基于MPLS跨域VPN若干问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着Internet的快速发展,影响互联网数据传输的不安全因素不断增多,而建立物理的私用网络需要消耗大量成本。在这样的背景下,VPN(Virtual Private Network,虚拟私用网)以其独有的优势赢得了越来越多企业的青睐,利用公共网络构建的私有专用网络称为虚拟私有网络。在公共网络上组建的VPN像企业的物理私有网络一样,可以提供安全性和可管理性等。
     在自治域之间,由于Internet采用分布式控制路由信息方式,每个AS通过BGP与其他AS交换网络可达信息,又由于MPLS中用于分发标签的信令协议LDP在设计之初,要求LSP的建立条件是路由条目的掩码全路径相等,对AS这个元素没有进行充分考虑,这个要求对于只有BGP协议可供选择的自治域之间很难达到。基于上述原因,部署和使用跨域MPLS VPN面临诸多挑战,与域内技术相比,域间技术还不细致、不完善,具体表现为以下几个方面:如何发现可视化的VPN拓扑结构;如何检测PE或ASBR上的MP-BGP配置错误;如何平衡VPN域间流量以及恢复LSP路径故障等。
     本文以国家自然科学基金“域间路由稳定性与可管理性研究”为背景,对上述4个问题提出了相应的对策和解决方法。
     (1)为了获得VPN的成员关系及其相互连接的方式,本文提出发现VPN拓扑结构的算法,以自动获取可视化的拓扑结构,从而直观显示VPN成员相应设备的连接方式。该算法基于PE或ASBR上VRF和RT的配置数据库信息,利用矩阵模型,经过算法推导,提取相关组件,提供可视化的VPN拓扑结构。
     (2)本文针对MP-BGP路由源配置错误和路由输出配置错误问题,提出检测PE或ASBR上MP-BGP配置错误的方法,降低路由器负载,保证VPN的互通和安全。该方法在发现VPN拓扑结构的基础上,对输入和输出路由的VPN-IPv4前缀进行从属关系检测,以发现非授权的地址前缀;利用AS关系对路由进行有效性检测,以发现违反输出原则的路由,提高MPLS VPN的安全性。
     (3)本文还针对VPN中出现的域间流量不平衡问题,提出用BGP实现MPLSVPN域间流量平衡的方法,从而有效利用网络资源,提高网络的传输效率。该方法通过出界流量控制算法,在出口PE或发送的ASBR中配置LOCAL-PREF属性值,控制AS的出界流量;通过入界流量控制算法,保证客户AS不在提供者间或对等体间过渡流量,允许客户AS向它的部分提供商通告路由,或人为增加AS-PATH的长度,从而控制AS中入口PE或接收ASBR的入界流量。
     (4)针对标签交换路径的设计与维护问题,本文提出基于故障恢复模型的MPLS VPN动态路径管理算法,这一算法能够自动设计并维护VPN路径。该算法在提出备份路径设计准则的基础上,测试全连通MPLS VPN中备份路径可用性的条件,提出快速备份路径构造算法,在多故障发生时,可以动态地构造VPN路径,从而使满足客户故障恢复需求的VPN业务受干扰程度最小。
A VPN is a network where customers have connectivity across a shared infrastructure using the same access and security policies as a.private network. In the course of research, we discovered several problems for inter-domain MPLS VPN.
     Aimed at the circumstance,Based on the NSF project Study on InterDomain Routing Stability and Managebility,in this dissertation, we put forward algorithms to automatically discover VPN topology,to detect MP-BGP misconfiguration on PE or ASBR,to manage the inter-domain routes and to effectively balance inter-domain traffic and to dynamically manage MPLS VPN path.
     Firstly, in order to grasp clearly the membership, we put forward to an algorithm to discover MPLS VPN topology. Algorithms aims at automating this VPN discovery procedure based on VRF and RT.
     Secondly, we put forward to the algorithm to detect MP-BGP misconfiguration on PE or ASBR in MPLS VPN. This algorithm can decrease the update load on routers, and avoid disrupting Internet connectivity. We mainly study the origin misconfiguration and export misconfiguration. In this method, the inbound routes and outbound routes are detected for origin errors according to the relationship between the prefixes and ASes which announce the prefixes. We use the commercial relationships between ASes to detect routes and further find routes violating export guidelines.
     Thirdly, in MPLS VPNs, traffic engineering achieved by using MPLS was predominantly limited to intra-domain and single administrative domain. However with the rapid expansion of enterprise scale, a VPN has spanned a large number of administrative domains. Thus effective management of inter-domain traffic is urgently demanded. We put forward to methodology to balance the inter-domain traffic in MPLS VPNs by BGP. Presented the simplest method is on the basis of various BGP attributes, BGP import or export routing policy and AS relationship constructed according to bilateral economical agreements. For this, they can rely on the LOCAL-PREF attribute to control the routes that will be chosen for the packets that leave each BGP router of the provider. In order to balancing incoming traffic, ASes are allowed announce their prefixes to a selected subset of providers instead of all providers.
     Finally, in MPLS VPN, the connectionless IP traffic of the VPN site transits MPLS backbone by connect-oriented LSP, in many cases, LSP was designed manually by network manager, we put forward to the algorithm to dynamically manage MPLS VPN path based on failure recover model. In this article, we present a methodology for MPLS VPN service management employing a resilience model. The methods can dynamically configure the service paths of MPLS VPN satisfying the TE resilience requirement from the customers. Specifically, we describe backup path design rules and derive the conditions for testing the availability of feasible backup paths satisfying the resilience constraints in a full mesh MPLS VPN. We present fast backup path construction algorithms which could make the MPLS VPN service to be available with minimal disruption, satisfying the resilience requirement from the customers.
引文
1. Huston G.ISP Survial Guide:Strategies for Running a Competitive ISP [M],Hoboken,NJ:John Wiley & Sons,1998.2-10.
    2. Huston G.Interconnection,peering and settlements-Part Ⅰ [J], Internet Protocol Journal,1999,23(2):32-40.
    3. Halabi S, McPherson D著.因特网的路由选择技术(第二版)[M],北京:电子工业出版社,2001,1-30.
    4. Internet Assigned Number Autority [EB/OL], http://www.iana.org, 2004-12-5.
    5. AS Reports [EB/OL], http://www.potaroo.net/tools/asns,2005-10-6.
    6. IPv4 Address Space Report [EB/OL], http://bgp.potaroo.net/ipv4/, 2005-10-6.
    7. Govindan R and Reddy A. An analysis of Internet inter-Domain topology and route stability[A],16th Annual Joint Conference of the IEEE Computer and Communications Societies[C],LOS ALAMITOS, CA, USA:IEEE Computer Society press,1997,2:850-857.
    8. Govindan R,Aleattinoglu C and Varadhan K.Route servers for inter-domain routing[J],Computer Networks and ISND Systems,1998,30(12):1157-1174.
    9. Govindan R,Alaettinoglu C,Eddy G,Kessens D,Kumar S and Lee W S.An architecture for stable,analyzable Internet routing [J],IEEE Network,1999,13(1):29-35.
    10. L.Martini,Ed.,C.Kawa,Ed.,A.Malis,Ed.Encapsulation Methods for Transport of Frame Relay over Multiprotocol Label Switching (MPLS) Networks[S],RFC 4619,September 2006.
    11. M.Townsley, G.Wilkie, S.Booth, S.Bryant, J.Lau.Frame Relay over Layer 2 Tunneling Protocol Version 3 (L2TPv3) [S], RFC 4591, August 2006.
    12. S.Singh, M.Townsley, C.Pignataro.Asynchronous Transfer Mode (ATM) over Layer 2 Tunneling Protocol Version 3 (L2TPv3) [S], RFC 4454, May 2006.
    13. B. Patel, B.Aboba, W.Dixon, G.Zorn, S. Booth.Securing L2TP using IPsec [S], RFC 3193, November 2001.
    14. A.Nagarajan, Ed.Generic Requirements for Provider Provisioned Virtual Private Networks (PPVPN) [S], RFC 3809, June 2004.
    15. L.Andersson, T.Madsen.Provider Provisioned Virtual Private Network (VPN) Terminology[S], RFC 4026, March 2005.
    16. L.Fang, Ed.Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs) [S], RFC 4111, July 2005.
    17. B.Schliesser,T.Nadeau.Definition of Textual Conventions for Vir-tual Private Network (VPN) Management[S],RFC 4265, November 2005.
    18.T.Nadeau, S.Hegde.Multiprotocol Label Switching (MPLS) Label-Controlled Asynchronous Transfer Mode (ATM) and Frame-Relay Management Interface Definition[S], RFC 4368, January 2006.
    19. J. Lau, Ed. M. Townsley, Ed., I.Goyret, Ed. Layer Two Tunneling Protocol-Version 3 (L2TPv3) [S], RFC 3931, March 2005.
    20. Y. T'Joens, P.Crivellari, B. Sales. Layer Two Tunnelling Protocol (L2TP): ATM access network extensions[S], RFC 3301, June 2002.
    21. A.Singh, R.Turner, R.Tio, S.Nanji.Layer Two Tunnelling Protocol (L2TP) Over ATM Adaptation Layer 5(AAL5) [S], RFC 3355, August 2002.
    22. T. Worster, Y. Rekhter, E. Rosen, Ed. Encapsulating MPLS in IP or Generic Routing Encapsulation (GRE) [S],RFC 4023,March 2005.
    23. D. Farinacci, T. Li, S. Hanks, D. Meyer, P. Traina. Generic Routing Encapsulation (GRE) [S], RFC 2784, March 2000.
    24. C.Perkins.IP Encapsulation within IP[S], RFC 2003, October 1996.
    25. JP.Vasseur, Ed., Y.Ikejiri, R.Zhang.Reoptimization of Multipro-tocol Label Switching (MPLS) Traffic Engineering (TE) Loosely Routed Label Switched Path (LSP) [S], RFC 4736,November 2006.
    26. K.Kompella, G. Swallow. Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures[S], RFC 4379, February 2006.
    27. D.Allan,Ed.,T.Nadeau,Ed A Framework for Multi-Protocol Label Switching (MPLS) Operations and Management (OAM)[S],RFC 4378, February 2006
    28. T.Nadeau, C.Srinivasan, A.Farrel.Multiprotocol Label Switching (MPLS) Management Overview[S], RFC 4221, November 2005.
    29. R.Zhang, Ed., J.-P.Vasseur, Ed.MPLS Inter-Autonomous System (AS) Traffic Engineering (TE) Requirements[S], RFC 4216, November 2005.
    30. L.Andersson, G.Swallow.The Multiprotocol Label Switching (MPLS) Working Group decisionon MPLS signaling protocols[S], RFC 3468, February 2003.
    31. L.Andersson, Ed., E.Rosen, Ed.Framework for Layer 2 Virtual Pri-vate Networks (L2VPNs) [S], RFC 4664, September 2006.
    32. Ivan Pepelnjak,Jim Guichard.MPLS VPN体系结构[M]北京:人民邮电出版社,2001,89-111.
    33. Jim Guichard,Ivan Pepelnjak,Jeff Apcar.MPLS and VPN Archi-tectures, Volume Ⅱ [M],Cisco Press, June 06,2003.
    34. W.Augustyn, Ed., Y.Serbest, Ed.Service Requirements for Layer 2 Provider-Provisioned Virtual Private Networks[S], RFC 4665, Sep-tember 2006.
    35. W.Luo.Layer 2 Virtual Private Network (L2VPN) Extensions for Layer 2 Tunneling Protocol (L2TP) [S], RFC 4667, September 2006.
    36. M.Carugi, Ed., D.McDysan, Ed.Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs) [S], RFC 4031, April 2005.
    37. R.Callon, M.Suzuki.A Framework for Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNs) [S], RFC 4110, July 2005.
    38. Y. El Mghazli, Ed., T. Nadeau, M. Boucadair, K. Chan, A. Gonguet. Framework for Layer 3 Virtual Private Networks (L3VPN) Opera-tions and Management[S],RFC 4176,October 2005.
    39. Jeremy De Clercq,Olivier Paridaens,An Architecture for Provider Provisioned CE-based Virtual Private Networks using IPsec [S], draft-ietf-13vpn-ce-based-03.txt,December 2005
    40. Paul Knight,Hamid Ould-Brahim,Bryan Gleeson,Network based IP VPN Architecture Using Virtual Routers[S], draft-ietf-13vpn-vpn-vr-03.txt, March 6,2006
    41. E.Rosen,Y.Rekhter.BGP/MPLS VPN[S], RFC2547, March 1999.
    42. E.Rosen,Y.Rekhter.BGP/MPLS IP Virtual Private Networks (VPNs) [S], RFC 4364, February 2006.
    43. T.Bates, R.Chandra, Y.Rekhter, etc. Multiprotocol Extension for BGP-4[S], RFC4760, January 2007.
    44. Y.Rekhter, S.Hares.A Border Gateway Protocol 4 (BGP-4) [S], RFC 4271.January 2006.
    45. A.Farrel, Ed.Fault Tolerance for the Label Distribution Protocol (LDP) [S], RFC 3479, February 2003.
    46. A.Farrel, Ed., D.Papadimitriou, J.-P.Vasseur, A.Ayyangar.Encoding of Attributes for Multiprotocol Label Switching (MPLS) Label Switched Path (LSP) Establishment Using Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) [S], RFC 4420, February 2006.
    47. B.Rajagopalan.Documentation of IANA Assignments for Label Dis-tribution Protocol (LDP), Resource ReSerVation Protocol (RSVP), and Resource ReSerVation Protocol-Traffic Engineering (RSVP-TE) Extensions for Optical UNI Signaling [S],RFC 3476, March 2003.
    48. K.Kompella, Y.Rekhter, A.Kullberg.Signalling Unnumbered Links in CR-LDP (Constraint-Routing Label Distribution Protocol) [S], RFC 3480, February 2003.
    49. E.Rosen, P.Psenak, P.Pillay-Esnault.OSPF as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks (VPNs) [S], RFC 4577, June 2006.
    50. Gustav Rosebaum,William Lau and Sanjay Jha.An Analysis of Virtual Private Network Solutions [A],28th.Annual IEEE Interna-tional Conference on LocalComputer Networks[C],October 20-24,2003.395-404.
    51. Zhensheng Zhang,Ya-Qin Zhang,Xiaowen Chu,et al.An Overview of Virtual Private Network(VPN):IP VPN and Optical VPN [J], Photo-nic Network Communications,May 2004,7(3):213-225.
    52. Artan Halimi,Brikena Statovci-Halimi.Overview on MPLS Virtual Private Networks[J],Photonic Network Communications,May 2002,4(2):115-131.
    53. G Rosenbaum,W Lau,S Jha.Recent Directions in Virtual Private Network Solutions[A]ICON 2003,The 11th IEEE Internation Confe-rence on Networks[C],Eds.B.Landfeldt,T.Moors IEEE, ydney,2003,217-223.
    54. Dr.Hosein and F.Badran.Service Provider Networking Infrastruc-tures with MPLS [A], IEEE Computers and Communications [C], Proceedings Sixth IEEE Symposium on,2001,312-318.
    55. A.Daniel.IP Virtual Private Networks-a Service Provider Pers-pective [J], IEE Proc.Commun.,2004,151(1):62-70.
    56. Yun-Lung Chen, Chienhua Chen.The Performance Analysis of Two-Class Priority Queueing in MPLS-Enabled IP Network[J]. LECTURE NOTES IN COMPUTER SCIENCE,2005(3421),34-41.
    57. Francesco Palmieri.VPN scalability over high performance backbones Evaluating MPLS VPN against traditional approaches [A],Proceedings of the Eighth IEEE International Symposium on Computers and Communications [C],Proceedings of the Eighth IEEE International Symposium on Computers and Communication,2003,975-981.
    58. Satish Raghunath, K. K. Ramakrishnan, Shivkumar. Measurement Based Characterization and Provisioning of IP VPNs [A], Proceed-ings of the 4th ACM SIGCOMM conference on Internet measurement[C], Taormina, Sicily, Italy, Oct 2004,342-355.
    59. Daniel Von-Kyu Hong and Choong Seon Hong. A Flow-Through Workflow Control Scheme for BGP/MPLS VPN Service Provision[J], LNCS3262,2004, 397-406.
    60. A. Kumar, R. Rastogi, A. Silberschatz, and B.Yener. Algorithms for Provisioning Virtual Private Networks in the Hose Model [J],ACM SIGCOMM Computer Communication Review,Oct.2001,31(4):135-146.
    61. Chirttaranjan Hota and G.Raghurama.Design and Deployment of IP Virtual Private Networks:a Case Study [J], LNCS3356,2004,76-86.
    62. Georgina Schafer.Placement of Intelligence within Networks to Privide Corporate VPN Services [J],Information Security Technical Report,2000,6(1):77-94.
    63. Quanshi Xia.Provisioning VPN over Shared Network Infrastructure [J], LNCS3420,2005,500-507.
    64. Luyuan Fang,Nabil Bita,Jean-Louis Le Roux and et al.Interprovider IP-MPLS Services:Requirements, Implemntations, and Challenges [J], IEEE Communications Magezine,2005,119-128.
    65. Chongying Cao, Jing Yang and Guoqing Zhang.MPLS Inter Domain Services Routing Architecture and Model Based on P2P Semantic Grid [J], LNCS3947, 2006,427-436.
    66. Chongying Cao, Jing Yang and Guoqing Zhang.Overlay Based Mapp-ing Egress Service Path Between MPLS Domains [J],LNCS 3828,2005,641-650.
    67. Cristel Pelsser and Olivier Bonaventure.Path Selection Techniques to Establish Constrained Interdomain MPLS LSPs [J], LNCS3976,2006, 209-220.
    68. Michael H.Behringer,Monique J.Morrow.MPLS VPN Security[M], Cisco Press,June 08,2005
    69. Cristel Pelsser,Steve Uhlig and Olivier Bonaventure.On the Diffi-culty of Establishing Interdomain LSPs [A],2004 IEEE Internation-al Workshop on IP Operations & Management (IPOM 2004)[C], Beijing, China,October 11-13,2004,134-139.
    70. Yuanping Zou, Zhengkun Mi and Xudong Meng.A Genetic Algorithm for Optimization of Bandwidth Assignment in Hose-Modeled VPN[J], LNCS4114,2006,315-323.
    71. Chun Tung Chou.Traffic engineering for MPLS-based virtual private networks [J],Computer Networks,the International Journal of Com-puter and Telecommunications Networking,Feb.2004,44(3):319-333.
    72. Haesun Byun,Hyeonje Woo,Kyoungmin Kim,et al.A Resource Mana-gement Mechanism for Hose Model Based VPN QoS Provisioning [J], LNCS3961,2006,562-571.
    73. Peng Zhang, Raimo Kantola.Building MPLS VPNs with QoS Routing Capability [J], LNCS1938,2000,292-301.
    74. Yuxiao Jia, Dimitrios Makrakis,Nicolas D.Georganas and et al. Dy-namic Quality of Service Support in Virtual Private Networks [J], LNCS3503,2005,618-621.
    75. Haeryong Lee, Jeongyeon Hwang,Byungryong Kang,et al. End-To-End QoS Architecture for VPNs MPLS VPN Deployment in a Back-bone Network [A], Proceedings of the 2000 International Workshop on Parallel Processing [C],Aug.2000,479-483.
    76. S F Carter.Quality of service in BT's MPLS-VPN platform [J], BT Technology Journal, April 2005,23(2)61-72.
    77. Chittaranjan Hota, Sanjay Kumar Jha and G.Raghurama.Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model [J], LNCS3326,2004,289-302.
    78. Jenhui Chen, Chung-Ching Chiou and Shih-Lin Wu.A Fast Path Re- covery Mechanism for MPLS Networks [J], LNCS3421,2005,58-65.
    79. Brooks A,Sacks L.A methodology for monitoring LSP availability in MPLS networks[EB/OL],http://www.ee.ucl.ac.uk/lcs/papers2002/LCS092.pdf
    80. Jong-Tae Park and Min-Hee Kwon.A Methodology on MPLS VPN Service Management with Resilience Constraints [J], LNCS3335,2005,118-133.
    81. Wook Jeong, Geunhyung Kim and Cheeha Kim.An Efficient Backup Path Selection Algorithm in MPLS Networks [J], LNCS3375,2005,164-175.
    82. Siamack Ayandeh.Convergence of Protection and Restoration in Te-lecommunication Networks[J],Photonic Network Communications,2002,4 (3/4):237-250.
    83. Chris Phillips,John Bigham and Liwen He.Managing dynamic automated communities with MPLS-based VPNs [J],BT Technology Journal,April 2006,24(2).79-84.
    84. Svetlin Petrov.Monitoring MPLS VPNs [A], Proceedings of the 4th international conference conference on Computer systems and technologies[C], June 2003, Rousse, Bulgaria,130-134.
    85. L.Li,Milind M.Buddhikot,et al.Routing Bandwidth Guaranteed Paths with Local Restoration in Label Switched Networks [A], ICNP 2002[C], IEEE Computer Society,110-121.
    86. Won Shik Na, Jeom Goo Kim and Intae Ryoo.Perimeter Defence Policy Model of Cascade MPLS VPN Networks[J], LNCS3043,2004,1026-1034.
    87. L. Fang.Meeting VPN customer requirements:Lessons from real world deployments[A], MPLS World Congress 2004[C], February 2004.
    88. R. Zhang and J.-P. Vasseur. MPLS Inter-AS traffic engineering requirements[S], RFC4216, November 2005
    89. M. Carugi and J. D. Clercq.Virtual Private Network Services: Scenarios,Requirements and Architectural Constructs from a Standardization Perspective[J], IEEE Communications Magazine, 2004,42(6):116-122.
    90. The SSFNET Project [EB/OL]. http://www.ssfnet.org.
    91. HP Openview Network Services Management Solution for MPLS Networks[EB/OL],http://www.hp.com.
    92. Youngtak Kim, Hyung-Woo Choi, Hyo-Sung Kim, A QoS-guaranteed DiffServ-aware-MPLS VPN and its Network Management System[J], SNPD, 2003.
    93. P.Marques,R.Bonica,L.Fang,L.Martini,R.Raszuk,K.Patel,J.Guichard.Constr ained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs) [S],RFC 4684,November 2006.
    94. E.Rosen,P.Psenak,P.Pillay-Esnault.Using a Link State Advertise-ment (LSA) Options Bit to Prevent Looping in BGP/MPLS IP Virtual Private Networks (VPNs) [S],RFC 4576,June 2006.
    95. T. Nadeau, Ed., H. van der Linde, Ed. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base[S],RFC 4382, February 2006.
    96. M.Behringer.Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs) [S], RFC 4381, February 2006.
    97. E.Rosen Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs) [S], RFC 4365, February 2006.
    98. P.Marques,R.Bonica,L.Fang,L.Martini,R.Raszuk,K.Patel,J.Guichard.Constr ained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs) [S],RFC 4684,November 2006.
    99. Y. Rekhter, and B. Moskowitz, Address Allocation for Private Inter-nets [S], RFC1918, February 1996.
    100. Srihari R.Sangli, and Daniel Tappan, BGP Extended Communities Attribute[S], RFC4360, February 2006.
    101. R.Chandra,P.Traina.BGP Communities Attribute[S], RFC 1997, Au-gust 1996
    102. P. Tomsu, G. Wieser, MPLS-Based VPNs Designing Advanced Virtual Networks[M], Pearson Education, December 2001.
    103. Misel S A.Wow, AS7007!. NANOG mail archives [EB/OL], http:// www.merit.edu/mail.Archives/nanog/1997-04/msg00340.html,2003-5-8.
    104. Farrar J.C & W routing instability, NANOG mail archives [EB/OL], http://www.merit.edu/mail.archives/nanog/2001-04/msg00209.html, 2002-12-30.
    105. Mahajan R,Wetherall D and Anderson T.Understanding BGP mis-configuration[A],the 2002 conference on Applications, technolo-gies,architectures,and protocols for computer communications[C], New York,USA:ACM Press,2002,3-16.
    106. Boyle J,Gill V,Hannan A,Cooper D,et al.Applicability Statement for Traffic Engineering with MPLS[S],RFC3346,August 2002.
    107. Eto M, Kadobayashi Y, Yamaguchi S.Improvement of Consistency among AS policies on IRR database [EB/OL], http://www.terena.nl/conferences/ tnc2003/programme/papers/p3b1.pdf,2005-7-26.
    108. Feamster N,Balakrishnan H.Towards a Logic for Wide-Area In-ternet Routing[A],ACM SIGCOMM Workshops[C],New York:ACM press,2003, 289-300.
    109. Feamster N, Balakrishnan H.Verifying the Correctness of Wide-Area Internet Routing [EB/OL], http://citeseer.ist. psu.edu/feamster-04verifying.html,2005-7-19.
    110. Feamster N and Balakrishnan H.Detecting BGP configuration faults with static analysis[A],2nd Symposium on Networked Sys-tems Design and Implementation (NSDI 05)[C],Berkeley,CA,USA:USENIX ASSOC,2005, 43-56.
    111. Siganos G,Faloutsos M.Analyzing BGP Policies:Methodology and Tool [A], IEEE INFOCOM 2004-Conference on Computer Commu-nications[C],Piscataway,NJ,USA:IEEE press,2004,1640-1651.
    112. Zhao X,Pei D,Wang L and Zhang L.Detection of invalid routing announcement in the Internet[A],the 2002 International Conference on Dependable Systems and Networks[C],Piscataway,NJ,USA:IEEE Computer Society press,2002,59-68.
    113. Pei D, Aiello W, Gilbert A and Mcdaniel P.Origin Disturbances in BGP [EB/OL], http://www.cs.ucla.edu/-peidan/publication.html.2005-8-20.
    114. Rajendran R, Rubenstein D, Wasserman M.A Theoretical Method for BGP Policy Verificaiton[EB/OL],http://www.ee.columbia.edu/-kumar/papers/p2004-02.pdf,2004-10-9.
    115. Kruegel C,Mutz D,Robertson W and Valeur F. Topology-based De-tection of Anomalous BGP Messages[A],Sixth International Sympo-sium on Recent Advances in Intrusion Detection[C],Berlin,Germany: Springer-Verlag,2003,17-35.
    116. Manadhata P,Sekar V.Understanding BGP Anomalies:Detection, Analysis, and Prevention[EB/OL],http://www-2.cs.cmu.edu/-vyass/vyas-cv.pdf, 2004-12-28.
    117. University of Oregon Route Views Project [EB/OL], http://www. routeviews.org/,2003-10-25.
    118. Alaettinoglu C,Bates T and Gerich E,Karrenberg D,Meyer D, Terpstra M,Villamizar C.Routing Policy Specification Language (RPSL)[S],RFC 2280,January 1998.
    119. Aleattinoglu C,Villamizar C and Gerich E,Kessens D,Meyer D, Bates T, Karrenberg D,Terpstra M.Routing Policy Specification Language(RPSL)[S],RFC 2622,June 1999.
    120. Meyer, J.Schmitz, C.Orange, M.Prior,et.al.Using RPSL in Practice [S], RFC 2650, August 1999.
    121. Kent S,Lynn C,and Seo K.Secure Border Gateway Protocol(S-BGP) [J],IEEE Journal on Selected Areas in Communications,2000,18(4):582-592.
    122. Goodell G,Aiello W,Griffin T G,Ioannidis J,Mcdaniel P,Rubin A. Working around BGP:An incremental approach to improving secure-ty and accuraccy of interdomain routing[A],ISOC NDSS'03[C],2003,75-85.
    123. Ng J.Extensions to BGP to support secure origin BGP (soBGP) [EB/OL],http://bgp.potaroo.net/ietf/idref/draft-ng-sobgp-bgp-extensions/, 2005-3-21.
    124. Aiello W,Loannidis J,McDaniel P.Origin authentication in inter-domain routing[A],Proceedings of the ACM Conference on Compu-ter and Communications Security[C],New York:ACM press,2003,165-178.
    125. Zhang K,Yen A,Zhao X,Massey D and Zhang L.On Detection of Anomalous Routing Dynamics in BGP[A],the 3rd International IFIP Networking Conference[C],Berlin,Germany:Springer-Verlag Berlin,2004, 259-270.
    126. Siganos G,Faloutsos M.Analyzing BGP Policies:Methodology and Tool[A],IEEE INFOCOM 2004-Conference on Computer Communi-cations [C],Piscataway,NJ,USA:IEEE press,2004,1640-1651.
    127. Zhao X,Pei D,Wang L and Zhang L.Detection of invalid routing announcement in the Internet[A],the 2002 International Conference on Dependable Systems and Networks[C],Piscataway,NJ,USA:IEEE Computer Society press,2002,59-68.
    128. Pei D, Aiello W, Gilbert A and Mcdaniel P.Origin Disturbances in BGP[EB/OL],http://www.cs. ucla.edu/-peidan/publication. html.2005-8-20.
    129. Rajendran R, Rubenstein D, Wasserman M.A Theoretical Method for BGP Policy Verificaiton[EB/OL],http://www.ee.columbia.edu/-kumar/ papers/p2004-02.pdf,2004-10-9.
    130. Kruegel C,Mutz D,Robertson W and Valeur F.Topology-based Detection of Anomalous BGP Messages [A], Sixth International Symposium on Recent Advances in Intrusion Detection[C],Berlin, Germany:Springer-Verlag, 2003,17-35.
    131. Pei D,Massey D,Zhang L.Detection of Invalid Routing Announ-cements in RIP Protocol [A],IEEE Global Telecommunications Conference GLOBECOM'03[C],New York,USA:IEEE press,2003,1450-1455.
    132. Russ White, Danny McPherson, Sangli Srihari.Practical BGP [M], Addison Wesley Professional, July 06,2004.
    133. Halabi S,McPherson D.Internet Routing Architecture [M],Second Edition Indianapolis:Cisco Press,1997,111-131.
    134. Rekhter Y, Li T.An Architecture for IP Address Allocation with CIDR[S], RFC 1518, September 1993.
    135. Fuller V,Li T,Yu J,Varadhan K.Classless Inter-Domain Routing (CIDR): An Address Assignment and Aggregation Strategy[S], RFC 1519, September 1993.
    136. Chen E and Stewart J.A framework for inter-domain route aggregation[S], RFC 2519, Feberary,1999.
    137. J.Reynolds,Assigned Numbers:RFC 1700 is Replaced by an On-line Database[S],RFC3232 January 2002
    138. Gao L X,Rexford J.Stable Internet routing without global coordi-nation[J],IEEE/ACM Transactions on Networking,2001,9(6):681-692.
    139. Gao L X.On inferring autonomous system relationships in the Internet[J],IEEE/ACM Transactions on Networking,2001,9(6):733-745.
    140. Subramanian L,Agarwal S,Rexford J,Katz R.Characterizing the internet hierarchy from multiple vantage points[A],IEEE INFOCOM 2002:THE CONFERENCE ON COMPUTER COMMUNICATIONS[C],New York:IEEE Press,2002,618-627.
    141. Battista G,Patrignani M,Pizzonia M.Computing the Types of the Relationships between Autonomous Systems[A],IEEE INFOCOM 2003[C],NewYork:IEEE Press,2003,156-165.
    142. Haneef A, Thampuran S.Verification of Sibling-Sibling Relation-ship Between Autonomous Systems in the Internet [EB/OL], http:// www-aml.cs.umass.edu/-santhosh/academics.html,2004-03-02.
    143. Wang F,Gao L X.On inferring and characterizing Internet routing policies[A],ACM SIGCOMM Internet Measurement Conference[C], New York:ASSOC COMPUTING MACHINERY,2003,15-26.
    144. P. Aukia, M. Kodialam, P. Koppol, T. Lakshman, H. Sarin, and B. Suter. RATES:A server for MPLS Traffic Engineering[J], IEEE Network Magazine, March/April 2000,pp.34-41.
    145. F. Blanchy, L. Melon, and G. Leduc. An efficient decentralized on-line traffic engineering algorithm for MPLS networks[A],18th International TELETRAFFIC CONGRESS-Providing QoS in Heterogeneous Environments[C], vol.5a, Berlin, Germany, August 31st-September 5th 2003,pp.451-460.
    146. K.Kompella, Y. Rekhter. Intermediate System to Intermediate System (IS-IS) Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)[S],RFC4205,October 2005.
    147. K. Kompella, Ed., Y. Rekhter, Ed.. OSPF Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)[S]. RFC4203,October 2005.
    148. J. Ash, J.L. Le Roux. Path Computation Element (PCE) Communication Protocol Generic Requirements[S], RFC 4657, September 2006.
    149. Y.Rekhter and E.Rosen.Carrying Label Information in BGP-4[S], RFC3107, May 2001.
    150. Awduche D. et al. Requirements for Traffic Engineering Over MPLS[S]. IETF RFC 2702,1999.
    151. Li, G., Wang, D., et al. Efficient Distributed Path Selection for Shared Restoration Connections[A].IEEE INFOCOM 2002[C].140-149.
    152. Sharma, V. and Hellstrand, F. Framework for Multi-Protocol Label Switching (MPLS)-based Recovery[S].RFC3469,February 2003.
    153. Huang, C., Sharma, V., Owens, K. and Makam, S. Building Reliable MPLS Networks Using a Path Protection Mechanism[J]. IEEE Commu-nications Magazine. March 2002. pp.156-162.
    154. Banerjee, A., Drake, Jet., El. Generalized Multiprotocol Label Switching_An overview of Signaling Enhancements and Recovery Techniques[J]. IEEE Communications Magazine, July 2001, pp.144-151.
    155. Guangzhi Li, Jennifer Yates, Robert Doverspike, et.al. Experi-ments in Fast Restoration using GMPLS in Optical/Electronic Mesh Networks[D]. Postdeadline Papers Digest, OFC-2001. Anaheim. CA. March 2001.
    156. Doverspike, R. and Yates, J. Challenges for MPLS in optical net-work restoration[J]. IEEE Communications Magazine. Feb.2001. pp.89-96.
    157. P. Ho and H.T. Mouftah.A Framework for Service-Guaranteed Shared Protection in WDM Mesh Networks[J], IEEE Communications Magazine, February 2002.
    158. Lee S.K., Griffith D.Hierarchical Restoration Scheme for Multiple Failures in MPLS Networks[A]. Proceedings of the 2002 ICPP Workshops[C],2002,177-182.
    159. Clouqueur M., Grover W. D.Availability Analysis of Span-Restorable Mesh Networks[J]. Journal on Selected Areas in Communications, IEEE,2002,20(4):810-821.
    160. W. W. Won & and C. K. Wong, Minimum k-Hamiltonian Graphs [J], Journa of Gvuph Throrr,1984,8:155-165.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700