Font Size: a A A

Study On An Optimal Control Technique Of Embedding Security Function

Posted on:2018-09-01Degree:MasterType:Thesis
Country:ChinaCandidate:X XinFull Text:PDF
GTID:2348330512481354Subject:Engineering
Abstract/Summary:PDF Full Text Request
The information industry has made rapid progress in recent years.Data center,cloud computing and other business also developed rapidly along with virtualization technology maturing.On the one hand,the traditional telecom network develops and update slowly which is also lack of flexibility.Only by constantly equipping the hardware devices in the network can expand the service performance of the network.Also,security services can only be cured by configuring security hardware devices in the network.On the other hand,the utilization of the security services is extremely low,which brings a great waste of resources to the whole network.Combined with the above characteristics and problems,the thesis presents the standpoint of putting the technology of virtual network function into the traditional telecom network,decoupling the hardware devices and the security services of traditional network security equipment,which makes the network more flexible.Nowadays,AWS,Azure and other platforms have had related services,which provide more precious value for academic research.This thesis also puts forward the innovative view of the problem of consumption and resource consumption.The main points as follows.Firstly,considering the advantages of virtual network function,this thesis puts forward an optimized control technique for secure embedded network architecture,and gives full consideration to reduce resource consumption by pathfinding strategy,turning the complex traditional telecom network into a abstract flexible and inerratic network architecture,updating and optimizing the architecture design of the entire network.Secondly,this thesis uses two different kinds of security function and users' pathfinding algorithm——the Greedy algorithm and the Viterbi algorithm.In this way,The problem of large overhead caused by the unbalance of the network security service configuration and network resource consumption can be resolved.The Greedy algorithm mainly takes local optimization into consideration,and each pathfinding takes advantage of the current situation,not to consider more global issue.However,the Viterbi algorithm is used to analyze the process optimization from the results.Finally,the security function is deployed in the network reasonably,and the simulation is carried out in two different ways.The thesis concludes the characteristics and advantages by comparing the simulation results.
Keywords/Search Tags:Network Function Virtualization, security function, system overhead, routing algorithm
PDF Full Text Request
Related items