Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (5): 21-31.doi: 10.11959/j.issn.2096-109x.2019047
• Special Column: Routing Technology in Complex Network Environment • Previous Articles Next Articles
Wei HUANG, Ran LU, Cuncai LIU, Sibo QI()
Revised:
2019-03-18
Online:
2019-10-15
Published:
2019-11-02
Supported by:
CLC Number:
Wei HUANG, Ran LU, Cuncai LIU, Sibo QI. QoS routing algorithm based on multiple domain architecture of SDN[J]. Chinese Journal of Network and Information Security, 2019, 5(5): 21-31.
[1] | WANG Z , CROWCROFT J . QoS routing for supporting resource reservation[J]. IEEE Journal on Selected Areas in Communications, 1996,14(7): 1228-1234. |
[2] | HEDRICKCL.Routing information protocol 1988[S]. |
[3] | MOY J . OSPF Version 2[S]. 1997. |
[4] | BIANCO , ANDREA , .et al. OpenFlow switching:data plane performance[C]// IEEE International Conference on ICC. 2010: 1-5. |
[5] | MCKEOWN N , . Software defined mobile networks[C]// Tenth ACM International Symposium on Mobile Ad Hoc Networking & Computing. 2009. |
[6] | PFAFF B . OpenFlow switch specification version 1.10 implemented (Wire Protocol 0x02)[S]. 2011. |
[7] | Open Networking Foundation (ONF).SND Architecture Overview[S].2013. 2013. |
[8] | GUDE N , KOPONEN T'PETTIT J ,et al. Nox:towards an operating system for networks[J]. ACM SIGCOMM Computer Communication Review, 2008,38(3): 105-110. |
[9] | KOPONEN T , CASADO M , GUDE N ,et al. Onix:a distributed control platform for large-scale production networks[C]// Usenix Symposi um on Operating Systems Design & Implementation, 2010(10): 1-6. |
[10] | ROTHENBERG C E , NASCIMENTO M K SALVADORM R ,et al. Revisiting routing control platforms with the eyes and muscles of software-defined networking[C]// The First Workshop on Hot Topics in Software Defined Networks. 2012: 13-18. |
[11] | LIN P , BI J , WANG Y . East-west bridge for SDN network peering[C]// Frontiers in Internet Technologies.Berlin:Springer. 2013: 170-181. |
[12] | GAREY M S , JOHNSON D S . Computers and intractability:a guide to the theory of NP-completeness.Oxford:Freeman[M]. W.H.. 1979. |
[13] | 崔勇, 吴建平, 徐恪 ,等. 互联网络服务质量路由算法研究综述[J]. 软件学报, 2002,13(11): 2065-2075. |
CUI Y , WU J P , XU L . A survey on research of quality of service routing algorithms in internet[J]. Journal of Software, 2002,13(11): 2065-2075. | |
[14] | 董占丽 . 基于 SDN 的农垦 EDRP 路由协议研究[J]. 信息技术, 2014,38(3): 198-202. |
DONG Z L . Discussion on Nongken EDRP protocol based on SDN[J]. Information Technology, 2014,38(3): 198-202. | |
[15] | 王歆平, 王茜, 刘恩慧 ,等. 基于SDN的按需智能路由系统研究与验证[J]. 电信科学, 2014,30(4): 8-14. |
WANG X P , WANG Q , LIU E H . Research and Verification on SDN-Based On-Demand Smart Routing System[J]. Telecommunications Science, 2014,30(4): 8-14. | |
[16] | DOSHI M , KAMDAR A . Multi-constraint QoS disjoint multipath routing in SDN[C]// 2018 Moscow Workshop on Electronic and Networking Technologies (MWENT). 2018: 1-5. |
[17] | HATA M , SOYLU M , IZUMI S ,et al. Design of SDN based end-to-end routing over multiple domains for mobility management[C]// Network and Service Management (CNSM),2017 13th International Conference on. IEEE, 2017: 1-4. |
[18] | SALAMA H F , REEVES D S , VINIOTIS Y A . Distributed algorithm for delay-constrained unicast routing[J]. IEEE/ACM Transactions on Networking, 2000,8(2): 239-250. |
[19] | 杨建华 . 基于启发式多约束最优路径的软件定义网络服务质量路由算法研究[D]. 陕西:西安电子科技大学, 2015. |
YANG J H . Research on quality-of-service routing algorithm in software defined network based on heuristic multi-constraint optimal path[D]. Shaanxi:Xidian University, 2015. | |
[20] | 陈章迎, 朱尚明 . 基于重叠网络的多路径路由设计和实现[J]. 通信学报, 2018,39(S1): 200-205. |
CHEN Y Z , ZHU S M . Designing and implementation of multi-path QoS routing algorithm based on overlay network[J]. Journal on Communications, 2018,39(S1): 200-205. | |
[21] | 孔德慧 . 基于SDN的多限制多路径QoS路由算法研究[D]. 北京:北京邮电大学, 2018. |
KONG D H . Routing algorithm for qos with multi constraints and multipath based on SDN[D]. Beijing:Beijing University of Posts and Telecommunications, 2018. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|