[1]曹雪峰.基于GNS3的帧中继仿真分析[J].计算机技术与发展,2013,(05):254-257.
 CAO Xue-feng.Frame Relay Simulation and Analysis Based on GNS3[J].,2013,(05):254-257.
点击复制

基于GNS3的帧中继仿真分析()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年05期
页码:
254-257
栏目:
应用开发研究
出版日期:
1900-01-01

文章信息/Info

Title:
Frame Relay Simulation and Analysis Based on GNS3
文章编号:
1673-629X(2013)05-0254-04
作者:
曹雪峰
河北民族师范学院 数学与计算机系
Author(s):
CAO Xue-feng
关键词:
帧中继协议分析GNS3本地管理接口逆向地址解析协议
Keywords:
frame relayprotocol analysisGNS3local management interfaceinverse address resolution protocol
文献标志码:
A
摘要:
帧中继是常用的广域网协议,配置在路由器的串口,无法直接在主机上捕获帧中继报文,而学习网络协议的最好方法,就是通过对网络中捕获报文的分析,理解报文格式、协议的工作原理和交互过程.利用GNS3模拟软件搭建虚拟实验环境,设计了帧中继协议仿真实验,对帧中继网络进行配置,通过对链路中捕获帧中继报文的分析,阐述了帧中继数据帧结构、LMI协议工作原理和InARP协议工作原理,加深了对帧中继协议的理解.从方法学的角度看,这些对于计算机网络协议的学习、研究和教学均有一定的指导意义和参考价值
Abstract:
Frame relay is a protocol that can be usually used over wide area network,to be deployed in serial port of router,can’t directly capture the frame relay frames by the computer,but the best way to learn the network protocol is analysis of network packets captured,un-derstands the format of packet,the principle and the interactive work process of protocol. The virtual experiment environment is construc-ted by GNS3 simulator,design the simulation experiment of the frame relay,configure the frame relay network,analyze frame relay frames that captured on the link,explain the format of frame relay frame,the principle of LMI protocol and the principle of InARP proto-col,deepen the understanding of the frame relay. From the methodological point of view,it is significant for the study,research and in-struction

相似文献/References:

[1]韩咚 田银花.基于赋时颜色Petri网的NSSK协议建模[J].计算机技术与发展,2010,(06):156.
 HAN Dong,TIAN Yin-hua.The Modeling of NSSK Protocols Based on Timed Colored Petri Nets[J].,2010,(05):156.
[2]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(05):179.
[3]周彩兰 虞珊 张亚芳.基于SMTP协议解析的垃圾邮件防治技术[J].计算机技术与发展,2008,(01):188.
 ZHOU Cai-lan,YU Shan,ZHANG Ya-fang.Technique of Preventing Junk Mail Based on SMTP[J].,2008,(05):188.
[4]燕振刚 罗进文.一种基于协议分析的入侵检测模型[J].计算机技术与发展,2008,(11):146.
 YAN Zhen-gang,LUO Jin-wen.An Intrusion Detection Model Based on Protocol Analysis[J].,2008,(05):146.
[5]王亚楠 刘方爱.基于数据挖掘和协议分析的可扩充IDS架构[J].计算机技术与发展,2006,(01):223.
 WANG Ya-nan,LIU Fang-ai.An Extensible Framework of Intrusion Detection System Based on Data Mining and Protocol Analysis[J].,2006,(05):223.
[6]蔡敏 叶震 徐吉斌.协议分析技术在入侵检测中的应用[J].计算机技术与发展,2007,(02):239.
 CAI Min,YE Zhen,XU Ji-bin.Application of Protocol Analysis Technology in IDS[J].,2007,(05):239.
[7]王锦超 李飞 沈明玉.网络数据包的协议分析算法设计与实现[J].计算机技术与发展,2006,(04):30.
 WANG Jin-chao,LI Fei,SHEN Ming-yu.Design and Implementation of Protocols Analysis Algorithm for Network Datagram Packets[J].,2006,(05):30.
[8]蒋绍林 姚金魁 施祖清 王金双 陆晓雯.基于HDLC和FR分析通信环境对协议设计的影响[J].计算机技术与发展,2012,(06):22.
 JIANG Shao-lin,YAO Jin-kui,SHI Zu-qing,et al.Influence of Communication Conditions to Protocol Design Based on HDLC & FR[J].,2012,(05):22.
[9]王凯,吴君钦.基于DPI技术的IM协议识别系统研究[J].计算机技术与发展,2013,(11):120.
 WANG Kai,WU Jun-qin.Research on IM Protocol Recognition System Based on DPI Technology[J].,2013,(05):120.

更新日期/Last Update: 1900-01-01