WO2011162215A1 - 通信システム、制御装置、ノードの制御方法およびプログラム - Google Patents
通信システム、制御装置、ノードの制御方法およびプログラム Download PDFInfo
- Publication number
- WO2011162215A1 WO2011162215A1 PCT/JP2011/064080 JP2011064080W WO2011162215A1 WO 2011162215 A1 WO2011162215 A1 WO 2011162215A1 JP 2011064080 W JP2011064080 W JP 2011064080W WO 2011162215 A1 WO2011162215 A1 WO 2011162215A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- processing rule
- rule
- node
- processing
- management unit
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000004891 communication Methods 0.000 title claims description 34
- 238000012545 processing Methods 0.000 claims abstract description 295
- 238000012217 deletion Methods 0.000 claims abstract description 89
- 230000037430 deletion Effects 0.000 claims abstract description 61
- 230000008569 process Effects 0.000 claims abstract description 21
- 230000009471 action Effects 0.000 abstract description 14
- 238000012546 transfer Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/56—Routing software
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/20—Traffic policing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/44—Star or tree networks
Definitions
- the present invention is based on the priority claim of Japanese patent application: Japanese Patent Application No. 2010-142511 (filed on June 23, 2010), the entire contents of which are incorporated herein by reference. Shall.
- the present invention relates to a communication system, a control device, a node control method, and a program, and more particularly, to a communication system, a control device, and a node control including a node that processes a received packet according to a processing rule having a matching rule that matches the received packet. It relates to a method and a program.
- OpenFlow captures communication as an end-to-end flow and performs path control, failure recovery, load balancing, and optimization on a per-flow basis.
- the OpenFlow switch includes a secure channel for communication with the OpenFlow controller, and operates according to a flow table that is appropriately added or rewritten by the OpenFlow controller.
- a set of a collation rule (FlowKey / matching key) that collates with the packet header, an action (Actions) that defines processing contents, and flow statistical information (Stats) is defined (FIG. 7).
- FIG. 8 illustrates action names and action contents defined in Non-Patent Document 2.
- OUTPUT is an action for outputting a packet to a designated port (interface).
- SET_VLAN_VID to SET_TP_DST are actions for modifying the field of the packet header.
- the OpenFlow switch when it receives the first packet (first packet), it searches the flow table for an entry having a matching rule (FlowKey) that matches the header information of the received packet. When an entry that matches the received packet is found as a result of the search, the OpenFlow switch performs the processing content described in the action field of the entry on the received packet. On the other hand, if no entry matching the received packet is found as a result of the search, the OpenFlow switch forwards the received packet to the OpenFlow controller via the secure channel, and the source / destination of the received packet. To request the determination of the route of the packet based on the above, receive the flow entry that realizes this, and update the flow table.
- FlowKey matching rule
- the OpenFlow controllers of Non-Patent Documents 1 and 2 collect flow statistical information (Stats) from OpenFlow switches that operate as described above, and depending on the communication policy and the network load status at that time, It is possible to dynamically set a route (a flow entry (processing rule) that realizes the route) for the OpenFlow switch, and to perform route control, load distribution, and the like according to the communication policy.
- the setting, change, and deletion of the flow entry in the OpenFlow switch are performed by the OpenFlow protocol of Non-Patent Documents 1 and 2 (see “4.6 Flow Table Modification Messages” of Non-Patent Document 2).
- Patent Document 1 includes the layer 3 device including an IP multicast table and a label multicast table, and a layer 2 switch including the label multicast table, and the output port of the layer 2 switch from the layer 3 device.
- IP multicast control system characterized in that it is possible to specify the IP address
- a multicast control method is disclosed. Specifically, when a multicast frame to which a multicast label is attached is received, the label multicast table in the layer 3 device is referred to, a transmission port is determined from the multicast label, and the multicast label is added to the label multicast table.
- a layer 2 switch that deletes a multicast label and transmits a multicast frame is disclosed.
- STP Shorting Tree Protocol
- flow entry processing rule
- the present invention has been made in view of the above circumstances, and its object is to provide a control device that sets processing rules (flow entries) in each node, such as an OpenFlow controller and an OpenFlow switch.
- processing rules flow entries
- the flow entry (processing rule) of the node grasped by the control device and the flow entry (processing rule) actually held by these nodes are not executed due to unintended action or loop failure. It is an object to provide a communication system, a control device, a node control method, and a program that can reduce the occurrence of the problem.
- a node that processes a received packet in accordance with a processing rule that defines a matching rule and processing of a packet that conforms to the matching rule, and requesting the node to delete the processing rule
- a processing rule that defines a matching rule and processing of a packet that conforms to the matching rule
- the deletion request history management unit refers to the deletion request history management unit to determine a processing rule having a matching rule that conflicts with the new processing rule. If there is a processing rule search unit to search and a processing rule having a matching rule that conflicts with the new processing rule, the node is requested again to delete the processing rule having a matching rule that conflicts with the new processing rule.
- a communication system including a processing rule setting unit.
- a node that processes a received packet in accordance with a processing rule that defines a matching rule and processing of a packet that conforms to the matching rule is connected, and the processing rule is deleted from the node.
- a deletion request history management unit that holds a history of requesting a request, and a collation rule that conflicts with the new processing rule with reference to the deletion request history management unit when setting a new processing rule for the node If a processing rule having a matching rule that conflicts with the new processing rule exists in the processing rule search unit that searches for a processing rule and the deletion request history management unit, a matching that conflicts with the new processing rule for the node
- a control device including a processing rule setting unit that requests deletion of a processing rule having a rule again.
- the node is connected to a node that processes a received packet according to a processing rule that defines a matching rule and a packet processing that conforms to the matching rule, and sets the processing rule for the node.
- a method of controlling a node by a control device the step of keeping a history of requesting the node to delete a processing rule, and when setting a new processing rule for the node, A process rule having a matching rule that conflicts with the new processing rule in the history, and a search rule that has a matching rule that conflicts with the new processing rule. Requesting the node again to delete a processing rule having a matching rule that conflicts with the new processing rule.
- This method is linked to a specific machine called a control device that sets processing rules for the above-described nodes.
- the node is connected to a node that processes a received packet in accordance with a processing rule that defines a matching rule and processing of a packet that conforms to the matching rule, and the processing rule is set for the node.
- a program to be executed by a computer constituting a control device the process of holding a history of requesting deletion of a processing rule for the node, and when setting a new processing rule for the node, Referring to the history of requesting the processing rule to be deleted from the node, searching for a processing rule having a matching rule that conflicts with the new processing rule, and having a matching rule that conflicts with the new processing rule in the history If a processing rule exists, a process of requesting the node again to delete a processing rule having a matching rule that conflicts with the new processing rule is executed.
- Program to be executed by Yuta is provided.
- This program can be recorded on a computer-readable storage medium. That is, the present invention can be embodied as a computer program product.
- FIG. 1 It is a figure for demonstrating the outline
- the control device (controller) 100 When communication is performed between the external node 310 and the external node 320 at the communication end point in FIG. 1, the control device (controller) 100 includes only a node group (nodes 210 to 240 in the example of FIG. 1) arranged in the network. A route according to the figure is calculated, and a processing rule (flow entry) for realizing the route is set in each node.
- control device (controller) 100 calculates a route for transferring packets in the order of the node 210, the node 240, the node 220, and the node 230, and is addressed to the node 240 from the external node 310 to the external node 320.
- a processing rule (Old rule) for outputting a packet from a port connected to the node 220 has been set.
- control device (controller) 100 determines the transfer path of the packet addressed from the external node 310 to the external node 320 based on the load of the nodes 210 to 240, the communication policy, and the like.
- the processing rule (Old rule) held in the node 240 is deleted and a new processing rule (New rule) is set.
- the processing rule for transferring the packet from the node 220 set in the node 220 to the node 240 is as follows: Due to the combination, a packet transmitted from the external node 310 to the external node 320 falls into a loop failure between the node 220 and the node 240.
- control device (controller) 100 manages a history of requesting a node to delete a processing rule (flow entry) in the past, and sets a new processing rule (flow entry) from this history. Then, a processing rule (flow entry) that conflicts with the new processing rule (flow entry) is searched, and the node 240 is requested to delete again (“Delete / Request Old Rule”). As a result, the processing rule (Old rule) is deleted, and the possibility of occurrence of a loop failure is reduced in combination with a new processing rule (flow entry) from the node 220 to the node 240.
- the processing rule (flow entry) held in the node 240 matches the content grasped by the control device (controller) 100, and the occurrence frequency of the loop fault can be suppressed.
- FIG. 2 is a diagram showing the configuration of the first exemplary embodiment of the present invention.
- a plurality of nodes nodes 210 to 240 are illustrated
- processing rules flow entries
- control for setting processing rules (flow entries) in these nodes.
- a device (controller) 100 and external nodes 310 and 320 are shown.
- FIG. 3 is a block diagram showing a detailed configuration of the control device (controller) 100 of FIG. 3, the control device (controller) 100 includes a processing rule creation unit 101, a processing rule setting unit 102, a processing rule search unit 103, a node information management unit 104, a processing rule management unit 105, and a deletion.
- a request history management unit 106 and an event information reception processing unit 109 are provided.
- the processing rule creation unit 101 creates a processing rule (flow entry) in response to a request from the node. More specifically, when the processing rule management unit 105 holds a processing rule (flow entry) corresponding to the packet requested from the node, the processing rule creation unit 101 sets the set processing rule (flow). Entry) is output to the processing rule search unit 103. On the other hand, when the processing rule (flow entry) corresponding to the packet requested from the node is not held in the processing rule management unit 105, the processing rule creation unit 101 performs communication held in the node information management unit 104.
- the processing rule search unit 103 deletes a deletion requested processing rule (flow entry) that causes a loop failure or the like in combination with the processing rule (flow entry) output from the processing rule creation unit 101 from the deletion request history management unit 106. ) This search conflicts with a new processing rule (flow entry) created by the processing rule creation unit 101 from among the deletion requested processing rules (flow entry) of the corresponding node held in the deletion request history management unit 106. This can be realized by searching for a processing rule having a matching rule (matching key). As a result of the search, when a deletion requested processing rule (flow entry) that requires a re-deletion request is found, the processing rule search unit 103 instructs the processing rule setting unit 102 to process the node (flow entry). Request a re-deletion request for.
- the processing rule setting unit 102 requests the relevant node to add a new processing rule (flow entry) created by the processing rule creation unit 101, or to delete a processing rule (flow entry) that has become unnecessary. I do. Further, the processing rule setting unit 102 adds a deletion history to the deletion request history management unit 106 when making a deletion request for a processing rule (flow entry) that has become unnecessary. Further, the processing rule setting unit 102 updates the contents of the processing rule management unit 105 in accordance with the additional setting or deletion of the processing rule.
- the node information management unit 104 manages communication policies related to setting of processing rules (flow entries) and communication load information of each node arranged in the network.
- the node information management unit 104 holds the connection relationship (topology information) of each node, and the processing rule creation unit 101 refers to the topology information in addition to the communication policy and communication load, and forwards the packet. It is good also as what creates.
- the processing rule management unit 105 manages processing rules (flow entries) set in each node in response to processing rule (flow entry) addition setting requests and deletion requests by the processing rule setting unit 102.
- processing rule (flow entry) corresponding to a packet for which setting of the processing rule (flow entry) is requested because the processing rule (flow entry) has not been set is held in the processing rule management unit 105
- the processing rule The creation unit 101 can read a processing rule (flow entry) from the processing rule management unit 105 and reuse it.
- the deletion request history management unit 106 manages a deletion requested processing rule (flow entry) for which a processing rule deletion request has been made from the processing rule setting unit 102 as a history.
- the event information reception processing unit 109 receives a processing rule setting request from each node as event information and transfers it to the processing rule creation unit 101.
- control device (controller) 100 holds a processing rule (flow entry) requested to be deleted from a certain node as a history, and causes a loop failure or the like in combination with the new processing rule (flow entry). If there is a processing rule (flow entry) that becomes, the node is requested to delete the processing rule (flow entry) again.
- the control device (controller) 100 as described above is realized by a configuration in which the processing rule search unit 103 and the deletion request history management unit 106 are added based on the OpenFlow controller of Non-Patent Documents 1 and 2. Is also possible.
- each unit of the control device (controller) 100 as described above causes the computer constituting the control device (controller) 100 to use the hardware including the storage device and the processing rule (flow entry) that has been requested to be deleted as described above.
- This can be realized by a program that executes a storage rule search process, a process rule (flow entry) search process for requesting deletion again, and the like.
- the nodes 210 to 240 in FIGS. 2 and 3 are described as open-flow switches in Non-Patent Documents 1 and 2, but other switches can be used as long as they have equivalent functions. It is also possible to use a router or the like.
- FIG. 4 is a flowchart showing the operation of the control device (controller) according to the first embodiment of the present invention.
- the control device (controller) 100 receives a processing rule (flow entry) setting request (Packet-In) together with the packet from the node 210 that first received the packet from the external node 310 (step S1001). ).
- the processing rule creation unit 101 of the control device (controller) 100 receives the communication policy held in the node information management unit 104 and each node arranged in the network. With reference to the communication load information, a processing rule (flow entry) corresponding to the packet requested from the node is created (step S1002).
- the processing rule management unit 105 holds a processing rule (flow entry) corresponding to the packet requested from the node, the processing rule (flow entry) held in the processing rule management unit 105 is stored. Use it.
- the processing rule creation unit 101 of the control device (controller) 100 refers to the communication policy held in the node information management unit 104 and the communication load information of each node arranged in the network, and determines the packet transfer route.
- the processing rule (flow entry) that realizes the transfer route is calculated and output to the processing rule search unit 103.
- the processing rule search unit 103 of the control device (controller) 100 receives the processing rule (flow entry) from the processing rule creation unit 101, the processing rule search unit 103 performs a loop based on the combination with the processing rule (flow entry) from the deletion request history management unit 106.
- a search-required processing rule (flow entry) that causes a failure or the like and that has a conflicting collation rule is searched (step S1003).
- the processing rule setting unit 102 When the processing rule (flow entry) requested to be deleted that conflicts with the processing rule (flow entry) output from the processing rule creation unit 101 is not found (No in step S1004), the processing rule setting unit 102 The node is requested to set the processing rule (flow entry) output from the processing rule creation unit 101 via the processing rule search unit 103 (step S1006).
- processing rule setting is performed.
- the unit 102 requests the corresponding node again to delete the deletion requested processing rule (flow entry) that may cause the loop failure or the like (step S1005).
- the processing rule setting unit 102 sends the deletion requested processing rule ("Old rule" in FIG. 1) to the node 240.
- the deletion is requested again (step S1005).
- the processing rule setting unit 102 requests the deletion request history management unit 106 to delete the processing rule ( Flow entry).
- the processing rule setting unit 102 After requesting the re-deletion of the processing rule (flow entry), the processing rule setting unit 102 outputs the processing rule (flow entry) output from the processing rule creation unit 101 via the processing rule search unit 103 to the corresponding node. Is requested (step S1006).
- processing rule setting unit 102 registers the additionally set processing rule (flow entry) in the processing rule management unit 105.
- Non-Patent Documents 1 and 2 it is possible to suppress the occurrence frequency of loop faults and the like caused by remaining processing rules (flow entries) that should be deleted. Is possible.
- FIG. 5 is a block diagram showing the configuration of a control device (controller) according to the second embodiment of the present invention.
- the control device (controller) 100a according to the second embodiment provides a processing rule re-deletion policy management unit 107 to the control device (controller) 100 according to the first embodiment illustrated in FIG. 3. It has an added configuration.
- the processing rule re-deletion policy management unit 107 re-deletes a processing rule (flow entry) that has been requested to be deleted that will cause a loop failure or the like due to a combination with the processing rule (flow entry) output from the processing rule creation unit 101.
- a predetermined threshold may be a value common to the nodes 210 to 240 or may be set individually for each node.
- FIG. 6 is a flowchart showing the operation of the control device (controller) of the second embodiment of the present invention.
- the processing from step S1001 to step S1005 in FIG. 6 is the same as step S1001 to step S1005 in FIG. 4 for explaining the operation of the first embodiment.
- step S1005 when a re-deletion request for a deletion requested processing rule (flow entry) is executed, the processing rule re-deletion policy management unit 107 determines whether or not the number of consecutive re-deletion requests has reached the predetermined threshold. Is determined (step S1007).
- step S1007 when the number of consecutive re-deletion requests reaches a predetermined threshold value (Yes in step S1007), the processing rule re-deletion policy management unit 107 requests re-deletion from the deletion request history management unit 106 in step S1005.
- the processed processing rule (flow entry) is deleted (step S1008). Thereby, the request for re-deletion of the processing rule (flow entry) is suppressed from the next time.
- the processing rule setting unit 102 performs processing via the processing rule search unit 103 thereafter, as in the first embodiment.
- the setting of the processing rule (flow entry) output from the rule creating unit 101 is requested (step S1006).
- an upper limit is set for the number of re-deletion requests for the same processing rule (flow entry) for the same node, It becomes possible to suppress the occurrence of repeated situations.
- the processing rule re-deletion policy management unit 107 has been described as deleting the history of the deletion request history management unit 106 based on the number of consecutive re-deletion requests. It is also possible to delete a history from the deletion request history management unit 106 by setting a predetermined policy such as progress or exceeding the number of entries.
- the control devices (controllers) 100 and 100a of the above-described embodiments can be realized as dedicated servers.
- the nodes 210 to 240 include, in addition to the above-mentioned OpenFlow switch, routers in the IP network, MPLS (Multi-Protocol Label). It can be realized by an MPLS switch in a switching network.
- the server is a network that centrally manages the behavior of nodes in the network, the present invention can be applied.
- the control device further includes a processing rule re-deletion policy management unit that deletes a history from the deletion request history management unit based on a predetermined policy.
- the processing rule re-deletion policy management unit corresponds from the deletion request history management unit when the number of deletion requests of a processing rule that conflicts with the new processing rule by the processing rule setting unit reaches a predetermined threshold value. A communication system that deletes history.
- [Fourth form] In the communication system of the third form, A communication system using a threshold set for each node as the predetermined threshold. [Fifth embodiment] (Refer to the control device according to the second viewpoint) [Sixth embodiment] In the control device of the fifth aspect, And a processing rule re-deletion policy management unit that deletes the history from the deletion request history management unit based on a predetermined policy. [Seventh form] In the control device of the sixth aspect, The processing rule re-deletion policy management unit corresponds from the deletion request history management unit when the number of deletion requests of a processing rule that conflicts with the new processing rule by the processing rule setting unit reaches a predetermined threshold value. Control device that deletes history.
- Control device 101 processing rule creation unit 102 processing rule setting unit 103 processing rule search unit 104 node information management unit 105 processing rule management unit 106 deletion request history management unit 107 processing rule re-deletion policy management unit 109 event information reception processing unit 210 to 240 node 310 320 External node
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
本発明は、日本国特許出願:特願2010-142511号(2010年6月23日出願)の優先権主張に基づくものであり、同出願の全記載内容は引用をもって本書に組み込み記載されているものとする。
本発明は、通信システム、制御装置、ノードの制御方法およびプログラムに関し、特に、受信パケットに適合する照合規則を持つ処理規則に従って、受信パケットを処理するノードを含む通信システム、制御装置、ノードの制御方法およびプログラムに関する。
しかしながら、オープンフロースイッチにおけるフローエントリ(処理規則)の設定・変更・削除を繰り返し実行していくうちに、必要のなくなったフローエントリ(処理規則)の削除処理が不完全なまま残ってしまい、オープンフローコントローラ側で把握しているオープンフロースイッチのフローエントリ(処理規則)との状態不一致が発生することがある。さらには、この削除漏れのフローエントリ(処理規則)と新規設定したフローエントリ(処理規則)の組合せが原因となって、パケット廃棄、ヘッダ書換え等の意図しないアクションが実行されたり、ループ障害を引き起こすことも考えられる。
図2は、本発明の第1の実施形態の構成を表した図である。図2を参照すると、ネットワークに配置され、処理規則(フローエントリ)に従ってパケットの処理を行う複数のノード(ノード210~ノード240を図示)と、これらノードに処理規則(フローエントリ)を設定する制御装置(コントローラ)100と、外部ノード310、320とが示されている。
次に、本発明の第2の実施形態について図面を参照して説明する。本発明の第2の実施形態は、上記第1の実施形態をベースに、処理規則(フローエントリ)再削除の要求回数に上限を設けたものである。以下、第1の実施形態との相違点を中心に説明を加える。
[第1の形態]
(上記第1の視点による通信システム参照)
[第2の形態]
第1の形態の通信システムにおいて、
前記制御装置は、さらに、所定のポリシーに基づいて、前記削除要求履歴管理部から履歴を削除する処理規則再削除ポリシー管理部を備える通信システム。
[第3の形態]
第2の形態の通信システムにおいて、
前記処理規則再削除ポリシー管理部は、前記処理規則設定部による前記新しい処理規則と競合する処理規則の削除要求回数が所定のしきい値に達した場合に、前記削除要求履歴管理部から該当する履歴を削除する通信システム。
[第4の形態]
第3の形態の通信システムにおいて、
前記所定のしきい値として、ノード毎に設定されたしきい値を用いる通信システム。
[第5の形態]
(上記第2の視点による制御装置参照)
[第6の形態]
第5の形態の制御装置において、
さらに、所定のポリシーに基づいて、前記削除要求履歴管理部から履歴を削除する処理規則再削除ポリシー管理部を備える制御装置。
[第7の形態]
第6の形態の制御装置において、
前記処理規則再削除ポリシー管理部は、前記処理規則設定部による前記新しい処理規則と競合する処理規則の削除要求回数が所定のしきい値に達した場合に、前記削除要求履歴管理部から該当する履歴を削除する制御装置。
[第8の形態]
第7の形態の制御装置において、
前記所定のしきい値として、ノード毎に設定されたしきい値を用いる制御装置。
[第9の形態]
(上記第3の視点によるノードの制御方法参照)
[第10の形態]
(上記第4の視点によるプログラム参照)
なお、上記第9、第10の形態は、上記第1の形態と同様に、第2~第4の形態に展開することが可能である。
本発明の全開示(請求の範囲を含む)の枠内において、さらにその基本的技術思想に基づいて、実施形態の変更・調整が可能である。また、本発明の請求の範囲の枠内において種々の開示要素の多様な組み合わせないし選択が可能である。すなわち、本発明は、請求の範囲を含む全開示、技術的思想にしたがって当業者であればなし得るであろう各種変形、修正を含むことは勿論である。
101 処理規則作成部
102 処理規則設定部
103 処理規則検索部
104 ノード情報管理部
105 処理規則管理部
106 削除要求履歴管理部
107 処理規則再削除ポリシー管理部
109 イベント情報受信処理部
210~240 ノード
310、320 外部ノード
Claims (10)
- 照合規則と該照合規則に適合するパケットの処理とを規定した処理規則に従って受信パケットを処理するノードと、
前記ノードに対して処理規則の削除を要求した履歴を保持する削除要求履歴管理部と、前記ノードに対して新しい処理規則を設定する際に、前記削除要求履歴管理部を参照して、前記新しい処理規則と競合する照合規則を持つ処理規則を検索する処理規則検索部と、前記新しい処理規則と競合する照合規則を持つ処理規則が存在した場合、前記ノードに対して、前記新しい処理規則と競合する照合規則を持つ処理規則の削除を再度要求する処理規則設定部と、を備える制御装置と、
を含む通信システム。 - 前記制御装置は、さらに、所定のポリシーに基づいて、前記削除要求履歴管理部から履歴を削除する処理規則再削除ポリシー管理部を備える請求項1の通信システム。
- 前記処理規則再削除ポリシー管理部は、前記処理規則設定部による前記新しい処理規則と競合する処理規則の削除要求回数が所定のしきい値に達した場合に、前記削除要求履歴管理部から該当する履歴を削除する請求項2の通信システム。
- 前記所定のしきい値として、ノード毎に設定されたしきい値を用いる請求項3の通信システム。
- 照合規則と該照合規則に適合するパケットの処理とを規定した処理規則に従って受信パケットを処理するノードと、接続され、
前記ノードに対して処理規則の削除を要求した履歴を保持する削除要求履歴管理部と、
前記ノードに対して新しい処理規則を設定する際に、前記削除要求履歴管理部を参照して、前記新しい処理規則と競合する照合規則を持つ処理規則を検索する処理規則検索部と、
前記削除要求履歴管理部に前記新しい処理規則と競合する照合規則を持つ処理規則が存在した場合、前記ノードに対して、前記新しい処理規則と競合する照合規則を持つ処理規則の削除を再度要求する処理規則設定部と、を備える制御装置。 - さらに、所定のポリシーに基づいて、前記削除要求履歴管理部から履歴を削除する処理規則再削除ポリシー管理部を備える請求項5の制御装置。
- 前記処理規則再削除ポリシー管理部は、前記処理規則設定部による前記新しい処理規則と競合する処理規則の削除要求回数が所定のしきい値に達した場合に、前記削除要求履歴管理部から該当する履歴を削除する請求項6の制御装置。
- 前記所定のしきい値として、ノード毎に設定されたしきい値を用いる請求項7の制御装置。
- 照合規則と該照合規則に適合するパケットの処理とを規定した処理規則に従って受信パケットを処理するノードに接続され、前記ノードに対し前記処理規則を設定する制御装置によるノードの制御方法であって、
前記ノードに対して処理規則の削除を要求した履歴を保持しておくステップと、
前記ノードに対して新しい処理規則を設定する際に、前記ノードに対して処理規則の削除を要求した履歴を参照して、前記新しい処理規則と競合する照合規則を持つ処理規則を検索するステップと、
前記履歴中に新しい処理規則と競合する照合規則を持つ処理規則が存在した場合、前記ノードに対して、前記新しい処理規則と競合する照合規則を持つ処理規則の削除を再度要求するステップと、を含むノードの制御方法。 - 照合規則と該照合規則に適合するパケットの処理とを規定した処理規則に従って受信パケットを処理するノードに接続され、前記ノードに対し前記処理規則を設定する制御装置を構成するコンピュータに実行させるプログラムであって、
前記ノードに対して処理規則の削除を要求した履歴を保持しておく処理と、
前記ノードに対して新しい処理規則を設定する際に、前記ノードに対して処理規則の削除を要求した履歴を参照して、前記新しい処理規則と競合する照合規則を持つ処理規則を検索する処理と、
前記履歴中に新しい処理規則と競合する照合規則を持つ処理規則が存在した場合、前記ノードに対して、前記新しい処理規則と競合する照合規則を持つ処理規則の削除を再度要求する処理と、を前記コンピュータに実行させるプログラム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11798099.5A EP2587741B1 (en) | 2010-06-23 | 2011-06-20 | Communication system, control apparatus, node controlling method and node controlling program |
CN201180030760.1A CN103119900B (zh) | 2010-06-23 | 2011-06-20 | 通信系统、控制设备、节点控制方法和节点控制程序 |
US13/806,715 US9049150B2 (en) | 2010-06-23 | 2011-06-20 | Communication system, control apparatus, node controlling method and node controlling program |
JP2012521467A JP5304947B2 (ja) | 2010-06-23 | 2011-06-20 | 通信システム、制御装置、ノードの制御方法およびプログラム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-142511 | 2010-06-23 | ||
JP2010142511 | 2010-06-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011162215A1 true WO2011162215A1 (ja) | 2011-12-29 |
Family
ID=45371398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2011/064080 WO2011162215A1 (ja) | 2010-06-23 | 2011-06-20 | 通信システム、制御装置、ノードの制御方法およびプログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US9049150B2 (ja) |
EP (1) | EP2587741B1 (ja) |
JP (1) | JP5304947B2 (ja) |
CN (1) | CN103119900B (ja) |
WO (1) | WO2011162215A1 (ja) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102546351A (zh) * | 2012-03-15 | 2012-07-04 | 北京邮电大学 | openflow网络和现有IP网络互联的系统和方法 |
CN102857416A (zh) * | 2012-09-18 | 2013-01-02 | 中兴通讯股份有限公司 | 一种实现虚拟网络的方法和虚拟网络 |
WO2014027687A1 (ja) * | 2012-08-17 | 2014-02-20 | 日本電気株式会社 | 通信システム、制御情報記録装置、制御装置、制御情報の記録方法及びプログラム |
JP2014033464A (ja) * | 2013-10-18 | 2014-02-20 | Nec Corp | 無線通信端末、通信システム、制御装置、通信方法およびプログラム |
WO2014050143A1 (en) * | 2012-09-28 | 2014-04-03 | Nec Corporation | Communication system, control apparatus, control method, and program |
WO2014127517A1 (zh) * | 2013-02-21 | 2014-08-28 | 华为技术有限公司 | 报文处理方法、转发器、报文处理设备、报文处理系统 |
CN104852867A (zh) * | 2014-02-19 | 2015-08-19 | 华为技术有限公司 | 数据包转发方法、装置及系统 |
US20160028623A1 (en) * | 2012-04-10 | 2016-01-28 | International Business Machines Corporation | Switch routing table utilizing software defined network (sdn) controller programmed route segregation and prioritization |
JP2016048854A (ja) * | 2014-08-27 | 2016-04-07 | 横河電機株式会社 | データ転送システム及び方法 |
JP2017092996A (ja) * | 2017-02-22 | 2017-05-25 | 横河電機株式会社 | プロセス制御システム及びデータ転送方法 |
US9942821B2 (en) | 2012-02-07 | 2018-04-10 | Nec Corporation | Wireless communication terminal, communication system, control apparatus, communication method and program |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104641606B (zh) * | 2013-06-13 | 2017-11-17 | 华为技术有限公司 | 网络资源均衡处理的方法和虚拟网络管理实体 |
CN104426813A (zh) * | 2013-09-02 | 2015-03-18 | 中兴通讯股份有限公司 | 一种流表更新的控制方法、装置及控制器 |
CN104954271B (zh) * | 2014-03-26 | 2018-11-30 | 国际商业机器公司 | Sdn网络中的数据包处理方法和装置 |
CN104243270B (zh) * | 2014-09-25 | 2017-11-24 | 新华三技术有限公司 | 一种建立隧道的方法和装置 |
US10015048B2 (en) | 2014-12-27 | 2018-07-03 | Intel Corporation | Programmable protocol parser for NIC classification and queue assignments |
US9825862B2 (en) | 2015-08-26 | 2017-11-21 | Barefoot Networks, Inc. | Packet header field extraction |
US9912774B2 (en) | 2015-12-22 | 2018-03-06 | Intel Corporation | Accelerated network packet processing |
US11223520B1 (en) | 2017-01-31 | 2022-01-11 | Intel Corporation | Remote control plane directing data plane configurator |
US10694006B1 (en) | 2017-04-23 | 2020-06-23 | Barefoot Networks, Inc. | Generation of descriptive data for packet fields |
US11503141B1 (en) | 2017-07-23 | 2022-11-15 | Barefoot Networks, Inc. | Stateful processing unit with min/max capability |
US10771387B1 (en) | 2017-09-28 | 2020-09-08 | Barefoot Networks, Inc. | Multiple packet data container types for a processing pipeline |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010064532A1 (ja) * | 2008-12-02 | 2010-06-10 | 日本電気株式会社 | 通信ネットワーク管理システム、方法、プログラム、及び管理計算機 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7082102B1 (en) * | 2000-10-19 | 2006-07-25 | Bellsouth Intellectual Property Corp. | Systems and methods for policy-enabled communications networks |
JP2003348148A (ja) | 2002-05-28 | 2003-12-05 | Nippon Telegr & Teleph Corp <Ntt> | Ipマルチキャスト制御方法およびこれを用いるipマルチキャスト制御システム |
US6741595B2 (en) * | 2002-06-11 | 2004-05-25 | Netrake Corporation | Device for enabling trap and trace of internet protocol communications |
JP3886891B2 (ja) * | 2002-12-10 | 2007-02-28 | 富士通株式会社 | 通信システム、並びにその通信システムにおいて使用される通信装置およびネットワーク管理装置 |
US7706302B2 (en) | 2004-09-14 | 2010-04-27 | Alcatel Lucent | Optimization of routing forwarding database in a network processor |
JP4516397B2 (ja) * | 2004-10-05 | 2010-08-04 | 株式会社日立製作所 | レイヤ2スイッチ |
JP2006352831A (ja) * | 2005-05-20 | 2006-12-28 | Alaxala Networks Corp | ネットワーク制御装置およびその制御方法 |
JP2009508410A (ja) * | 2005-09-08 | 2009-02-26 | パナソニック株式会社 | マルチデスティネーション・ルーティングを利用したピアツーピア・オーバーレイ通信の並列実行 |
EP2582091B1 (en) * | 2007-09-26 | 2017-05-31 | Nicira Inc. | Network operating system for managing and securing networks |
JP4659850B2 (ja) * | 2008-04-10 | 2011-03-30 | 富士通株式会社 | ネットワーク監視プログラム、ネットワーク監視方法およびネットワーク監視装置 |
US8295284B1 (en) * | 2010-02-02 | 2012-10-23 | Cisco Technology, Inc. | Dynamic, conditon-based packet redirection |
-
2011
- 2011-06-20 JP JP2012521467A patent/JP5304947B2/ja not_active Expired - Fee Related
- 2011-06-20 WO PCT/JP2011/064080 patent/WO2011162215A1/ja active Application Filing
- 2011-06-20 US US13/806,715 patent/US9049150B2/en not_active Expired - Fee Related
- 2011-06-20 CN CN201180030760.1A patent/CN103119900B/zh not_active Expired - Fee Related
- 2011-06-20 EP EP11798099.5A patent/EP2587741B1/en not_active Not-in-force
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010064532A1 (ja) * | 2008-12-02 | 2010-06-10 | 日本電気株式会社 | 通信ネットワーク管理システム、方法、プログラム、及び管理計算機 |
Non-Patent Citations (2)
Title |
---|
See also references of EP2587741A4 * |
YOSHIHIKO KANAUMI ET AL.: "BS-10-4 The demonstration experience of OpenFlow on JGN2plus", PROCEEDINGS OF THE 2009 IEICE GENERAL CONFERENCE, TSUSHIN 2, 4 March 2009 (2009-03-04), pages S-135 - S-136, XP008156452 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9942821B2 (en) | 2012-02-07 | 2018-04-10 | Nec Corporation | Wireless communication terminal, communication system, control apparatus, communication method and program |
CN102546351A (zh) * | 2012-03-15 | 2012-07-04 | 北京邮电大学 | openflow网络和现有IP网络互联的系统和方法 |
US20160028623A1 (en) * | 2012-04-10 | 2016-01-28 | International Business Machines Corporation | Switch routing table utilizing software defined network (sdn) controller programmed route segregation and prioritization |
WO2014027687A1 (ja) * | 2012-08-17 | 2014-02-20 | 日本電気株式会社 | 通信システム、制御情報記録装置、制御装置、制御情報の記録方法及びプログラム |
CN102857416A (zh) * | 2012-09-18 | 2013-01-02 | 中兴通讯股份有限公司 | 一种实现虚拟网络的方法和虚拟网络 |
WO2013185715A1 (zh) * | 2012-09-18 | 2013-12-19 | 中兴通讯股份有限公司 | 一种实现虚拟网络的方法和虚拟网络 |
CN102857416B (zh) * | 2012-09-18 | 2016-09-28 | 中兴通讯股份有限公司 | 一种实现虚拟网络的方法、控制器和虚拟网络 |
WO2014050143A1 (en) * | 2012-09-28 | 2014-04-03 | Nec Corporation | Communication system, control apparatus, control method, and program |
JP2015530767A (ja) * | 2012-09-28 | 2015-10-15 | 日本電気株式会社 | 通信システム、制御装置、制御方法及びプログラム |
US9641397B2 (en) | 2012-09-28 | 2017-05-02 | Nec Corporation | Communication system, control apparatus, control method, and program |
CN104160735A (zh) * | 2013-02-21 | 2014-11-19 | 华为技术有限公司 | 发报文处理方法、转发器、报文处理设备、报文处理系统 |
WO2014127517A1 (zh) * | 2013-02-21 | 2014-08-28 | 华为技术有限公司 | 报文处理方法、转发器、报文处理设备、报文处理系统 |
US9800479B2 (en) | 2013-02-21 | 2017-10-24 | Huawei Technologies Co., Ltd. | Packet processing method, forwarder, packet processing device, and packet processing system |
CN104160735B (zh) * | 2013-02-21 | 2018-07-13 | 华为技术有限公司 | 发报文处理方法、转发器、报文处理设备、报文处理系统 |
JP2014033464A (ja) * | 2013-10-18 | 2014-02-20 | Nec Corp | 無線通信端末、通信システム、制御装置、通信方法およびプログラム |
CN104852867A (zh) * | 2014-02-19 | 2015-08-19 | 华为技术有限公司 | 数据包转发方法、装置及系统 |
CN104852867B (zh) * | 2014-02-19 | 2018-02-06 | 华为技术有限公司 | 数据包转发方法、装置及系统 |
US10135725B2 (en) | 2014-02-19 | 2018-11-20 | Huawei Technologies Co., Ltd. | Data packet forwarding method, apparatus, and system |
JP2016048854A (ja) * | 2014-08-27 | 2016-04-07 | 横河電機株式会社 | データ転送システム及び方法 |
JP2017092996A (ja) * | 2017-02-22 | 2017-05-25 | 横河電機株式会社 | プロセス制御システム及びデータ転送方法 |
Also Published As
Publication number | Publication date |
---|---|
EP2587741A4 (en) | 2014-01-15 |
JPWO2011162215A1 (ja) | 2013-08-22 |
EP2587741A1 (en) | 2013-05-01 |
CN103119900A (zh) | 2013-05-22 |
EP2587741B1 (en) | 2015-01-28 |
US20130100951A1 (en) | 2013-04-25 |
US9049150B2 (en) | 2015-06-02 |
CN103119900B (zh) | 2016-01-27 |
JP5304947B2 (ja) | 2013-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5304947B2 (ja) | 通信システム、制御装置、ノードの制御方法およびプログラム | |
JP5674107B2 (ja) | 通信システム、制御装置、処理規則の設定方法およびプログラム | |
US9426061B2 (en) | Communication system, node, control device, communication method, and program | |
CN102714628B (zh) | 通信系统、控制装置、处理规则设置方法和分组传输方法 | |
JP5850471B2 (ja) | 通信システム、制御装置、ノード制御方法およびプログラム | |
JP5590126B2 (ja) | 通信システム、制御装置、通信方法及びプログラム | |
JP5862769B2 (ja) | 通信システム、制御装置、通信方法及びプログラム | |
US20110307628A1 (en) | Communication system, node, control server, communication method and program | |
WO2011155510A1 (ja) | 通信システム、制御装置、パケットキャプチャ方法およびプログラム | |
WO2011118566A1 (ja) | パケット転送システム、制御装置、転送装置、処理規則の作成方法およびプログラム | |
US10171352B2 (en) | Communication system, node, control device, communication method, and program | |
CN104106244A (zh) | 控制装置、通信系统、通信方法和程序 | |
JPWO2012050071A1 (ja) | 通信システム、制御装置、処理規則の設定方法およびプログラム | |
WO2014017631A1 (ja) | 制御装置、通信システム、通信方法及びプログラム | |
CN105075196A (zh) | 控制器、通信系统、路径切换方法和程序 | |
WO2011118586A1 (ja) | 通信システム、制御装置、転送ノード、処理規則の更新方法およびプログラム | |
JP5747997B2 (ja) | 制御装置、通信システム、仮想ネットワークの管理方法およびプログラム | |
JP5854488B2 (ja) | 通信システム、制御装置、処理規則の設定方法およびプログラム | |
US20170208020A1 (en) | Communication control apparatus, communication system, communication control method, and medium | |
JP6314970B2 (ja) | 通信システム、制御装置、通信方法およびプログラム | |
JP2016139908A (ja) | 通信システム、通信ノード、制御装置、通信制御方法、及び、プログラム | |
JP2015128213A (ja) | 通信ノード、制御装置、通信システム、通信方法及びプログラム | |
WO2015087947A1 (ja) | 通信システム、通信ノード、制御装置、通信制御方法及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201180030760.1 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11798099 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011798099 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012521467 Country of ref document: JP Ref document number: 13806715 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |