CN104506614B - A kind of design method at the more live data centers of distribution based on cloud computing - Google Patents

A kind of design method at the more live data centers of distribution based on cloud computing Download PDF

Info

Publication number
CN104506614B
CN104506614B CN201410805490.2A CN201410805490A CN104506614B CN 104506614 B CN104506614 B CN 104506614B CN 201410805490 A CN201410805490 A CN 201410805490A CN 104506614 B CN104506614 B CN 104506614B
Authority
CN
China
Prior art keywords
network
data center
security protection
level
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410805490.2A
Other languages
Chinese (zh)
Other versions
CN104506614A (en
Inventor
夏飞
崔恒志
何金陵
孙祥刚
郑海雁
官国飞
葛崇慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Fangtian Power Technology Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Fangtian Power Technology Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Jiangsu Fangtian Power Technology Co Ltd, Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201410805490.2A priority Critical patent/CN104506614B/en
Publication of CN104506614A publication Critical patent/CN104506614A/en
Application granted granted Critical
Publication of CN104506614B publication Critical patent/CN104506614B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1034Reaction to server failures by a load balancer

Abstract

The design method at the more live data centers of distribution that the invention discloses a kind of based on cloud computing, includes the following steps:(1)Data center network is designed using big two-tiered structure, is extended through extensive double layer network and VLAN, realizes a wide range of transfer of the virtual machine inside data center;(2)The Fault Isolation of data center network is realized using virtual switch technology;(3)For data center network using board elongation technology come access switch, the board elongation technology can allow data center network to perceive virtual machine simultaneously;(4)Design construction is physically separated but the interconnection of across data center network realization data center integrated in logic, and establishes the data center of distributed virtualization across data center network based on described;(5)The security protection of data center uses multi-level security protection, including the security protection of device level, the security protection of network level, the protection of system-level active safety.

Description

A kind of design method at the more live data centers of distribution based on cloud computing
Technical field
The design method at the more live data centers of distribution that the present invention relates to a kind of based on cloud computing belongs to electric system letter Breathization construction technique field.
Background technology
After data centralization, the business activities of enterprise are increasingly dependent on the IT infrastructure such as data center and network, The whole day business continuity operation of IT becomes the target that large enterprise's IT construction operation is pursued with enterprise operation.Data center is to calculate The crucial carrying of the core place of machine equipment and mass data, with the arrival in cloud computing big data epoch, data center Construction has started new upsurge, data center towards large-scale intensivization development, client to the solution of data center it is also proposed that Higher requirement.Green energy conservation, intelligence, automatic management are data center's development trends.
For the standby purpose of calamity, enterprise generally can all build two or more data centers.Primary data center undertakes user Core business, other data centers mainly undertake some non-key business and back up data, configuration, the industry at main center simultaneously Business etc..Under normal circumstances, Each performs its own functions for main center and standby center, when disaster occurs, primary data center delay machine, and Backup Data center Can fast quick-recovery data and application, to mitigate the loss brought to user by disaster.
Since disaster is small probability event, and use a master one for this mode, Backup Data center only occurs in disaster Shi Caineng is played a role, and with the promotion of enterprise's disaster tolerance construction criteria, backup IT resources and fund can put into it is increasing, It mutually can not directly be multiplexed again, to cause to waste.In addition the application of active-standby mode, standby center are needed when taking over main center Longer time, relationship are complicated, often seriously affect the business handling of user.To overcome disadvantages mentioned above, electricity power etc. all Conglomerate user, starts to turn to focus that " construction of distributed more live data " center "s, distributed more live data centers are by industry Business is distributed to multiple data centers, and each other and behavior offering customers service, distributed more work include two big crucial special Levy --- it is distributed and mostly living, enterprise-class tools are embodied when building with using data center to scheduling of resource utilization and business The new approaches of disposition flexibility.
Invention content
The design method at the object of the present invention is to provide a kind of more live data centers of more distributions based on cloud computing solves Network scaling problem inside data center meets and is concurrently visited large data files after application program is drifted about on different server Convenience, high speed and the reliability asked.
To overcome the shortcomings of the prior art, above-mentioned technical problem is solved, the present invention adopts the following technical scheme that:It is a kind of The design method at the more live data centers of distribution based on cloud computing, which is characterized in that include the following steps:
(1) data center network is designed using big two-tiered structure, is extended through extensive double layer network and VLAN, is realized empty Quasi- a wide range of transfer of the machine inside data center;
(2) virtual switch technology is used to realize the Fault Isolation of data center network;
(3) for data center network using board elongation technology come access switch, the board elongation technology simultaneously can be with Data center network is allowed to perceive virtual machine;
(4) design construction is physically separated but the interconnection of across data center network realization data center integrated in logic, And the data center of distributed virtualization is established across data center network based on described, computing capability can be in different data It is flowed freely between center;
(5) security protection of data center uses multi-level security protection, includes security protection, the network level of device level Security protection, system-level active safety protection.
Preferably, the step (2) includes:One interchanger is logically separated into multiple virtual switches, the void Be completely separated between quasi- interchanger, each virtual switch have separate two layers and three layers protocol stack and software into Journey has separate administrator;Since the software process of each virtual switch is completely independent, when some virtual switch When going wrong of machine is not interfere with other virtual switch, realizes perfect Fault Isolation.
Preferably, the step (3) includes:The board elongation technology, will be former by IEEE802.1qbh protocol realizations The control plane and Forwarding plane of multiple TOR (Top of Rack, the cabinet interchanger) crosspoint of this interconnection together merge Together, the state that multiple switch is combined into an interchanger is formed, original TOR accesses for being distributed in each rack exchange Machine just becomes the long-range board of new interchanger;Under above-mentioned framework, TOR crosspoints are not the NE management points of individualism, Spanning tree or three layers of Routing Protocol without two layers safeguard network topology.
Preferably, the step (3) includes:Using the board elongation technology based on IEEE801.1qbh, in server Fill the network interface card of one piece of support IEEE802.1qbh agreement, the network interface card be segmented into multiple empty network interface cards come it is corresponding with virtual machine, together Shi Suoshu network interface cards are also the long-range board of external switch, can realize that management is issued with tactful on external switch;On The method of stating need not consume the cpu resource of server, so having higher switching performance.
Preferably, the step (4) includes:The network across data center passes through IP backbone by the realization of OTV technologies The data center network of net is got through;The OTV technologies borrow the data frame encapsulation of a part of Eo-MPLS-OGRE, have used Complete different control plane, establishes Adjacency relationships, and exchange the mac address table between data center by ISIS; Requirement of the OTV technologies for IP backbone is IP reachable, does not need the support of MPLS, enormously simplifies the maintenance of network;Together When as a result of control plane and Forwarding plane separation, effectively double layer network is prevented to spread unchecked on IP backbone, simultaneously Also the stability of whole network need not be substantially increased spanning tree across on the IP backbone between data center.
Preferably, the step (5) includes:The safety of the network level includes carrying out access authentication of user, authorizing and examine Meter to prevent illegal access, be transmitted encryption to prevent the leakage of information and spy out, carry out safe division and isolation to prevent It is only the access authorized;The system-level active safety protection includes making the machine of " health " that can just connect by admission control Enter network, prevents Large Scale DDoS Attack by detecting shunting immediately in advance, carry out global safety management;Network is as letter The platform for ceasing transmission has the ability and chance of first time protection information resource, intelligent defending against network to allow for realizing institute It calls " with foresight ", is protected before potential threat develops into security attack.
Preferably, the step (5) includes:The network level security protection is controlled using ACL, is connect allowing network flow Enter one ACL of configuration on the interface of network, otherwise data center network will refuse the network flow on the interface.
Preferably, the step (5) includes:The ACL includes a series of multiple entries being made of sentences, described each Entry, which includes one, allows or refuses the execution unit that network flow (incoming and outgoing) reaches network parts specified in entry, institute It further includes a filter unit based on source address, destination address, agreement, agreement special parameter to state each entry, described every All there are one the whole entries of implicit refusal for a ACL last.
The advantageous effect that the present invention is reached:By VPC virtual machine techniques and board elongation technology, data center is realized Internal network scaling problem, meets and is concurrently accessed just large data files after application program is drifted about on different server Victory, high speed and reliability.
The meaning of specification English label:
TOR:Top of Rack, cabinet interchanger;
OTV:Overlay Transport Virtualization cover transfer of virtual;
ISIS:Intermediate system to intermediate system, the linking status road of a classification By agreement;
Adjacency:It is adjacent, the association between the neighbor router and terminal node of selection;
MPLS:Multiprotocol label switching is a kind of system for rapid data packet switch and routing, it is network data Flow provides the abilities such as target, routing address, forwarding and exchange;
DDoS:Distributed Denial of Service, distributed denial of service attack refer to by means of client/clothes Be engaged in device technology, multiple computers are joined together as Attack Platform, ddos attack is started to one or more targets, from into The power of Denial of Service attack is improved again;
ACL:Access Control List, accesses control list is router and the instruction list of exchange interface, For the data packet of control port disengaging;
OGRE:Object-Oriented Graphics Rendering Engine, object-oriented graphics rendering engine are One with C++ exploitation towards scene, very flexible 3D engines.
Description of the drawings
Fig. 1 is a kind of flow chart of the design method at more live data centers of distribution based on cloud computing of the present invention.
Specific implementation mode
The invention will be further described below in conjunction with the accompanying drawings.Following embodiment is only used for clearly illustrating the present invention Technical solution, and not intended to limit the protection scope of the present invention.
As shown in Fig. 1 the stream of the design method at a kind of more live data centers of distribution based on cloud computing of the present invention Cheng Tu, the present invention provide a kind of design method at the more live data centers of distribution based on cloud computing, solve inside data center Network scaling problem, meet the convenience that large data files are concurrently accessed after application program is drifted about on different server, High speed and reliability, the present invention include the following steps:
(1) data center network is designed using big two-tiered structure, is extended through extensive double layer network and VLAN, is realized empty Quasi- a wide range of transfer of the machine inside data center;
(2) virtual switch technology is used to realize the Fault Isolation of data center network;
(3) for data center network using board elongation technology come access switch, the board elongation technology simultaneously can be with Data center network is allowed to perceive virtual machine;
(4) design construction is physically separated but the interconnection of across data center network realization data center integrated in logic, And the data center of distributed virtualization is established across data center network based on described, computing capability can be in different data It is flowed freely between center;
(5) security protection of data center uses multi-level security protection, includes security protection, the network level of device level Security protection, system-level active safety protection.
Preferably, the step (2) includes:One interchanger is logically separated into multiple virtual switches, the void Be completely separated between quasi- interchanger, each virtual switch have separate two layers and three layers protocol stack and software into Journey has separate administrator;Since the software process of each virtual switch is completely independent, when some virtual switch When going wrong of machine is not interfere with other virtual switch, realizes perfect Fault Isolation.
Preferably, the step (3) includes:The board elongation technology, will be former by IEEE802.1qbh protocol realizations The control plane and Forwarding plane of multiple TOR (Top of Rack, the cabinet interchanger) crosspoint of this interconnection together merge Together, the state that multiple switch is combined into an interchanger is formed, original TOR accesses for being distributed in each rack exchange Machine just becomes the long-range board of new interchanger;Under above-mentioned framework, TOR crosspoints are not the NE management points of individualism, Spanning tree or three layers of Routing Protocol without two layers safeguard network topology.
Preferably, the step (3) includes:Using the board elongation technology based on IEEE801.1qbh, in server Fill the network interface card of one piece of support IEEE802.1qbh agreement, the network interface card be segmented into multiple empty network interface cards come it is corresponding with virtual machine, together Shi Suoshu network interface cards are also the long-range board of external switch, can realize that management is issued with tactful on external switch;On The method of stating need not consume the cpu resource of server, so having higher switching performance.
Preferably, the step (4) includes:The network across data center passes through IP backbone by the realization of OTV technologies The data center network of net is got through;The OTV technologies borrow the data frame encapsulation of a part of Eo-MPLS-OGRE, have used Complete different control plane, establishes Adjacency relationships, and exchange the mac address table between data center by ISIS; Requirement of the OTV technologies for IP backbone is IP reachable, does not need the support of MPLS, enormously simplifies the maintenance of network;Together When as a result of control plane and Forwarding plane separation, effectively double layer network is prevented to spread unchecked on IP backbone, simultaneously Also the stability of whole network need not be substantially increased spanning tree across on the IP backbone between data center.
Preferably, the step (5) includes:The safety of the network level includes carrying out access authentication of user, authorizing and examine Meter to prevent illegal access, be transmitted encryption to prevent the leakage of information and spy out, carry out safe division and isolation to prevent It is only the access authorized;The system-level active safety protection includes making the machine of " health " that can just connect by admission control Enter network, prevents Large Scale DDoS Attack by detecting shunting immediately in advance, carry out global safety management;Network is as letter The platform for ceasing transmission has the ability and chance of first time protection information resource, intelligent defending against network to allow for realizing institute It calls " with foresight ", is protected before potential threat develops into security attack.
Preferably, the step (5) includes:The network level security protection is controlled using ACL, is connect allowing network flow Enter one ACL of configuration on the interface of network, otherwise data center network will refuse the network flow on the interface.
Preferably, the step (5) includes:The ACL includes a series of multiple entries being made of sentences, described each Entry, which includes one, allows or refuses the execution unit that network flow (incoming and outgoing) reaches network parts specified in entry, institute It further includes a filter unit based on source address, destination address, agreement, agreement special parameter to state each entry, described every All there are one the whole entries of implicit refusal for a ACL last.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the technical principles of the invention, several improvement and deformations can also be made, these improvement and deformations Also it should be regarded as protection scope of the present invention.

Claims (5)

1. a kind of design method at the more live data centers of distribution based on cloud computing, which is characterized in that include the following steps:
(1) data center network is designed using big two-tiered structure, is extended through extensive double layer network and VLAN, realizes virtual machine A wide range of transfer inside data center;
(2) virtual switch technology is used to realize the Fault Isolation of data center network;
(3) for data center network using board elongation technology come access switch, the board elongation technology can allow number simultaneously Virtual machine is perceived according to central site network;
(4) design construction is physically separated but the interconnection of across data center network realization data center integrated in logic, and base The data center of distributed virtualization is established across data center network in described, computing capability can be in different data centers Between flow freely;
(5) security protection of data center uses multi-level security protection, includes the peace of the security protection of device level, network level Full protection, the protection of system-level active safety;The step (5) includes:The security protection of the network level includes carrying out user Access authentication, mandate and audit are transmitted encryption to prevent the leakage of information and spy out, are pacified to prevent illegal access It is complete to divide and be isolated to prevent the access of unauthorized;The system-level active safety protection includes being made by admission control The machine of " health " could access network, prevent Large Scale DDoS Attack by detecting shunting immediately in advance, carry out the overall situation Safety management;The step (5) includes:The network level security protection is controlled using ACL, and network is accessed allowing network flow Interface on configure an ACL, otherwise data center network will refuse the network flow on the interface;Step (5) packet It includes:The ACL includes a series of multiple entries being made of sentences, and each entry, which includes one, allows or refuse network flow to arrive Up to the execution unit of network parts specified in entry, each entry further includes one based on source address, destination address, association The filter unit of view, agreement special parameter, the last entry whole there are one implicit refusal of each ACL.
2. a kind of design method at more live data centers of distribution based on cloud computing according to claim 1, feature It is, the step (2) includes:One interchanger is logically separated into multiple virtual switches, the virtual switch it Between be completely separated, each virtual switch has the protocol stack and software process of separate two layers and three layers, have respectively Independent administrator.
3. a kind of design method at more live data centers of distribution based on cloud computing according to claim 1, feature It is, the step (3) includes:The board elongation technology will be interconnected at one originally by IEEE802.1qbh protocol realizations The control plane and Forwarding plane of the multiple TOR crosspoints risen are merged, and are formed multiple switch and are combined into a friendship The state changed planes, original TOR access switch for being distributed in each rack just become the long-range board of new interchanger.
4. a kind of design method at more live data centers of distribution based on cloud computing according to claim 3, feature It is, the step (3) includes:Using the board elongation technology based on IEEE801.1qbh, in the built-in one piece of support of server The network interface card of IEEE802.1qbh agreements, the network interface card are segmented into multiple empty network interface cards and carry out, while the network interface card corresponding with virtual machine It is also the long-range board of external switch, can realizes that management is issued with tactful on external switch.
5. a kind of design method at more live data centers of distribution based on cloud computing according to claim 1, feature It is, the step (4) includes:The network across data center is passed through by the realization of OTV technologies in the data of IP backbone Heart network is got through;The OTV technologies borrow the data frame encapsulation of a part of Eo-MPLS-OGRE, use entirely different control Plane processed establishes Adjacency relationships by ISIS, and exchanges the mac address table between data center.
CN201410805490.2A 2014-12-22 2014-12-22 A kind of design method at the more live data centers of distribution based on cloud computing Active CN104506614B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410805490.2A CN104506614B (en) 2014-12-22 2014-12-22 A kind of design method at the more live data centers of distribution based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410805490.2A CN104506614B (en) 2014-12-22 2014-12-22 A kind of design method at the more live data centers of distribution based on cloud computing

Publications (2)

Publication Number Publication Date
CN104506614A CN104506614A (en) 2015-04-08
CN104506614B true CN104506614B (en) 2018-07-31

Family

ID=52948329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410805490.2A Active CN104506614B (en) 2014-12-22 2014-12-22 A kind of design method at the more live data centers of distribution based on cloud computing

Country Status (1)

Country Link
CN (1) CN104506614B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9875359B2 (en) * 2015-10-14 2018-01-23 Quanta Computer Inc. Security management for rack server system
CN108737263B (en) * 2017-04-19 2021-10-15 阿里巴巴集团控股有限公司 Data center system and data stream processing method
CN108833153A (en) * 2018-06-07 2018-11-16 中国石油天然气股份有限公司 The method for realizing the unified management of strange land data center cloud resource
CN110990200B (en) * 2019-11-26 2022-07-05 苏宁云计算有限公司 Flow switching method and device based on multiple active data centers
CN111371535B (en) * 2020-02-27 2023-04-07 广东南粤银行股份有限公司 Disaster backup system and switching method for different-place main and standby data centers
CN113992680B (en) * 2021-11-10 2024-02-02 中国工商银行股份有限公司 Scheduling method, device, equipment and medium applied to distributed multi-activity system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7609619B2 (en) * 2005-02-25 2009-10-27 Cisco Technology, Inc. Active-active data center using RHI, BGP, and IGP anycast for disaster recovery and load distribution
US8694664B2 (en) * 2010-11-23 2014-04-08 Cisco Technology, Inc. Active-active multi-homing support for overlay transport protocol
CN103812929A (en) * 2014-01-11 2014-05-21 浪潮电子信息产业股份有限公司 Active-active method for cloud data center management platforms
CN104243527A (en) * 2013-06-20 2014-12-24 华为技术有限公司 Data synchronization method and device and distributed system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130325885A1 (en) * 2012-05-30 2013-12-05 Red Hat Israel, Inc. Provisioning composite applications using a hierarchical data structures

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7609619B2 (en) * 2005-02-25 2009-10-27 Cisco Technology, Inc. Active-active data center using RHI, BGP, and IGP anycast for disaster recovery and load distribution
US8694664B2 (en) * 2010-11-23 2014-04-08 Cisco Technology, Inc. Active-active multi-homing support for overlay transport protocol
CN104243527A (en) * 2013-06-20 2014-12-24 华为技术有限公司 Data synchronization method and device and distributed system
CN103812929A (en) * 2014-01-11 2014-05-21 浪潮电子信息产业股份有限公司 Active-active method for cloud data center management platforms

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CISCO-Nexus-7000;liu_fang_yu;《百度文库》;20111021;全文 *
Cisco思科两地三中心-双活数据中心解决方案;思科中国;《百度文库》;20130716;正文第1-3页 *

Also Published As

Publication number Publication date
CN104506614A (en) 2015-04-08

Similar Documents

Publication Publication Date Title
CN104506614B (en) A kind of design method at the more live data centers of distribution based on cloud computing
CN106953788B (en) virtual network controller and control method
CN105850080B (en) The automatic solution of VNI to VLAN mapping conflict in dual-homed principal part administration
CN103718527B (en) Communication security processing method, apparatus and system
CN106254176A (en) A kind of traffic mirroring method based on openvswitch
CN102884761A (en) Virtual switching overlay for cloud computing
CN110290045A (en) A kind of soft or hard binding model construction method in cloud framework lower network target range
CN101651680A (en) Network safety allocating method and network safety device
CN102413190A (en) Network architecture based on cloud computing and virtual network management method thereof
CN105224385A (en) A kind of virtualization system based on cloud computing and method
CN110417665B (en) EVPN networking system and method for multiple Fabric scenes of data center
CN104283721A (en) Dual-core three-layer network system structure
CN105592016B (en) The protective device of virtual machine under a kind of cloud environment of power information system
CN105490937B (en) Ether virtual network gateway switching method and service provider's edge node devices
CN102523171A (en) Network system based on double call centers
Faujdar et al. Network security in Software defined Networks (SDN)
CN104113434A (en) Data center network redundancy control device by adopting multi-chassis cluster system
CN106059930A (en) Electric power communication network
CN110971456A (en) Design method of computer network system suitable for large-scale commercial complex
Yuan et al. Disaggregated optical data center in a box network using parallel OCS topologies
CN105376231A (en) Method and device for realizing service isolation
CN108134778B (en) Multipurpose cryptosystem based on cryptosystem virtualization slice
CN202353593U (en) Campus network structure
CN108809958A (en) A kind of SDN controller architectures managing system based on MDC
CN106559322B (en) A kind of security protection gateway based on more Godson parallel processing architectures

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant