Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A physical slicing method based on sdn technology

A technology of physical slicing and technology, applied in the field of physical slicing based on SDN technology, can solve problems such as slicing technology cannot meet security requirements, and achieve the effect of improving security

Active Publication Date: 2019-11-05
XINGTANG TELECOMM TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] In view of the above analysis, the present invention aims to provide a physical slicing method based on SDN technology to solve the problem of security requirements that cannot be met by existing slicing technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A physical slicing method based on sdn technology
  • A physical slicing method based on sdn technology
  • A physical slicing method based on sdn technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Embodiment one: if Figure 4 shown.

[0050] The specific physical slicing method includes the following steps:

[0051] Step S1, the operator sets dedicated infrastructure resources in the forwarding plane, and divides the set dedicated infrastructure resources into three levels: primary, intermediate and advanced;

[0052] Specifically, the dedicated infrastructure resources are devices certified by organizations with information security device certification qualifications.

[0053]Classify infrastructure resources according to their trust level and the functions they can realize; specifically, special infrastructure resources are divided into primary and low levels according to their level of trust and the functions they can realize. , intermediate and advanced;

[0054] The credible level division mechanism of dedicated infrastructure resources is based on Article 4 of the "Information Security Level Protection Management Measures (Trial)": the security protecti...

Embodiment 2

[0077] Embodiment 1 is described by taking an online payment scenario as an example.

[0078] 1) Set up dedicated infrastructure resources and grade them; the infrastructure resources required for online payment are computing equipment and data storage equipment. Therefore, the operator's infrastructure resources should include these two types of equipment.

[0079] 2) Determine the user level; users who can provide online payment functions are divided into levels according to the scale of use they can provide and the security level of the user (ordinary user, VIP user, etc.).

[0080] 3) Form a physical slicing template; according to the user level, select a corresponding level of equipment (for example, can provide 1000 operations / second computing capability, 10000 operations / second computing capability, etc.) in the dedicated infrastructure resources to form a physical slicing template.

[0081] 4) After receiving user requirements, form physical slices through the NFV orc...

Embodiment 3

[0083] For some applications with higher security levels and lower application flexibility requirements, dedicated applications and business support systems and dedicated forwarding planes can be deployed independently. The dedicated forwarding plane has only dedicated equipment, which is for certain specific services and is separately divided. The forwarding plane of the public network does not matter. Private services are interconnected with the public network through limited security isolation gateways. Private services refer to services with a particularly high security level. If the services are threatened, it will cause irreparable damage to the entire system. For example, the control command business of the control system of a special industry. like Figure 6 shown. Compared with the above technologies, this alternative not only uses dedicated infrastructure resources, but also completely separates dedicated infrastructure resources from public network equipment, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a physical slicing method based on an SDN technology. The method comprises the following steps: setting dedicated base installation resource and grading; determining the safety level of a user applying for the network resource; according to the safety level of the user, virtualizing to form an independent physical slicing template; according to the user requirement, executing the network orchestration on the physical slicing template, creating a network function module and an interface in the instantiation mode, and forming the physical slicing. The method is used for liberating the limitation of the public network base installation in the aspects of function, performance and safety, and satisfying the dedicated requirement. The dedicated device is used for reducing the interaction between a dedicated user and the public network device. The safety is improved by the mode of physical insulation, and the trusted network and the safe grading can be realized.

Description

technical field [0001] The present invention relates to the technical field of slicing, in particular to a physical slicing method based on SDN technology. Background technique [0002] After the network in the traditional IT architecture is deployed and launched according to business needs, if the business needs change, it is very cumbersome to re-modify the configuration on the corresponding network devices (routers, switches, firewalls). In today's business environment, flexibility and agility are more critical. [0003] The emergence of SDN (Software Defined Network) technology has played a vital role in improving network flexibility and agility. SDN separates the control rights on network devices and is managed by a centralized controller without relying on the underlying network devices (routers, switches, firewalls), shielding the differences from the underlying network devices. The control right is completely open, and users can customize any network routing and tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W16/18H04W28/16
CPCH04W12/06H04W16/18H04W28/16
Inventor 贾云鹤王发
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products