credible interface has been broken traditional protocol hierarchy model to stride the shared pattern of layer, set up layer design of striding of agreement, providing is resource stream, trust stream, the control flows standard to describe of unified standard with the logic flow, can solve network management logical centralization problem in the present 4D hierarchy of control.
(3) traditional safety research based on next generation network is advanced to credible research, and and the network management mechanism combination, emphasize the credibility and the controllability of user behavior are measured and assessment, change defence single in the legacy network, single information security patch, provide new approaches for effectively solving network security problem.
Current society, the effect basic, of overall importance of information network strengthens day by day, the credible controlled key factor that influences social economy's harmonious development and national security that becomes of network.Yet along with the develop rapidly of network technology and application, the appearance of multiple terminals, multiple services fusion, complexity, isomery and characteristics such as ubiquitous appear in the Internet day by day, the current network system has exposed wretched insufficiency, network is striven great demonstration challenges such as facing serious safety and management, ensures the credibility of network and the active demand that controllability becomes current network development.Under this background; we propose credible controlled network architecture; solve the credible and controlled problem of network with flexi mode system, open, that stride layer; realized comprehensive consideration of Internet resources services; for credible controlled basic platform is created in the deployment of large-scale internetwork more, will contribute share for the research and the construction of China's information network of future generation.
Description of drawings
Fig. 1 is a network architecture diagram of the present invention,
Fig. 2 is the network system situation transition graph under the body series,
Fig. 3 is the control procedure figure of body series lower network system.
Embodiment
Embodiment: a kind of credible controlled network architecture as shown in Figure 1, it is not to overthrow existing OSI seven layer architectures and TCP/IP four layer architectures are rebuild a new network architecture, but increase credible four layers of controlled logical construction on this basis, it comprises " decision-making level ", " observation layer ", " resource layer " and " credible interface layer " four levels, wherein " credible interface layer " mode of striding layer with agreement realize existing network system and resource layer alternately, resource layer will obtain based on the seasonal effect in time series user behavior by the interface layer agreement, network state and Internet resources, interface layer offers observation layer with the resource information of sequential and by the historical reliability of the relevant constituent element of decision-making level's service with the form of " logic flow ", observation layer is from abstract, extract feature in the discrete logic flow, and provide a view with better consistency and ornamental by analyzing to decision-making level, decision-making level is according to considerable view, from current situation of system and the maximized angle of interests of the whole, provide the reliability of each constituent element of logic flow, and proposition controlling schemes, offer network by credible interface layer, reach the purpose of control.System is in service may pass through a plurality of states, the purpose of control is to make whole network system closed loop with self feed back in the runtime move, as shown in Figure 2, after network system is passed through intermediateness (a plurality of intermediatenesses that system disturbance produces) by initial stable state, enter control state (a plurality of intermediatenesses that system's control procedure produces), finally get back to stable state, form the control system of a closed loop.Under this is credible controlled architectural framework, the control procedure of network system as shown in Figure 3, its concrete steps are as follows:
(1) network system is changed by external disturbance, and perceptron monitors the disturbance of system, with the variation of network state and user behavior to offer observer based on time series resource stream.
(2) observer is according to carrying out accident analysis from the resource information of perceptron, and the reliability that provides according to the constituent element historical behavior from decision-making device, understand and analysis, to the doubt problem is arranged, carry out check and analysis, service quality analysis etc., thereby provide a visual view to decision-making device for whole network state and service scenario;
(3) decision-making device is according to the visual view from observer, carry out consistency analysis, these analyses comprise trusts revaluation, situation assessment, system early warning, constituent element voting, alliance's game etc., decision-making device is according to these analyses based on integral body, take concrete control measure, propagate to actuator with the form of the control flows in the logic flow;
(4) actuator is responsible for carrying out control command, not only comprises resource restructuring, system reconfiguration, constituent element isolation, also comprises the feedback to system's implementation status;
(5) control is adjusted system with disturbance, and its final purpose is that the system that makes returns stable state, and whole control process is with the closed loop self-adapting operation.
Claims (8)
1. the control method of a reliable controllable network architecture is characterized in that it comprises decision-making level, observation layer, resource layer, four levels of credible interface layer; The mode that wherein credible interface layer is striden layer with agreement realizes the mutual of existing network network system and resource layer, resource layer provides resource stream by the agreement of credible interface layer for observation layer, observation layer is from comprising resource stream and trusting the logic flow that flows and extract feature, for decision-making level provides one to have better consistency and considerable view, decision-making level is according to considerable view, from current situation of system and the maximized angle of interests of the whole, controlling schemes is proposed, offer network by credible interface layer, reach the purpose of control; Provide the reliability of this each constituent element of moment simultaneously, offer by credible interface layer with the form of trusting stream and observe layer, the mutual basic element of each interlayer is a logic flow in these the four layers credible controlled architecture; The controllability that supports network system down based on the control method of reliable controllable network architecture with monitoring, detect, analyze, decision-making, control a plurality of links and the control system of a closed loop self feed back of adaptive formation, realize the complete controllability of network system in the mode of closed loop.
2. according to the control method of the described reliable controllable network architecture of claim 1, it is characterized in that, the various states of resource layer during to the network operation carry out timely perception, and the result of perception and monitoring is converted into based on the seasonal effect in time series resource flows, this resource stream also comprises based on seasonal effect in time series user behavior information except comprising the timing variations of network state, transfer of data and resource allocation etc.
3. the control method of reliable controllable network architecture according to claim 1, it is characterized in that, observation layer provides the view of the logic flow with consistency and ornamental to the upper strata, timely detection and Identification to degradation anomaly under fault, attack and the service quality and user's abnormal behaviour, from the logic flow of forming by resource stream and trust stream, extract abnormal information, judge or identify to reach situation of change unusually.
4. the control method of reliable controllable network architecture according to claim 1, it is characterized in that decision-making level is the formation stage of control command, result according to observation, employing is based on multiple means such as game, voting, collaborative, competitions, the current situation of coupling system, provide the measure of control, being characterized as that this measure is implemented upgraded abstract logic flow.
5. the control method of reliable controllable network architecture according to claim 1, it is characterized in that credible interface layer playing the part of the important layer mutual role that stride, to stride the mutual shared platform pattern of layer, link up decision-making, observation and three abstract logic aspects of resource, finished the mutual of resource layer and decision-making level and network system simultaneously.
6. the control method of reliable controllable network architecture according to claim 1, it is characterized in that the mutual basic element of each interlayer is a logic flow in four layers of credible controlled architecture, the essential characteristic of this logic flow is to have the signal fluid existing network network parameter and the service operation situation based on sequential of consistency pattern, this signal flow comprises that trusting stream is the indispensable part of this logic flow by the reliability situation of change of interface layer agreement acquisition based on seasonal effect in time series user behavior, network state and Internet resources and each network component.
7. according to the control method of claim 3 or 6 described reliable controllable network architectures, it is characterized in that described trust stream is based on the network element reliability change sequence of sequential, decision-making level gives its certain reliability value according to the network element historical behavior, and this reliability value can reflect ruuning situation, the invasion situation of service and resource.
8. the control method of credible controlled architecture according to claim 1 is characterized in that logic flow runs through decision-making level, observation layer, resource layer, credible interface layer four levels; Form a plurality of controlling units such as monitoring, detection, analysis, decision-making, control, form the control system of a closed loop self feed back adaptively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101007483A CN101277303B (en) | 2008-05-16 | 2008-05-16 | Control method for reliable controllable network architecture |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101007483A CN101277303B (en) | 2008-05-16 | 2008-05-16 | Control method for reliable controllable network architecture |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101277303A true CN101277303A (en) | 2008-10-01 |
CN101277303B CN101277303B (en) | 2011-06-29 |
Family
ID=39996315
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008101007483A Expired - Fee Related CN101277303B (en) | 2008-05-16 | 2008-05-16 | Control method for reliable controllable network architecture |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101277303B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101800755A (en) * | 2010-03-30 | 2010-08-11 | 东南大学 | Method for realizing credible and controllable network protocol |
CN102752133A (en) * | 2012-06-18 | 2012-10-24 | 东南大学 | Mechanism and method for constructing consistency view in autonomous domain in credible controllable network |
CN102752134A (en) * | 2012-06-18 | 2012-10-24 | 东南大学 | Trusted controllable network-based control information descriptive model and descriptive method |
CN102932177A (en) * | 2012-10-30 | 2013-02-13 | 东南大学 | Inter-domain distributed resource control method |
CN103619031A (en) * | 2012-12-18 | 2014-03-05 | 徐培杰 | Wireless network adaptive power control setting algorithm |
CN105515822A (en) * | 2015-11-24 | 2016-04-20 | 武汉邮电科学研究院 | Internet architecture driven by big data and realization method |
CN105871593A (en) * | 2016-03-21 | 2016-08-17 | 东南大学 | Method for implementing control mechanism of reliable and controllable network |
CN106815086A (en) * | 2017-01-13 | 2017-06-09 | 邦彦技术股份有限公司 | Communication control framework based on Loongson platform |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136928B (en) * | 2007-10-19 | 2012-01-11 | 北京工业大学 | Reliable network access control system |
-
2008
- 2008-05-16 CN CN2008101007483A patent/CN101277303B/en not_active Expired - Fee Related
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101800755A (en) * | 2010-03-30 | 2010-08-11 | 东南大学 | Method for realizing credible and controllable network protocol |
CN102752133A (en) * | 2012-06-18 | 2012-10-24 | 东南大学 | Mechanism and method for constructing consistency view in autonomous domain in credible controllable network |
CN102752134A (en) * | 2012-06-18 | 2012-10-24 | 东南大学 | Trusted controllable network-based control information descriptive model and descriptive method |
CN102752133B (en) * | 2012-06-18 | 2015-02-18 | 东南大学 | Mechanism and method for constructing consistency view in autonomous domain in credible controllable network |
CN102932177A (en) * | 2012-10-30 | 2013-02-13 | 东南大学 | Inter-domain distributed resource control method |
CN103619031A (en) * | 2012-12-18 | 2014-03-05 | 徐培杰 | Wireless network adaptive power control setting algorithm |
CN105515822A (en) * | 2015-11-24 | 2016-04-20 | 武汉邮电科学研究院 | Internet architecture driven by big data and realization method |
CN105871593A (en) * | 2016-03-21 | 2016-08-17 | 东南大学 | Method for implementing control mechanism of reliable and controllable network |
CN106815086A (en) * | 2017-01-13 | 2017-06-09 | 邦彦技术股份有限公司 | Communication control framework based on Loongson platform |
WO2018129757A1 (en) * | 2017-01-13 | 2018-07-19 | 邦彦技术股份有限公司 | Loongson platform-based communication control framework |
CN106815086B (en) * | 2017-01-13 | 2020-04-14 | 邦彦技术股份有限公司 | Communication control device based on Loongson platform |
Also Published As
Publication number | Publication date |
---|---|
CN101277303B (en) | 2011-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101277303B (en) | Control method for reliable controllable network architecture | |
Song et al. | Enabling heterogeneous deterministic networks with smart collaborative theory | |
Feldmann | Internet clean-slate design: what and why? | |
Lin et al. | A west-east bridge based SDN inter-domain testbed | |
CN106603147B (en) | Space-sky information network business retransmission method based on software defined network | |
Vasseur et al. | Interconnecting smart objects with ip: The next internet | |
CN101606373B (en) | Communications method for a packet-switched network and network employing the method | |
CN109962825A (en) | The method and device of transmission quantity is monitored in a network | |
CN107819742B (en) | System architecture and method for dynamically deploying network security service | |
CN102694732B (en) | Method and system for constructing virtual network based on local virtualization | |
CN107181691A (en) | The method, apparatus and system of message routing are realized in a kind of network | |
WO2024016642A1 (en) | Sdn-based intelligent ship network system | |
Heller et al. | Ripcord: a modular platform for data center networking | |
CN102932251B (en) | Realize the method and apparatus of local three layers of termination | |
Bekri et al. | Softwarized Internet of Things network monitoring | |
Burakowski et al. | Virtualized network infrastructure supporting co-existence of Parallel Internets | |
CN101374096B (en) | Virtual concurrent internet architecture | |
Samimi et al. | Service clouds: distributed infrastructure for adaptive communication services | |
Zhang et al. | A systematic review for smart identifier networking | |
CN106357443B (en) | A kind of method and apparatus of network configuration | |
Muazu et al. | Network configuration by utilizing cisco technologies with proper segmentation of broadcast domain in FNAS-UMYUK Nigeria | |
Gu et al. | Towards self-optimizing protocol stack for autonomic communication: Initial experience | |
Rus et al. | Cross-layer QoS and its application in congestion control | |
Eraslan et al. | A scalable network architecture for distributed virtual environments with dynamic QoS over 1Pv6 | |
Durand | New IP |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110629 Termination date: 20140516 |