luni, 28 mai 2012

Discussion about the fictitious router development problem - Computers - Networks

The development of the fictitious router is still very fast at present, its market demand is very objective too, then I have studied about the fictitious router development problem, am taken here out and share with everybody, it is useful to everybody to hope. Recently, some new technological break-throughs about IP key network equipment, the realization serving for Internet will come newlying paves the way for. The fictitious router is one such new technology, it makes some new Internet's services become possible. Through these new services, users can control performance, Internet's address and route and online security of the network,etc.. Israeli RND network company whether one offer from LAN to WAN manufacturer of solution, this company has put forward the concept of the fictitious route first.

On a physical router, can form a lot of logical fictitious routers, each fictitious router operates one's own route agreement embodiments alone, and have one's own special-purpose I/O port, buffer memory, address space, route form and network management software. Fictitious key router, can offer controlling and safe functions of management of special-purpose backbone network with cheap cost to customer. The software which controls and manages the apparatus of fictitious route adopts the module and is designed, if software the operate in a real one, at the many operating system of process ' for instance: UNIX),Then it still supports many embodiments, that is to say it can support a lot of fictitious routers at the same time. The process of each fictitious router was separated from that other process of router are each other, its memory used receives the protection of the operating system too, thus guaranteed the high security of the data; Meanwhile, dispel also because with data possibility that collide of other fictitious router software what completion cause of module.

A lot of signal carriers and one grade of routers are connected with high-speed SONET/SDH network and divided into groups while transmitting, all realize speed performance of line by the hardware. But the speech of and the system of the fictitious route function for using, these hardwares functions can all be subdivided by logic; Can also be by disposing it to some one special-purpose fictitious router in a flexible way. With fictitious route function software module, can control data divide into groups physical port sent and received and exchange the route totally. Grouping buffer memory and exchanging the size of the form of the fictitious router.

Limited by its resource size taken up, do it in this way, it is for will not influence each other while guaranteeing the fictitious routersing. Fictitious route technology makes each fictitious router carry out the route agreement software embodiment alone each ' for instance: OSPF, BGP) With network embodiment of management software ' for instance: SNMP or order line),So, users can monitor and manage each fictitious router independently. Operate the procotol embodiment independently, make each fictitious router have a totally independent IP address land, will not produce any conflict each other. Each fictitious router can be managed as an independent entity that operates. Its security module on the basis of users offered, functions of management of networks and information that can guarantee to belong to a certain fictitious router are only open to user with authority. In addition, it is separate too that the grouping of each fictitious router transmits the route, this en ables administrators to dispose performance alone for each fictitious router respectively.

Through the fictitious router, the dataflow has happened suddenly in great communication will only exert an influence on this router, will not influence other routers, thus can receive steady network performance for the end user and provide safeguard. In addition, the fictitious router offers the independent tactics and IETFDS (Internet Engineering Task Force Differentiated Service) at the same time Ability, enable the fictitious router to offer complete customer service for end user. Dispose through I/O port for the fictitious router, can count the grouping that is received, in this way, can guarantee the data amount will not surmount the agreement confirmed in advance; The service that the fictitious router can also follow the data and divide into groups is different in grade at the same time, divide into groups, assign reach different formations data their, in order to realize different service qualities.

At present, the fictitious router has already got real application. Accelar1000 route exchanger of Nortel uses the fictitious route port on the route between VLANs, the fictitious router port can dispose each VLAN, realize the route between IP sub network or VLANs. Accelar1000 route exchanger supports the fictitious router port, and does not reduce its performance.



access point vs router

Niciun comentariu:

Trimiteți un comentariu