2023年全國(guó)碩士研究生考試考研英語(yǔ)一試題真題(含答案詳解+作文范文)_第1頁(yè)
已閱讀1頁(yè),還剩39頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、<p>  Authorized licensed use limited to: GUILIN UNIVERSITY OF ELECTRONIC TECHNOLOGY. Downloaded on April 21,2010 at 07:38:02 UTC from IEEE Xplore. Restrictions apply. 80 </p><p>  Netflow-based campus

2、network traffic management system </p><p>  1 Prasad Calyam, 2 Dima Krymskiy, 2 Mukundan Sridharan, 1 Paul Schopis </p><p>  1 OARnet, 1224 Kinnear Road,Columbus, Ohio 43212. </p><p&g

3、t;  Email:{pcalyam, pschopis}@oar.net </p><p>  2 Department of Computer Science and Engineering, </p><p>  The Ohio State University, Columbus, Ohio 43210. </p><p>  Email:{krymski

4、y, sridhara}@cse.ohio-state.edu </p><p>  Abstract--In recent years, with the campus network size, complexity increases, the building in the campus network, the application of more and more, which makes a va

5、riety of network problems resulting, for such a large complex networks to solve network problems is the key issue of positioning. Therefore, relevant information on network traffic and monitoring the implementation of sc

6、ientific and rational and in-depth analysis, become an important element of network management, while it is for the</p><p>  This chapter describes the development trend of network management and network man

7、agement, analysis techniques based on NetFlow traffic management system needs to achieve. The second chapter analyzes the current popular network data stream collection method, compared their advantages and disadvantages

8、, and introduces the principle of NetFlow technology, data formats, and its various applications. Chapter III introduces the design flow management system to analyze the function of each subsystem. </p><p> 

9、 I. INTRODUCTION </p><p>  1. Background </p><p>  With the rapid growth of Internet applications, more and more web applications need to understand the flow of the network operation parameters,

10、 to support the services can be distinguished. By monitoring network traffic analysis and network management technology related business, you can monitor the network, including the monitoring of network operation, networ

11、k resources, network performance monitoring and surveillance. Monitoring quality control results will help the network and supporting net</p><p>  pathological routing, under long-term observation network ro

12、uting, routing data to develop strategies. In addition, network traffic analysis can also be applied to different Internet Service Provider ISP comparison of the quality of service, the proxy server automatically select

13、and many other areas, while simulated Internet environment, protocol design and evaluation, and provide dynamic network analysis of survival basis. </p><p>  In this paper, design a campus network based on N

14、etFlow traffic management system to be implemented in Hexi College campus network traffic statistics and management of the ports can also monitor and analyze the different types of data, enabling data on the campus netwo

15、rk to view and management. </p><p>  2. The basic concept of network management and content </p><p>  Network management refers to the supervision, organization and control of network communicat

16、ions services, and information processing activities necessary for the general term. From the technical point of view, the network management process typically includes data acquisition, data processing, and then submitt

17、ed to the manager, for use in network operations. It may also include an analysis of the data and provide solutions, even while managers may not need to bother to handle some things. Furth</p><p>  With the

18、development and popularization of computer networks, network management is increasingly important. Not powerful management tools and effective management of technology is unable to organize coordination and efficient ope

19、ration of the network.. </p><p>  2.1 Network management needs and goals </p><p>  1)the demand for network management </p><p>  While networks and distributed processing systems fo

20、r commercial applications and even to the people's daily life has become increasingly important role, the computer network of individuals and enterprises are increasingly becoming an indispensable tool for daily acti

21、vities. Many companies, state organs and institutions of higher learning need to use every day on the network data such as e-mail and fax, video conferencing and voice services, etc. to ensure their normal work.. </p&

22、gt;<p>  On the other hand the composition of the computer more and more complex, it is mainly manifested in the increasingly large scale networking, and networking equipment is a heterogeneous multi-device, multi

23、-manufacturer environment, multi-protocol, there is no doubt this new situation increase the difficulty of network management. Management of such networks by hand is a powerless, so the network management is an urgent ta

24、sk. </p><p>  2)The goal of network management </p><p>  Network management goal is to reduce the fault time, to improve and enhance the response time, improve equipment utilization; reduce netw

25、ork operating costs, improve network efficiency, reduce network bottlenecks, and can adapt to a variety of multimedia technology to make it easier for more secure network use. Authorized licensed use limited to: GUILIN U

26、NIVERSITY OF ELECTRONIC TECHNOLOGY. Downloaded on April 21,2010 at 07:38:02 UTC from IEEE Xplore. Restrictions apply. 82 </p><p>  2.2 The field of network management technology </p><p>  Networ

27、k management technology are mainly related to the following research areas [2-3]. </p><p>  ·flow measurement. Interest for a particular network link, to accurately capture network activity measurements

28、. In the network-level traffic analysis and measurement, the need to measure data, including network topology, link capacity, queuing delay, connection availability, dynamic routing and other data types. </p><

29、p>  ·modeling. This is the network behavior and traffic analysis of the core technical problems, only to establish a reasonable description of the network model, has been able to receive traffic data is used to d

30、escribe the network performance and to achieve the forecast of future network behavior. </p><p>  ·management and control. From the measurement and modeling using the knowledge gained to achieve the rat

31、ional allocation of Internet resources and use. Network traffic flow measurement is to obtain data, conduct traffic analysis and monitoring of the key and the foundation. Flow measurement of many categories, such as by m

32、easuring the way, is divided into active and passive measurement measurement; according to the number of measurement points, divided into single-point measurement and multi-poi</p><p>  Active measurement to

33、 the network by sending data, observations, and the time required to send data to study the behavior of the network. So far, people do most of the projects involve the active measurement techniques, such as the United St

34、ates, NIMI project, using ping, traceroute, mtrace other active measurement tools. To June 2000, the Internet run active measurement monitors the source site 116 (U.S. 114, New Zealand, Norway, 1 each), the purpose of th

35、e site was measured about 13 340 [5]. T</p><p>  In passive measurement, the recorded network activity probe was access to the network, test a low in most cases, the connection between the receiving network

36、node, the summary and record the connection piece of the information flow of business. Passive measurement of the ongoing projects include: the U.S. National Science Foundation (NSF)-funded National Laboratory for Applie

37、d Network Research (NLANR) Measurement Project (PMA), Berkeley University and IBM jointly developed SPAND projects [6]. Pa</p><p>  install the necessary measurement point software and hardware equipment, th

38、e measurement is limited by the scope of this [7]. </p><p>  In terms of the number of measurement points from the network into a single point measurement and multi-point measurement. Typical example of sing

39、le point measurement is the Bell Labs Internet Mapping Project, the project has successfully described the Kosovo war in Yugoslavia and Kosovo during the two network topology changes, is the field of network measurement

40、applications in the military model. Single-point measurement because measurement capability is limited, collection of information is n</p><p>  Performance measurement, project carried out a lot about. One i

41、s to carry out performance measurement of a specific network maintenance and management, security and service quality; the other hand, forecasting network performance to every certain time interval, periodically monitors

42、 and dynamically forecasts (all kinds of network and computing resources), network performance. Performance measurement process, data collection, after a moment, the numerical model can predict the next time the TCP /<

43、;/p><p>  3. The development trend of network management technology </p><p>  3.1The development of network management standards </p><p>  With the Internet's development, network

44、management has gone through several stages of this [11-12]: </p><p>  ·manual management of early stage of development in the Internet, the network of smaller, user requirements on the reliability of th

45、e network is not too high, management is basically hand to meet, management expert from the proficient communication protocols to solve. </p><p>  ·A simplified network management tools is through the I

46、nternet ICMP (Internet Control Message Protocol) implementation, the effectiveness of its network management is that it provides a transmission from the router or host control information to other routers or hosts mechan

47、ism, and provide feedback on problems. ICMP's echo / echo-reply message pair, provided both parties to communicate in the test may, for example commonly used ping command. Another time stamp and time stamp to respond

48、 to news </p><p>  · Internet managers developed a dedicated network management tools These tools are mainly divided into two categories: real-time work tools and collect data for analysis by the non-re

49、al-time tool. These tools provide only one or some specific functions, such as the widely-used Traceroute, can be used to seek to reach a destination through the path, this also can determine not reach the destination of

50、 the failures. Use these tools to some extent alleviate the contradiction between the network man</p><p>  ·based on SNMP (Simple Network Management Protocol) of the overall Authorized licensed use limi

51、ted to: GUILIN UNIVERSITY OF ELECTRONIC TECHNOLOGY. Downloaded on April 21,2010 at 07:38:02 UTC from IEEE Xplore. Restrictions apply. 84 </p><p>  management of the [13-14] the first Internet Architecture Bo

52、ard intends to use the OSI management program, but the regulatory framework has been discussed in the short term can not be achieved. The late 90's, Internet's rapid development and network management is weak, so

53、 that the Commission's own Internet architecture to define a common standardized network management architecture and protocols. 1988 formed a SNMPvl, 1993, the published SNMPv2, SNMP quickly the broad support network

54、 manufacture</p><p>  3.2 The development trend of network management technology </p><p>  Network in the continuous development of the user's demand is also growing, therefore, network mana

55、gement, continuous development of technology needs to move. The current trends include the following [15-16]. </p><p>  1)integrated network management </p><p>  From a single platform allows us

56、ers to manage multiple network protocols, operating platform through a multiple interconnection of network management, network management system that is integrated (INMS). </p><p>  2)Intelligent Network Man

57、agement </p><p>  This is the network management is an important development, especially in the fault management functions. Intelligent network management can better deal with network structure and network e

58、lements of uncertainty; to strengthen the capacity of the network management system collaboration and interoperability; rule-based intelligent network management system better able to adapt to changes in the network; int

59、elligence of network management by the interpretation and reasoning ability with according </p><p>  3)Distributed management of network management </p><p>  This is an important network managem

60、ent direction for the development plan it from the hierarchy of network management system operating mode and maintenance methods, network management, distributed management is an important trend. </p><p>  3

61、.3Overview of network managementa </p><p>  In recent years, due to computer, network, information management database and related application technology development, Internet and Intranet has been widely us

62、ed in China's information construction in the education sector is under unprecedented attention. Digitization of information resources to achieve a high degree of information sharing, which for teachers, students and

63、 research technicians for their importance is self-evident. Campus Network as CERNET China Education Research Network mea</p><p>  the effect of network exports. As the access to large amounts of data and in

64、ter-school exchanges require a high-speed exit, and the special requirements of the campus network must use Network Address Translation must be NAT (Network Address Translator) [17], so this need to export the core equip

65、ment should be has strong capacity to address translation. </p><p>  Now there are a variety of network devices on the network, which means that achieve a variety of hardware platforms, operating systems run

66、ning various software programs unified management unlikely. In fact, the management of these programs is nothing more than they need to send commands and data, and from them to obtain data and status information. This sy

67、stem needs a manager's role and managed object MO (Managed Object). As a general procedure has many objects need to be managed (corresponding </p><p>  To achieve a managed program (agent) management, ma

68、nagers need to know to be manager of the information model (in fact proxy managed object contains the information model). In order to transmit such information, people must be provided between the manager and was manager

69、 of a network protocol. We know that different platforms for integers, characters have different coding, to make an application under different platforms to read each other's data, must also provide for a no ambiguit

70、y, unified da</p><p>  GDMO is mainly used to describe a variety of network syntax needs to be managed in a variety of concrete and abstract resources. General equipment manufacturers need to use this syntax

71、 information model describes the device out of the convenience of users or other manufacturers to achieve the management of the equipment. The underlying protocol CMIP general use OSI protocol stack is mainly used to ach

72、ieve the GDMO object definitions of various operations such as create, delete object instance, r</p><p>  As the hardware, software platforms, data format (encoding format, word length, the internal addressi

73、ng boundary structure, etc.) of different, TMN managers and agents must pass the data Description Syntax ASN.1 description to ensure the reception to properly analyze the data, remove the correct data content. </p>

74、<p>  ASN.1 is not only a data description language, it also provides for communications between the parties with a data encoding format, such as BER (Basic Encoding Rule). In a management process and management p

75、rocedures to be between the definition of a standard GDMO information model, with the ASN.1 definition of interactive data, using CMIP to achieve interoperability. This point is achieved, we can think of devices to compl

76、y with the TMN Q3 interfaces between modules (Reference Point) standards.</p><p>  as QX, X, etc., these interfaces can be considered for the Q3 of services. </p><p>  4.The objective of the res

77、earch and content </p><p>  This article is designed Campus Network Traffic Management System, the school principal is to achieve the original network data and traffic speed data acquisition, complete real-t

78、ime monitoring and statistical data, and to complete work on the statistical business data, so the network service providers to that the advanced traffic management system is to provide an important guarantee of quality

79、network services, in improving the quality of service plays a crucial supporting role. </p><p>  II. THE FLOW OF INFORMATION ACQUISITION METHODS AND RELATED TECHNOLOGIES </p><p>  1. Overview of

80、 the network data stream collection method </p><p>  Measurement and analysis of network data flow, the rapid development of the network today, with its significance. Short-term network traffic data collecte

81、d can be used to detect utilization of network resources, abuse, and a variety of malicious attacks; long-term data analysis can also used to implement traffic engineering, traffic statistics and so on. </p><p

82、>  The traditional method is to use SNMP [21] (Simple Network Management Protocol, Simple Network Management Protocol), opened the SNMP service from the network equipment of traffic counters (traffic counters) read th

83、e flow information. More common for intrusion detection and protocol analysis, packet sniffing method [22] (packet sniffering) are widely used. NetFlow technology is developing rapidly, NetFlow version 9 [23] has as one

84、of the dissemination of IETF standards. More and more manufacturer</p><p>  2. SNMP-based collection of data flow </p><p>  Simple Network Management Protocol SNMP is based on TCP / IP reference

85、 model application layer Internet network management protocol [24]. It on the Internet in a variety of different types of equipment, monitoring and management. SNMP inception in 1988, has become the de facto industry sta

86、ndard. As the later has a new version of SNMPv2 and SNMPv3, which is also known as the original SNMP SNMPvl. </p><p>  SNMP is the most important guiding principle as simple as possible. The basic features i

87、nclude SNMP monitoring network performance, detect errors and configuration of network equipment. Normal working hours in the network, SNMP enables statistics, configuration and testing functions. When the network fails,

88、 can achieve a variety of error detection and recovery capabilities. Although SNMP is a TCP / IP network management based on the agreement, but can also be extended to other types of network d</p><p>  SNMP

89、network management protocol is the application layer protocol, the network management station to process the MIB of each agent in the management of the object to read and write operations. Agreement defines the command a

90、nd response message formats, and also describes the framework for the necessary authorization Authorized licensed use limited to: GUILIN UNIVERSITY OF ELECTRONIC TECHNOLOGY. Downloaded on April 21,2010 at 07:38:02 UTC fr

91、om IEEE Xplore. Restrictions apply. 87 </p><p>  from senior management and authentication mechanisms, it also defines a trap mechanism so that agents can process active under certain pre-conditions to send

92、trap messages. </p><p>  SNMP uses management (Manager) and agent (Agent) model. SNMP protocol anager / Agent communication theory as shown. </p><p>  SNMP manager - communication between agents

93、 Usually a standard network management system includes four components: network management station NMS, Agent (Agent), network management protocol (SNMP) and Management Information Base MIB (Management Information Base).

94、 Agent is based in the network node equipment (such as routers, servers, etc.) on the software. It does this by receiving instructions from the network management station and send a response message, the operation MIB an

95、d to monitor and </p><p>  MIB management information is the basic unit, which represents the agency was monitoring network station management information. Agents in a variety of information to be managed or

96、ganically combined into management information tree (MIB Tree). MIB objects in the realization of the separation agreement with the network, it can be extended and customized without affecting the agreement itself. The d

97、efinition of the MIB in proxy, by the Structure of Management Information SMI (Structure of Manageme</p><p>  The system must have a management station. Management processes and agent processes to communicat

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論