WO2014054768A1 - 通信システム、仮想ネットワーク管理装置、仮想ネットワークの管理方法及びプログラム - Google Patents
通信システム、仮想ネットワーク管理装置、仮想ネットワークの管理方法及びプログラム Download PDFInfo
- Publication number
- WO2014054768A1 WO2014054768A1 PCT/JP2013/077040 JP2013077040W WO2014054768A1 WO 2014054768 A1 WO2014054768 A1 WO 2014054768A1 JP 2013077040 W JP2013077040 W JP 2013077040W WO 2014054768 A1 WO2014054768 A1 WO 2014054768A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- user
- layer
- hierarchy
- virtual
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/044—Network management architectures or arrangements comprising hierarchical management structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/38—Flow based routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/35—Flow control; Congestion control by embedding flow control information in regular packets, e.g. piggybacking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0895—Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
Definitions
- the present invention is based on a Japanese patent application: Japanese Patent Application No. 2012-223123 (filed on October 5, 2012), and the entire contents of the application are incorporated herein by reference.
- the present invention relates to a communication system, a virtual network management apparatus, a virtual network management method, and a program, and more particularly, to a communication system, a virtual network management apparatus, a virtual network management method, and a program that provide a virtual network having a plurality of layers.
- Non-Patent Documents 1 and 2 OpenFlow captures communication as an end-to-end flow and performs path control, failure recovery, load balancing, and optimization on a per-flow basis.
- the OpenFlow switch specified in Non-Patent Document 2 includes a secure channel for communication with the OpenFlow controller, and operates according to a flow table that is appropriately added or rewritten from the OpenFlow controller. For each flow, a set of match conditions (Match Fields), flow statistical information (Counters), and instructions (Instructions) that define processing contents are defined for each flow (non-patented). (Refer to “4.1 Flow Table” in Document 2).
- the OpenFlow switch searches the flow table for an entry having a matching condition (see “4.3 Match Fields” in Non-Patent Document 2) that matches the header information of the received packet. If an entry that matches the received packet is found as a result of the search, the OpenFlow switch updates the flow statistical information (counter) and processes the processing (designated) in the instruction field of the entry for the received packet. Perform packet transmission, flooding, discard, etc. from the port. On the other hand, if no entry matching the received packet is found as a result of the search, the OpenFlow switch sends an entry setting request to the OpenFlow controller via the secure channel, that is, a control for processing the received packet. An information transmission request (Packet-In message) is transmitted. The OpenFlow switch receives a flow entry whose processing content is defined and updates the flow table. As described above, the OpenFlow switch performs packet transfer using the entry stored in the flow table as control information.
- a matching condition see “4.3 Match Fields” in Non-Patent Document 2
- the OpenFlow switch updates the flow statistical information
- Example 2 on page 5 of Non-Patent Document 1 describes that a virtual network such as a VLAN (Virtual Local Network) can be provided by using the above-described OpenFlow mechanism.
- a virtual network such as a VLAN (Virtual Local Network) can be provided by using the above-described OpenFlow mechanism.
- individual user traffic is specified by the port or MAC (Media Access Control) address of the OpenFlow switch, and an appropriate VLAN ID is assigned to the OpenFlow switch. It is described that the user authentication is performed, and further, the location of the user is taken into consideration in the assignment of the VLAN ID.
- MAC Media Access Control
- Patent Document 1 discloses a network management system that prevents one user from seeing the setting contents set by another user and the operation data for the processing performed.
- this network management system creates a virtual network device information object in units of the shared network device and in units of users who share and use the shared network device, and stores a resource information repository that stores the virtual network device information object.
- a virtual resource information access unit that searches for various requests to the virtual network device, and a shared resource information access unit that searches for a shared network device information object corresponding to the searched object.
- a virtual network device that virtually becomes a subset of the shared network device for each user is configured, and a setting content or processing performed by another user for one user is set. It can be configured not to show operational data.
- Some virtual network administrators are interested in controlling access between individual hosts and the administrators (tenant providers) who are interested in lower-level network configurations and traffic. There are administrators (tenant users) who are not interested. Although it is possible to change the abstraction level of the network according to the manager, there is a problem that simply changing the abstraction level does not always make it easy for individual managers to manage.
- the first layer of network configuration information that represents a region that is desired to conceal a lower configuration by a predetermined symbol, and the second that represents the region that is represented by the symbol.
- a network configuration storage unit for storing network configuration information of a hierarchy, and a first user for managing the network of the first hierarchy using the network configuration information of the first hierarchy, and a second user
- a communication system including a network configuration management unit that allows the user to manage the network of the second layer using at least the network configuration information of the second layer.
- the network configuration information of the first hierarchy that represents a region that is desired to conceal the lower configuration by a predetermined symbol, and the second that represents the region that is represented by the symbol.
- a network configuration storage unit for storing network configuration information of a hierarchy, and a first user for managing the network of the first hierarchy using the network configuration information of the first hierarchy, and a second user
- a virtual network management device is provided that includes a network configuration management unit that allows at least the second layer network management information to be managed using the network configuration information of the second layer.
- the first-layer network configuration information that represents a region that is desired to conceal a lower configuration by a predetermined symbol
- the second that represents the region that is represented by the symbol.
- a virtual network including a network configuration storage unit that stores network configuration information of a hierarchy, an operation related to the network of the first hierarchy from a first user using the network configuration information of the first hierarchy And a step of accepting an operation relating to the network of the second hierarchy from a second user using at least the network configuration information of the second hierarchy.
- This method is linked to a specific machine called a virtual network management device that manages a virtual network.
- the network configuration information of the first hierarchy that represents a region that is desired to conceal a lower configuration by a predetermined symbol
- the second that represents the region that is represented by the symbol.
- a computer configured in a virtual network including a network configuration storage unit for storing a network configuration information of a hierarchy, from a first user using the network configuration information of the first hierarchy, Provided is a program that executes a process of accepting an operation related to a network of a hierarchy and a process of accepting an operation related to a network of the second hierarchy from a second user using at least the network configuration information of the second hierarchy Is done.
- This program can be recorded on a computer-readable (non-transient) storage medium. That is, the present invention can be embodied as a computer program product.
- FIG. 9 is an example of domain and boundary configuration information in the network configuration of FIG. 8.
- FIG. 9 is an example of configuration information of a second-layer virtual network configured from the switch # 1 and the switch # 2 in FIG.
- FIG. 11 is an example of configuration information of the first layer in which the virtual network of the second layer of FIG. 10 is arranged as a virtual tunnel.
- It is an example of the structure information of another 1st hierarchy which has arrange
- first layer network configuration information in which a region to be concealed in a lower layer configuration is represented by a predetermined symbol, and a region in which the symbol is represented.
- This can be realized by a communication system including the network management apparatus 20 provided (FIG. 1).
- the operation content received from the user by the network configuration management unit (22 in FIG. 2) is transferred to a control device (not shown) and used for controlling individual switches.
- a virtual network configured by the same physical network is shared by a user assigned network identifier: 1 and a user assigned network identifier: 2.
- the network management device 20 configures the virtual node 11 using a plurality of physical switches, and is arranged in the second layer network.
- the second hierarchy network is represented by symbols. For this reason, users assigned with network identifiers: 1 and 2 can manage and use their respective virtual dedicated networks without worrying about the configuration of the second hierarchy.
- management is performed by a third user who manages the network in the second layer.
- the ease of construction or management of the virtual network is improved.
- the virtual network is divided into a plurality of layers, and the upper layer is configured such that the region where the lower configuration is to be concealed is represented by a symbol.
- FIG. 3 is a reference diagram for explaining the first embodiment of the present invention.
- VNI is an abbreviation for VXLAN Network Identifier
- VXLAN is an abbreviation for Virtual Extensible Local Area Network.
- the virtual node 11 of the virtual network of FIG. 3 is arranged in the second hierarchy where the virtual endpoints are arranged, and in the first hierarchy, the network slice is performed by VXLAN. It is carried out.
- the virtual node in the first layer, the virtual node is represented by the symbol “virtual tunnel”, and the interface of the virtual tunnel is mapped to the virtual end point of the second layer.
- the flow control considering VNI is performed also in the second layer.
- FIG. 5 is a diagram illustrating a configuration of the network management device 20A according to the first embodiment of this invention. 2 is different from the network management apparatus shown in FIG. 2 in that the mapping information storage unit 23 stores a correspondence relationship between user identifiers between the first and second layers, and switches on the physical network based on the correspondence relationship. And a switch control unit 24 that executes a process of writing a user identifier in the packet header.
- FIG. 6 is a diagram illustrating an example of the storage position of the identifier for the second hierarchy.
- the identifier for the second hierarchy is stored at a predetermined position of an additional header such as VXLAN. By doing in this way, the flow identification using the identifier for 2nd hierarchy is also attained.
- FIG. 7 is a diagram showing another example of the storage position of the identifier for the second hierarchy.
- the identifier for the second layer is stored at a predetermined position in the upper protocol header inside the additional header such as VXLAN.
- the VNI is connected to the external network node. It is possible to perform flow control considering the above.
- FIG. 8 is a diagram for explaining the physical configuration of the virtual network according to the second embodiment of this invention.
- the present embodiment can be realized with the same configuration as the first embodiment, and therefore, the following description will focus on the differences.
- switches # 1 and # 2 that are controlled to perform slicing with VSID (Virtual Subset IDentifier) by NVGRE (Network Virtualizing using Generic Routing Encapsulation) and switches outside of NVGRE # 4 and # 4 A configuration connected via a gateway GW is shown.
- the switch # 1 is connected to hypervisor hosts # 1 and # 2 realized by a hypervisor type server virtualization application.
- b1 to b4 are boundaries indicating the boundaries of the domains formed by the controller.
- FIG. 9 is an example of domain and boundary configuration information in the network configuration of FIG.
- five domains and boundaries b1 to b4 located at the boundary between these are defined by combinations of switches and ports.
- FIG. 10 is an example of the configuration information of the virtual network in the second hierarchy composed of the switch # 1 and the switch # 2 in FIG.
- a virtual bridge vbr1 including switches # 1 and # 2 an interface of the virtual bridge, and a virtual link defined by a virtual tunnel end point (vstep) are defined. Further, each virtual link is mapped to the boundaries b1 to b3 in FIG. 8, and “10” is assigned as the vlan-id.
- FIG. 11 is an example of the first layer configuration information in which the second layer virtual network of FIG. 10 is arranged as a virtual tunnel.
- the virtual network shown in FIG. 10 is represented by a virtual tunnel vtunnel1 having VSID: 10, and is connected to virtual bridges vbr1 and vbr2 in the first layer.
- Each interface of the virtual tunnel vtunnel 1 is mapped to the virtual tunnel end points vstep 1 and vstep 3 in FIG.
- the endpoints 1 and 4 connected to the interfaces of the virtual bridges vbr1 and vbr3 of the first layer network are associated with the port of the hypervisor host # 1 and the port of the switch # 4.
- FIG. 12 is another example of the first layer configuration information in which the second layer virtual network of FIG. 10 is arranged as a virtual tunnel.
- the virtual network shown in FIG. 10 is represented by a virtual tunnel vtunnel1 having VSID: 20, and is connected to the first level virtual bridges vbr1 and vbr2.
- Each interface of the virtual tunnel vtunnel 1 is mapped to the virtual tunnel end points vstep 2 and vstep 3 in FIG.
- the endpoints 2 and 3 connected to the interfaces of the virtual bridges vbr1 and vbr3 of the first layer network are associated with the port of the hypervisor host # 2 and the port of the switch # 3.
- the physical network is finally expanded into a virtual network having two layers as shown in FIG.
- a user with VSID: 1 can perform network setting and management based on the virtual network vtn1-A simplified by a virtual tunnel.
- the user with VSID: 2 can perform network setting and management based on the virtual network vtn1-B simplified by the virtual tunnel.
- flow control by VLAN ID can be performed based on the virtual network vtn1 of the second hierarchy.
- FIG. 14 is a diagram for explaining the configuration of the virtual network according to the third embodiment of this invention. Since the present embodiment can be realized with a configuration substantially similar to that of the above-described second embodiment and the configuration method is also substantially the same, the difference will be described below.
- the physical network has a configuration in which two data centers are connected via EoMPLS (Ethernet (registered trademark) over MPLS).
- the EoMPLS (Ethernet (registered trademark) over MPLS) portion is represented as a third-layer network in which virtual switches that perform control using MPLS labels are arranged in the virtual network.
- the network of the third layer is represented by a virtual tunnel, and a virtual bridge or a virtual router is arranged for each domain.
- the network of the second hierarchy is represented by a virtual tunnel, and a virtual router is arranged for each domain.
- the present invention can simplify the configuration of a virtual network handled by an end user even in a complicated case where a plurality of data centers are connected via a network.
- the reason is that even when there are a large number of domains and a large number of virtual nodes corresponding to the domains need to be provided, these are combined into a virtual tunnel so that they can be excluded from the management target of the end user.
- FIG. 15 is a diagram for explaining the configuration of the virtual network according to the fourth embodiment of this invention. Since the present embodiment can be realized with a configuration substantially similar to the second and third embodiments described above and the configuration method is also substantially the same, the differences will be described below.
- slicing is performed in the first to third layers using a physical network including an EoMPLS network and a legacy switch.
- the virtual network sliced in the lower layer is represented as a virtual tunnel in the upper layer, and the corresponding virtual tunnel end point and the interface are mapped.
- the present invention can also be applied to a case where slicing is performed in a plurality of layers such as MPLS, VLAN, and NVGRE, and the configuration of a virtual network handled by an end user is simplified as in the above embodiments. can do.
- VXLAN or NVGRE in the upper layer
- VXLAN and MPLS are used in the lower layers, these are merely examples, and other methods can be adopted.
- the network management device has been described as including the network configuration storage unit and the network configuration management unit. However, these may be arranged in separate devices, or a physical switch group may be provided. You may implement
- a mapping information storage unit that stores a correspondence relationship between an identifier for identifying a user in the first hierarchy and an identifier for identifying a user in the second hierarchy;
- a network management unit that manages the flow control in both the first and second layers using the identifiers;
- a virtual network management device comprising: [Ninth Embodiment]
- Switch control for causing a switch on the path to execute a process of writing an identifier for identifying a user in the second layer in a header based on an identifier for identifying the user in the first layer included in the user packet
- Virtual network management device including a section.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本発明は、日本国特許出願:特願2012-223123号(2012年10月 5日出願)に基づくものであり、同出願の全記載内容は引用をもって本書に組み込み記載されているものとする。
本発明は、通信システム、仮想ネットワーク管理装置、仮想ネットワークの管理方法及びプログラムに関し、特に、複数のレイヤを有する仮想ネットワークを提供する通信システム、仮想ネットワーク管理装置、仮想ネットワークの管理方法及びプログラムに関する。
続いて、本発明の第1の実施形態について図面を参照して詳細に説明する。図3は、本発明の第1の実施形態を説明するための参考図である。図3を参照すると、4つの物理スイッチを用いて構成された物理ネットワークと、仮想ノード10、11を含む1レイヤの仮想ネットワークを構成している。この状態においても、ネットワーク管理装置X20にフロー別の制御を行わせることにより、複数のユーザ(例えば、VNI=1のユーザと、VNI=2のユーザ)に仮想ネットワークを利用させることができる。なお、VNIは、VXLAN Network Identifierの略であり、VXLANは、Virtual Extensible Local Area Networkの略である。
続いて、本発明の第2の実施形態について図面を参照して詳細に説明する。図8は、本発明の第2の実施形態の仮想ネットワークの物理的構成を説明するための図である。以下、本実施形態は、第1の実施形態と同様の構成にて実現できるので、以下相違点を中心に説明する。
続いて、本発明の第3の実施形態について図面を参照して詳細に説明する。図14は、本発明の第3の実施形態の仮想ネットワークの構成を説明するための図である。本実施形態は、上記した第2の実施形態と略同様の構成で実現でき、構成方法も略同様であるので以下、その相違点を説明する。
続いて、本発明の第4の実施形態について図面を参照して詳細に説明する。図15は、本発明の第4の実施形態の仮想ネットワークの構成を説明するための図である。本実施形態は、上記した第2、第3の実施形態と略同様の構成で実現でき、構成方法も略同様であるので以下、その相違点を説明する。
[第1の形態]
(上記第1の視点による通信システム参照)
[第2の形態]
第1の形態の通信システムにおいて、
前記第1の階層でユーザを識別するための識別子と、前記第2の階層でユーザを識別するための識別子と、の対応関係を記憶するマッピング情報記憶部を含み、
前記各識別子を用いて、前記第1、第2の階層の双方においてフロー制御をできるよう管理する通信システム。
[第3の形態]
第2の形態の通信システムにおいて、
さらに、
ユーザパケットに含まれる前記第1の階層でユーザを識別するための識別子に基づいて、前記第2の階層でユーザを識別するための識別子をヘッダに書き込む処理を経路上のスイッチに実行させるスイッチ制御部を含む通信システム。
[第4の形態]
第3の形態の通信システムにおいて、
前記第2の階層でユーザを識別するための識別子を、前記第1の階層の識別子を格納するヘッダの所定領域に格納する通信システム。
[第5の形態]
第3又は第4の形態の通信システムにおいて、
前記第2の階層でユーザを識別するための識別子を、前記第1の階層の識別子を格納するヘッダより内側の第2ヘッダの所定領域に格納する通信システム。
[第6の形態]
第1から第5いずれか一の形態の通信システムにおいて、
前記シンボルで表した領域を表した第2の階層のネットワークと、前記第1の階層のネットワークとが1対多の関係で対応付けられている通信システム。
[第7の形態]
(上記第2の視点による仮想ネットワーク管理装置参照)
[第8の形態]
第7の形態の仮想ネットワーク管理装置において、
さらに、
前記第1の階層でユーザを識別するための識別子と、前記第2の階層でユーザを識別するための識別子と、の対応関係を記憶するマッピング情報記憶部と、
前記各識別子を用いて、前記第1、第2の階層の双方においてフロー制御をできるよう管理するネットワーク管理部と、
を備える仮想ネットワーク管理装置。
[第9の形態]
第8の形態の仮想ネットワーク管理装置において、
さらに、
ユーザパケットに含まれる前記第1の階層でユーザを識別するための識別子に基づいて、前記第2の階層でユーザを識別するための識別子をヘッダに書き込む処理を経路上のスイッチに実行させるスイッチ制御部を含む仮想ネットワーク管理装置。
[第10の形態]
(上記第3の視点による仮想ネットワークの管理方法参照)
[第11の形態]
(上記第4の視点によるプログラム参照)
なお、上記第7の形態は、上記第1の形態と同様に、第4~第6の形態に展開することが可能である。同様に、上記第10、第11の形態は、上記第1の形態と同様に、第2~第6の形態に展開することが可能である。
20、20A、X20 ネットワーク管理装置
21 ネットワーク構成記憶部
22 ネットワーク構成管理部
23 マッピング情報記憶部
24 スイッチ制御部
b1~b4 バウンダリー
vtep1~vtep3 仮想トンネルエンドポイント
vbr1~vbr3 仮想ブリッジ
vtunnel1 仮想トンネル
Claims (11)
- 仮想ネットワークの構成のうち、下位構成を隠蔽したい領域を所定のシンボルで表した第1の階層のネットワーク構成情報と、前記シンボルで表した領域を表した第2の階層のネットワーク構成情報と、を記憶するネットワーク構成記憶部と、
第1のユーザに対し、前記第1の階層のネットワーク構成情報を用いて前記第1の階層のネットワークの管理を行わせ、第2のユーザに対し、少なくとも前記第2の階層のネットワーク構成情報を用いて第2の階層のネットワークの管理を行わせるネットワーク構成管理部とを備えた通信システム。 - さらに、
前記第1の階層でユーザを識別するための識別子と、前記第2の階層でユーザを識別するための識別子と、の対応関係を記憶するマッピング情報記憶部を含み、
前記各識別子を用いて、前記第1、第2の階層の双方においてフロー制御をできるよう管理する請求項1の通信システム。 - さらに、
ユーザパケットに含まれる前記第1の階層でユーザを識別するための識別子に基づいて、前記第2の階層でユーザを識別するための識別子をヘッダに書き込む処理を経路上のスイッチに実行させるスイッチ制御部を含む請求項2の通信システム。 - 前記第2の階層でユーザを識別するための識別子を、前記第1の階層の識別子を格納するヘッダの所定領域に格納する請求項3の通信システム。
- 前記第2の階層でユーザを識別するための識別子を、上位プロトコルのヘッダの所定領域に格納する請求項3又は4の通信システム。
- 前記シンボルで表した領域を表した第2の階層のネットワークと、前記第1の階層のネットワークとが1対多の関係で対応付けられている請求項1から5いずれか一の通信システム。
- 仮想ネットワークの構成のうち、下位構成を隠蔽したい領域を所定のシンボルで表した第1の階層のネットワーク構成情報と、前記シンボルで表した領域を表した第2の階層のネットワーク構成情報と、を記憶するネットワーク構成記憶部と、
第1のユーザに対し、前記第1の階層のネットワーク構成情報を用いて前記第1の階層のネットワークの管理を行わせ、第2のユーザに対し、少なくとも前記第2の階層のネットワーク構成情報を用いて第2の階層のネットワークの管理を行わせるネットワーク構成管理部と、
を備える仮想ネットワーク管理装置。 - さらに、
前記第1の階層でユーザを識別するための識別子と、前記第2の階層でユーザを識別するための識別子と、の対応関係を記憶するマッピング情報記憶部と、
前記各識別子を用いて、前記第1、第2の階層の双方においてフロー制御をできるよう管理するネットワーク管理部と、
を備える請求項7の仮想ネットワーク管理装置。 - さらに、
ユーザパケットに含まれる前記第1の階層でユーザを識別するための識別子に基づいて、前記第2の階層でユーザを識別するための識別子をヘッダに書き込む処理を経路上のスイッチに実行させるスイッチ制御部を含む請求項8の仮想ネットワーク管理装置。 - 仮想ネットワークの構成のうち、下位構成を隠蔽したい領域を所定のシンボルで表した第1の階層のネットワーク構成情報と、前記シンボルで表した領域を表した第2の階層のネットワーク構成情報と、を記憶するネットワーク構成記憶部と、を含む仮想ネットワークにおいて、
前記第1の階層のネットワーク構成情報を用いて、第1のユーザから、前記第1の階層のネットワークに関する操作を受け付けるステップと、
少なくとも前記第2の階層のネットワーク構成情報を用いて、第2のユーザから、前記第2の階層のネットワークに関する操作を受け付けるステップと、
を含む仮想ネットワークの管理方法。 - 仮想ネットワークの構成のうち、下位構成を隠蔽したい領域を所定のシンボルで表した第1の階層のネットワーク構成情報と、前記シンボルで表した領域を表した第2の階層のネットワーク構成情報と、を記憶するネットワーク構成記憶部と、を含む仮想ネットワークに配置されたコンピュータに、
前記第1の階層のネットワーク構成情報を用いて、第1のユーザから、前記第1の階層のネットワークに関する操作を受け付ける処理と、
少なくとも前記第2の階層のネットワーク構成情報を用いて、第2のユーザから、前記第2の階層のネットワークに関する操作を受け付ける処理と、
を実行させるプログラム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201380052113.XA CN104704772B (zh) | 2012-10-05 | 2013-10-04 | 通信系统、虚拟网络管理装置、虚拟网络管理方法 |
JP2014539834A JP6248938B2 (ja) | 2012-10-05 | 2013-10-04 | 通信システム、仮想ネットワーク管理装置、仮想ネットワークの管理方法及びプログラム |
US14/433,015 US9794111B2 (en) | 2012-10-05 | 2013-10-04 | Communication system, virtual network management apparatus, virtual network management method and program |
EP13843992.2A EP2905926B1 (en) | 2012-10-05 | 2013-10-04 | Communication system, virtual network management apparatus, virtual network management method and program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012-223123 | 2012-10-05 | ||
JP2012223123 | 2012-10-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014054768A1 true WO2014054768A1 (ja) | 2014-04-10 |
Family
ID=50435087
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/077040 WO2014054768A1 (ja) | 2012-10-05 | 2013-10-04 | 通信システム、仮想ネットワーク管理装置、仮想ネットワークの管理方法及びプログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US9794111B2 (ja) |
EP (1) | EP2905926B1 (ja) |
JP (1) | JP6248938B2 (ja) |
CN (1) | CN104704772B (ja) |
WO (1) | WO2014054768A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016158092A (ja) * | 2015-02-24 | 2016-09-01 | 日本電気株式会社 | 表示システム、表示方法、表示プログラムおよび仮想システム |
KR20170139763A (ko) * | 2016-06-10 | 2017-12-20 | 한국전자통신연구원 | 네트워크 서비스 검출 방법 및 이를 위한 장치 |
WO2019163725A1 (ja) * | 2018-02-20 | 2019-08-29 | 日本電信電話株式会社 | 監視装置、ネットワーク障害監視システムおよび監視方法 |
JP7525646B2 (ja) | 2020-04-30 | 2024-07-30 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | ネットワーク管理 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10250443B2 (en) * | 2014-09-30 | 2019-04-02 | Nicira, Inc. | Using physical location to modify behavior of a distributed virtual network element |
JPWO2016068238A1 (ja) * | 2014-10-30 | 2017-08-17 | 日本電気株式会社 | ネットワークの制御システム、制御装置、ネットワーク情報の管理方法及びプログラム |
US9775045B2 (en) * | 2015-09-11 | 2017-09-26 | Intel IP Corporation | Slicing architecture for wireless communication |
CN107318113B (zh) * | 2016-04-27 | 2021-09-21 | 华为技术有限公司 | 网络切片处理方法和装置 |
US10225103B2 (en) | 2016-08-29 | 2019-03-05 | Vmware, Inc. | Method and system for selecting tunnels to send network traffic through |
US10681131B2 (en) | 2016-08-29 | 2020-06-09 | Vmware, Inc. | Source network address translation detection and dynamic tunnel creation |
US10164829B1 (en) * | 2017-03-20 | 2018-12-25 | Barefoot Networks, Inc. | Incremental update of the data plane of a hardware forwarding element |
CN110650076B (zh) * | 2018-06-26 | 2021-12-24 | 华为技术有限公司 | Vxlan的实现方法,网络设备和通信系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06326706A (ja) * | 1993-05-11 | 1994-11-25 | Sumitomo Electric Ind Ltd | 複合ネットワーク管理システム |
JPH10145364A (ja) * | 1996-11-15 | 1998-05-29 | Hitachi Ltd | ネットワーク管理システム |
JP2005203984A (ja) | 2004-01-14 | 2005-07-28 | Nec Corp | ネットワーク管理システム、ネットワーク管理方法及びネットワーク管理用プログラム、記録媒体 |
WO2011114389A1 (ja) * | 2010-03-19 | 2011-09-22 | 富士通株式会社 | 資産管理装置、資産管理方法および資産管理プログラム |
WO2012133060A1 (ja) * | 2011-03-29 | 2012-10-04 | 日本電気株式会社 | ネットワークシステム、及びvlanタグ情報取得方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3617770B2 (ja) * | 1998-05-29 | 2005-02-09 | 株式会社日立製作所 | ネットワーク管理システム及びネットワーク管理方式 |
US20060098649A1 (en) * | 2004-11-10 | 2006-05-11 | Trusted Network Technologies, Inc. | System, apparatuses, methods, and computer-readable media for determining security realm identity before permitting network connection |
JP4068492B2 (ja) * | 2003-04-01 | 2008-03-26 | 富士通株式会社 | ネットワークレイヤ連携プログラムおよびネットワークレイヤ連携装置 |
JP4606249B2 (ja) | 2005-05-18 | 2011-01-05 | 富士通株式会社 | 情報処理方法及びルータ |
CN101217398A (zh) * | 2007-12-28 | 2008-07-09 | 华为技术有限公司 | 分布式网管采集系统、实现方法及相关设备 |
JP6214023B2 (ja) | 2009-07-31 | 2017-10-18 | 日本電気株式会社 | 制御サーバ、サービス提供システムおよび仮想的なインフラストラクチャの提供方法 |
JP5710928B2 (ja) * | 2010-10-07 | 2015-04-30 | 株式会社日立製作所 | ネットワークシステム、仮想ネットワーク管理方法及びルータ |
CN102263667B (zh) | 2011-08-24 | 2015-09-23 | 迈普通信技术股份有限公司 | 网络管理系统以及网络管理处理方法 |
-
2013
- 2013-10-04 JP JP2014539834A patent/JP6248938B2/ja not_active Expired - Fee Related
- 2013-10-04 CN CN201380052113.XA patent/CN104704772B/zh active Active
- 2013-10-04 EP EP13843992.2A patent/EP2905926B1/en active Active
- 2013-10-04 WO PCT/JP2013/077040 patent/WO2014054768A1/ja active Application Filing
- 2013-10-04 US US14/433,015 patent/US9794111B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06326706A (ja) * | 1993-05-11 | 1994-11-25 | Sumitomo Electric Ind Ltd | 複合ネットワーク管理システム |
JPH10145364A (ja) * | 1996-11-15 | 1998-05-29 | Hitachi Ltd | ネットワーク管理システム |
JP2005203984A (ja) | 2004-01-14 | 2005-07-28 | Nec Corp | ネットワーク管理システム、ネットワーク管理方法及びネットワーク管理用プログラム、記録媒体 |
WO2011114389A1 (ja) * | 2010-03-19 | 2011-09-22 | 富士通株式会社 | 資産管理装置、資産管理方法および資産管理プログラム |
WO2012133060A1 (ja) * | 2011-03-29 | 2012-10-04 | 日本電気株式会社 | ネットワークシステム、及びvlanタグ情報取得方法 |
Non-Patent Citations (4)
Title |
---|
DAS, S. ET AL.: "Why OpenFlow/SDN Can Succeed Where GMPLS Failed", ECOC TECHNICAL DIGEST, 16 September 2012 (2012-09-16), XP032543745, Retrieved from the Internet <URL:http://yuba.stanford.edu/~nickm/papers/ECEOC-2012-Tu.1.D.1.pdf> [retrieved on 20131219] * |
NICK MCKEOWN, OPENFLOW: ENABLING INNOVATION IN CAMPUS NETWORKS, 14 March 2008 (2008-03-14), Retrieved from the Internet <URL:http://www.openflow.org/documents/openflow-wp-latest.pdf> |
OPENFLOW SWITCH SPECIFICATION, 2012, Retrieved from the Internet <URL:https://www.openflow.org/documents/openflow-spec-vl.1.0.pd> |
See also references of EP2905926A4 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016158092A (ja) * | 2015-02-24 | 2016-09-01 | 日本電気株式会社 | 表示システム、表示方法、表示プログラムおよび仮想システム |
KR20170139763A (ko) * | 2016-06-10 | 2017-12-20 | 한국전자통신연구원 | 네트워크 서비스 검출 방법 및 이를 위한 장치 |
KR102499705B1 (ko) * | 2016-06-10 | 2023-02-14 | 한국전자통신연구원 | 네트워크 서비스 검출 방법 및 이를 위한 장치 |
WO2019163725A1 (ja) * | 2018-02-20 | 2019-08-29 | 日本電信電話株式会社 | 監視装置、ネットワーク障害監視システムおよび監視方法 |
JP7525646B2 (ja) | 2020-04-30 | 2024-07-30 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | ネットワーク管理 |
Also Published As
Publication number | Publication date |
---|---|
CN104704772A (zh) | 2015-06-10 |
US20150249565A1 (en) | 2015-09-03 |
JP6248938B2 (ja) | 2017-12-20 |
JPWO2014054768A1 (ja) | 2016-08-25 |
EP2905926A4 (en) | 2016-06-22 |
EP2905926A1 (en) | 2015-08-12 |
CN104704772B (zh) | 2018-06-15 |
US9794111B2 (en) | 2017-10-17 |
EP2905926B1 (en) | 2017-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6248938B2 (ja) | 通信システム、仮想ネットワーク管理装置、仮想ネットワークの管理方法及びプログラム | |
JP5991424B2 (ja) | パケット書換装置、制御装置、通信システム、パケット送信方法及びプログラム | |
CN105051688B (zh) | 经扩展的标记联网 | |
US10104017B2 (en) | Methods, systems and apparatus for the virtualization of high performance networks | |
US10374972B2 (en) | Virtual flow network in a cloud environment | |
CN104350467B (zh) | 用于使用sdn的云安全性的弹性实行层 | |
US9438512B2 (en) | Stacking metadata contexts for service chains | |
JP5494668B2 (ja) | 情報システム、制御サーバ、仮想ネットワーク管理方法およびプログラム | |
EP3058687B1 (en) | Configurable service proxy mapping | |
US9203645B2 (en) | Virtual input-output connections for machine virtualization | |
US9294351B2 (en) | Dynamic policy based interface configuration for virtualized environments | |
CN106936715B (zh) | 虚拟机报文控制方法及装置 | |
JP2014135721A (ja) | データセンタネットワークのトラフィックを分配するための装置および方法 | |
CN113595804A (zh) | 将远程设备管理属性分发给服务节点以用于服务规则处理 | |
CN107733670A (zh) | 一种转发策略配置方法和装置 | |
CN105519046A (zh) | 可缩放和分离式网络虚拟化 | |
US20160006642A1 (en) | Network-wide service controller | |
US20170279689A1 (en) | Software defined network controller for implementing tenant specific policy | |
JPWO2014112616A1 (ja) | 制御装置、通信装置、通信システム、スイッチの制御方法及びプログラム | |
US9853870B2 (en) | Controller supported service maps within a federation of forwarding boxes | |
KR101527377B1 (ko) | Sdn 기반의 서비스 체이닝 시스템 | |
CN112822104A (zh) | 一种数据报文的处理方法、设备、存储介质及系统 | |
Robertazzi et al. | Software-defined networking | |
KR101543735B1 (ko) | 엔에프브이(nfv)를 위한 패킷 처리 시스템 및 방법 | |
Higuchi et al. | A Verification Based Flow Space Management Scheme for Multi-Tenant Virtualized Network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13843992 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2013843992 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013843992 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14433015 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2014539834 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |