CN104506614B - A kind of design method at the more live data centers of distribution based on cloud computing - Google Patents
A kind of design method at the more live data centers of distribution based on cloud computing Download PDFInfo
- Publication number
- CN104506614B CN104506614B CN201410805490.2A CN201410805490A CN104506614B CN 104506614 B CN104506614 B CN 104506614B CN 201410805490 A CN201410805490 A CN 201410805490A CN 104506614 B CN104506614 B CN 104506614B
- Authority
- CN
- China
- Prior art keywords
- network
- data center
- security protection
- level
- cloud computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013461 design Methods 0.000 title claims abstract description 18
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000009826 distribution Methods 0.000 title claims abstract description 14
- 238000005516 engineering process Methods 0.000 claims abstract description 28
- 238000010276 construction Methods 0.000 claims abstract description 9
- 238000002955 isolation Methods 0.000 claims abstract description 8
- 238000012546 transfer Methods 0.000 claims abstract description 5
- ABEXEQSGABRUHS-UHFFFAOYSA-N 16-methylheptadecyl 16-methylheptadecanoate Chemical compound CC(C)CCCCCCCCCCCCCCCOC(=O)CCCCCCCCCCCCCCC(C)C ABEXEQSGABRUHS-UHFFFAOYSA-N 0.000 claims description 4
- 241000764238 Isis Species 0.000 claims description 4
- 238000005417 image-selected in vivo spectroscopy Methods 0.000 claims description 4
- 238000012739 integrated shape imaging system Methods 0.000 claims description 4
- 238000005538 encapsulation Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 claims 2
- 238000012550 audit Methods 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000009877 rendering Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 239000011800 void material Substances 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011982 device technology Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000004134 energy conservation Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1034—Reaction to server failures by a load balancer
Abstract
The design method at the more live data centers of distribution that the invention discloses a kind of based on cloud computing, includes the following steps:(1)Data center network is designed using big two-tiered structure, is extended through extensive double layer network and VLAN, realizes a wide range of transfer of the virtual machine inside data center;(2)The Fault Isolation of data center network is realized using virtual switch technology;(3)For data center network using board elongation technology come access switch, the board elongation technology can allow data center network to perceive virtual machine simultaneously;(4)Design construction is physically separated but the interconnection of across data center network realization data center integrated in logic, and establishes the data center of distributed virtualization across data center network based on described;(5)The security protection of data center uses multi-level security protection, including the security protection of device level, the security protection of network level, the protection of system-level active safety.
Description
Technical field
The design method at the more live data centers of distribution that the present invention relates to a kind of based on cloud computing belongs to electric system letter
Breathization construction technique field.
Background technology
After data centralization, the business activities of enterprise are increasingly dependent on the IT infrastructure such as data center and network,
The whole day business continuity operation of IT becomes the target that large enterprise's IT construction operation is pursued with enterprise operation.Data center is to calculate
The crucial carrying of the core place of machine equipment and mass data, with the arrival in cloud computing big data epoch, data center
Construction has started new upsurge, data center towards large-scale intensivization development, client to the solution of data center it is also proposed that
Higher requirement.Green energy conservation, intelligence, automatic management are data center's development trends.
For the standby purpose of calamity, enterprise generally can all build two or more data centers.Primary data center undertakes user
Core business, other data centers mainly undertake some non-key business and back up data, configuration, the industry at main center simultaneously
Business etc..Under normal circumstances, Each performs its own functions for main center and standby center, when disaster occurs, primary data center delay machine, and Backup Data center
Can fast quick-recovery data and application, to mitigate the loss brought to user by disaster.
Since disaster is small probability event, and use a master one for this mode, Backup Data center only occurs in disaster
Shi Caineng is played a role, and with the promotion of enterprise's disaster tolerance construction criteria, backup IT resources and fund can put into it is increasing,
It mutually can not directly be multiplexed again, to cause to waste.In addition the application of active-standby mode, standby center are needed when taking over main center
Longer time, relationship are complicated, often seriously affect the business handling of user.To overcome disadvantages mentioned above, electricity power etc. all
Conglomerate user, starts to turn to focus that " construction of distributed more live data " center "s, distributed more live data centers are by industry
Business is distributed to multiple data centers, and each other and behavior offering customers service, distributed more work include two big crucial special
Levy --- it is distributed and mostly living, enterprise-class tools are embodied when building with using data center to scheduling of resource utilization and business
The new approaches of disposition flexibility.
Invention content
The design method at the object of the present invention is to provide a kind of more live data centers of more distributions based on cloud computing solves
Network scaling problem inside data center meets and is concurrently visited large data files after application program is drifted about on different server
Convenience, high speed and the reliability asked.
To overcome the shortcomings of the prior art, above-mentioned technical problem is solved, the present invention adopts the following technical scheme that:It is a kind of
The design method at the more live data centers of distribution based on cloud computing, which is characterized in that include the following steps:
(1) data center network is designed using big two-tiered structure, is extended through extensive double layer network and VLAN, is realized empty
Quasi- a wide range of transfer of the machine inside data center;
(2) virtual switch technology is used to realize the Fault Isolation of data center network;
(3) for data center network using board elongation technology come access switch, the board elongation technology simultaneously can be with
Data center network is allowed to perceive virtual machine;
(4) design construction is physically separated but the interconnection of across data center network realization data center integrated in logic,
And the data center of distributed virtualization is established across data center network based on described, computing capability can be in different data
It is flowed freely between center;
(5) security protection of data center uses multi-level security protection, includes security protection, the network level of device level
Security protection, system-level active safety protection.
Preferably, the step (2) includes:One interchanger is logically separated into multiple virtual switches, the void
Be completely separated between quasi- interchanger, each virtual switch have separate two layers and three layers protocol stack and software into
Journey has separate administrator;Since the software process of each virtual switch is completely independent, when some virtual switch
When going wrong of machine is not interfere with other virtual switch, realizes perfect Fault Isolation.
Preferably, the step (3) includes:The board elongation technology, will be former by IEEE802.1qbh protocol realizations
The control plane and Forwarding plane of multiple TOR (Top of Rack, the cabinet interchanger) crosspoint of this interconnection together merge
Together, the state that multiple switch is combined into an interchanger is formed, original TOR accesses for being distributed in each rack exchange
Machine just becomes the long-range board of new interchanger;Under above-mentioned framework, TOR crosspoints are not the NE management points of individualism,
Spanning tree or three layers of Routing Protocol without two layers safeguard network topology.
Preferably, the step (3) includes:Using the board elongation technology based on IEEE801.1qbh, in server
Fill the network interface card of one piece of support IEEE802.1qbh agreement, the network interface card be segmented into multiple empty network interface cards come it is corresponding with virtual machine, together
Shi Suoshu network interface cards are also the long-range board of external switch, can realize that management is issued with tactful on external switch;On
The method of stating need not consume the cpu resource of server, so having higher switching performance.
Preferably, the step (4) includes:The network across data center passes through IP backbone by the realization of OTV technologies
The data center network of net is got through;The OTV technologies borrow the data frame encapsulation of a part of Eo-MPLS-OGRE, have used
Complete different control plane, establishes Adjacency relationships, and exchange the mac address table between data center by ISIS;
Requirement of the OTV technologies for IP backbone is IP reachable, does not need the support of MPLS, enormously simplifies the maintenance of network;Together
When as a result of control plane and Forwarding plane separation, effectively double layer network is prevented to spread unchecked on IP backbone, simultaneously
Also the stability of whole network need not be substantially increased spanning tree across on the IP backbone between data center.
Preferably, the step (5) includes:The safety of the network level includes carrying out access authentication of user, authorizing and examine
Meter to prevent illegal access, be transmitted encryption to prevent the leakage of information and spy out, carry out safe division and isolation to prevent
It is only the access authorized;The system-level active safety protection includes making the machine of " health " that can just connect by admission control
Enter network, prevents Large Scale DDoS Attack by detecting shunting immediately in advance, carry out global safety management;Network is as letter
The platform for ceasing transmission has the ability and chance of first time protection information resource, intelligent defending against network to allow for realizing institute
It calls " with foresight ", is protected before potential threat develops into security attack.
Preferably, the step (5) includes:The network level security protection is controlled using ACL, is connect allowing network flow
Enter one ACL of configuration on the interface of network, otherwise data center network will refuse the network flow on the interface.
Preferably, the step (5) includes:The ACL includes a series of multiple entries being made of sentences, described each
Entry, which includes one, allows or refuses the execution unit that network flow (incoming and outgoing) reaches network parts specified in entry, institute
It further includes a filter unit based on source address, destination address, agreement, agreement special parameter to state each entry, described every
All there are one the whole entries of implicit refusal for a ACL last.
The advantageous effect that the present invention is reached:By VPC virtual machine techniques and board elongation technology, data center is realized
Internal network scaling problem, meets and is concurrently accessed just large data files after application program is drifted about on different server
Victory, high speed and reliability.
The meaning of specification English label:
TOR:Top of Rack, cabinet interchanger;
OTV:Overlay Transport Virtualization cover transfer of virtual;
ISIS:Intermediate system to intermediate system, the linking status road of a classification
By agreement;
Adjacency:It is adjacent, the association between the neighbor router and terminal node of selection;
MPLS:Multiprotocol label switching is a kind of system for rapid data packet switch and routing, it is network data
Flow provides the abilities such as target, routing address, forwarding and exchange;
DDoS:Distributed Denial of Service, distributed denial of service attack refer to by means of client/clothes
Be engaged in device technology, multiple computers are joined together as Attack Platform, ddos attack is started to one or more targets, from into
The power of Denial of Service attack is improved again;
ACL:Access Control List, accesses control list is router and the instruction list of exchange interface,
For the data packet of control port disengaging;
OGRE:Object-Oriented Graphics Rendering Engine, object-oriented graphics rendering engine are
One with C++ exploitation towards scene, very flexible 3D engines.
Description of the drawings
Fig. 1 is a kind of flow chart of the design method at more live data centers of distribution based on cloud computing of the present invention.
Specific implementation mode
The invention will be further described below in conjunction with the accompanying drawings.Following embodiment is only used for clearly illustrating the present invention
Technical solution, and not intended to limit the protection scope of the present invention.
As shown in Fig. 1 the stream of the design method at a kind of more live data centers of distribution based on cloud computing of the present invention
Cheng Tu, the present invention provide a kind of design method at the more live data centers of distribution based on cloud computing, solve inside data center
Network scaling problem, meet the convenience that large data files are concurrently accessed after application program is drifted about on different server,
High speed and reliability, the present invention include the following steps:
(1) data center network is designed using big two-tiered structure, is extended through extensive double layer network and VLAN, is realized empty
Quasi- a wide range of transfer of the machine inside data center;
(2) virtual switch technology is used to realize the Fault Isolation of data center network;
(3) for data center network using board elongation technology come access switch, the board elongation technology simultaneously can be with
Data center network is allowed to perceive virtual machine;
(4) design construction is physically separated but the interconnection of across data center network realization data center integrated in logic,
And the data center of distributed virtualization is established across data center network based on described, computing capability can be in different data
It is flowed freely between center;
(5) security protection of data center uses multi-level security protection, includes security protection, the network level of device level
Security protection, system-level active safety protection.
Preferably, the step (2) includes:One interchanger is logically separated into multiple virtual switches, the void
Be completely separated between quasi- interchanger, each virtual switch have separate two layers and three layers protocol stack and software into
Journey has separate administrator;Since the software process of each virtual switch is completely independent, when some virtual switch
When going wrong of machine is not interfere with other virtual switch, realizes perfect Fault Isolation.
Preferably, the step (3) includes:The board elongation technology, will be former by IEEE802.1qbh protocol realizations
The control plane and Forwarding plane of multiple TOR (Top of Rack, the cabinet interchanger) crosspoint of this interconnection together merge
Together, the state that multiple switch is combined into an interchanger is formed, original TOR accesses for being distributed in each rack exchange
Machine just becomes the long-range board of new interchanger;Under above-mentioned framework, TOR crosspoints are not the NE management points of individualism,
Spanning tree or three layers of Routing Protocol without two layers safeguard network topology.
Preferably, the step (3) includes:Using the board elongation technology based on IEEE801.1qbh, in server
Fill the network interface card of one piece of support IEEE802.1qbh agreement, the network interface card be segmented into multiple empty network interface cards come it is corresponding with virtual machine, together
Shi Suoshu network interface cards are also the long-range board of external switch, can realize that management is issued with tactful on external switch;On
The method of stating need not consume the cpu resource of server, so having higher switching performance.
Preferably, the step (4) includes:The network across data center passes through IP backbone by the realization of OTV technologies
The data center network of net is got through;The OTV technologies borrow the data frame encapsulation of a part of Eo-MPLS-OGRE, have used
Complete different control plane, establishes Adjacency relationships, and exchange the mac address table between data center by ISIS;
Requirement of the OTV technologies for IP backbone is IP reachable, does not need the support of MPLS, enormously simplifies the maintenance of network;Together
When as a result of control plane and Forwarding plane separation, effectively double layer network is prevented to spread unchecked on IP backbone, simultaneously
Also the stability of whole network need not be substantially increased spanning tree across on the IP backbone between data center.
Preferably, the step (5) includes:The safety of the network level includes carrying out access authentication of user, authorizing and examine
Meter to prevent illegal access, be transmitted encryption to prevent the leakage of information and spy out, carry out safe division and isolation to prevent
It is only the access authorized;The system-level active safety protection includes making the machine of " health " that can just connect by admission control
Enter network, prevents Large Scale DDoS Attack by detecting shunting immediately in advance, carry out global safety management;Network is as letter
The platform for ceasing transmission has the ability and chance of first time protection information resource, intelligent defending against network to allow for realizing institute
It calls " with foresight ", is protected before potential threat develops into security attack.
Preferably, the step (5) includes:The network level security protection is controlled using ACL, is connect allowing network flow
Enter one ACL of configuration on the interface of network, otherwise data center network will refuse the network flow on the interface.
Preferably, the step (5) includes:The ACL includes a series of multiple entries being made of sentences, described each
Entry, which includes one, allows or refuses the execution unit that network flow (incoming and outgoing) reaches network parts specified in entry, institute
It further includes a filter unit based on source address, destination address, agreement, agreement special parameter to state each entry, described every
All there are one the whole entries of implicit refusal for a ACL last.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the technical principles of the invention, several improvement and deformations can also be made, these improvement and deformations
Also it should be regarded as protection scope of the present invention.
Claims (5)
1. a kind of design method at the more live data centers of distribution based on cloud computing, which is characterized in that include the following steps:
(1) data center network is designed using big two-tiered structure, is extended through extensive double layer network and VLAN, realizes virtual machine
A wide range of transfer inside data center;
(2) virtual switch technology is used to realize the Fault Isolation of data center network;
(3) for data center network using board elongation technology come access switch, the board elongation technology can allow number simultaneously
Virtual machine is perceived according to central site network;
(4) design construction is physically separated but the interconnection of across data center network realization data center integrated in logic, and base
The data center of distributed virtualization is established across data center network in described, computing capability can be in different data centers
Between flow freely;
(5) security protection of data center uses multi-level security protection, includes the peace of the security protection of device level, network level
Full protection, the protection of system-level active safety;The step (5) includes:The security protection of the network level includes carrying out user
Access authentication, mandate and audit are transmitted encryption to prevent the leakage of information and spy out, are pacified to prevent illegal access
It is complete to divide and be isolated to prevent the access of unauthorized;The system-level active safety protection includes being made by admission control
The machine of " health " could access network, prevent Large Scale DDoS Attack by detecting shunting immediately in advance, carry out the overall situation
Safety management;The step (5) includes:The network level security protection is controlled using ACL, and network is accessed allowing network flow
Interface on configure an ACL, otherwise data center network will refuse the network flow on the interface;Step (5) packet
It includes:The ACL includes a series of multiple entries being made of sentences, and each entry, which includes one, allows or refuse network flow to arrive
Up to the execution unit of network parts specified in entry, each entry further includes one based on source address, destination address, association
The filter unit of view, agreement special parameter, the last entry whole there are one implicit refusal of each ACL.
2. a kind of design method at more live data centers of distribution based on cloud computing according to claim 1, feature
It is, the step (2) includes:One interchanger is logically separated into multiple virtual switches, the virtual switch it
Between be completely separated, each virtual switch has the protocol stack and software process of separate two layers and three layers, have respectively
Independent administrator.
3. a kind of design method at more live data centers of distribution based on cloud computing according to claim 1, feature
It is, the step (3) includes:The board elongation technology will be interconnected at one originally by IEEE802.1qbh protocol realizations
The control plane and Forwarding plane of the multiple TOR crosspoints risen are merged, and are formed multiple switch and are combined into a friendship
The state changed planes, original TOR access switch for being distributed in each rack just become the long-range board of new interchanger.
4. a kind of design method at more live data centers of distribution based on cloud computing according to claim 3, feature
It is, the step (3) includes:Using the board elongation technology based on IEEE801.1qbh, in the built-in one piece of support of server
The network interface card of IEEE802.1qbh agreements, the network interface card are segmented into multiple empty network interface cards and carry out, while the network interface card corresponding with virtual machine
It is also the long-range board of external switch, can realizes that management is issued with tactful on external switch.
5. a kind of design method at more live data centers of distribution based on cloud computing according to claim 1, feature
It is, the step (4) includes:The network across data center is passed through by the realization of OTV technologies in the data of IP backbone
Heart network is got through;The OTV technologies borrow the data frame encapsulation of a part of Eo-MPLS-OGRE, use entirely different control
Plane processed establishes Adjacency relationships by ISIS, and exchanges the mac address table between data center.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410805490.2A CN104506614B (en) | 2014-12-22 | 2014-12-22 | A kind of design method at the more live data centers of distribution based on cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410805490.2A CN104506614B (en) | 2014-12-22 | 2014-12-22 | A kind of design method at the more live data centers of distribution based on cloud computing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104506614A CN104506614A (en) | 2015-04-08 |
CN104506614B true CN104506614B (en) | 2018-07-31 |
Family
ID=52948329
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410805490.2A Active CN104506614B (en) | 2014-12-22 | 2014-12-22 | A kind of design method at the more live data centers of distribution based on cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104506614B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9875359B2 (en) * | 2015-10-14 | 2018-01-23 | Quanta Computer Inc. | Security management for rack server system |
CN108737263B (en) * | 2017-04-19 | 2021-10-15 | 阿里巴巴集团控股有限公司 | Data center system and data stream processing method |
CN108833153A (en) * | 2018-06-07 | 2018-11-16 | 中国石油天然气股份有限公司 | The method for realizing the unified management of strange land data center cloud resource |
CN110990200B (en) * | 2019-11-26 | 2022-07-05 | 苏宁云计算有限公司 | Flow switching method and device based on multiple active data centers |
CN111371535B (en) * | 2020-02-27 | 2023-04-07 | 广东南粤银行股份有限公司 | Disaster backup system and switching method for different-place main and standby data centers |
CN113992680B (en) * | 2021-11-10 | 2024-02-02 | 中国工商银行股份有限公司 | Scheduling method, device, equipment and medium applied to distributed multi-activity system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7609619B2 (en) * | 2005-02-25 | 2009-10-27 | Cisco Technology, Inc. | Active-active data center using RHI, BGP, and IGP anycast for disaster recovery and load distribution |
US8694664B2 (en) * | 2010-11-23 | 2014-04-08 | Cisco Technology, Inc. | Active-active multi-homing support for overlay transport protocol |
CN103812929A (en) * | 2014-01-11 | 2014-05-21 | 浪潮电子信息产业股份有限公司 | Active-active method for cloud data center management platforms |
CN104243527A (en) * | 2013-06-20 | 2014-12-24 | 华为技术有限公司 | Data synchronization method and device and distributed system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130325885A1 (en) * | 2012-05-30 | 2013-12-05 | Red Hat Israel, Inc. | Provisioning composite applications using a hierarchical data structures |
-
2014
- 2014-12-22 CN CN201410805490.2A patent/CN104506614B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7609619B2 (en) * | 2005-02-25 | 2009-10-27 | Cisco Technology, Inc. | Active-active data center using RHI, BGP, and IGP anycast for disaster recovery and load distribution |
US8694664B2 (en) * | 2010-11-23 | 2014-04-08 | Cisco Technology, Inc. | Active-active multi-homing support for overlay transport protocol |
CN104243527A (en) * | 2013-06-20 | 2014-12-24 | 华为技术有限公司 | Data synchronization method and device and distributed system |
CN103812929A (en) * | 2014-01-11 | 2014-05-21 | 浪潮电子信息产业股份有限公司 | Active-active method for cloud data center management platforms |
Non-Patent Citations (2)
Title |
---|
CISCO-Nexus-7000;liu_fang_yu;《百度文库》;20111021;全文 * |
Cisco思科两地三中心-双活数据中心解决方案;思科中国;《百度文库》;20130716;正文第1-3页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104506614A (en) | 2015-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104506614B (en) | A kind of design method at the more live data centers of distribution based on cloud computing | |
CN106953788B (en) | virtual network controller and control method | |
CN105850080B (en) | The automatic solution of VNI to VLAN mapping conflict in dual-homed principal part administration | |
CN103718527B (en) | Communication security processing method, apparatus and system | |
CN106254176A (en) | A kind of traffic mirroring method based on openvswitch | |
CN102884761A (en) | Virtual switching overlay for cloud computing | |
CN110290045A (en) | A kind of soft or hard binding model construction method in cloud framework lower network target range | |
CN101651680A (en) | Network safety allocating method and network safety device | |
CN102413190A (en) | Network architecture based on cloud computing and virtual network management method thereof | |
CN105224385A (en) | A kind of virtualization system based on cloud computing and method | |
CN110417665B (en) | EVPN networking system and method for multiple Fabric scenes of data center | |
CN104283721A (en) | Dual-core three-layer network system structure | |
CN105592016B (en) | The protective device of virtual machine under a kind of cloud environment of power information system | |
CN105490937B (en) | Ether virtual network gateway switching method and service provider's edge node devices | |
CN102523171A (en) | Network system based on double call centers | |
Faujdar et al. | Network security in Software defined Networks (SDN) | |
CN104113434A (en) | Data center network redundancy control device by adopting multi-chassis cluster system | |
CN106059930A (en) | Electric power communication network | |
CN110971456A (en) | Design method of computer network system suitable for large-scale commercial complex | |
Yuan et al. | Disaggregated optical data center in a box network using parallel OCS topologies | |
CN105376231A (en) | Method and device for realizing service isolation | |
CN108134778B (en) | Multipurpose cryptosystem based on cryptosystem virtualization slice | |
CN202353593U (en) | Campus network structure | |
CN108809958A (en) | A kind of SDN controller architectures managing system based on MDC | |
CN106559322B (en) | A kind of security protection gateway based on more Godson parallel processing architectures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |