Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service chain realization method and device

A service chain and MAC address technology, applied in the computer field, can solve problems such as unsolvable processing problems, excessive maximum transmission unit, insufficient performance, etc., and achieve the effects of smart deployment, easy management, flexible performance and security support

Inactive Publication Date: 2015-11-25
IBM CORP
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these solutions have several disadvantages, including: the data packet received by the middle box is not the original data packet, so special middle box hardware or software is required; the processing problem of the middle box that does not support the MAC address cannot be solved; Possible re-entry problems when there are multiple middleboxes; use of proprietary protocols; insufficient performance; excessive maximum transmission unit (MTU), etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service chain realization method and device
  • Service chain realization method and device
  • Service chain realization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0024] The present invention is based on the following requirements or assumptions:

[0025] 1. Middleboxes are treated as second-tier devices that behave as black holes (i.e., never respond to any request / listen / scan), which include firewalls, intrusion prevention / detection systems, data leakage prevention systems, etc.;

[0026] 2. The middlebox is "placed inline" for a particular communication flow: the relevant communication flow passes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Techniques for realizing service chaining, a corresponding apparatus and an SDN (Software Defined Network) controller are disclosed. The method includes temporarily modifying an original destination MAC (media access control) address of a packet and an original source MAC address the packet during the time the packet makes a hop from one middlebox to another. A restore operation is used to restore the original source and destination MAC addresses after the hop is made.

Description

technical field [0001] The present invention relates to the field of computers, in particular to service chaining (service chaining) based on SDN (Software Defined Networking, software-defined network), and more specifically to a method and device for implementing service chaining. Background technique [0002] In recent years, with the increasing popularity of cloud computing, cloud security, especially network security, has become a very prominent issue. Increasing efforts are being made to leverage emerging technologies to provide dynamic and flexible security features in cloud networks. A typical example is to dynamically provide virtual network security services using SDN-based service chaining. [0003] SDN is an emerging computer networking technology that separates the system that makes decisions about where to send traffic (called the control plane) from the underlying system that forwards traffic to selected targets (called the data plane). couple. The control p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/947H04L12/931H04L45/74
CPCH04L29/06H04L67/327H04L12/6418H04L67/63H04L45/745H04L69/22H04L45/566H04L45/127
Inventor 杨保华郑凯张跃刘天成
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products