- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
* The fundamental architecture of the Juniper Networks routing systems is a complete separation between the routing- and packet-forwarding functions. This implementation consists of two independent components: a Routing Engine (RE) and a Packet Forwarding Engine (PFE). The RE is responsible for performing routing updates and system management. The RE consists of routing-protocol software processes running inside a protected memory environment on a Pentium-based computer platform. It has a direct 100-Mbps connection to the PFE. The RE maintains peer relationships, runs the routing protocols, builds the routing table and from that table, and creates the forwarding table that it exports to the PFE. The PFE is responsible for forwarding packets through the router. It is a high-performance, ASIC-based forwarding engine that is capable of forwarding 40 Mpps for all packet sizes under production conditions (for example, with 80,000 unique destinations). This separation ensures that high levels of route instability do not impact the performance of the Packet Forwarding Engine. Likewise, extremely large volumes of traffic do not impact the ability of the Routing Engine to maintain peer relationships and calculate routing tables. The clean separation of these two functions permits the delivery of both superior forwarding performance and a highly reliable system. * * * * * * NetScreen’s FW/VPN products are built on a unique technology platform. We use custom ASICs that gives us major performance and cost advantages, such as our 10x performance advantages in denial of service attack blocking and in VPN throughput. We also use a custom, real-time operating system software that gives us flexibility, security and additional performance advantages. Other security vendors run their security applications on general purpose operating systems that are slow and are riddled with vulnerabilities that are well known by hackers. Before installing security software on one of
文档评论(0)