WO2012137646A1 - ネットワークシステム、スイッチ、及び接続端末検知方法 - Google Patents
ネットワークシステム、スイッチ、及び接続端末検知方法 Download PDFInfo
- Publication number
- WO2012137646A1 WO2012137646A1 PCT/JP2012/058150 JP2012058150W WO2012137646A1 WO 2012137646 A1 WO2012137646 A1 WO 2012137646A1 JP 2012058150 W JP2012058150 W JP 2012058150W WO 2012137646 A1 WO2012137646 A1 WO 2012137646A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- packet
- mac address
- node device
- terminal
- address information
- Prior art date
Links
- 238000001514 detection method Methods 0.000 title claims description 6
- 230000009471 action Effects 0.000 claims description 22
- 230000005540 biological transmission Effects 0.000 claims description 21
- 238000000034 method Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 5
- 238000012546 transfer Methods 0.000 description 41
- 238000004891 communication Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 230000008859 change Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 7
- 238000000926 separation method Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 239000004065 semiconductor Substances 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/12—Avoiding congestion; Recovering from congestion
- H04L47/125—Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
- H04L12/462—LAN interconnection over a bridge based backbone
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/25—Routing or path finding in a switch fabric
- H04L49/253—Routing or path finding in a switch fabric using establishment or release of connections between ports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/70—Virtual switches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
Definitions
- the present invention relates to a network system, and more particularly to a network system that detects a terminal connected to a switch.
- the conventional network device has a problem that it cannot perform flexible control such as load distribution or offset from the outside. For this reason, when the scale of the network becomes large, it becomes difficult to understand and improve the behavior of the system, and there has been a problem that design and configuration changes are accompanied by a great cost.
- the network device is in charge of the packet transfer function
- the control device is in charge of the control function that is separated from the network device, so that the control device can centrally manage packet transfer and is highly flexible. It becomes possible to build a network.
- CD-separated network A CD (C: control plane / D: data plane) separation type network that controls a data plane side node device from a control plane side control device has been proposed as one of the networks having separated functions.
- the CD separation type network there is an open flow network using an open flow (OpenFlow) technology in which a switch is controlled from a controller to control a network path.
- OpenFlow open flow
- the details of the open flow technique are described in Non-Patent Document 1.
- the OpenFlow network is only an example.
- a control device such as an open flow controller (OFC) operates a flow table (flow table) related to path control of a node device such as an open flow switch (OFS) to operate a node. Control the behavior of the device.
- OFC open flow controller
- OFS open flow switch
- control device and the node device are connected by a control channel (control communication channel) called “secure channel” which is a communication path protected by a dedicated line, SSL (Secure Socket Layer), or the like.
- secure channel which is a communication path protected by a dedicated line, SSL (Secure Socket Layer), or the like.
- the control device and the node device transmit / receive an OpenFlow message (OpenFlow Message), which is a control message conforming to (compliant with) the OpenFlow protocol (OpenFlow Protocol), via the control channel.
- OpenFlow Protocol OpenFlow Protocol
- the node devices in the OpenFlow network are edge switches and core switches that are arranged in the OpenFlow network and are under the control of the control device.
- a series of packet flows from reception of a packet at the ingress edge switch (Ingress) to transmission at the egress edge switch (Egress) in the OpenFlow network is referred to as a flow.
- communication is regarded as an end-to-end (E2E: End to End) flow, and path control, failure recovery, load balancing, and optimization are performed in units of flow.
- the packet may be read as a frame.
- the difference between a packet and a frame is only the difference in the data unit (PDU: Protocol Data Unit) handled by the protocol.
- the packet is a PDU of “TCP / IP” (Transmission Control Protocol / Internet Protocol).
- the frame is a PDU of “Ethernet (registered trademark)” (Ethernet).
- a flow table is a set of determination conditions (rules) for identifying packets handled as a flow, statistical information indicating the number of times a packet matches (matches) a rule, and processing contents (actions) to be performed on the packet. This is a set of flow entries that define.
- the flow entry rule is defined by various combinations using any or all of information of each protocol layer included in the header area (field) of the packet, and can be distinguished.
- a transmission destination address (Destination Address), a transmission source address (Source Address), a transmission destination port (Destination Port), a transmission source port (Source Port), and the like can be considered.
- the above address includes a MAC address (Media Access Control Address) and an IP address (Internet Protocol Address).
- information on the ingress port (Ingress Port) can also be used as a rule for the flow entry.
- a part (or all) of a header area value of a packet handled as a flow can be set by a regular expression, a wild card “*”, or the like.
- the action of the flow entry indicates operations such as “output to a specific port”, “discard”, and “rewrite header”. For example, if the node device indicates output port identification information (output port number, etc.) in the action of the flow entry, the node device must output the packet to the corresponding port and indicate the output port identification information. If so, the packet is discarded. Alternatively, when the header information is indicated in the action of the flow entry, the node device rewrites the header of the packet based on the header information.
- the node device executes the action of the flow entry for the packet group (packet series) that conforms to the rule of the flow entry. Specifically, when receiving the packet, the node device searches the flow table for a flow entry having a rule that matches the header information of the received packet. As a result of the search, when a flow entry having a rule that matches the header information of the received packet is found, the flow entry statistical information is updated, and the operation specified as the action of the flow entry is performed on the received packet. carry out. On the other hand, if a flow entry having a rule that matches the header information of the received packet is not found as a result of the search, the received packet is determined to be the first packet (first packet), and in the OpenFlow network via the control channel. Forwards the received packet (or a copy of it) to the control device, requests packet route calculation based on the source / destination (destination) of the received packet, etc., and receives a flow entry setting message as a response And update the flow table.
- a default entry having a rule that conforms to the header information of all packets with low priority is registered. If no other flow entry that matches the received packet is found, the received packet matches this default entry.
- the action of the default entry is “transmission of inquiry information of the received packet to the control device”.
- the current method of using the flow table is not efficient and may run out of resources.
- the switch acquires terminal location information (information indicating the current location of the terminal on the network) using a broadcast packet such as ARP. Information could not be obtained.
- the node device when a packet is sent from the terminal to the node device, the node device sends the MAC address information held by itself and the port number associated with the MAC address information and the source MAC address of the packet to be transferred. Compare the information with the port number.
- the inquiry information (Packet-in) is transmitted to the control device, the terminal information is managed by the control device, and the control device Register the information in the node device.
- the inquiry information (Packet-in) is one of the OpenFlow messages.
- the network system includes a switch and a controller that sets a flow entry in which rules and actions for uniformly controlling packets as a flow are defined in the flow table of the switch.
- the switch receives a packet from the terminal, the switch notifies the controller of a set of the source MAC address information and the port number of the packet. Based on the notification from the switch, the controller recognizes the current position of the packet transmission source terminal on the network.
- a switch When a switch according to the present invention receives a packet from a terminal, the switch notifies the controller of a set of the source MAC address information and the port number of the packet as current location information on the network of the terminal of the source of the packet And a means for setting a flow entry in which a rule and an action for uniformly controlling the packet as a flow are defined in its own flow table in accordance with control from the controller.
- the controller sets a flow entry in which rules and actions for uniformly controlling packets as flows are defined in the flow table of the switch. Further, when the switch receives a packet from the terminal, it notifies the controller of a set of the source MAC address information and the port number of the packet. Further, the controller recognizes the current position of the packet transmission source terminal on the network based on the notification from the switch.
- the program according to the present invention when receiving a packet from a terminal, notifies the controller of a set of transmission source MAC address information and port number of the packet as current position information on the network of the transmission source terminal of the packet And a program for causing the switch to execute a step for setting a flow entry in which a rule and an action for uniformly controlling the packet as a flow are defined in its own flow table according to control from the controller It is.
- the program according to the present invention can be stored in a storage device or a storage medium.
- the terminal connected to the node device group is assigned to which number port of which node device using only the source MAC address (Source MAC) and the port number (port information) of the packet transferred from the terminal. Determine if it is connected. Further, the control device manages this terminal connection information, thereby realizing route control in consideration of the terminal position.
- the present invention is directed to a CD separation type network.
- an OpenFlow network which is one of CD separation type networks, will be described as an example. However, actually, it is not limited to the OpenFlow network.
- the packet 50 is transferred from the terminal 10-1 to the terminal 10-2 via the node device 20-1 and the node device 20-2.
- the terminal 10-1 is a transmission source terminal “A” that transmits a packet.
- the terminal 10-2 is the destination terminal “B” that receives the packet.
- the packet 50 is “B-addressed, A-source packet”.
- To B means that the destination is the terminal B, and the MAC address of the terminal B is designated as the destination MAC address.
- Source A means that the transmission source is the terminal A, and that the MAC address of the terminal A is designated as the transmission source MAC address.
- OFS OpenFlow switch
- the terminal location information comparison unit 21 performs terminal location information comparison using the MAC address information and the port number. Specifically, the terminal location information comparison unit 21 holds the MAC address information and the port number, and sets the MAC address information and the port number that are held, the source MAC address information of the packet to be transferred, Compare the port number pair.
- the terminal location information comparison unit 21 is an L2 (layer 2) functional block (L2 block).
- the flow table comparison unit 22 compares the flow table and flow information performed by a normal node device.
- the control device 30 is a control device that controls and manages the node devices arranged in the network.
- the control device 30 operates as an OpenFlow controller (OFC).
- OFC OpenFlow controller
- the control device 30 detects the node device 20-1 and the node device 20-2 based on the topology information (topology) indicating the connection state of the network, the control device 30 calculates the packet transfer path and the node device related to the path The flow entry is registered in the flow table. Thereby, the control device 30 performs path control between the node device 20-1 and the node device 20-2.
- the control device 30 has a terminal location information management table 31.
- the inquiry information (Packet-in) 51 is a control message for requesting the control device 30 to perform path control (inquiring about the transfer path of the packet 50).
- the data format and data contents of the inquiry information (Packet-in) 51 are the same as the inquiry information (Packet-in) transmitted to the control device when there is a nonconformity (mismatch) in the normal flow table search.
- Information (flag) is assigned.
- the terminal location information comparison unit 21 when the terminal location information comparison unit 21 receives the packet 50, the terminal location information comparison unit 21 sets the MAC address information held and the port number linked to the MAC address information, the source MAC address information and the port of the packet 50 to be transferred When the number and the pair are compared, and inconsistency (mismatch), inquiry information (Packet-in) 51 is generated based on the packet 50, and the inquiry information (Packet-in) 51 is transferred to the control device 30 To do.
- inquiry information (Packet-in) 51 is generated based on the packet 50, and the inquiry information (Packet-in) 51 is transferred to the control device 30 To do.
- the inquiry information (Packet-in) 52 is a control message for requesting the control device 30 to perform path control (inquiring about the transfer path of the packet 50).
- the difference between the inquiry information (Packet-in) 52 and the normal inquiry information (Packet-in) is that the information (flag) for identification is different, and the data format and data content are basically normal. This is the same as the inquiry information (Packet-in).
- the flow table comparison unit 22 compares the MAC address information stored in the flow entry of the flow table with the destination MAC address information of the packet 50 to be transferred. Based on this, inquiry information (Packet-in) 52 is generated, and the inquiry information (Packet-in) 52 is transferred to the control device 30.
- control device 30 defines a connection end between the node devices as an inside port (inside) 23.
- a connection end of the node device and the terminal on the node device side is defined as an outside port 24.
- the control device 30 recognizes the terminal 10-1 newly connected to the node device 20-1 based on the content of the inquiry information (Packet-in) 51 from the node device 20-1. Specifically, the control device 30 acquires the MAC address information of the terminal 10-1 and the port number to which the terminal 10-1 is connected from the content of the inquiry information (Packet-in) 51, and the terminal location information The management table 31 is updated. Note that the port to which the terminal 10-1 is connected is of course the outside port (outside) 24.
- the terminal location information comparison unit 21 has a MAC & port information (terminal location information) table 211.
- the MAC & port information table 211 is a pre-stage search table searched before the flow table 221.
- the MAC & port information table 211 can be said to be a kind of flow table in which a combination of MAC address information and a port number is a determination condition (rule).
- the flow table comparison unit 22 has a flow table 221.
- the flow table 221 is a flow table in the OpenFlow network.
- the flow table 221 is a subsequent search table that is searched after the MAC & port information table 211.
- the flow table 221 contains a flow entry that uses only the destination MAC address (Destination MAC) as a determination condition (rule). It ’s fine.
- the MAC & port information table 211 held by the terminal location information comparison unit 21 has an area (field) for storing MAC address information 2111 and a port number 2112.
- the packet 50 has an area for storing the source MAC address information 501 and the port number 502 in the header area.
- the node device 20-1 compares the contents of the MAC & port information table 211 with the contents of the packet 50.
- the node device 20-1 transmits the set of the MAC address information 2111 stored in the MAC & port information table 211 and the port number 2112 linked to the MAC address information 2111 and the transmission source held by the packet 50 A pair of the MAC address information 501 and the port number 502 is compared for each port and each MAC.
- the node device 20-1 If the node device 20-1 matches (matches) the contents of the MAC & port information table 211 and the contents of the packet 50 as a result of the comparison, the node device 20-1 performs a flow table comparison.
- the node device 20-1 activates the L2 learning function.
- the MAC & port information table 211 is a table that holds, as terminal location information, a set of MAC address information of a terminal connected to the node device 20-1 and a port number to which the terminal is connected.
- control device 30 receives the inquiry information (Packet-in) 51 generated by this comparison mismatch (mismatch), so that the attribute of the port that received the packet 50 is the outside port (outside). It can be determined that the port is an inlet port.
- Packet-in the inquiry information
- control device 30 can manage terminal location information with only two pieces of information of the source MAC address information 501 and the port number 502 of the packet 50.
- Terminal location information With reference to FIG. 4, an example of the terminal location information management table 31 included in the control device 30 will be described.
- the terminal location information management table 31 has an area for storing node device information 311, terminal MAC information 312, and port number 313.
- the node device information 311 is an area for writing identification information of the node device to which the terminal is connected.
- the terminal MAC information 312 is an area for writing information on the terminal MAC address (source MAC address).
- the port number 313 is an area for writing the port number of the node device to which the terminal is connected.
- control information 30 manages inquiry information (Packet-in) 51 that is generated when the result of terminal location information comparison is nonconformity (mismatch).
- the control device 30 receives the inquiry information (Packet-in) 51 from the node device 20-1, and registers the terminal information in the terminal location information management table 31 based on the contents of the inquiry information (Packet-in) 51.
- the control device 30 The node device information 311 is written with the identification information of the node device to which the terminal is connected, the terminal MAC information 312 is written with the source MAC address information of the terminal, and the port number 313 is the node device to which the terminal is connected. Write the port number.
- This system includes a terminal 10-1, a terminal 10-2, a terminal 10-3, a terminal 10-4, a node device 20-1, a node device 20-2, a node device 20-3, a node A device 20-4 and a control device 30 are included.
- the control device 30 manages the node device 20-1, the node device 20-2, the node device 20-3, and the node device 20-4.
- the control device 30 has a terminal location information management table 31.
- the control device 30 defines a connection end between the node devices as an inside port (inside) 23 and defines a connection end of the node device and the terminal on the node device side as an outside port (outside) 24.
- the terminal 10-1 is connected to the port 1, and the terminal 10-3 is connected to the port 2.
- the terminal 10-2 is connected to the port 1, and the terminal 10-4 is connected to the port 2.
- the port 1 and the port 2 are outside ports (outside).
- control device 30 identifies the position where the node devices are connected to each other, defines the identified location as an inside port 23, and manages it as management information.
- the control device 30 suppresses inquiry information (Packet-in) that is generated when the result of the terminal location information comparison performed at the inside port (inside) 23 is nonconformity (mismatch).
- Packet-in inquiry information
- control device 30 may register a set of the port number of the inside port (inside) 23 and all MAC address information using a wild card or the like in the MAC & port information table 211 of the node device 20-1. .
- the node device 20-1 shifts to the processing of the flow table comparison unit 22 unconditionally for the packet received at the inside port (inside) 23 regardless of the source MAC address information.
- the control device 30 uses the lowest priority and uses all the MACs using the port number of the outside port (outside) 24 and a wild card. It is also possible to register a flow entry that defines a set of address information as a rule and an action to transfer inquiry information (Packet-in) to the control device 30 as an action.
- the node device 20-1 inquires about the information of the packet because only the above flow entry is registered. The information (Packet-in) is stored, and the inquiry information (Packet-in) is transferred to the control device 30.
- the node device 20-1 Terminal position information comparison is performed on a packet that has flowed in through the outer port (outside) 24 from 1 and if the result of the terminal position information comparison is mismatch (mismatch), the information of the packet is referred to inquiry information (Packet). -In) and transfer the inquiry information (Packet-in) to the control device 30.
- inquiry information Packet
- -In inquiry information
- Packet-in inquiry information
- the control device 30 registers the information of the terminal 10-1 in the terminal location information management table 31 based on the transferred inquiry information (Packet-in) information, and the transfer source node device 20-1 A flow entry including the location of the terminal 10-1 (a set of MAC address information and port number) is registered in the flow table 221 of the node device 20-1.
- Packet-in transferred inquiry information
- the packet passes through the outside port (outside) 24 and flows into the node device 20-1.
- the node device 20-1 Since the flow table having the position information of the terminal 10-1 has already been registered, the node device 20-1 matches (matches) as a result of the terminal position information comparison. Thereafter, the node device 20-1 searches the flow table 221, and if there is a matching (matching) flow entry, the node device 20-1 transfers the flow entry to the node device 20-2 according to the action of the flow entry.
- the terminal position information is also compared in the transfer between the node devices, but the control device 30 manages the inner port (inside) of each node device and generates the inquiry information (Packet-in). Deter. That is, in the transfer between the node devices, the inquiry information (Packet-in) is not generated in the terminal position information comparison.
- the node device 20-2 transfers the transferred packet to the terminal 10-4 as a result of the terminal position information comparison and the flow table comparison.
- Step S102 When transferring the packet 50 from the terminal 10-1 to the terminal 10-2, the terminal location information comparison unit 21 of the node device 20-1 uses the MAC & port information in the terminal location information comparison unit 21 by the matching method shown in FIG.
- the table 211 and the packet 50 are collated to check whether the contents of the MAC & port information table 211 and the contents of the packet 50 match (match).
- the terminal location information comparison unit 21 sets the MAC address information stored in the MAC & port information table 211 and the port number associated therewith, and the source MAC address of the packet received from the terminal 10-1. Check the pair of information and port number to see if they match (match).
- Step S103 The terminal location information comparison unit 21 transfers the packet 50 to the flow table comparison unit 22 when it matches (matches) as a result of the collation.
- Step S104 The terminal location information comparison unit 21 stores the information of the packet 50 in the inquiry information (Packet-in) 51 and matches the inquiry information (Packet-in) 51 to the control device 30 when it does not match (match) as a result of the collation. Send. At this time, the terminal location information comparison unit 21 may temporarily hold the packet 50.
- Step S105 Based on the information of the packet 50 stored in the inquiry information (Packet-in) 51, the control device 30 is connected to which port of which node device the terminal 10-1 is connected to the terminal location information management table 31. Or register.
- Step S106 the control device 30 registers a new set of MAC address information and port number in the MAC & port information table 211 of the node device 20-1 based on the terminal location information in the terminal location information management table 31.
- the control device 30 uses the packet 50 information stored in the inquiry information (Packet-in) 51 to keep the original header information and send the packet 50 to the node device 20-1. Send. If registration is not performed, the packet 50 need not be transmitted to the node device 20-1.
- Packet-in inquiry information
- Step S107 The terminal location information comparison unit 21 transfers the packet 50 to the flow table comparison unit 22 in accordance with the registration.
- the terminal location information comparison unit 21 transfers the packet 50 received from the control device 30 to the flow table comparison unit 22.
- the terminal location information comparison unit 21 transfers the temporarily held packet 50 to the flow table comparison unit 22 according to the registration from the control device 30. You may do it. In this case, if there is no registration as described above, the terminal location information comparison unit 21 may discard the packet 50 that is temporarily held after the elapse of a predetermined period.
- Step S108 When the flow table comparison unit 22 receives the packet 50 from the terminal location information comparison unit 21, the flow table comparison unit 22 searches the flow table 221 in the flow table comparison unit 22, and any flow entry in the flow table 221 indicates the content of the packet 50. Check if they match (match). Specifically, the flow table comparison unit 22 compares the MAC address information stored in each flow entry of the flow table 221 with the destination MAC address information of the packet received from the terminal 10-1, and the flow table 221. Confirm that it matches (matches) any of the flow entries. In practice, the flow table comparison unit 22 uses the “pair of MAC address information and port number” stored in each flow entry of the flow table 221 and the “destination MAC” of the packet received from the terminal 10-1. The pair of address information and output port number ”may be compared to confirm whether the flow table 221 matches (matches) any flow entry.
- Step S109 When the flow table comparison unit 22 matches (matches) any flow entry in the flow table 221 as a result of the comparison, the flow table comparison unit 22 sends the packet 50 to the inside port (inside) 23 according to the action of the matched (match) flow entry. Output and transfer to the terminal 10-2.
- Step S110 If the comparison does not match (match) any flow entry in the flow table 221, the flow table comparison unit 22 stores the information of the packet 50 in the inquiry information (Packet-in) 52 and sends it to the control device 30. Inquiry information (Packet-in) 52 is transmitted. At this time, the flow table comparison unit 22 may temporarily hold the packet 50.
- a flow entry indicating that the destination MAC address information of the packet 50 and that the packet 50 is transferred to a predetermined inside port 23 is registered.
- the control device 30 may transmit the packet 50 to the node device 20-1 based on the information of the packet 50 stored in the inquiry information (Packet-in) 52.
- Step S112 In accordance with the action of the flow entry registered in the flow table 221, the flow table comparison unit 22 outputs the packet 50 to the inside port (inside) 23 and transfers it to the terminal 10-2. At this time, the flow table comparison unit 22 outputs the packet 50 received from the control device 30 or the temporarily held packet 50 to the inside port (inside) 23 and transfers it to the terminal 10-2. Note that the flow table comparison unit 22 may discard the temporarily held packet 50 after the elapse of a predetermined period if the above flow entry registration is not performed.
- the node device compares the MAC address information it holds, the port number associated therewith, the source MAC address information of the packet and the port number, respectively, and does not match (match), the inquiry information (Packet) -In) to the controller.
- the control device accumulates the location of the terminal from the information of the inquiry information (Packet-in), and registers the flow entry including the terminal location in the node device in the flow table of the node device.
- Packet-in information of the inquiry information
- the location of the terminal connected to the node device can be specified only by the packet source MAC address information and the port number.
- the location of the terminal can be specified by the control device.
- the control apparatus can select a route in consideration of the terminal information, and the route can be selected more flexibly.
- control device manages terminal location information from information of inquiry information (Packet-in) generated when the result of terminal location information comparison is nonconformity (mismatch), and the managed information Can be used as a judgment material when selecting a route.
- Information of inquiry information Packet-in
- mismatch nonconformity
- Second Embodiment The second embodiment of the present invention will be described below.
- the result of terminal location information comparison is nonconformity (mismatch)
- inquiry information Packet-in
- the terminal location information comparison unit 21 of the node device 20-1 copies the packet 50 (addressed to B, original packet A) when there is a mismatch (mismatch) as a result of the comparison of the terminal location information (copy: The inquiry information (Packet-in) 51 storing the copied packet 53 is generated.
- Packet-in inquiry information
- the node device 20-1 When transferring the packet 50 from the terminal 10-1 to the terminal 10-2, the node device 20-1 compares the packet received from the terminal 10-1 with the terminal position information, and stores the packet if it does not match (mismatch).
- the packet 50 (addressed to B, original packet A) is copied, and inquiry information (Packet-in) 51 storing the copied packet is generated.
- the control device 30 registers in the terminal location information management table 31 which port of which node device the terminal 10-1 is connected to.
- the control device 30 rewrites the flow table 221 of the node device 20-1 for the received packet based on the terminal location information management table 31.
- control device 30 updates the flow table 221 without updating the MAC & port information table 211 according to the inquiry information (Packet-in) 51. That is, the control device 30 registers a flow entry including a set of MAC address information and a port number in the flow table 221.
- the terminal location information comparison unit 21 of the node device 20-1 searches the flow table 221 after the terminal location information comparison is completed, and any flow entry in the flow table 221 matches the content of the packet 50 ( If there is a match, the packet 50 is transferred to the terminal 10-2 according to the transfer path of the control device 30.
- the flow table comparison unit 22 of the node device 20-1 searches the flow table, and generates inquiry information (Packet-in) 52 to the control device 30 if it does not match the flow table (mismatch).
- the node device 20-1 always searches the flow table 221 when receiving the packet 50 regardless of the suitability (match) or mismatch (mismatch) of the terminal location information comparison, The packet 50 is transferred.
- the terminal location information comparison unit 21 of the node device 20-1 copies the packet 50 (addressed to B, original packet A). Then, inquiry information (Packet-in) 51 storing the copied packet 53 is transmitted to the control device 30. Simultaneously with / in parallel with this processing, the node device 20-1 transfers the packet 50 to the flow table comparison unit 22.
- the terminal location information comparison unit 21 collates the contents of the MAC & port information table 211 with the contents of the packet 50.
- the terminal location information comparison unit 21 copies the packet 50 and stores inquiry information (Packet-in) 51 in which the copied packet 53 is stored. And the inquiry information (Packet-in) 51 is transmitted to the control device 30.
- the terminal location information comparison unit 21 proceeds to the process of the flow table comparison unit 22 regardless of the collation result.
- the flow table comparison unit 22 searches the flow table 221 and compares the content of the flow table 221 with the content of the packet 50.
- the flow table comparison unit 22 transfers the packet 50 according to the action of the matched (matched) flow entry.
- the flow table comparison unit 22 transmits inquiry information (Packet-in) 52 to the control device 30 when none of the flow entries in the flow table 221 matches (matches) the contents of the packet 50.
- Information Packet-in
- This system includes a terminal 10-1, a terminal 10-2, a terminal 10-3, a terminal 10-4, a node device 20-1, a node device 20-2, a node device 20-3, a node A device 20-4 and a control device 30 are included.
- the control device 30 manages the node device 20-1, the node device 20-2, the node device 20-3, and the node device 20-4.
- the control device 30 has a terminal location information management table 31.
- the control device 30 defines a connection end between the node devices as an inside port (inside) 23 and defines a connection end of the node device and the terminal on the node device side as an outside port (outside) 24.
- the terminal 10-1 is connected to the port 1, and the terminal 10-3 is connected to the port 2.
- the terminal 10-2 is connected to the port 1, and the terminal 10-4 is connected to the port 2.
- the port 1 and the port 2 are outside ports (outside).
- control device 30 identifies the position where the node devices are connected to each other, and defines and manages the identified location as the inside port (inside) 23.
- the control device 30 avoids registering the port number of the inner port (inside) 23 of the node device 20-1 in the MAC & port information table 211, and transmits the packet received at the inner port (inside) 23.
- generation of inquiry information Packet-in
- the node device 20-1 transmits the packet 50 as inquiry information (Packet). -In) 51, and the inquiry information (Packet-in) 51 is transmitted to the control device 30.
- control device 30 When the control device 30 receives the inquiry information (Packet-in) 51 from the node device 20-1, the control device 30 stores the terminal 10-1 in the terminal location information management table 31 based on the contents of the inquiry information (Packet-in) 51. Register information.
- Flow change information (FlowMod-Add) is one of the OpenFlow messages.
- the control device 30 sends flow change information (FlowMod ⁇ ) to a plurality of node devices (node device 20-2, node device 20-3, node device 20-4) connected to the control device 30.
- FlowMod ⁇ flow change information
- a flow entry including the location (terminal location information) of the terminal 10-1 connected to the node device 20-1 is registered (updated) in the flow table 221 of each node device 20.
- the flow change information (FlowMod-Add) 54 is a control message for registering a flow entry in the flow table 221 for each of the node device 20-2, the node device 20-3, and the node device 20-4.
- the control device 30 transmits the flow change information (FlowMod-Add) 55 to the node device 20-1, so that the terminal 10-1 is stored in the flow table 221 of the node device 20-1.
- the flow entry including the location (terminal location information) is registered.
- Flow change information (FlowMod-Add) 55 is a control message for registering a flow entry in the flow table 221 for the node device 20-1.
- the terminal 10-1 transmits the packet 50 again, it passes through the outer port (outside) 24 and flows into the node device 20-1.
- the packet 50 and the flow entry match (match), If the flow table is searched and matched (matched), it is transferred to the node device 20-2 according to the path control of the control device 30.
- the terminal position information is also compared in the transfer between the node devices, but the control device 30 manages the inner port (inside) of each node device and generates the inquiry information (Packet-in). Deter. That is, in the transfer between the node devices, the inquiry information (Packet-in) is not generated in the terminal position information comparison.
- the node device 20-2 transfers the transferred packet to the terminal 10-4 as a result of the flow table comparison.
- the third embodiment of the present invention will be described below.
- open flow transfer is performed only by terminal location information comparison without performing flow table comparison. Specifically, after the terminal location information comparison is performed using the MAC & port information table, the destination comparison is performed again using the MAC & port information table, and the open flow transfer is performed.
- inquiry information Packet-in
- Inquiry information Packet-in 51 is transmitted.
- the flow change information (FlowMod-Add) 56 is a control message for updating the MAC & port information table 211 for each node device 20.
- the terminal location information comparison unit 21 compares the MAC & port information table 211 and the packet 50 again after performing the terminal location information comparison.
- the terminal location information comparison unit 21 includes a set of the MAC address information 2111 stored in the MAC & port information table 211 and the port number 2112 linked to the MAC address information 2111 and the packet 50.
- the pair of the transmission source MAC address information 501 and the port number 502 is compared for each port and each MAC.
- the terminal location information comparison unit 21 matches the terminal location information when the set of the MAC address information 2111 and the port number 2112 matches the set of the source MAC address information 501 and the port number 502.
- the source MAC address information 501 and the port number 502 used for comparison are not used, and the MAC address information 2111 in the MAC & port information table 211 is compared with the destination MAC address information 503 of the packet 50.
- the terminal location information comparison unit 21 transfers the packet 50 using the port number 2112 associated with the MAC address information 2111 in the MAC & port information table 211 as an output port.
- a computer such as a PC (personal computer), an appliance, a thin client server, a workstation, a mainframe, and a supercomputer is assumed.
- terminals include IP phones, mobile phones, smart phones, smart books, car navigation systems (car navigation systems), portable game machines, home game machines, portable music players, handy terminals, gadgets (electronic devices).
- An interactive television, a digital tuner, a digital recorder, an information home appliance (information home appliance), an office automation (OA) device, an over-the-counter terminal / high-function copier, a digital signage (digital signage), and the like are also conceivable.
- the terminal and the control device may be a relay device or a peripheral device.
- node devices include network switches, routers, routers, proxies, gateways, firewalls, load balancers, bandwidth control devices (packet shapers). ), Security supervisory control device (SCADA: Supervision Control And Data Acquisition), gatekeeper (gatekeeper), base station (base station), access point (AP: Access Point), communication satellite (CS: Communication Satellite) A computer with a communication port of .
- SCADA Supervision Control And Data Acquisition
- gatekeeper gatekeeper
- base station base station
- AP Access Point
- CS Communication Satellite
- the terminal, node device, and control device may be an expansion board mounted on a computer or the like, or a virtual machine (Virtual Machine (VM)) constructed on a physical machine. Further, the terminal, the node device, and the control device may be mounted on a moving body such as a vehicle, a ship, or an aircraft.
- VM Virtual Machine
- each of the terminal, the node device, and the control device includes a processor that is driven based on a program and executes predetermined processing, a memory that stores the program and various data, and an interface used for communication with a network. It is realized by.
- processors include a CPU (Central Processing Unit), a network processor (NP: Network Processor), a microprocessor (microprocessor), a microcontroller (microcontroller), or a semiconductor integrated circuit (LSI: Large Scale) having a dedicated function. Integration) or the like.
- CPU Central Processing Unit
- NP Network Processor
- microprocessor microprocessor
- microcontroller microcontroller
- LSI semiconductor integrated circuit
- semiconductor storage devices such as RAM (Random Access Memory), ROM (Read Only Memory), EEPROM (Electrically Erasable and Programmable Read Only Memory), and HDD Memory (SDHidK)
- RAM Random Access Memory
- ROM Read Only Memory
- EEPROM Electrically Erasable and Programmable Read Only Memory
- HDD Memory HDD Memory
- An auxiliary storage device such as State Drive
- a removable disk such as a DVD (Digital Versatile Disk)
- a storage medium such as an SD memory card (Secure Digital memory card), or the like
- a buffer, a register, or the like may be used.
- DAS Direct Attached Storage
- FC-SAN Fibre Channel-Storage Area Network
- NAS Network Attached Storage
- IP-SAN IP-Storage Area
- processor and the memory may be integrated.
- a single chip such as a microcomputer has been developed. Therefore, a case where a one-chip microcomputer mounted on an electronic device or the like includes the processor and the memory can be considered.
- Examples of the above interfaces include semiconductor integrated circuits such as substrates (motherboards, I / O boards) and chips that support network communication, network adapters such as NIC (Network Interface Card), and similar expansion cards, communication devices such as antennas, etc.
- a communication port such as a connection port (connector) is conceivable.
- networks include the Internet, LAN (Local Area Network), wireless LAN (Wireless LAN), WAN (Wide Area Network), backbone (Backbone), cable TV (CATV) line, fixed telephone network, mobile phone network, WiMAX (IEEE 802.16a), 3G (3rd Generation), dedicated line (lease line), IrDA (Infrared Data Association), Bluetooth (registered trademark), serial communication line, data bus, and the like are conceivable.
- each of the terminal, node device, and control device may be a module, a component, a dedicated device, or an activation (calling) program thereof.
- the present invention relates to a network system that detects a terminal connected to a switch by using an open flow (OpenFlow) function.
- OpenFlow open flow
- the node device has a set of the source MAC address (Source MAC) information and port number of the packet sent from the terminal to the node device, and the MAC address held in the preceding search table (MAC & port information table) Compare information and port number pairs to see if they match.
- Source MAC source MAC address
- MAC & port information table MAC & port information table
- the node device uses the OpenFlow inquiry information (Packet-in) function to the control device, and sets the combination of the source MAC address information and the port number held by the packet to the control device. Notice. Further, the previous search table is updated as necessary.
- Packet-in OpenFlow inquiry information
- the node device unconditionally notifies the control device of the combination of the source MAC address information and the port number held by the packet for all packets. You may make it do.
- the node device compares the destination MAC address (Destination MAC) information of the packet with a set of MAC address information held in the subsequent search table (flow table), and confirms whether they match (match).
- the node device compares the set of the destination MAC address and port number of the packet with the set of MAC address information held in the post-stage search table, and confirms whether it matches (matches). May be.
- the node device uses the OpenFlow inquiry information (Packet-in) function to inquire the control device about the action for the packet. Further, the subsequent search table is updated as necessary.
- Packet-in OpenFlow inquiry information
- control device manages the terminal connection information, thereby realizing route control in consideration of the terminal position.
- terminal location information comparison for detecting terminal movement is performed, and inquiry information (Packet-in) in which a packet is stored is triggered when a result of terminal location information comparison is nonconformity (mismatch). Generate and transfer to controller.
- the transferred packet is copied, the copied packet is stored in inquiry information (Packet-in), and transferred to the control device.
- Packet-in inquiry information
- the inquiry information (Packet-in) generated when the result of the terminal location information comparison is nonconformity (mismatch) and the inquiry information (Packet-in) generated when the flow table search fails are identified.
- the node device generates inquiry information (Packet-in) and notifies the control device of the terminal position connected to the node device.
- the control device can acquire the terminal position information connected to the node device based on the inquiry information (Packet-in) of the node device.
- the terminal location information is notified by the port attribute.
- the attribute of the inside port (inside) is given to the connection end between the node devices, and the outside port (outside) attribute is given to the connection end of the node device and the terminal on the node device side, and the result of the terminal location information comparison is incompatible (mismatch)
- the generation of inquiry information (Packet-in) generated at the time is controlled.
- terminal location information comparison is performed. For example, a set of MAC address information and port number held by the node device is compared with a set of packet transmission source MAC address information and port number.
- MAC & port information table transfer is performed. For example, the MAC & port information table is compared with the destination MAC address (Destination MAC) of the packet, and if it matches (matches), it is transferred to the port linked to the MAC address information in the MAC & port information table.
- Destination MAC Destination MAC
- the present invention determines whether or not to accept a packet from a transmission source terminal by comparing terminal location information (comparison using a combination of a transmission source MAC address and a port number) for an inflowing flow. Whether to transfer the packet to the destination terminal is determined by searching (comparison using the destination MAC address).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
機能を分離したネットワークの1つとして、コントロールプレーン側の制御装置からデータプレーン側のノード装置を制御するCD(C:コントロールプレーン/D:データプレーン)分離型ネットワークが提案されている。
オープンフローネットワークでは、オープンフローコントローラ(OFC:OpenFlow Controller)等の制御装置が、オープンフロースイッチ(OFS:OpenFlow Switch)等のノード装置の経路制御に関するフローテーブル(Flow table)を操作することにより、ノード装置の挙動を制御する。
以下に、本発明の第1実施形態について添付図面を参照して説明する。
図1を参照して、本発明の第1実施形態に係るネットワークシステムの構成例について説明する。
端末10(10-i、i=1~n)の各々は、ノード装置20(20-j、j=1~m)に接続可能な端末である。
ノード装置20(20-j、j=1~m)の各々は、ネットワークに配置されたノード装置である。ノード装置20(20-j、j=1~m)の各々は、オープンフローネットワークでは、オープンフロースイッチ(OFS)として動作する。ノード装置20(20-j、j=1~m)の各々は、受信したパケットを、自身のフローテーブルに登録されたフローエントリに従って転送する。
制御装置30は、ネットワークに配置されたノード装置を制御・管理する制御装置である。制御装置30は、オープンフローネットワークでは、オープンフローコントローラ(OFC)として動作する。制御装置30は、ネットワークの接続状態を示すトポロジ情報(topology)を基に、ノード装置20-1及びノード装置20-2を検知した際、パケット転送経路を計算し、当該経路に関連するノード装置のフローテーブルにフローエントリの登録を行う。これにより、制御装置30は、ノード装置20-1とノード装置20-2間の経路制御を行う。
パケット50は、ノード装置20(20-j、j=1~m)に転送されるパケットである。
図2を参照して、本実施形態におけるノード装置20(20-j、j=1~m)の内部の構成について説明する。
図3を参照して、端末位置情報の照合内容の詳細について説明する。
図4を参照して、制御装置30が持つ端末位置情報管理テーブル31の例について説明する。
ノード装置情報311に、端末が接続されているノード装置の識別情報を書き込み、端末MAC情報312に、端末の送信元MACアドレス情報を書き込み、ポート番号313に、端末が接続されているノード装置のポート番号を書き込む。
図5を参照して、本実施形態を利用したシステムの構成例について説明する。
図6を参照して、本実施形態に係る接続端末検知処理時の動作について説明する。
まず、制御装置30は、既存の経路制御からノード装置群の接続端を算出し、ノード装置同士の接続端を内側ポート(inside)23と定義し、ノード装置と端末のノード装置側の接続端を外側ポート(outside)24と定義し、ノード装置同士間の接続端とノード装置-端末間の接続端を区別できるようにする。この後、ノード装置20(20-j、j=1~m)の各々は、通常の動作を開始する。
ノード装置20-1の端末位置情報比較部21は、端末10-1から端末10-2宛にパケット50を転送する場合、図3に示す照合方法で、端末位置情報比較部21にあるMAC&port情報テーブル211とパケット50とを照合し、MAC&port情報テーブル211の内容とパケット50の内容が適合(マッチ)するか確認する。具体的には、端末位置情報比較部21は、MAC&port情報テーブル211に格納されているMACアドレス情報とそれに結びついているポート番号との組と、端末10-1から受信したパケットの送信元MACアドレス情報とポート番号との組を照合し、適合(マッチ)するか確認する。
端末位置情報比較部21は、照合の結果、適合(マッチ)する場合、フローテーブル比較部22にパケット50を転送する。
端末位置情報比較部21は、照合の結果、適合(マッチ)しない場合、問い合わせ情報(Packet-in)51にパケット50の情報を格納し、制御装置30宛に問い合わせ情報(Packet-in)51を送信する。このとき、端末位置情報比較部21は、パケット50を一時的に保持するようにしても良い。
制御装置30は、この問い合わせ情報(Packet-in)51に格納されているパケット50の情報を基に、端末位置情報管理テーブル31に、端末10-1がどのノード装置のどのポートに接続されているか登録する。
また、制御装置30は、端末位置情報管理テーブル31の端末位置情報を基に、新たなMACアドレス情報とポート番号との組を、ノード装置20-1のMAC&port情報テーブル211に登録する。ここでは、制御装置30は、登録を行った場合、問い合わせ情報(Packet-in)51に格納されたパケット50の情報を基に、元々のヘッダ情報のまま、ノード装置20-1宛にパケット50を送信する。登録を行わない場合、ノード装置20-1宛にパケット50を送信しなくても良い。
端末位置情報比較部21は、上記の登録に応じて、パケット50を、フローテーブル比較部22に転送する。ここでは、端末位置情報比較部21は、制御装置30から受信したパケット50を、フローテーブル比較部22に転送する。なお、端末位置情報比較部21は、パケット50を一時的に保持している場合、制御装置30からの登録に応じて、一時的に保持しているパケット50を、フローテーブル比較部22に転送しても良い。この場合、端末位置情報比較部21は、上記の登録がなければ、所定期間の経過後、一時的に保持しているパケット50を破棄しても良い。
フローテーブル比較部22は、端末位置情報比較部21からパケット50を受け取ると、フローテーブル比較部22にあるフローテーブル221に検索をかけ、フローテーブル221内のいずれかのフローエントリがパケット50の内容と適合(マッチ)するか確認する。具体的には、フローテーブル比較部22は、フローテーブル221の各フローエントリに格納されているMACアドレス情報と、端末10-1から受信したパケットの宛先MACアドレス情報とを比較し、フローテーブル221のいずれかのフローエントリと適合(マッチ)するか確認する。なお、実際には、フローテーブル比較部22は、フローテーブル221の各フローエントリに格納されている「MACアドレス情報とポート番号との組」と、端末10-1から受信したパケットの「宛先MACアドレス情報と出力ポート番号との組」とを比較し、フローテーブル221のいずれかのフローエントリと適合(マッチ)するか確認しても良い。
フローテーブル比較部22は、比較の結果、フローテーブル221のいずれかのフローエントリと適合(マッチ)する場合、適合(マッチ)したフローエントリのアクションに従い、パケット50を、内側ポート(inside)23に出力し、端末10-2宛に転送する。
フローテーブル比較部22は、比較の結果、フローテーブル221のいずれかのフローエントリと適合(マッチ)しない場合、問い合わせ情報(Packet-in)52にパケット50の情報を格納し、制御装置30宛に問い合わせ情報(Packet-in)52を送信する。このとき、フローテーブル比較部22は、パケット50を一時的に保持するようにしても良い。
制御装置30は、この問い合わせ情報(Packet-in)52に格納されているパケット50の情報を基に、転送経路を計算し、経路上のノード装置20(20-j、j=1~m)の各々のフローテーブル221に、パケット50の宛先MACアドレス情報と、該パケット50を所定の内側ポート(inside)23へ転送する旨とを示すフローエントリを登録する。また、制御装置30は、問い合わせ情報(Packet-in)52に格納されたパケット50の情報を基に、ノード装置20-1宛にパケット50を送信しても良い。
フローテーブル比較部22は、フローテーブル221に登録されたフローエントリのアクションに従い、パケット50を、内側ポート(inside)23に出力し、端末10-2宛に転送する。このとき、フローテーブル比較部22は、制御装置30から受信したパケット50、又は一時的に保持しているパケット50を、内側ポート(inside)23に出力し、端末10-2宛に転送する。なお、フローテーブル比較部22は、上記のフローエントリ登録がなければ、所定期間の経過後、一時的に保持しているパケット50を破棄しても良い。
本実施形態では、ノード装置が、保有しているMACアドレス情報とそれに結びついているポート番号とパケットの送信元MACアドレス情報とポート番号をそれぞれ比較し適合(マッチ)しない場合は、問い合わせ情報(Packet-in)を制御装置に上げる。
以下に、本発明の第2実施形態について説明する。
本発明の第2実施形態では、端末位置情報比較の結果が不適合(ミスマッチ)の場合に、問い合わせ情報(Packet-in)が発生しても、通常通りにオープンフロー転送処理を行う。
図7を参照して、本発明の第2実施形態に係るネットワークシステムの構成例について説明する。
図8を参照して、本実施形態におけるノード装置20(20-j、j=1~m)の内部の構成について説明する。
図9を参照して、本実施形態を利用したシステムの構成例について説明する。
以下に、本発明の第3実施形態について説明する。
本発明の第3実施形態では、フローテーブル比較を行うことなく、端末位置情報比較のみでオープンフロー転送を行う。具体的には、MAC&port情報テーブルを使用して端末位置情報比較を行った後、MAC&port情報テーブルを再度使用して宛先比較を行い、オープンフロー転送を行う。
図10を参照して、本実施形態におけるノード装置20(20-i、i=1~n)の内部の構成について説明する。
図11を参照して、MAC&port情報テーブルとパケットの宛先MACアドレス(Destination MAC)の照合内容の詳細について説明する。
なお、上記の各実施形態は、組み合わせて実施することも可能である。
以下に、本発明に係るネットワークシステムを実現するための具体的なハードウェアの例について説明する。
以上のように、本発明は、オープンフロー(OpenFlow)機能を使用して、スイッチに接続された端末を検知するネットワークシステムに関する。
以上、本発明の実施形態を詳述してきたが、実際には、上記の実施形態に限られるものではなく、本発明の要旨を逸脱しない範囲の変更があっても本発明に含まれる。
Claims (10)
- パケットをフローとして一律に制御するためのルールとアクションとが定義されたフローエントリに従って、受信したパケットの処理を行うノード装置と、
前記ノード装置に対して、前記フローエントリを設定する制御装置と
を含み、
前記ノード装置は、端末からパケットを受信した際、前記パケットの送信元MACアドレス情報及びポート番号の組を前記制御装置に通知し、
前記制御装置は、前記ノード装置からの通知に基づいて、前記パケットの送信元の端末のネットワーク上の現在位置を認識する
ネットワークシステム。 - 請求項1に記載のネットワークシステムであって、
前記ノード装置は、
前記ノード装置が保有しているMACアドレス情報及びポート番号の組と、前記パケットの送信元MACアドレス情報及びポート番号の組とを比較し、適合しない場合、前記パケットに基づく第1の問い合わせパケットを生成し、前記制御装置宛に前記第1の問い合わせパケットを送信する手段と、
前記ノード装置が保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較し、適合しない場合、前記パケットに基づく第2の問い合わせパケットを生成し、前記制御装置宛に前記第2の問い合わせパケットを送信する手段と
を具備し、
前記制御装置は、
前記第1の問い合わせパケットの内容を基に、前記端末のMACアドレス情報と前記端末が接続されたポートを示すポート番号とを管理する手段と、
前記第1及び第2の問い合わせパケットの内容を基に、前記ノード装置が保有している情報を更新する手段と
を具備する
ネットワークシステム。 - 請求項2に記載のネットワークシステムであって、
前記ノード装置は、
前記ノード装置が保有しているMACアドレス情報及びポート番号の組と、前記パケットの送信元MACアドレス情報及びポート番号の組とを比較し、適合する場合、前記ノード装置が保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較する手段と、
前記ノード装置が保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較し、適合する場合、前記パケットを転送する手段と
を更に具備する
ネットワークシステム。 - 端末からパケットを受信した際、前記パケットの送信元の端末のネットワーク上の現在位置情報として、前記パケットの送信元MACアドレス情報及びポート番号の組を制御装置に通知する手段と、
前記制御装置からの制御に応じて、前記パケットをフローとして一律に制御するためのルールとアクションが定義されたフローエントリを登録する手段と
を具備する
ノード装置。 - 請求項4に記載のノード装置であって、
保有しているMACアドレス情報及びポート番号の組と、前記パケットの送信元MACアドレス情報及びポート番号の組とを比較し、適合しない場合、前記パケットに基づく第1の問い合わせパケットを生成し、前記制御装置宛に前記第1の問い合わせパケットを送信する手段と、
保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較し、適合しない場合、前記パケットに基づく第2の問い合わせパケットを生成し、前記制御装置宛に前記第2の問い合わせパケットを送信する手段と
を更に具備する
ノード装置。 - 請求項5に記載のノード装置であって、
保有しているMACアドレス情報及びポート番号の組と、前記パケットの送信元MACアドレス情報及びポート番号の組とを比較し、適合する場合、保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較する手段と、
保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較し、適合する場合、前記パケットを転送する手段と
を更に具備する
ノード装置。 - 制御装置が、ノード装置に対して、パケットをフローとして一律に制御するためのルールとアクションが定義されたフローエントリを設定することと、
前記ノード装置が、端末からパケットを受信した際、前記パケットの送信元MACアドレス情報及びポート番号の組を前記制御装置に通知することと、
前記制御装置が、前記ノード装置からの通知に基づいて、前記パケットの送信元の端末のネットワーク上の現在位置を認識することと
を含む
接続端末検知方法。 - 端末からパケットを受信した際、前記パケットの送信元の端末のネットワーク上の現在位置情報として、前記パケットの送信元MACアドレス情報及びポート番号の組を制御装置に通知するステップと、
前記制御装置からの制御に応じて、前記パケットをフローとして一律に制御するためのルールとアクションが定義されたフローエントリを登録するステップと
をノード装置に実行させるためのプログラムを格納した
記憶媒体。 - 請求項8に記載の記憶媒体であって、
保有しているMACアドレス情報及びポート番号の組と、前記パケットの送信元MACアドレス情報及びポート番号の組とを比較し、適合しない場合、前記パケットに基づく第1の問い合わせパケットを生成し、前記制御装置宛に前記第1の問い合わせパケットを送信するステップと、
保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較し、適合しない場合、前記パケットに基づく第2の問い合わせパケットを生成し、前記制御装置宛に前記第2の問い合わせパケットを送信するステップと
を更にノード装置に実行させるためのプログラムを格納した
記憶媒体。 - 請求項9に記載の記憶媒体であって、
保有しているMACアドレス情報及びポート番号の組と、前記パケットの送信元MACアドレス情報及びポート番号の組とを比較し、適合する場合、保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較するステップと、
保有しているMACアドレス情報と、前記パケットの宛先MACアドレス情報とを比較し、適合する場合、前記パケットを転送するステップと
を更にノード装置に実行させるためのプログラムを格納した
記憶媒体。
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/009,677 US9444743B2 (en) | 2011-04-04 | 2012-03-28 | Network system, switch and connected terminal detection method |
KR1020137025960A KR101501397B1 (ko) | 2011-04-04 | 2012-03-28 | 네트워크 시스템, 스위치 및 접속 단말기 검지 방법 |
EP12767795.3A EP2696537B1 (en) | 2011-04-04 | 2012-03-28 | Network system, switch, and connection terminal detection method |
CN201280017014.3A CN103477593B (zh) | 2011-04-04 | 2012-03-28 | 网络系统、交换机和连接终端检测方法 |
JP2013508826A JP5652630B2 (ja) | 2011-04-04 | 2012-03-28 | ネットワークシステム、スイッチ、及び接続端末検知方法 |
BR112013025528A BR112013025528A2 (pt) | 2011-04-04 | 2012-03-28 | sistema de rede, comutador e método de detecção de terminal conectado |
ES12767795.3T ES2607106T3 (es) | 2011-04-04 | 2012-03-28 | Sistema de red, conmutador y método de detección de terminal conectado |
RU2013148947/08A RU2583745C2 (ru) | 2011-04-04 | 2012-03-28 | Сетевая система, коммутатор и способ обнаружения подсоединенного терминала |
CA2832019A CA2832019A1 (en) | 2011-04-04 | 2012-03-28 | Network system, switch and connected terminal detection method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011082765 | 2011-04-04 | ||
JP2011-082765 | 2011-04-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012137646A1 true WO2012137646A1 (ja) | 2012-10-11 |
Family
ID=46969047
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2012/058150 WO2012137646A1 (ja) | 2011-04-04 | 2012-03-28 | ネットワークシステム、スイッチ、及び接続端末検知方法 |
Country Status (10)
Country | Link |
---|---|
US (1) | US9444743B2 (ja) |
EP (1) | EP2696537B1 (ja) |
JP (1) | JP5652630B2 (ja) |
KR (1) | KR101501397B1 (ja) |
CN (1) | CN103477593B (ja) |
BR (1) | BR112013025528A2 (ja) |
CA (1) | CA2832019A1 (ja) |
ES (1) | ES2607106T3 (ja) |
RU (1) | RU2583745C2 (ja) |
WO (1) | WO2012137646A1 (ja) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103209121A (zh) * | 2013-03-15 | 2013-07-17 | 中兴通讯股份有限公司 | 基于开放流协议的控制面设备的发现处理方法及装置 |
CN103501246A (zh) * | 2013-09-27 | 2014-01-08 | 迈普通信技术股份有限公司 | 查找终端设备的上联采集设备和上联端口的方法及装置 |
JP2014127768A (ja) * | 2012-12-25 | 2014-07-07 | Nec Corp | 通信ノード、制御装置、通信システム、エントリ集約方法及びプログラム |
CN104079506A (zh) * | 2014-07-18 | 2014-10-01 | 国家电网公司 | 一种基于地理位置信息的交换机端口三层管理架构及其应用 |
WO2014173235A1 (zh) * | 2013-04-22 | 2014-10-30 | 华为技术有限公司 | 转发路径的生成方法、控制器和系统 |
JP2015133556A (ja) * | 2014-01-10 | 2015-07-23 | 富士通株式会社 | 制御装置および転送制御方法 |
WO2015175359A1 (en) * | 2014-05-13 | 2015-11-19 | Adtran, Inc. | Detecting and disabling rogue access points in a network |
US9270618B2 (en) | 2013-02-28 | 2016-02-23 | International Business Machines Corporation | Source routing with fabric switches in an ethernet fabric network |
JP2020099058A (ja) * | 2015-09-15 | 2020-06-25 | グーグル エルエルシー | コンピュータネットワークにおいてパケットを処理するためのシステムおよび方法 |
Families Citing this family (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9191327B2 (en) | 2011-02-10 | 2015-11-17 | Varmour Networks, Inc. | Distributed service processing of network gateways using virtual machines |
US10333827B2 (en) * | 2012-04-11 | 2019-06-25 | Varmour Networks, Inc. | Adaptive session forwarding following virtual machine migration detection |
CN103905577A (zh) * | 2012-12-28 | 2014-07-02 | 中兴通讯股份有限公司 | 一种地址解析协议报文的处理方法和系统 |
CN104471538B (zh) * | 2013-07-15 | 2017-09-29 | 华为技术有限公司 | 一种数据流处理方法、设备和系统 |
US9973472B2 (en) | 2015-04-02 | 2018-05-15 | Varmour Networks, Inc. | Methods and systems for orchestrating physical and virtual switches to enforce security boundaries |
US10091238B2 (en) | 2014-02-11 | 2018-10-02 | Varmour Networks, Inc. | Deception using distributed threat detection |
US10264025B2 (en) | 2016-06-24 | 2019-04-16 | Varmour Networks, Inc. | Security policy generation for virtualization, bare-metal server, and cloud computing environments |
US20150341377A1 (en) * | 2014-03-14 | 2015-11-26 | Avni Networks Inc. | Method and apparatus to provide real-time cloud security |
US9680708B2 (en) | 2014-03-14 | 2017-06-13 | Veritas Technologies | Method and apparatus for cloud resource delivery |
CN104301446B (zh) * | 2014-08-08 | 2019-04-09 | 新华三技术有限公司 | 一种报文处理方法、交换机设备及系统 |
CN104219150B (zh) * | 2014-09-03 | 2018-03-16 | 新华三技术有限公司 | 流表下发方法及装置 |
CN104283738B (zh) * | 2014-10-11 | 2018-07-17 | 新华三技术有限公司 | 一种链路检测方法及设备 |
CN104320340A (zh) * | 2014-10-21 | 2015-01-28 | 杭州华三通信技术有限公司 | 软件定义网络中学习源mac地址的方法和装置 |
US9294442B1 (en) | 2015-03-30 | 2016-03-22 | Varmour Networks, Inc. | System and method for threat-driven security policy controls |
US10193929B2 (en) | 2015-03-13 | 2019-01-29 | Varmour Networks, Inc. | Methods and systems for improving analytics in distributed networks |
US9380027B1 (en) | 2015-03-30 | 2016-06-28 | Varmour Networks, Inc. | Conditional declarative policies |
US10009381B2 (en) | 2015-03-30 | 2018-06-26 | Varmour Networks, Inc. | System and method for threat-driven security policy controls |
US9525697B2 (en) | 2015-04-02 | 2016-12-20 | Varmour Networks, Inc. | Delivering security functions to distributed networks |
CN104869125B (zh) * | 2015-06-09 | 2020-04-17 | 上海斐讯数据通信技术有限公司 | 基于sdn的动态防mac地址欺骗方法 |
CN104917640B (zh) * | 2015-06-12 | 2017-11-24 | 国家电网公司 | 一种与接入点对应的交换机端口的定位方法 |
US10191758B2 (en) | 2015-12-09 | 2019-01-29 | Varmour Networks, Inc. | Directing data traffic between intra-server virtual machines |
US9680852B1 (en) | 2016-01-29 | 2017-06-13 | Varmour Networks, Inc. | Recursive multi-layer examination for computer network security remediation |
US9762599B2 (en) | 2016-01-29 | 2017-09-12 | Varmour Networks, Inc. | Multi-node affinity-based examination for computer network security remediation |
US9521115B1 (en) | 2016-03-24 | 2016-12-13 | Varmour Networks, Inc. | Security policy generation using container metadata |
US10755334B2 (en) | 2016-06-30 | 2020-08-25 | Varmour Networks, Inc. | Systems and methods for continually scoring and segmenting open opportunities using client data and product predictors |
US10560407B2 (en) * | 2016-10-06 | 2020-02-11 | Sap Se | Payload description for computer messaging |
KR20180056895A (ko) * | 2016-11-21 | 2018-05-30 | 고려대학교 산학협력단 | Sdn의 방화벽 응용의 검증시스템 및 그 검증방법 |
KR101926987B1 (ko) * | 2017-07-11 | 2018-12-07 | 사단법인 엑시콘산학공동연구소 | 반도체 메모리 디바이스를 테스트 하기 위한 테스트 시스템 및 방법 |
US11863580B2 (en) | 2019-05-31 | 2024-01-02 | Varmour Networks, Inc. | Modeling application dependencies to identify operational risk |
US11711374B2 (en) | 2019-05-31 | 2023-07-25 | Varmour Networks, Inc. | Systems and methods for understanding identity and organizational access to applications within an enterprise environment |
US11575563B2 (en) | 2019-05-31 | 2023-02-07 | Varmour Networks, Inc. | Cloud security management |
US11310284B2 (en) | 2019-05-31 | 2022-04-19 | Varmour Networks, Inc. | Validation of cloud security policies |
US11290493B2 (en) | 2019-05-31 | 2022-03-29 | Varmour Networks, Inc. | Template-driven intent-based security |
US11290494B2 (en) | 2019-05-31 | 2022-03-29 | Varmour Networks, Inc. | Reliability prediction for cloud security policies |
CN111107021A (zh) * | 2019-11-22 | 2020-05-05 | 广东工业大学 | 一种信息流路径的确定方法、装置、设备和存储介质 |
CN111555981A (zh) * | 2020-04-03 | 2020-08-18 | 深圳震有科技股份有限公司 | 一种数据传输方法、交换机及存储介质 |
CN111726305B (zh) * | 2020-06-18 | 2021-03-16 | 广州市品高软件股份有限公司 | 一种面向虚拟机的多级流表管控方法及系统 |
US11818152B2 (en) | 2020-12-23 | 2023-11-14 | Varmour Networks, Inc. | Modeling topic-based message-oriented middleware within a security system |
US11876817B2 (en) | 2020-12-23 | 2024-01-16 | Varmour Networks, Inc. | Modeling queue-based message-oriented middleware relationships in a security system |
US11777978B2 (en) | 2021-01-29 | 2023-10-03 | Varmour Networks, Inc. | Methods and systems for accurately assessing application access risk |
US12050693B2 (en) | 2021-01-29 | 2024-07-30 | Varmour Networks, Inc. | System and method for attributing user behavior from multiple technical telemetry sources |
US11734316B2 (en) | 2021-07-08 | 2023-08-22 | Varmour Networks, Inc. | Relationship-based search in a computing environment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003324468A (ja) * | 2002-05-08 | 2003-11-14 | Hitachi Ltd | データ転送システム及びノード装置 |
JP2009239625A (ja) * | 2008-03-27 | 2009-10-15 | Fujitsu Ltd | ユーザ現在地検索装置、ユーザ現在地検索システム、ユーザ現在地検索方法、およびコンピュータプログラム |
JP2011082765A (ja) | 2009-10-06 | 2011-04-21 | Hitachi Chem Co Ltd | 電子機器、送受信部間の接続方法及びフィルム状配線 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7453801B2 (en) * | 2001-11-08 | 2008-11-18 | Qualcomm Incorporated | Admission control and resource allocation in a communication system supporting application flows having quality of service requirements |
KR100425745B1 (ko) * | 2001-11-24 | 2004-04-06 | 엘지전자 주식회사 | 패킷의 헤더압축을 지원하는 통신 시스템에서 패킷의전송방법 |
JP2004153775A (ja) * | 2002-09-03 | 2004-05-27 | Ntt Docomo Inc | 送受信制御装置、送受信制御方法および送受信制御プログラム |
JP2007318432A (ja) | 2006-05-25 | 2007-12-06 | Kyowa Exeo Corp | ネットワーク端末位置情報取得方法およびシステム |
EP1976195B1 (en) | 2007-03-30 | 2014-05-07 | Alcatel-Lucent | Method and apparatus for Mac address learning |
EP2597816B1 (en) * | 2007-09-26 | 2019-09-11 | Nicira Inc. | Network operating system for managing and securing networks |
JP2009094832A (ja) * | 2007-10-10 | 2009-04-30 | Nec Access Technica Ltd | マルチキャストデータ配信装置、その配信方法およびその配信制御プログラム |
GB2461955A (en) * | 2008-07-25 | 2010-01-27 | Gnodal Ltd | Ethernet bridge or router employing a distributed MAC address table |
JP5408243B2 (ja) | 2009-03-09 | 2014-02-05 | 日本電気株式会社 | OpenFlow通信システムおよびOpenFlow通信方法 |
CN104683146B (zh) | 2009-10-07 | 2019-05-07 | 日本电气株式会社 | 控制装置、信息系统以及控制方法 |
EP2572473B1 (en) * | 2010-05-19 | 2014-02-26 | Telefonaktiebolaget L M Ericsson (PUBL) | Methods and apparatus for use in an openflow network |
US8897134B2 (en) * | 2010-06-25 | 2014-11-25 | Telefonaktiebolaget L M Ericsson (Publ) | Notifying a controller of a change to a packet forwarding configuration of a network element over a communication channel |
US8619546B2 (en) * | 2010-08-17 | 2013-12-31 | Alcatel Lucent | Method and apparatus for coping with link failures in central control plane architectures |
US20120099591A1 (en) * | 2010-10-26 | 2012-04-26 | Dell Products, Lp | System and Method for Scalable Flow Aware Network Architecture for Openflow Based Network Virtualization |
US9001827B2 (en) * | 2010-12-17 | 2015-04-07 | Big Switch Networks, Inc. | Methods for configuring network switches |
-
2012
- 2012-03-28 CN CN201280017014.3A patent/CN103477593B/zh not_active Expired - Fee Related
- 2012-03-28 JP JP2013508826A patent/JP5652630B2/ja active Active
- 2012-03-28 CA CA2832019A patent/CA2832019A1/en not_active Abandoned
- 2012-03-28 WO PCT/JP2012/058150 patent/WO2012137646A1/ja active Application Filing
- 2012-03-28 RU RU2013148947/08A patent/RU2583745C2/ru not_active IP Right Cessation
- 2012-03-28 KR KR1020137025960A patent/KR101501397B1/ko not_active IP Right Cessation
- 2012-03-28 ES ES12767795.3T patent/ES2607106T3/es active Active
- 2012-03-28 BR BR112013025528A patent/BR112013025528A2/pt not_active IP Right Cessation
- 2012-03-28 US US14/009,677 patent/US9444743B2/en active Active
- 2012-03-28 EP EP12767795.3A patent/EP2696537B1/en not_active Not-in-force
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003324468A (ja) * | 2002-05-08 | 2003-11-14 | Hitachi Ltd | データ転送システム及びノード装置 |
JP2009239625A (ja) * | 2008-03-27 | 2009-10-15 | Fujitsu Ltd | ユーザ現在地検索装置、ユーザ現在地検索システム、ユーザ現在地検索方法、およびコンピュータプログラム |
JP2011082765A (ja) | 2009-10-06 | 2011-04-21 | Hitachi Chem Co Ltd | 電子機器、送受信部間の接続方法及びフィルム状配線 |
Non-Patent Citations (2)
Title |
---|
OPENFLOW SWITCH SPECIFICATION, VERSION 1.0.0, 31 December 2009 (2009-12-31), Retrieved from the Internet <URL:http://www.openflowswitch.org/documents/ openflow-spec-vl.0.0.pdf> |
See also references of EP2696537A4 |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014127768A (ja) * | 2012-12-25 | 2014-07-07 | Nec Corp | 通信ノード、制御装置、通信システム、エントリ集約方法及びプログラム |
US9270618B2 (en) | 2013-02-28 | 2016-02-23 | International Business Machines Corporation | Source routing with fabric switches in an ethernet fabric network |
US9680746B2 (en) | 2013-02-28 | 2017-06-13 | International Business Machines Corporation | Source routing with fabric switches in an ethernet fabric network |
CN103209121A (zh) * | 2013-03-15 | 2013-07-17 | 中兴通讯股份有限公司 | 基于开放流协议的控制面设备的发现处理方法及装置 |
WO2014139276A1 (zh) * | 2013-03-15 | 2014-09-18 | 中兴通讯股份有限公司 | 基于开放流协议的控制面设备的发现处理方法及装置 |
WO2014173235A1 (zh) * | 2013-04-22 | 2014-10-30 | 华为技术有限公司 | 转发路径的生成方法、控制器和系统 |
CN103501246A (zh) * | 2013-09-27 | 2014-01-08 | 迈普通信技术股份有限公司 | 查找终端设备的上联采集设备和上联端口的方法及装置 |
JP2015133556A (ja) * | 2014-01-10 | 2015-07-23 | 富士通株式会社 | 制御装置および転送制御方法 |
WO2015175359A1 (en) * | 2014-05-13 | 2015-11-19 | Adtran, Inc. | Detecting and disabling rogue access points in a network |
US9439131B2 (en) | 2014-05-13 | 2016-09-06 | Adtran, Inc. | Detecting and disabling rogue access points in a network |
CN104079506A (zh) * | 2014-07-18 | 2014-10-01 | 国家电网公司 | 一种基于地理位置信息的交换机端口三层管理架构及其应用 |
JP2020099058A (ja) * | 2015-09-15 | 2020-06-25 | グーグル エルエルシー | コンピュータネットワークにおいてパケットを処理するためのシステムおよび方法 |
Also Published As
Publication number | Publication date |
---|---|
CN103477593B (zh) | 2017-03-29 |
ES2607106T3 (es) | 2017-03-29 |
EP2696537B1 (en) | 2016-09-28 |
KR20130126730A (ko) | 2013-11-20 |
RU2583745C2 (ru) | 2016-05-10 |
RU2013148947A (ru) | 2015-05-10 |
EP2696537A1 (en) | 2014-02-12 |
US20140022894A1 (en) | 2014-01-23 |
CA2832019A1 (en) | 2012-10-11 |
CN103477593A (zh) | 2013-12-25 |
BR112013025528A2 (pt) | 2016-12-27 |
JP5652630B2 (ja) | 2015-01-14 |
EP2696537A4 (en) | 2014-09-03 |
KR101501397B1 (ko) | 2015-03-12 |
JPWO2012137646A1 (ja) | 2014-07-28 |
US9444743B2 (en) | 2016-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5652630B2 (ja) | ネットワークシステム、スイッチ、及び接続端末検知方法 | |
US9548933B2 (en) | Network system, switch, and methods of network configuration | |
JP5660211B2 (ja) | 通信経路制御システム、及び通信経路制御方法 | |
JP5610247B2 (ja) | ネットワークシステム、及びポリシー経路設定方法 | |
JP5842933B2 (ja) | ネットワークシステム、及び経路情報同期方法 | |
EP2765742B1 (en) | Load reduction system, and load reduction method | |
WO2012033117A1 (ja) | ネットワークシステム、及びネットワーク管理方法 | |
WO2012096131A1 (ja) | ネットワークシステム、及び経路制御方法 | |
JP5682846B2 (ja) | ネットワークシステム、パケット処理方法、及び記憶媒体 | |
WO2012098779A1 (ja) | ネットワークシステム、コントローラ、及びQoS制御方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12767795 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2013508826 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20137025960 Country of ref document: KR Kind code of ref document: A Ref document number: 2832019 Country of ref document: CA |
|
REEP | Request for entry into the european phase |
Ref document number: 2012767795 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012767795 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14009677 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2013148947 Country of ref document: RU Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112013025528 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112013025528 Country of ref document: BR Kind code of ref document: A2 Effective date: 20131003 |