Identifier Network:修订间差异

来自删除百科
(导入5个版本)
(添加{{deletionpedia}})
 
第1行: 第1行:
{{deletionpedia
| deleteddate   = 2015-02-28
| firstrevdate   = 2015-02-11
| uniqueeditors  = 3
| counttotal    = 5
| reason      = <nowiki>[[WP:CSD#G14|G14]]: 超过两周没有翻译的非现代标准汉语页面 ([[WP:TW|TW]])</nowiki>
| pagename     = Identifier Network
| deletedby    = 范
| countview    =
| error      =
| daysonwiki    = 16
}}
<!--     本行以下为原始wikitext内容      -->
{{notchinese|time=2015-2-11}}
{{notchinese|time=2015-2-11}}



2023年5月21日 (日) 00:34的最新版本

本条目“Identifier Network”在中文维基百科已被删除其它版本),这是一个删除前的存档副本
删除了Identifier Network,理由是:
[[WP:CSD#G14|G14]]: 超过两周没有翻译的非现代标准汉语页面 ([[WP:TW|TW]])
这个理由未必准确 (为什么?)

本条目共存留16天:

  • 创建于:2015-02-11
  • 删除于:2015-02-28
  • 贡献者:3
  • 编辑:5
  • 浏览:无数据
请阅读免责声明。删除百科只是中文维基百科被删除条目的存档。   Alert icon 建议删除本条目

本条目被标记为包含過多不是現代標準漢語的內容。

The Identifier Network[1] [2] [3] was first proposed by Professor Hongke Zhang, a highly respected scientist in Chinese National Basic Research Program (“973” project). The Identifier Network is famous for “two layer”,“three mappings” and “four identifiers”.

Different from the traditional OSI (Open System Interconnection) 7 layers network model, the Identifier Network includes two layers:the infrastructure layer and the pervasive service layer. The infrastructure layer is used to complete all kinds of network terminal access, forwarding and switching routing of data information in network, providing unified communication platform for network services such as data, voice, video and so on. The pervasive service layeris used to complete unified management of service data resource and unified control of network connections, so as to structure pervasive network service architecture and meet the requirement of different network.

The "three mappings" include: 1.the recolution mapping of SID, 2.the resolution mapping of CID, 3.the resolution mapping of AID.

The "four identifiers" include: 1.Routing Identifier (RID), 2.Access Identifier (AID), 3.Connecting Identifier (CID), 4.Service Identifier(SID).

The infrastructure layer introduces virtual access component (VAC) and virtual backbone component (VBC). VAC achieves the pervasive access by introducing the concept and scheme of AID. Users could communicate with each other at anytime, anywhere and share the most popular services. VBC uses RID to solve the problems of routing and management of location. In contrast, VBC realizes the resource configuration and coordination at the core networks by introducing the concept and scheme of RID. The resolution mapping of AID achieves the mapping between AIDs and RIDs and supports four operation modes: one-to-one, one-to-many, many-to-one and many-to-many.

User locates in the VAC, in which the AID represents the identity information of terminal or subnet, being only used in VAC. While the RID in the VBC represents the location information of terminal or subnet, being only used in VBC. The access router realizes the mapping from AID to RID through resolution mapping of AID. By this way, we could implement the separation between indentity information and location information.

The pervasive service layer introduces virtual service component (VSC) and virtual connect component(VCC). VSC is the foundation for realizing the pervasive service. It not only provides the universal description and presentation of various services, but also provides a system to control and manage the services. By introducing SID, various services could be sorted and described in a unified way. The resolution mapping of SID connects the VSC and VCC together and establishes communication tunnels for many kinds of services. VCC introduces the CID as identification of both connection and user. A CID identifies a connection which is used to achieve a service. If a user changes his location,the system only updates the mapping between AID and RID, but the CID and AID both remain invariant. And only the users authorized by the CID could use this connection, other users could not use the connection of this CID unless pass the authentication of this CID. Therefore, VCC could efficiently support mobility and security. In pervasive service layer, the resolution mapping of SID and CID are also employed. Similar with the resolution mapping of AID, both of them support four operation modes: one-to-one, one-to-many, many-to-one and many-to-many.

Over the course of ten years of investigation, a variety of theoretical models have been studied and applied to industrial and civilian applications, which demonstrated that Identifier Network provides great help to solve the problems of today’s Internet, offering impressive flexibility, security, mobility and manageability.

  1. 张宏科,苏伟,“新网络体系基础研究——一体化网络与普适服务”,电子学报,35(4)(2007):593-598.
  2. 董平,秦雅娟,张宏科,“支持普适服务的一体化网络研究”,电子学报,35(4)(2007):599-606.
  3. 杨冬,周华春,张宏科,“基于一体化网络的普适服务研究”,电子学报,35(4)(2007):607-613.