PON系统中DBA方案与QoS的研究

Li Li, Xin Shouting, Duan De-gong
{"title":"PON系统中DBA方案与QoS的研究","authors":"Li Li, Xin Shouting, Duan De-gong","doi":"10.1109/COMPCOMM.2016.7925080","DOIUrl":null,"url":null,"abstract":"With the further promotion of smart city, optical access for replacing copper access and integration of three networks, PON is widely considered as the best option for next-generation high-speed access network owing to its advantages such as high bandwidth, low cost and good compatibility. However, its point-to-multipoint topological structure is born with the problem of bandwidth allocation scheduling and there are serious security risks in its downlink broadcasting transmit mode, which impose restrictions on the widespread use of the technology. After making a detailed analysis and comparison of the existing bandwidth allocation algorithm, the deterioration of light load, low utilization rate of bandwidth, poor fairness and inability to guarantee QoS are pointed out and the original dual-clocking DBA algorithm is put forward. Meanwhile, OLT/ONU bidirectional authentication during registration is proposed and Diffie-Hellman key exchange protocol is introduced. The information that can perform key exchange is embedded into authentication information and passing another initial key is no longer needed for the following data encryptions, which strictly ensure system security in the authentication step. The experimental results show that this scheme has a great advantage in reducing average delay, queue delay and throughput of system as well as improving system security.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Research of DBA schemes and QoS in PON system\",\"authors\":\"Li Li, Xin Shouting, Duan De-gong\",\"doi\":\"10.1109/COMPCOMM.2016.7925080\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the further promotion of smart city, optical access for replacing copper access and integration of three networks, PON is widely considered as the best option for next-generation high-speed access network owing to its advantages such as high bandwidth, low cost and good compatibility. However, its point-to-multipoint topological structure is born with the problem of bandwidth allocation scheduling and there are serious security risks in its downlink broadcasting transmit mode, which impose restrictions on the widespread use of the technology. After making a detailed analysis and comparison of the existing bandwidth allocation algorithm, the deterioration of light load, low utilization rate of bandwidth, poor fairness and inability to guarantee QoS are pointed out and the original dual-clocking DBA algorithm is put forward. Meanwhile, OLT/ONU bidirectional authentication during registration is proposed and Diffie-Hellman key exchange protocol is introduced. The information that can perform key exchange is embedded into authentication information and passing another initial key is no longer needed for the following data encryptions, which strictly ensure system security in the authentication step. The experimental results show that this scheme has a great advantage in reducing average delay, queue delay and throughput of system as well as improving system security.\",\"PeriodicalId\":210833,\"journal\":{\"name\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPCOMM.2016.7925080\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPCOMM.2016.7925080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着智慧城市、光接入取代铜接入和三网融合的深入推进,PON以其带宽高、成本低、兼容性好等优点被广泛认为是下一代高速接入网的最佳选择。但其点到多点的拓扑结构生来就存在带宽分配调度问题,其下行广播传输方式存在严重的安全隐患,限制了该技术的广泛应用。在对现有带宽分配算法进行详细分析和比较后,指出了轻负载恶化、带宽利用率低、公平性差、不能保证QoS等问题,提出了原有的双时钟DBA算法。同时,提出了注册过程中的OLT/ONU双向认证,并引入了Diffie-Hellman密钥交换协议。将可以进行密钥交换的信息嵌入到鉴权信息中,后续数据加密不再需要传递另一个初始密钥,严格保证了鉴权步骤中的系统安全性。实验结果表明,该方案在降低系统平均延迟、队列延迟和吞吐量以及提高系统安全性方面具有很大的优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Research of DBA schemes and QoS in PON system
With the further promotion of smart city, optical access for replacing copper access and integration of three networks, PON is widely considered as the best option for next-generation high-speed access network owing to its advantages such as high bandwidth, low cost and good compatibility. However, its point-to-multipoint topological structure is born with the problem of bandwidth allocation scheduling and there are serious security risks in its downlink broadcasting transmit mode, which impose restrictions on the widespread use of the technology. After making a detailed analysis and comparison of the existing bandwidth allocation algorithm, the deterioration of light load, low utilization rate of bandwidth, poor fairness and inability to guarantee QoS are pointed out and the original dual-clocking DBA algorithm is put forward. Meanwhile, OLT/ONU bidirectional authentication during registration is proposed and Diffie-Hellman key exchange protocol is introduced. The information that can perform key exchange is embedded into authentication information and passing another initial key is no longer needed for the following data encryptions, which strictly ensure system security in the authentication step. The experimental results show that this scheme has a great advantage in reducing average delay, queue delay and throughput of system as well as improving system security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信