期刊文献+

一种软件定义网络带内控制连接建立方法 被引量:1

A Method for Establishing In-band Control Connection in Software Defined Network
下载PDF
导出
摘要 鉴于软件定义网络(Software Defined Network,SDN)中带外控制方式的代价及成本较高,基于带内连接网络拓扑,提出了一种SDN带内控制连接建立方法。该方法首先通过链路层发现协议(Link Layer Discovery Protocol,LLDP)完成SDN控制器IP分发和SDN交换机IP分配,其中SDN交换机IP分配采用基于可变长子网掩码(Variable Length Subnet Mask,VLSM)的全自动IP分配技术来实现;之后,基于无类别域间路由(Classless Inter-domain Routing,CIDR)的路由聚合技术实现带内路由自动构建。实验结果表明,该方法能够实现SDN交换机与SDN控制器带内控制连接的自动建立,减小了SDN网络的配置复杂度和部署难度,同时使SDN交换机路由表条目数量得到控制,降低了带内路由构建的复杂性,为SDN控制平面与转发平面控制信道的建立提供了设计参考。 Considering the high cost of out-of-band control in software defined network(SDN),this paper proposes a method for establishing in-band control connection in SDN which is based on in-band network topology.First,the method completes IP distribution of SDN controller and IP allocation of SDN switch through Link Layer Discovery Protocol(LLDP),and IP allocation of SDN switch takes the fully automatic IP allocation technology based on Variable Length Subnet Mask(VLSM).Then,the routing aggregation technology based on Classless Inter-domain Routing(CIDR)is used to realize the automatic construction of in-band routing.The experimental results show that the proposed method can realize the automatic establishment of in-band control connection between SDN switch and SDN controller,thus reducing the configuration complexity and deployment difficulty of SDN network,moreover,controlly the number of SDN switch routing table entries and reducing the complexity of in-band routing construction.The method provides a design reference for the control channel establishment of control plane and forwarding plane in SDN.
作者 安菲菲 杨国东 潘乐炳 陈博文 AN Feifei;YANG Guodong;PAN Lebing;CHEN Bowen(The 50th Research Institute of China Electronics Technology Group Corporation,Shanghai 200331,China)
出处 《电讯技术》 北大核心 2022年第11期1629-1637,共9页 Telecommunication Engineering
关键词 软件定义网络(SDN) 带内控制 可变长子网掩码(VLSM) 无类别域间路由(CIDR) software defined network(SDN) in-band control variable length subnet mask(VLSM) classless inter-domain routing(CIDR)
  • 相关文献

参考文献3

二级参考文献22

  • 1Wen Xitao, Chen Yan, Hu Chengchen, Shi Chao. Towards a secure controller platform for OpenFlow applications//Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN13). Hong Kong, China, 2013:171-172.
  • 2Kreutz D, Ramos F, Verissimo P. Towards secure and dependable software-defined networks//Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN13). Hong Kong, China, 2013:55-60.
  • 3Kazemian P, Varghese G, McKeown N. Header space analysis: Static checking for networks//Proceedings of the 9th USENIX Symposium on Network Systems Design and Imple- mentation (NSDI). San Jose, USA, 2012:3-5.
  • 4Kazemian P, Chang M, Zeng Hongyi. Real time network policy checking using header space analysis//Proceedings of the 9th USENIX Symposium on Network Systems Design and Implementation (NSDI). Lombard, USA, 2013.. 4-6.
  • 5Porras P, Shin S, Yegneswaran V, Fong M. A security enforcement kernel for OpenFlow networks//Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN2012). New York, USA, 2012:123-125.
  • 6Sherwood R, Gibb G, Yap K K, et al. FlowVisor: A network virtualization layer. OpenFlow Switch Consortium, CA, USA: OPENFLOW-TR-2009-1, 2009.
  • 7Son S, Shin S, Yegneswaran V, Porras P. Model checking invariant security properties in OpenF|ow//Vroceedings of the IEEE International Conference on Communications (ICC' 2013). Budapest, Hungary, 2013:2-6.
  • 8Monsanto C, Reich J, Foster N, Rexford J, Walker D. Composing software defined networks//Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation. Berkeley, USA, 2013:1-14.
  • 9Mai H, Khurshid A, Agarwal R, et al. Debugging the data plane with anteater. ACM SIGCOMM Computer Communi- cation Review, 2011, 41(4): 290-301.
  • 10A1-Shaer E, A1-Haj S. FlowCheeker: Configuration analysis and verification of federated OpenFlow infrastructures// Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration. Chicago, USA, 2010: 37-44.

共引文献41

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部