Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for nve forwarding message in nvo3 network

A network and message technology, applied in the field of network security, can solve the problems of occupying service resources and legal users being unable to obtain services.

Inactive Publication Date: 2018-04-20
INT BUSINESS MASCH CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One of the security problems is Distributed Denial of Service (DDoS) attack. The basic principle is that the attacker sends a large number of service requests to the victim, thus occupying a large amount of service resources and causing legitimate users to be unable to receive services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for nve forwarding message in nvo3 network
  • A method and device for nve forwarding message in nvo3 network
  • A method and device for nve forwarding message in nvo3 network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0023] figure 1 A block diagram of an exemplary computer system / server 12 suitable for use in implementing embodiments of the invention is shown. figure 1 The computer system / server 12 shown is only an example and should not impose any limitation on the functions and scope of use of the embodiments of the present invention.

[0024] like figure 1 As shown, computer system / server 12 takes the form of a general purpose computing device. Co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and NVE for forwarding messages of a first network virtual edge entity NVE in a virtual overlay network NVO3 of a third-layer network. The method includes: responding to receiving To the IP message, the source IP address of the IP message is used as the IP address of the first tenant system (TS), and the first virtual network identifier VNID to which the IP message belongs is used as the VNID to which the first TS belongs, Search forwarding information to obtain the IP address of the second NVE connected to the first TS and the connected second VAP; in response to the search failure or the IP address of the second NVE and the IP address of the first NVE, the second VAP is different from at least one of the first VAP, discarding the IP packet; and in response to the IP address of the second NVE and the IP address of the first NVE, and both the second VAP and the first VAP Similarly, the IP packet is forwarded using the destination IP address of the IP packet. The method and device can detect DDos attacks and improve the security of the NVO3 network.

Description

technical field [0001] The present invention relates to network security, in particular to a method and equipment for NVE forwarding messages in the virtual overlay network NVO3 of the third layer network. Background technique [0002] With the development of cloud computing technology, virtualization has expanded from traditional computing resource virtualization to virtualization of all IT resources such as computing, storage, and network. Users can conveniently rent IT resources from cloud computing data centers instead of purchasing physical servers directly. Through this leasing method, tenants can deploy computing resources on demand, reducing the total cost of ownership. At the same time, hardware resources are abstracted into logical, unified software virtual resources, which can also greatly reduce the deployment time of IT resources and accelerate application deployment. Deploy to quickly respond to user needs. [0003] From a network point of view, multi-tenant ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L45/74
CPCH04L61/103H04L45/64H04L12/4641H04L45/74
Inventor 鲜明双陶孜谨唐刚黄登辉
Owner INT BUSINESS MASCH CORP