WO2011149003A1 - 通信システム、ノード、制御装置、通信方法およびプログラム - Google Patents
通信システム、ノード、制御装置、通信方法およびプログラム Download PDFInfo
- Publication number
- WO2011149003A1 WO2011149003A1 PCT/JP2011/062046 JP2011062046W WO2011149003A1 WO 2011149003 A1 WO2011149003 A1 WO 2011149003A1 JP 2011062046 W JP2011062046 W JP 2011062046W WO 2011149003 A1 WO2011149003 A1 WO 2011149003A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- received packet
- rule
- processing
- packet
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/20—Traffic policing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/38—Flow based routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0866—Checking the configuration
- H04L41/0873—Checking configuration conflicts between network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0895—Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/34—Signalling channels for network management communication
- H04L41/342—Signalling channels for network management communication between virtual entities, e.g. orchestrators, SDN or NFV entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/54—Organization of routing tables
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/60—Router architectures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Definitions
- the present invention relates to a communication system, a node, a control device, a communication method, and a program, and more particularly, to a communication system, a node, a control device, a communication method, and a program that realizes communication by transferring a packet by a node arranged in a network.
- OpenFlow captures communication as an end-to-end flow and performs path control, failure recovery, load balancing, and optimization on a per-flow basis.
- the OpenFlow switch that functions as a forwarding node includes a secure channel for communication with the OpenFlow controller, and operates according to a flow table that is appropriately added or rewritten from the OpenFlow controller.
- a set of a collation rule (FlowKey / matching key) that collates with the packet header, an action (Action) that defines the processing content, and flow statistical information (Stats) is defined (FIG. 30).
- FIG. 31 illustrates action names and action contents defined in Non-Patent Document 2.
- OUTPUT is an action for outputting a packet to a designated port (interface).
- SET_VLAN_VID to SET_TP_DST are actions for modifying the field of the packet header.
- the OpenFlow switch when it receives the first packet (first packet), it searches the flow table for an entry having a matching rule (FlowKey) that matches the header information of the received packet. When an entry that matches the received packet is found as a result of the search, the OpenFlow switch performs the processing content described in the action field of the entry on the received packet. On the other hand, if no entry matching the received packet is found as a result of the search, the OpenFlow switch forwards the received packet to the OpenFlow controller via the secure channel, and the source / destination of the received packet. To request the determination of the route of the packet based on the above, receive the flow entry that realizes this, and update the flow table.
- FlowKey matching rule
- the OpenFlow controller that has received the request for determining the path of the received packet (see s2 Packet-In in FIG. 33) determines the transfer path of the received packet.
- flow entries are set in all open flow switches (node # 1 and node # 2 in FIG. 33) on the transfer path.
- the OpenFlow controller may change an action for a flow entry that has been set based on an instruction or the like of a network administrator. At that time, it is necessary to change or delete the flow entry.
- Non-Patent Document 2 When the above flow entry is set / changed / deleted using the OpenFlow protocol (see “4.6 Flow Table Modification Messages” in Non-Patent Document 2), there will be a delay in communication between the OpenFlow controller and the OpenFlow switch. In some OpenFlow switches, setting / changing / deleting the flow entry is not in time, and in the OpenFlow switch on the route, the packet matches an unintended flow entry on the flow table and an unintended action is executed. There is a problem that.
- FIG. 32 shows a case where the OpenFlow switch (node # 1) that has received a packet addressed to the host (B) from the host (A) makes a flow entry creation request to the controller, and the relay switch (node # 2)
- the node # 2 conflicts with the matching key X of the flow entry to be set (the OpenFlow protocol allows partial matching of an arbitrary header field as a matching key and conflicts between the flow entries.
- the OpenFlow protocol allows partial matching of an arbitrary header field as a matching key and conflicts between the flow entries.
- There is a flow entry with a matching key B the avoidance is controlled by the search order of flow entries).
- the packet transmitted from the host (A) is transferred to the port # 1 instead of the port # 2 that should be output until the setting of the flow entry is completed (FIG. 32). ST8).
- unintended packet transfer execution of action
- the (open flow) controller sends a flow entry to the nodes # 1 and # 2 (see FlowMod (Add) of s3 and s6 in FIG. 33) and is opened. It is conceivable to transmit a Barrier Request defined in the flow protocol (see “5.3.7 Barrier Message” of Non-Patent Document 2 for s4 Barrier Request; Barrier Request / Reply in FIG. 33). The node that has received the Barrier Request completes the execution of the process received before the Barrier Request is received, and responds as “Barrier Reply” (s5 in FIG. 33). As a result, the (OpenFlow) controller can confirm that the flow entry is set correctly.
- Another method is to check whether each node has a corresponding entry by using Stats Request / Reply instead of Barrier Request / Reply.
- the Barrier Request / Reply is also used.
- the present invention has been made in view of the above-described circumstances, and the object of the present invention is that, as described above, an inappropriate processing rule (flow entry) is hit in a node and an unintended process is executed. It is an object to provide a communication system, a node, a control device, a communication method, and a program that can suppress the above.
- a control device sets a node that processes a received packet, a matching rule, and a processing rule that defines processing of a packet that conforms to the matching rule in the node.
- the node holds the identifier in association with the processing rule, and determines whether or not the received packet can be executed by the processing rule corresponding to the matching rule that matches the received packet.
- the matching rule that matches the identifier of the received packet and the received packet.
- a communication system that determines whether or not an identifier associated with a processing rule corresponding to is associated.
- a processing rule that defines a matching rule and processing of a packet that conforms to the matching rule is held in association with the identifier, and matches the identifier of the received packet and the received packet.
- an identifier for generating a processing rule that defines a matching rule and processing of a packet that conforms to the matching rule, and is associated with the processing rule, the received packet is transmitted to the node.
- a control device for setting is provided.
- a processing rule that defines a matching rule and processing of a packet that matches the matching rule is held in association with the identifier, and matches the identifier of the received packet and the received packet.
- a communication method for processing is provided. The method is tied to a specific machine, a node that processes received packets.
- an identifier for generating a processing rule defining a matching rule and processing of a packet conforming to the matching rule, and an identifier associated with the processing rule, the received packet Generating an identifier for determining whether or not the processing of the received packet can be executed according to the processing rule corresponding to the matching rule, and the processing rule and the identifier are arranged in a node arranged in the communication system and processing the received packet.
- a communication method for setting is provided. This method is linked to a specific machine called a control device that sets the processing rule in a node that processes a received packet.
- a process for storing a processing rule specifying a matching rule and a packet processing conforming to the matching rule in association with an identifier in a node that processes the received packet in the communication system And whether the processing of the received packet by the processing rule corresponding to the matching rule that matches the received packet corresponds to the identifier of the received packet and the identifier associated with the processing rule corresponding to the matching rule that matches the received packet and a process for determining whether or not to perform the program.
- This program can be recorded on a computer-readable storage medium. That is, the present invention can be embodied as a computer program product.
- a control rule that controls a node that processes a received packet generates a processing rule that defines a matching rule and processing of a packet that matches the matching rule.
- Processing and an identifier associated with the processing rule the node generating an identifier for determining whether or not the processing of the received packet by the processing rule corresponding to the matching rule matching the received packet can be executed,
- a program for executing a process rule and a process of setting the identifier in the node is provided. This program can be recorded on a computer-readable storage medium. That is, the present invention can be embodied as a computer program product.
- FIG. 5 is a diagram for explaining information held in a flow entry DB of the control device (controller) in FIG. 4. It is a figure for demonstrating the information hold
- a node 10 (see node # 2 in FIG. 1) of the communication system of the present invention receives a packet, a collation rule (matching key) in a processing rule held by the own device. ) To extract a processing rule that matches the received packet (step 1). Next, the node 10 (see node # 2 in FIG. 1) confirms that the identifier associated with the extracted processing rule matches the identifier included in the received packet (step 2).
- the present invention is not limited to this.
- the case where the node 10 confirms that the identifier associated with the processing rule and the identifier included in the received packet are in a correspondence relationship is also included.
- the node 10 executes the processing according to the processing rule. (Step 3).
- the identifier described above is information generated by the control device (controller) 20 in association with the processing rule, and is generated and assigned so that at least processing rules that can be matched with the received packet can be identified. Therefore, even if the processing rule is extracted by the search using the matching rule (matching key), if the identifiers do not match, the action of the processing rule is not executed.
- various forms such as a form added to the user packet as shown in FIGS. 1 and 2 and a form embedded in a specific area of the user packet (see FIG. 19) are adopted. be able to.
- the identifier associated with the extracted processing rule matches the identifier of the received packet.
- the collation rule (matching key) of the extracted processing rule is the value of the received packet. It is also possible to adopt a method of confirming that the contents (header information to be collated with the collation rule (matching key)) match.
- FIG. 3 is a diagram showing a configuration of a communication system according to the first embodiment of the present invention.
- a control device controller
- hosts A and (B) that communicate via the node 10
- three nodes 10, a control device (controller) 20, and two hosts (Host (A) and Host (B)) are shown. There can be any number.
- FIG. 4 is a diagram showing a detailed configuration of the control device (controller) 20.
- the control device (controller) 20 includes a flow entry database (flow entry DB) 21 storing a processing rule (flow entry) and verification information associated with the processing rule, and a node communication unit 26.
- flow entry DB flow entry database
- a topology management unit 22 that constructs network topology information based on the connection relationship of the nodes 10 collected in this way, a packet forwarding path based on the network topology information constructed by the topology management unit 22, and nodes on the forwarding route
- the route / action calculation unit 23 for obtaining an action to be executed by the network 10 and the processing rule (flow entry) and verification information calculated by the route / action calculation unit 23 and the verification information generation unit 28 are associated with each other and registered in the flow entry DB 21.
- Processing rules (flow entry) from node 10 A flow entry management unit 24 that responds to a request for addition, updates a processing rule (flow entry) and verification information, a control message processing unit 25, a node communication unit 26 that communicates with the node 10, and a flow entry management A verification information generation unit 28 that generates verification information to be included in the processing rule in response to a request from the unit 24 or extracts the verification information from the verification information database (verification information DB) 27.
- the verification information indicates information corresponding to the identifier used for verifying a matching result between the received packet and the processing rule based on the matching rule.
- control message processing unit 25 includes a message analysis / processing unit 251 that analyzes a control message received from the node 10 and performs necessary processing, and a message generation unit 252 that generates a message to be transmitted to the node 10. Configured.
- FIG. 5 is a diagram schematically showing information (flow entry and verification information) held in the flow entry DB 21.
- the first to third entries from the top of FIG. 5 are the processing rules (flow entries) set in the nodes whose DPID (identifier of node 10; Datapath Identifier) is 1 to 3, respectively, and the verifications associated with the processing rules. Information is shown (the same applies to the fourth to sixth entries from the top).
- a node whose DPID is 1 receives a packet matching the matching key “A” as shown in the first entry from above, its action field (Actions) Then, after adding a header including verification information “CA”, a process of outputting from the ninth port is executed.
- a node having a DPID of 2 receives a packet matching the matching key “A” from a node having a DPID of 1 (for example, node # 1 in FIG. 3). Then, processing to output from the 6th port is executed. Then, when a node having a DPID of 3 (for example, node # 3 in FIG.
- FIG. 6 is a diagram schematically showing information (verification information) held in the verification information DB 27.
- the verification information DB 27 includes the matching keys “A”, “B”,..., “X” and verification information “CA”, “CB”,. "Is held.
- the verification information generation unit 28 generates verification information corresponding to the processing rule (flow entry) requested from the flow entry management unit 24 and registers it in the verification information DB 27.
- Such verification information includes, for example, a plurality of rules that match at least a received packet by using a collation rule (hereinafter referred to as a “matching key”) and a predetermined function (such as a hash function) with other information as an argument.
- a collation rule hereinafter referred to as a “matching key”
- a predetermined function such as a hash function
- a plurality of processing rules corresponding to each of the collation rules can be generated so that they are unique, that is, at least the same verification information is not given to these processing rules. It is also possible to generate statistically unique verification information using random numbers (a specific example will be described in detail later).
- the verification information DB 27 is for the purpose of preventing duplication of verification information among a plurality of processing rules (flow entries) that may conflict with each other, and does not necessarily have the format shown in FIG. It is also possible to omit the verification information DB 27 by avoiding duplication of verification information in terms of probability and statistics.
- the flow entry DB 21 can be omitted when there is no need to hold the processing rule (flow entry) instructed to be added or updated to the node 10 and the verification information associated with the processing rule. Similarly, when it is not necessary to hold the verification information generated in association with the processing rule, the verification information DB 27 can be omitted.
- a configuration in which the flow entry DB 21 and the verification information DB 27 are separately provided in an external server or the like can also be employed.
- the control device (controller) 20 as described above can associate the OpenFlow controller of Non-Patent Documents 1 and 2 with at least the verification information generation unit 28 and the node 10 with a processing rule (flow entry) and the processing rule. This can be realized by adding a function for setting verification information.
- FIG. 7 is a diagram showing a detailed configuration of the node 10.
- the node 10 includes a control device communication unit 11 that communicates with the control device (controller) 20, a flow table management unit 12 that manages the flow table 13, a packet buffer 14, and a transfer processing unit 15. It is prepared for. Note that the node 10 does not necessarily include the packet buffer 14.
- the transfer processing unit 15 includes a table search unit 153 and an action execution unit 154.
- the table search unit 153 includes a verification information collating unit 152 that collates verification information associated with a certain processing rule (flow entry) and verification information added to the received packet and determines whether they match.
- the processing content (action) of the processing rule (flow entry) having the matching key that matches the received packet and that has the matching verification information is output from the flow table 13 to the action execution unit 154.
- the action execution unit 154 executes the processing content (action) output from the table search unit 153.
- the node 10 as described above has a configuration in which the verification information matching unit 152 is added to the OpenFlow switch, and the flow table 13 is configured to hold verification information in association with a processing rule (flow entry). It can also be realized.
- the table search unit 153 including the verification information matching unit 152 of the node 10 as described above can also be realized by a program executed by a computer that configures the node 10.
- FIG. 8 is a diagram schematically showing information (flow entry and verification information) held in the flow table 13 of the node having the DPID of 2 in FIG. 5 (node # 2 in FIG. 3).
- a flow entry and verification information having the same contents as the corresponding DPID entry in the flow entry DB 21 of FIG. 5 are set.
- the flow entries and verification information corresponding to the respective DPIDs are set in the nodes having the DPIDs 1 and 3 in FIG. 5 (nodes # 1 and # 3 in FIG. 3).
- the packet 32 with verification information has a configuration in which an additional header 33 with verification information including verification information is added to the head of the user packet 31.
- FIG. 10 is a diagram showing a configuration example of the additional header 33 with verification information.
- the additional header 33 with verification information includes the MAC destination address (MAC DA), the MAC transmission source address (MAC SA), the upper protocol type (Ether Type), and the total header length (Total Length). Is added.
- the value (f (matching key, rand)) calculated by a predetermined function (hash function or the like) having a matching key and a random number as arguments is used as verification information.
- FIG. 11 is a flowchart showing the operation of the control device (controller) 20.
- the control device (controller) 20 upon receiving an inquiry (processing rule creation request; see step S111 in FIG. 12) from the node 10 (step S001; Packet-In), the control device (controller) 20 sends a packet to the inquiry. It is confirmed whether or not verification information is included (step S002).
- the control device (controller) 20 transmits the processing rule from the flow entry DB 21.
- the processing rule corresponding to the packet and the verification information associated with the processing rule are extracted (step S012), and the process proceeds to step S008.
- control device (controller) 20 acquires the network topology information constructed by the topology management unit 22, and transfers the packet transfer route. Is calculated (step S003).
- the control device (controller) 20 except when it is determined that transfer cannot be performed due to a reason that a route cannot be created or a node on the route is faulty (No in step S004). Calculates an action corresponding to the calculated transfer path (step S005). Subsequently, verification information associated with a processing rule (flow entry) applied to each node 10 on the route is generated (step S006). Furthermore, the control device (controller) 20 generates a processing rule (flow entry) to be applied to each node 10 on the route including the matching key for specifying the flow to which the packet related to the inquiry belongs and the action ( Step S007).
- control device (controller) 20 When the acquisition or generation of the processing rule (flow entry) and verification information is completed, the control device (controller) 20 generates the generated processing rule (flow entry) and verification information setting instruction (Flow Mod (Add)). (Step S008), a processing rule (flow entry) and verification information setting instruction (Flow Mod (Add)) are transmitted to the node 10 on the packet transfer path realized by the processing rule (flow entry) ( Step S009).
- Step S011 When the node 10 does not buffer the packet (No in Step S010), the control device (controller) 20 issues a packet output instruction (Packet-Out) (Step S011).
- This packet output instruction indicates a packet to be output (packet received by Packet-In in step S001) and an action to be performed on the packet (attachment of verification information and output from a designated port). Alternatively, it is performed by instructing a packet to be output (packet received by Packet-In in step S001) and an action to be performed on the packet (search for a flow table). If the node 10 is buffering the packet (Yes in step S010), as will be described later, the node 10 can cause the packet to be output, so the processing on the control device (controller) 20 side is as follows. Omitted.
- FIG. 12 is a flowchart showing the operation of the node 10.
- the node 10 when receiving a packet from the host or another node 10 (step S101), the node 10 searches the flow table 13 for a processing rule (flow entry) having a matching key matching the received packet (Ste S102).
- step S104 the node 10 checks whether or not the verification information is included in the received packet. In the present embodiment, whether or not the verification information is included can be determined based on whether or not an additional header is added to the received packet.
- the node 10 executes the action described in the extracted processing rule (flow entry) (step S107).
- step S104 when it is determined in step S104 that the verification information is included in the received packet, the node 10 is associated with the verification information included in the received packet and the extracted processing rule (flow entry). The verification information is collated (step S105).
- the node 10 executes the action described in the extracted processing rule (flow entry) (step S107).
- a verification associated with the processing rule (flow entry) is performed. It is necessary that the information matches that of the received packet.
- step S103 determines that the extracted processing rule (flow Without executing the action described in (entry)
- the process proceeds to step S111, and the control device (controller) 20 is inquired (processing rule (flow entry) and verification information creation and transmission request corresponding to received packet).
- step S111 the node 10 stores the received packet in the packet buffer 14 and transmits the received packet to the control device (controller) 20 to request creation of processing rules and verification information. Thereafter, the control device (controller) 20 performs response processing including processing rules and verification information in accordance with the procedure shown in FIG.
- the node 10 Upon receiving the processing rule (flow entry) and the verification information setting instruction (Flow Mod (Add)) from the control device (controller) 20, the node 10 stores the processing rule in its flow table 13 according to the Flow Mod (Add). (Flow entry) and verification information associated with the processing rule are set (step S112).
- the node 10 checks whether or not the received packet is stored in the packet buffer 14 (step S113), and if stored (Yes in step S113), reads the received packet (step S114).
- the processing content action; giving verification information and outputting the received packet from the designated port) defined in the set processing rule (flow entry) is executed (step S107). As a result, the received packet is transferred to the next-hop node.
- the packet output instruction (Packet-Out) from the control device (controller) 20 is received. Received (step S116).
- the node 10 checks whether or not the packet is stored in the packet buffer 14 (step S117). If the packet is read (Yes in step S117), the packet is read (step S118), and the processing content (action; here, the verification information of the received packet and the output from the designated port are received together with the packet output instruction (Packet-Out). Alternatively, a flow table search) is executed (step S107). If the packet is not stored (No in step S117), the node 10 receives the processing content (action; received) together with the packet output instruction (Packet-Out) for the packet received together with the packet output instruction (Packet-Out). Here, the packet verification information is attached and output from the designated port, or the flow table is searched (step S107). As a result, the received packet is transferred to the next-hop node.
- FIGS. 13 and 14 show that node # 1 that has received a packet addressed to host (B) from host (A) makes an inquiry (processing rule and verification information creation request) to control device (controller) 20.
- FIG. 5 is a reference diagram and a sequence diagram for explaining a series of flow until a packet is delivered to a host (B).
- the node # 1 As shown in FIGS. 13 and 14, when the host (A) transmits a user packet addressed to the host (B) to the node # 1 (ST1 in FIG. 13 and FIG. 14; User Packet), the node # 1 As a result of the search of the flow table 13, it is determined that the packet is an unknown packet having no processing rule (flow entry) that matches the received packet (No in step S103 in FIG. 12), and an inquiry is made to the control device (controller) 20. (Processing rule (flow entry) and verification information creation request) are performed (ST2 in FIG. 13 and FIG. 14; Packet-In).
- control device 20 Upon receiving the inquiry (processing rule (flow entry) and verification information creation request), the control device (controller) 20 should set the nodes # 1 to # 3 on the transfer path of the packet according to the flowchart of FIG. Processing rules (flow entry) and verification information (CA) are created and transmitted to nodes # 1 to # 3 (ST3-1 to ST5-1 in FIGS. 13 and 14; Flow Mod (Add) w / CA).
- the nodes # 1 to # 3 add the processing rule (flow entry) and the verification information (CA) transmitted from the control device (controller) 20 to the flow table 13 of the own device, and the buffer ID is added Then, the action for the packet is executed (ST3-2 to ST5-2 in FIGS. 13 and 14).
- the processing rule (flow entry) and verification information (CA) transmitted in ST4-1 in FIGS. 13 and 14 do not reach the node # 2 for some reason, and the flow of the node # 2 It is assumed that no processing rule (flow entry) and verification information (CA) are added to the table 13.
- CA verification information
- the node # 2 When a user packet to which an additional header including verification information (CA) is added is received, the node # 2 has no processing rule (flow entry) that matches the received packet as a result of the search of the flow table 13, or It is determined that there is a processing rule (flow entry) that matches the received packet but the verification information does not match (No in step S103 in FIG. 12 or No in step 106), and an inquiry is made to the control device (controller) 20 (processing rule). (Flow entry) and verification information creation request) (ST8 in FIGS. 13 and 14; Packet-In).
- CA verification information
- control device (controller) 20 Upon receiving the inquiry (processing rule (flow entry) and verification information creation request), the control device (controller) 20 follows the flowchart of FIG. 11 to set the processing rule (node) to be set in the node # 2 on the transfer path of the packet.
- Flow entry) and verification information (CA) are acquired (step S012 in FIG. 11) and transmitted to the node # 2 (ST9 in FIG. 13 and FIG. 14; Flow Mod (Add) w / CA).
- the node # 2 adds the processing rule (flow entry) and verification information transmitted from the control device (controller) 20 to the flow table 13 of the own device, and executes an action when a buffer ID is added. (ST10 in FIGS. 13 and 14).
- a process of outputting the user packet to which the added header is included from the designated port (port connected to the node # 3) is executed (ST11 in FIGS. 13 and 14).
- the node # 3 is a processing rule (flow entry) that matches the received packet as a result of the search of the flow table 13, and the verification information Are also matched (Yes in step S103 in FIG. 12 and Yes in step 106), and the action defined in the processing rule (flow entry) extracted and confirmed is executed (ST12 in FIGS. 13 and 14).
- the matching key of the processing rule (flow entry) matches the header information of the received packet, but also the verification information generated separately by the control device (controller) 20 Since the action is executed on condition that they match, the situation where the action of the unintended processing rule (flow entry) described at the beginning can be avoided.
- step S104 when the verification information is not included in the received packet, the action is executed without performing verification information verification. However, if the verification information is not included in the received packet, the execution of the action may be suppressed without exception.
- the verification information is added to the packet by the additional header including the verification information.
- the verification information can be included in the packet without using the additional header.
- a second embodiment in which verification information is included in a packet without using an additional header will be described. Note that the basic configuration of the node 10 and the control device (controller) 20 of the second embodiment is the same as that of the first embodiment, and therefore the following description will focus on the differences.
- FIG. 15 is a diagram schematically showing information (flow entry) held in the flow entry DB 21 of the control device (controller) 20 of the present embodiment.
- the flow entry DB 21 does not have an independent verification information field, and the matching key field of the flow entry stores a matching key including verification information (CA).
- CA verification information
- a process for writing (returning) verification information to the MAC DA field is defined.
- the value of the original MAC DA field is “Dn”
- the value after being converted to include the verification information (CA) is “Dn ′”.
- a node whose DPID is 1 in FIG. 15 receives a packet that matches the matching key “A”
- the MAC of the packet is determined according to its action field (Actions).
- a value D1 ′ including verification information (CA) is set in the DA field
- a process of outputting from the 9th port is executed.
- a node whose DPID is 2 is a packet in which verification information (CA) is set in the MAC DA field from a node whose DPID is 1 (for example, node # 1 in FIG.
- FIG. 16 is a diagram schematically showing information (verification information) held in the verification information DB 27 of the control device (controller) 20 of the present embodiment.
- the difference from the first embodiment is the contents of the Original MAC DA field for writing back the MAC DA field to the same contents as the MAC DA of the original received packet (corresponding to D1, D2, and DX in FIG. 15).
- the node number of the last hop for executing this write-back process is added.
- FIG. 17 is a diagram showing a detailed configuration of the node 10a of the present embodiment.
- the difference from FIG. 7 showing the configuration of the node 10 of the first embodiment is that the verification operation of the verification information verification unit 152a is different due to the difference in the verification information (detailed later).
- 152a, table search unit 153a, and transfer processing unit 15a are each replaced.
- FIG. 18 is a diagram schematically showing information (flow entry) held in the flow table 13 of the node having the DPID of 2 in FIG. 15 (node # 2 in FIG. 3).
- the flow entry of the corresponding DPID is set from the flow entry DB 21 of FIG.
- the flow entries corresponding to the respective DPIDs are set in the nodes having the DPIDs 1 and 3 in FIG. 15 (nodes # 1 and # 3 in FIG. 3).
- the packet 32a with verification information has a configuration in which 48-bit information shown in the lower part of FIG. 19 is written in the MAC DA field of the user packet 31.
- 8-bit fixed data indicating that verification information is included, function f 1 (DPID of the last hop node, original MAC DA), and function f 2 (matching key, random number) are written.
- this is merely an example, and the fields used for storing the verification information, the contents of the verification information, the function for degenerating the original data, and the like can be changed as appropriate.
- FIG. 20 is a flowchart showing the operation of the control device (controller) of the second embodiment of the present invention.
- the difference from FIG. 11 showing the operation of the control device (controller) of the first embodiment is that it is added in step S002a when confirming whether or not verification information is included in the inquired packet. It is a point to check whether or not the above-mentioned fixed data (see FIG. 19) is written in the MAC DA, not the header. Others are the same as those in the first embodiment, and a description thereof will be omitted.
- FIG. 21 is a flowchart showing the operation of the node 10a according to the second embodiment of this invention.
- the difference from FIG. 12 showing the operation of the node 10 of the first embodiment is that, in step S104a, when checking whether or not verification information is included in the received packet, not the additional header but the MAC DA. Check whether or not the above-mentioned fixed data (see FIG. 19) is written to the node, and the final hop node does not delete the additional header, but restores the original MAC DA field according to the action before transferring the packet. It is a point to do. Others are the same as those in the first embodiment, and a description thereof will be omitted.
- the present invention can also be realized by including verification information in a specific field of an existing packet.
- each node is described as storing the same verification information in association with the flow entry of the flow table, but there is also a configuration in which each node performs verification with different verification information. It can be adopted.
- a third embodiment in which each node performs verification using different verification information will be described. Note that the basic configuration of the node 10 and the control device (controller) 20 of the third embodiment is the same as that of the first embodiment, and therefore the following description will focus on the differences.
- FIG. 22 is a diagram schematically showing information (flow entry and verification information) held in the flow entry DB 21 of the control device (controller) 20 of the present embodiment.
- the difference from the first embodiment is that the verification information generation process (step S006 in FIG. 11) of each node is executed for the number of nodes, and the flow entry DB 21 does not have an independent verification information field.
- a process for adding an additional header including different verification information to the action field is added. (Because each node adds a header including different verification information, the verification information associated with the flow entry includes the corresponding flow.
- the verification information field is unnecessary because it is described in the entry, and it is not necessary to maintain the correspondence between the verification information and the flow entry independently).
- a node having the DPID of 1 in FIG. 22 receives a packet that matches the matching key “A1”
- the verification information (Actions)
- a process of outputting from the 9th port is executed.
- a node with DPID 2 (for example, node # 2 in FIG. 3) has an additional header storing verification information (C2A) from a node with DPID 1 (for example, node # 1 in FIG. 3).
- the verification information (C2A) of the additional header is rewritten with the verification information (C3A), and then the process of outputting from the sixth port is executed.
- a node with DPID 3 (for example, node # 3 in FIG. 3) is added with an additional header storing verification information (C3A) from a node with DPID 2 (for example, node # 2 in FIG. 3).
- the received packet packet conforming to the matching key A3
- an additional header is removed from the packet, and a process of outputting from the first port is executed.
- the control is realized in which the transfer is performed on the designated route while rewriting the verification information and collating with the verification information in order from the node at the first hop of the transfer route.
- FIG. 23 is a diagram schematically showing information (verification information) held in the verification information DB 27 of the control device (controller) 20 of the present embodiment.
- the difference from the first embodiment is that a DPID field is added and the correspondence between the matching key and the verification information is stored for each node.
- the information held in the verification information DB 27 can be changed as appropriate depending on the function for generating the verification information.
- FIG. 24 is a diagram schematically showing information (flow entry and verification information) held in the flow table 13 of the node having the DPID of 2 in FIG. 22 (node # 2 in FIG. 3).
- the flow entry and verification information of the corresponding DPID are set in the flow table 13 from the flow entry DB 21 of FIG.
- the flow entries and verification information corresponding to the respective DPIDs are also set in the nodes having the DPIDs 1 and 3 in FIG. 22 (nodes # 1 and # 3 in FIG. 3).
- the present embodiment is different from the first embodiment only in that the control device generates verification information for each node and the action performed in each node, and the basic operation is the first embodiment. Since it is the same, description is abbreviate
- omitted (refer FIG. 11, FIG. 12).
- each node rewrites verification information by an action in a processing rule
- a flow having a different matching key for a certain communication flow compared to the first embodiment An entry can be set to a node on the route.
- the fourth embodiment of the present invention is a combination of the second embodiment and the third embodiment of the present invention, and each node has different verification information without using an additional header. Are used for collation. Note that the basic configurations of the node 10 and the control device (controller) 20 of the fourth embodiment are the same as those of the first to third embodiments, and therefore, the following description will focus on the differences.
- FIG. 25 is a diagram schematically showing information (flow entry) held in the flow entry DB 21 of the control device (controller) 20 of the present embodiment.
- the difference from the third embodiment is not a process of adding an additional header including different verification information to the action field, but rewriting the value of the MAC DA field to a value including the verification information of each node. The point is that processing to restore with hops has been added.
- the MAC of the packet is determined according to its action field (Actions). After the value D1 ′ including the verification information (C2A) is set in the DA field, the process of outputting from the 9th port is executed. Similarly, the verification information (C2A) is set in the MAC DA field from the node having the DPID of 2 (for example, the node # 2 in FIG. 3) from the node having the DPID of 1 (for example, the node # 1 in FIG. 3).
- a node with DPID 3 (for example, node # 3 in FIG. 3) is a packet in which verification information (C3A) is set in the MAC DA field from a node with DPID 2 (for example, node # 2 in FIG. 3).
- Packet matching matching key A (Packet matching matching key A ”), the MAC DA field is the same as the MAC DA of the original received packet.
- D1 After written back to (D1), it executes a process of outputting from the first port.
- the control is realized in which the verification information is sequentially rewritten at the first hop node of the transfer route, and is verified with the verification information, and transferred on the designated route.
- FIG. 26 is a diagram schematically showing information (verification information) held in the verification information DB 27 of the control device (controller) 20 of the present embodiment.
- the difference from the third embodiment is that the contents of the Original MAC DA field for rewriting the MAC DA field to the same contents as the MAC DA of the original received packet (corresponding to D1, D2, and DX in FIG. 25). The node number of the last hop for executing this write-back process is added.
- the information held in the verification information DB 27 can be changed as appropriate depending on the function for generating the verification information.
- FIG. 27 is a diagram schematically showing information (flow entry) held in the flow table 13 of the node having the DPID of 2 in FIG. 25 (node # 2 in FIG. 3).
- the flow entry of the corresponding DPID is set from the flow entry DB 21 of FIG.
- the flow entries corresponding to the respective DPIDs are set in the nodes having the DPIDs 1 and 3 in FIG. 25 (nodes # 1 and # 3 in FIG. 3).
- the present embodiment is different from the first embodiment only in that the control device generates verification information for each node and the action performed in each node, and the basic operation is the first embodiment. Since it is the same, description is abbreviate
- omitted (refer FIG. 11, FIG. 12).
- each node rewrites verification information by an action in the processing rule
- a flow having a different matching key for a certain communication flow as compared to the second embodiment An entry can be set to a node on the route.
- FIG. 28 is an example of a packet used in the fifth embodiment of the present invention.
- the packet 32b with verification information has a configuration in which an additional header 33b with verification information including verification information is added to the head of the user packet 31.
- FIG. 29 is a diagram illustrating a configuration example of the additional header 33b with verification information.
- the additional header 33b with verification information includes a MAC destination address (MAC DA), a MAC transmission source address (MAC SA), an upper protocol type (Ether Type), a total header length (Total Length), DPID and A plurality of pairs with verification information are added.
- MAC DA MAC destination address
- MAC SA MAC transmission source address
- Ether Type an upper protocol type
- Total Length Total Length
- DPID total header length
- a value (f (matching key, rand)) calculated by a predetermined function (hash function or the like) that uses a matching key of each node and a random number as arguments is used as verification information.
- This embodiment is different from the first embodiment only in that the control device generates verification information for each node and that each node extracts its own verification information using DPID and performs a verification operation. Since the basic operation is the same as that of the first embodiment, the description thereof is omitted (see FIGS. 11 and 12).
- the present invention can also be realized by a configuration in which an additional header storing verification information of each node is added. Compared with the third embodiment, the process of rewriting verification information at each node is performed. There is an advantage that it can be omitted.
- control devices (controllers) 20 and 20a of the above-described embodiment can also be realized as dedicated servers.
- the nodes 10, 10a and 10b in addition to the OpenFlow switch, a router in the IP network, MPLS (Multi- It can be realized with an MPLS switch in a Protocol Label Switching network.
- the present invention can be applied to any network where the server centrally manages nodes in the network.
- the node identifier is included in the additional header so that each node specifies the verification information to be verified by the own device.
- DPID node identifier
- the last hop node has been described as removing the additional header and writing back the MAC DA field.
- a configuration in which these processes are performed on the host side can also be employed.
- the control device 20 is described as including the verification information generation unit 28.
- the verification information generation function is synchronized between the nodes 10 or between the node 10 and the control device 20. If each node 10 can create verification information by allocating or arguments, a configuration in which a verification information generation unit is generated for each node can also be adopted.
- the node collates the received packet with the collation rule, searches for a processing rule corresponding to the collation rule that matches the received packet, and the identifier of the received packet corresponds to the identifier associated with the retrieved processing rule.
- the communication system executes processing of the received packet according to the retrieved processing rule.
- the node searches for a processing rule associated with an identifier corresponding to the identifier of the received packet. If the matching rule corresponding to the processing rule matches the received packet by matching, the node processes the received packet according to the searched processing rule.
- the communication system is a communication system in which the identifier is unique among a plurality of processing rules corresponding to each of a plurality of matching rules that match at least a received packet.
- a communication system in which the node determines whether or not an identifier of the received packet is included in the received packet based on whether or not the identifier is stored in a predetermined field of the received packet.
- the control device includes: The node located at the starting point of the packet transfer path replaces the information in a predetermined field of the received packet with information including an identifier, and then transfers the packet.
- a communication system in which a node located at an end point of the transfer path controls each of the nodes so as to transfer the packet after rewriting the information in a predetermined field of the received packet to the content before replacement.
- the control device includes: A different identifier is set for each processing rule set in the node on the packet transfer path, so that the node on the transfer path sequentially performs the operation of rewriting the identifier of the received packet with the identifier of the next hop node.
- the control device includes: The node located at the start point of the packet transfer path adds an additional header including an identifier to the received packet, forwards the packet, and the node located at the end point of the transfer path removes the additional header. Then, a communication system that controls each of the nodes to transfer the packet.
- the thirteenth to eighteenth forms can be developed into the second to twelfth forms, similar to the first form.
- Controller communication unit 10
- Flow table management unit 13
- Flow table 14 Packet buffer 15, 15a Transfer processing unit 20
- Control device 21
- Flow entry database (flow entry DB) 22
- topology management unit 23
- route / action calculation unit 24
- flow entry management unit 25
- control message processing unit 26
- node communication unit 27
- verification information database (verification information DB) 28
- Verification information generation unit 31
- Action execution unit 251
- Message analysis / processing unit 252
- Message Generator 25
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
本発明は、日本国特許出願:特願2010-123054号(2010年5月28日出願)の優先権主張に基づくものであり、同出願の全記載内容は引用をもって本書に組み込み記載されているものとする。
続いて、本発明の第1の実施形態について図面を参照して詳細に説明する。図3は、本発明の第1の実施形態に係る通信システムの構成を示す図である。図3を参照すると、3つのノード10と、制御装置(コントローラ)20と、ノード10を経由して通信するホスト(A)、(B)が示されている。なお、図3の例では、3つのノード10と、制御装置(コントローラ)20と、2つのホスト(Host(A)、Host(B))を示しているが、それぞれの数は、あくまで例示であり、それぞれ任意の数とすることができる。
続いて、本発明の第2の実施形態について図面を参照して詳細に説明する。上記本発明の第1の実施形態では、検証情報を含んだ追加ヘッダによりパケットに検証情報を付加するものとして説明したが、追加ヘッダを用いずに検証情報をパケットに含めることもできる。以下、追加ヘッダを用いずに検証情報をパケットに含めるようにした第2の実施形態について説明する。なお、第2の実施形態のノード10および制御装置(コントローラ)20の基本的な構成は、上記第1の実施形態と同等であるので、以下、相違点を中心に説明を行う。
続いて、本発明の第3の実施形態について図面を参照して詳細に説明する。上記本発明の第1の実施形態では、各ノードが同一の検証情報をそのフローテーブルのフローエントリに関連付けて格納するものとして説明したが、各ノードがそれぞれ異なる検証情報にて照合を行う構成も採用可能である。以下、各ノードがそれぞれ異なる検証情報にて照合を行うようにした第3の実施形態について説明する。なお、第3の実施形態のノード10および制御装置(コントローラ)20の基本的な構成は、上記第1の実施形態と同等であるので、以下、相違点を中心に説明を行う。
続いて、本発明の第4の実施形態について図面を参照して詳細に説明する。本発明の第4の実施形態は、上記本発明の第2の実施形態と第3の実施形態とを組み合わせたものであり、追加ヘッダを用いずに、かつ、各ノードがそれぞれ異なる検証情報にて照合を行うものである。なお、第4の実施形態のノード10および制御装置(コントローラ)20の基本的な構成は、上記第1~3の実施形態と同等であるので、以下、相違点を中心に説明を行う。
続いて、本発明の第5の実施形態について図面を参照して詳細に説明する。上記本発明の第3の実施形態では、追加ヘッダにはただ一つの検証情報を格納するものとして説明したが、追加ヘッダに、転送経路上の各ノードがそれぞれ照合すべき検証情報を格納しておき、当該追加ヘッダが付加されたパケットを受信したノードが、それぞれ自身が参照すべき検証情報を特定して、照合動作を行う構成も採用可能である。以下、追加ヘッダに複数の検証情報を格納可能とした第5の実施形態について説明する。なお、第5の実施形態のノード10および制御装置(コントローラ)20の基本的な構成は、上記第3の実施形態と同等であるので、以下、相違点を中心に説明を行う。
(上記第1の視点による通信システム参照)
第1の形態において、
前記識別子は、照合規則に基づく受信パケットと処理規則との照合結果を検証するために用いられることを特徴とする通信システム。
第1、第2の形態において、
前記ノードは、受信パケットと照合規則とを照合して、受信パケットと適合する照合規則に対応する処理規則を検索し、受信パケットの識別子と検索された処理規則に関連付けられた識別子とが対応する場合、検索した処理規則により受信パケットの処理を実行する通信システム。
第1、第2の形態において、
前記ノードは、受信パケットの識別子に対応する識別子と関連付けられた処理規則を検索し、該処理規則に対応する照合規則と受信パケットとが照合により適合する場合、検索した処理規則により受信パケットの処理を実行する通信システム。
第1~第4の形態において、
前記識別子は、少なくとも、受信パケットと適合する複数の照合規則のそれぞれに対応する複数の処理規則の中で一意である通信システム。
第1~第4の形態において、
前記識別子は、統計的に一意である通信システム。
第1~第6の形態において、
前記ノードは、受信パケットに、識別子を格納した追加ヘッダが付加されているか否かにより、受信パケットに、前記受信パケットの識別子が含まれているか否かを判定する通信システム。
第1~第6の形態において、
前記ノードは、受信パケットの所定のフィールドに、識別子が格納されているか否かにより、受信パケットに、前記受信パケットの識別子が含まれているか否かを判定する通信システム。
第1~第6、第8いずれか一の形態において、
前記制御装置は、
パケットの転送経路の始点に位置するノードが、受信パケットの所定のフィールドの情報を、識別子を含んだ情報に置き換えてから、当該パケットを転送し、
前記転送経路の終点に位置するノードが、受信パケットの所定のフィールドの情報を、置き換え前の内容に書き戻してから、当該パケットを転送するよう、前記各ノードを制御する通信システム。
第1~第9いずれか一の形態において、
前記制御装置は、
パケットの転送経路上のノードに設定する処理規則に対し、それぞれ異なる識別子を設定し、前記転送経路上のノードが、順次、受信パケットの識別子を次ホップのノードの識別子に書き換える動作を行うよう、前記各ノードを制御する通信システム。
第1~第7、第10いずれか一の形態において、
前記制御装置は、
パケットの転送経路の始点に位置するノードが、受信パケットに、識別子を含んだ追加ヘッダを付加してから、当該パケットを転送し、前記転送経路の終点に位置するノードが、前記追加ヘッダを除去してから、当該パケットを転送するよう、前記各ノードを制御する通信システム。
第7、第11いずれか一の形態において、
前記追加ヘッダには、パケットの転送経路上のノードにて、それぞれ判定に用いられる複数の識別子が格納されている通信システム。
(上記第2の視点によるノード参照)
(上記第3の視点による制御装置参照)
(上記第4の視点による通信方法参照)
(上記第5の視点による通信方法参照)
(上記第6の視点によるプログラム参照)
(上記第7の視点によるプログラム参照)
11 制御装置通信部
12 フローテーブル管理部
13 フローテーブル
14 パケットバッファ
15、15a 転送処理部
20 制御装置
21 フローエントリデータベース(フローエントリDB)
22 トポロジ管理部
23 経路・アクション計算部
24 フローエントリ管理部
25 制御メッセージ処理部
26 ノード通信部
27 検証情報データベース(検証情報DB)
28 検証情報生成部
31 ユーザパケット
32、32a、32b 検証情報付きパケット
33、33b 検証情報付き追加ヘッダ
152、152a 検証情報照合部
153、153a テーブル検索部
154 アクション実行部
251 メッセージ解析・処理部
252 メッセージ生成部
Claims (18)
- 受信パケットを処理するノードと、
照合規則と、該照合規則に適合するパケットの処理とを規定した処理規則を、前記ノードに設定する制御装置とを含み、
前記ノードは、識別子を処理規則に関連付けて保持し、受信パケットと適合する照合規則に対応する処理規則による受信パケットの処理の実行可否を、受信パケットの識別子と、受信パケットと適合する照合規則に対応する処理規則に関連付けられた識別子とが対応するか否かにより判定する
ことを特徴とする通信システム。 - 前記識別子は、照合規則に基づく受信パケットと処理規則との照合結果を検証するために用いられることを特徴とする
請求項1に記載の通信システム。 - 前記ノードは、受信パケットと照合規則とを照合して、受信パケットと適合する照合規則に対応する処理規則を検索し、受信パケットの識別子と検索された処理規則に関連付けられた識別子とが対応する場合、検索した処理規則により受信パケットの処理を実行する
ことを特徴とする請求項1または2に記載の通信システム。 - 前記ノードは、受信パケットの識別子に対応する識別子と関連付けられた処理規則を検索し、該処理規則に対応する照合規則と受信パケットとが照合により適合する場合、検索した処理規則により受信パケットの処理を実行する
ことを特徴とする請求項1または2に記載の通信システム。 - 前記識別子は、少なくとも、受信パケットと適合する複数の照合規則のそれぞれに対応する複数の処理規則の中で一意である
請求項1から4いずれか一の通信システム。 - 前記識別子は、統計的に一意であることを特徴とする
請求項1から4いずれか一の通信システム。 - 前記ノードは、受信パケットに、識別子を格納した追加ヘッダが付加されているか否かにより、受信パケットに、前記受信パケットの識別子が含まれているか否かを判定する請求項1から6いずれか一の通信システム。
- 前記ノードは、受信パケットの所定のフィールドに、識別子が格納されているか否かにより、受信パケットに、前記受信パケットの識別子が含まれているか否かを判定する請求項1から6いずれか一の通信システム。
- 前記制御装置は、
パケットの転送経路の始点に位置するノードが、受信パケットの所定のフィールドの情報を、識別子を含んだ情報に置き換えてから、当該パケットを転送し、
前記転送経路の終点に位置するノードが、受信パケットの所定のフィールドの情報を、置き換え前の内容に書き戻してから、当該パケットを転送するよう、前記各ノードを制御する請求項1から6、8いずれか一の通信システム。 - 前記制御装置は、
パケットの転送経路上のノードに設定する処理規則に対し、それぞれ異なる識別子を設定し、前記転送経路上のノードが、順次、受信パケットの識別子を次ホップのノードの識別子に書き換える動作を行うよう、前記各ノードを制御する請求項1から9いずれか一の通信システム。 - 前記制御装置は、
パケットの転送経路の始点に位置するノードが、受信パケットに、識別子を含んだ追加ヘッダを付加してから、当該パケットを転送し、前記転送経路の終点に位置するノードが、前記追加ヘッダを除去してから、当該パケットを転送するよう、前記各ノードを制御する請求項1から7、10いずれか一の通信システム。 - 前記追加ヘッダには、パケットの転送経路上のノードにて、それぞれ判定に用いられる複数の識別子が格納されている請求項7または11の通信システム。
- 照合規則と、該照合規則に適合するパケットの処理とを規定した処理規則を、識別子と関連付けて保持し、
受信パケットの識別子と、受信パケットと適合する照合規則に対応する処理規則に関連付けられた識別子とが対応するか否かにより、受信パケットと適合する照合規則に対応する処理規則による受信パケットの処理の実行可否を判定することにより、
受信パケットを処理する
ことを特徴とするノード。 - 照合規則と、該照合規則に適合するパケットの処理とを規定した処理規則を生成し、
前記処理規則に関連付ける識別子であって、前記ノードに、受信パケットと適合する照合規則に対応する処理規則による受信パケットの処理の実行可否を判定させるための識別子を生成し、
通信システムに配置されて受信パケットを処理するノードに、前記処理規則と前記識別子とを設定する
ことを特徴とする制御装置。 - 照合規則と、該照合規則に適合するパケットの処理とを規定した処理規則を、識別子と関連付けて保持し、
受信パケットの識別子と、受信パケットと適合する照合規則に対応する処理規則に関連付けられた識別子とが対応するか否かにより、受信パケットと適合する照合規則に対応する処理規則による受信パケットの処理の実行可否を判定することにより、受信パケットを処理する
ことを特徴とする通信方法。 - 照合規則と、該照合規則に適合するパケットの処理とを規定した処理規則を生成し、
前記処理規則に関連付ける識別子であって、前記ノードに、受信パケットと適合する照合規則に対応する処理規則による受信パケットの処理の実行可否を判定させるための識別子を生成し、
通信システムに配置されて受信パケットを処理するノードに、前記処理規則と前記識別子とを設定する
ことを特徴とする通信方法。 - 通信システムにおいて受信パケットを処理するノードに、
照合規則と、該照合規則に適合するパケットの処理とを規定した処理規則を、識別子と関連付けて記憶する処理と、
受信パケットと適合する照合規則に対応する処理規則による受信パケットの処理の実行可否を、受信パケットの識別子と、受信パケットと適合する照合規則に対応する処理規則に関連付けられた識別子とが対応するか否かにより判定する処理と、
を実行させることを特徴とするプログラム。 - 通信システムにおいて、受信パケットを処理するノードを制御する制御装置に、
照合規則と、該照合規則に適合するパケットの処理とを規定した処理規則を生成する処理と、
前記処理規則に関連付ける識別子であって、前記ノードに、受信パケットと適合する照合規則に対応する処理規則による受信パケットの処理の実行可否を判定させるための識別子を生成する処理と、
前記処理規則と前記識別子とを前記ノードに設定する処理と、
を実行させることを特徴とするプログラム。
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020127031930A KR20130032314A (ko) | 2010-05-28 | 2011-05-26 | 통신 시스템, 노드, 제어 장치, 통신 방법 및 프로그램 |
CN201180022831.3A CN102884769B (zh) | 2010-05-28 | 2011-05-26 | 通信系统、节点、控制设备以及通信方法 |
BR112012030135A BR112012030135A2 (pt) | 2010-05-28 | 2011-05-26 | sistema de comunicação, nó, dispositivo de controle, método de comunicação e programa |
RU2012157742/08A RU2556457C2 (ru) | 2010-05-28 | 2011-05-26 | Система связи, узел, устройство управления, способ связи и программа |
AU2011259267A AU2011259267B2 (en) | 2010-05-28 | 2011-05-26 | Communication system, node, control apparatus, communication method and program |
EP11786702.8A EP2579510B1 (en) | 2010-05-28 | 2011-05-26 | Communication system, node, control apparatus, communication method and program |
JP2012517305A JP5370588B2 (ja) | 2010-05-28 | 2011-05-26 | 通信システム、ノード、制御装置、通信方法およびプログラム |
US13/333,827 US9426061B2 (en) | 2010-05-28 | 2011-12-21 | Communication system, node, control device, communication method, and program |
HK13108288.9A HK1181928A1 (en) | 2010-05-28 | 2013-07-15 | Communication system, node, control apparatus, communication method and program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010123054 | 2010-05-28 | ||
JP2010-123054 | 2010-05-28 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/333,827 Continuation US9426061B2 (en) | 2010-05-28 | 2011-12-21 | Communication system, node, control device, communication method, and program |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011149003A1 true WO2011149003A1 (ja) | 2011-12-01 |
Family
ID=45003989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2011/062046 WO2011149003A1 (ja) | 2010-05-28 | 2011-05-26 | 通信システム、ノード、制御装置、通信方法およびプログラム |
Country Status (10)
Country | Link |
---|---|
US (1) | US9426061B2 (ja) |
EP (2) | EP2897327B1 (ja) |
JP (2) | JP5370588B2 (ja) |
KR (1) | KR20130032314A (ja) |
CN (2) | CN105357035B (ja) |
AU (1) | AU2011259267B2 (ja) |
BR (1) | BR112012030135A2 (ja) |
HK (1) | HK1181928A1 (ja) |
RU (2) | RU2628151C2 (ja) |
WO (1) | WO2011149003A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014104278A1 (ja) * | 2012-12-28 | 2014-07-03 | 日本電気株式会社 | 制御装置、制御装置の制御方法及びプログラム |
KR101434375B1 (ko) | 2011-02-17 | 2014-08-27 | 닛본 덴끼 가부시끼가이샤 | 플로우 통신 시스템 |
JP2016523062A (ja) * | 2013-05-31 | 2016-08-04 | 華為技術有限公司Huawei Technologies Co.,Ltd. | 入力パラメータを生成するための方法および装置 |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013180207A1 (ja) * | 2012-05-31 | 2013-12-05 | 日本電気株式会社 | 制御装置、通信システム、スイッチ制御方法及びプログラム |
US9363152B2 (en) * | 2012-06-11 | 2016-06-07 | Microsoft Technology Licensing, Llc | Large-scale passive network monitoring using multiple tiers of ordinary network switches |
CN103929334B (zh) * | 2013-01-11 | 2018-02-23 | 华为技术有限公司 | 网络异常通知方法和装置 |
US9210074B2 (en) * | 2013-05-03 | 2015-12-08 | Alcatel Lucent | Low-cost flow matching in software defined networks without TCAMs |
CN104412560B (zh) * | 2013-05-06 | 2018-03-13 | 华为技术有限公司 | 基于sdn的网络配置方法、装置及系统 |
CN104144156B (zh) | 2013-05-10 | 2018-09-21 | 华为技术有限公司 | 报文处理方法和装置 |
EP3001620A4 (en) * | 2013-06-25 | 2016-07-13 | Huawei Tech Co Ltd | ROUTING NODE, CONTROL NODE, AND PROCESSING METHOD FOR ROUTING NODE |
CN103581018B (zh) * | 2013-07-26 | 2017-08-11 | 北京华为数字技术有限公司 | 报文发送方法、路由器以及业务交换器 |
CN104734964B (zh) | 2013-12-24 | 2018-12-14 | 华为技术有限公司 | 报文处理方法、节点及系统 |
CN105075191B (zh) * | 2014-01-29 | 2018-09-21 | 华为技术有限公司 | 无线网络数据处理装置和无线网络系统 |
EP3116175A4 (en) * | 2014-03-04 | 2017-09-13 | Nec Corporation | Server, control device, management device, communication system, communication method, control method, management method, and program |
US9565114B1 (en) * | 2014-03-08 | 2017-02-07 | Google Inc. | Weighted load balancing using scaled parallel hashing |
US9491031B2 (en) * | 2014-05-06 | 2016-11-08 | At&T Intellectual Property I, L.P. | Devices, methods, and computer readable storage devices for collecting information and sharing information associated with session flows between communication devices and servers |
JP2016015672A (ja) * | 2014-07-03 | 2016-01-28 | 日立金属株式会社 | ネットワーク制御装置、及びネットワーク設定システム |
US10069727B2 (en) * | 2015-04-17 | 2018-09-04 | International Business Machines Corporation | Data packet retransmission processing |
US9654424B2 (en) * | 2015-07-31 | 2017-05-16 | Nicira, Inc. | Managed forwarding element with conjunctive match flow entries |
US10348619B2 (en) | 2015-07-31 | 2019-07-09 | Nicira, Inc. | Generating conjunctive match flow entries |
EP3361684B1 (en) | 2015-10-31 | 2020-07-29 | Huawei Technologies Co., Ltd. | Route determining method and corresponding apparatus and system |
WO2018006929A1 (en) * | 2016-07-04 | 2018-01-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Packet buffering in a telecommunications network |
EP3267658A1 (de) * | 2016-07-08 | 2018-01-10 | Deutsche Telekom AG | Netzwerkentität zum kommunizieren mit einer weiteren netzwerkentität über ein kommunikationsnetzwerk |
EP3614642B1 (de) * | 2018-08-20 | 2021-03-17 | Siemens Aktiengesellschaft | Verfahren zum einrichten eines streams, verfahren zur bereitstellung von stream-kennungs-informationen, verwendung eines namensdienst-servers, gerät, computerprogramm und computerlesbares medium |
CN110972138B (zh) | 2018-09-30 | 2021-06-15 | 华为技术有限公司 | 一种数据处理方法及其数据处理设备 |
CN115827754A (zh) * | 2022-11-25 | 2023-03-21 | 北京友友天宇系统技术有限公司 | 基于抽象策略模型的同构环境下的数据处理方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0998189A (ja) * | 1995-09-29 | 1997-04-08 | Toshiba Corp | ネットワーク中継装置 |
JP2010050719A (ja) * | 2008-08-21 | 2010-03-04 | Nippon Telegr & Teleph Corp <Ntt> | 通信システム、制御ノード、通信方法、およびプログラム |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05189318A (ja) * | 1992-01-16 | 1993-07-30 | Fujitsu Ltd | 情報処理装置 |
US6154776A (en) * | 1998-03-20 | 2000-11-28 | Sun Microsystems, Inc. | Quality of service allocation on a network |
JP2003512799A (ja) | 1999-10-20 | 2003-04-02 | アルカテル・インターネツトワーキング・インコーポレイテツド | データ通信スイッチのためのオンスイッチポリシールールキャッシング |
US7436830B2 (en) * | 2000-04-03 | 2008-10-14 | P-Cube Ltd. | Method and apparatus for wire-speed application layer classification of upstream and downstream data packets |
KR100425745B1 (ko) * | 2001-11-24 | 2004-04-06 | 엘지전자 주식회사 | 패킷의 헤더압축을 지원하는 통신 시스템에서 패킷의전송방법 |
US7688832B2 (en) * | 2005-01-28 | 2010-03-30 | Cisco Technology, Inc. | MPLS cookie label |
US20080212613A1 (en) * | 2007-03-02 | 2008-09-04 | Perkinson Terry D | Multilink meshed transport service |
KR101495126B1 (ko) * | 2010-03-17 | 2015-02-24 | 닛본 덴끼 가부시끼가이샤 | 통신 시스템, 노드, 제어 서버 및 통신 방법 |
-
2011
- 2011-05-26 JP JP2012517305A patent/JP5370588B2/ja active Active
- 2011-05-26 RU RU2015120346A patent/RU2628151C2/ru not_active IP Right Cessation
- 2011-05-26 RU RU2012157742/08A patent/RU2556457C2/ru not_active IP Right Cessation
- 2011-05-26 KR KR1020127031930A patent/KR20130032314A/ko not_active IP Right Cessation
- 2011-05-26 CN CN201510685170.2A patent/CN105357035B/zh active Active
- 2011-05-26 WO PCT/JP2011/062046 patent/WO2011149003A1/ja active Application Filing
- 2011-05-26 BR BR112012030135A patent/BR112012030135A2/pt not_active IP Right Cessation
- 2011-05-26 EP EP15154553.0A patent/EP2897327B1/en active Active
- 2011-05-26 AU AU2011259267A patent/AU2011259267B2/en not_active Ceased
- 2011-05-26 EP EP11786702.8A patent/EP2579510B1/en active Active
- 2011-05-26 CN CN201180022831.3A patent/CN102884769B/zh active Active
- 2011-12-21 US US13/333,827 patent/US9426061B2/en active Active
-
2013
- 2013-07-15 HK HK13108288.9A patent/HK1181928A1/xx not_active IP Right Cessation
- 2013-07-26 JP JP2013155534A patent/JP5598582B2/ja active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0998189A (ja) * | 1995-09-29 | 1997-04-08 | Toshiba Corp | ネットワーク中継装置 |
JP2010050719A (ja) * | 2008-08-21 | 2010-03-04 | Nippon Telegr & Teleph Corp <Ntt> | 通信システム、制御ノード、通信方法、およびプログラム |
Non-Patent Citations (4)
Title |
---|
NICK MCKEOWN, OPENFLOW: ENABLING INNOVATION IN CAMPUS NETWORKS, 26 February 2010 (2010-02-26), Retrieved from the Internet <URL:http://www.openflowswitch.org//documents/openflow-wp-latest.pdf>> |
OPENFLOW SWITCH SPECIFICATION, 1 April 2010 (2010-04-01), Retrieved from the Internet <URL:http://www.openflowswitch.org/documents/openflow-spec-vl.0.0.pdf>> |
See also references of EP2579510A4 |
YASUNOBU CHIBA ET AL.: "A Proposal of Flow Entry Reduction Scheme for Flow-based Networks and Its Implementation on OpenFlow-based Network", IEICE TECHNICAL REPORT, NS2009-162 TO NS2009- 260, NETWORK SYSTEM, vol. 109, no. 448, 25 February 2010 (2010-02-25), pages 7 - 12, XP008168095 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101434375B1 (ko) | 2011-02-17 | 2014-08-27 | 닛본 덴끼 가부시끼가이샤 | 플로우 통신 시스템 |
WO2014104278A1 (ja) * | 2012-12-28 | 2014-07-03 | 日本電気株式会社 | 制御装置、制御装置の制御方法及びプログラム |
US9847916B2 (en) | 2012-12-28 | 2017-12-19 | Nec Corporation | Control apparatus, control apparatus control method, and program |
JP2016523062A (ja) * | 2013-05-31 | 2016-08-04 | 華為技術有限公司Huawei Technologies Co.,Ltd. | 入力パラメータを生成するための方法および装置 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2011149003A1 (ja) | 2013-07-25 |
BR112012030135A2 (pt) | 2016-12-13 |
US20120093158A1 (en) | 2012-04-19 |
CN102884769B (zh) | 2015-11-25 |
RU2628151C2 (ru) | 2017-08-15 |
US9426061B2 (en) | 2016-08-23 |
EP2579510A1 (en) | 2013-04-10 |
RU2556457C2 (ru) | 2015-07-10 |
AU2011259267B2 (en) | 2015-01-15 |
CN105357035B (zh) | 2019-02-12 |
AU2011259267A1 (en) | 2012-11-15 |
KR20130032314A (ko) | 2013-04-01 |
EP2579510B1 (en) | 2015-02-25 |
CN105357035A (zh) | 2016-02-24 |
JP2013236399A (ja) | 2013-11-21 |
HK1181928A1 (en) | 2013-11-15 |
EP2897327A1 (en) | 2015-07-22 |
RU2015120346A (ru) | 2015-11-20 |
CN102884769A (zh) | 2013-01-16 |
RU2012157742A (ru) | 2014-07-10 |
EP2579510A4 (en) | 2014-03-12 |
EP2897327B1 (en) | 2016-09-14 |
JP5370588B2 (ja) | 2013-12-18 |
JP5598582B2 (ja) | 2014-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5598582B2 (ja) | 通信システム、ノード、制御装置、通信方法およびプログラム | |
JP5768861B2 (ja) | 通信システム、ノード、制御サーバ、通信方法およびプログラム | |
JP6418261B2 (ja) | 通信システム、ノード、制御装置、通信方法及びプログラム | |
JP5494668B2 (ja) | 情報システム、制御サーバ、仮想ネットワーク管理方法およびプログラム | |
JP5994851B2 (ja) | 転送装置の制御装置、転送装置の制御方法、通信システムおよびプログラム | |
JP5854048B2 (ja) | 通信システム、転送ノード、制御装置、通信制御方法およびプログラム | |
US10171352B2 (en) | Communication system, node, control device, communication method, and program | |
JP5854047B2 (ja) | 通信システム、制御装置、転送ノード、通信制御方法およびプログラム | |
WO2014126094A1 (ja) | 通信システム、通信方法、制御装置、制御装置の制御方法及びプログラム | |
WO2014175335A1 (ja) | 制御装置、計算機システム、通信制御方法及びプログラム | |
JP5768600B2 (ja) | 通信システム、制御装置、パケット転送方法およびプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201180022831.3 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11786702 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012517305 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 2011259267 Country of ref document: AU Date of ref document: 20110526 Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20127031930 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011786702 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10737/CHENP/2012 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2012157742 Country of ref document: RU Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112012030135 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112012030135 Country of ref document: BR Kind code of ref document: A2 Effective date: 20121127 |