An SDN-based security authentication method and related equipment
A technology of security authentication and authentication module, applied in the field of communication, can solve problems such as security risks, and achieve the effect of realizing security certification and solving security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] A typical layered diagram of an SDN network is as follows: figure 1 As shown, it is mainly divided into application layer, control layer and forwarding layer. Each layer is described separately below.
[0067] The forwarding layer mainly includes forwarding devices, such as switches and routers. The forwarding layer usually has a programmable southbound interface, and the control layer manages the forwarding layer through the southbound interface. For example, the control layer issues control policies through the southbound interface to control the forwarding behavior of the forwarding layer. Under the SDN network architecture, the forwarding layer is managed by the control layer, which greatly simplifies the forwarding equipment, thereby reducing the dependence of the SDN network on hardware forwarding equipment.
[0068] The application layer is mainly oriented to user services, converting original user service information into network service models provided by the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


