Abstract:
A system and method for virtualizing SDN-based network monitoring. The system for includes: an information collector, a monitoring component, an information converter, and a resource allocator, in which a user-defined virtual monitor is included so that integrated monitoring may be performed, and expandability may be guaranteed to dynamically respond to a user's, demands.
Abstract:
Disclosed herein is a system for a secret sharing authentication. The system may include a secret sharing information management server, a client device, and a network device. The secret sharing information management server may store and manage an authentication key capable of being used for secret sharing authentication, by dividing the authentication key into a first secret sharing key shard and a second secret sharing key shard, and allocate the first and second secret sharing key shards. The client device may receive the first secret sharing key shard from the secret sharing information management server and construct an interest packet by using the first secret sharing key shards. The network device may receive the second secret sharing key shard from the secret sharing information management server, and process the interest packet received from the client device on the basis of an ICN(Information Centric Networking) method by performing secret sharing authentication using the second secret sharing key shard and the first secret sharing key shard comprised in the interest packet.
Abstract:
A method and apparatus for controlling and managing a flow. The apparatus classifies a flow management space into a plurality of spaces, detects a heavy load-flow in the classified flow management space, and adjusts variably the flow management space due to a control traffic processing overhead, transmits the detected heavy load-flow according to a weight of each forwarding path through multi-path routing, and balances traffic.
Abstract:
A method and apparatus for managing a flow table is provided. The method includes dividing a flow table into a plurality of states according to occupancy levels of the flow table in a network device; and managing the flow table by reflecting the changed state of the flow table.
Abstract:
A method for configuring a service function path (SFP) for a software defined network (SDN) based service function chain (SFC) may comprise configuring a SFC which is a set of ordered service functions (SFs) by reflecting requirements of a flow flowing into a network; generating a primary SFP that is a path through which the flow is to be actually transmitted in the network according to the SFC; generating a secondary SFP against an error of the primary SFP; and controlling a transmission path through which the flow is transmitted to be at least one of the primary SFP and the secondary SFP.
Abstract:
Provided is a distributed service function (SF) forwarding system that applies the corresponding service function chain (SFC) to traffic classified by a plurality of service network (SN) controller instances based on an SN overlay structure. Therefore, by selectively combining and executing necessary network functions (SFs) according to a path and traffic made up of defined component services, it is possible to dynamically configure and control one network service.
Abstract:
An apparatus and method for resolving a mapping between an address of a physical or virtual node and a physical address on a network, in the SDN in which a network is controlled based on software by a centralized controller. The apparatus may include an address matcher and a controller. The controller may determine all matters related to packet forwarding in a centralized method; and an application for performing desired functions is programmed in the controller, which is then installed therein. Accordingly, the purpose thereof is to provide new network services easily.
Abstract:
Disclosed herein are a method for protecting data for information centric in-network computing and a system using the same. The method includes: preparing, at a computing node, a an encryption key pool that includes a security key for sharing a symmetric key used for encrypting result data according to a user's request and matching information; preparing, at an INC agent receiving the user's request, a synchronization key pool for sharing the security key through the matching information; and creating, by the computing node, a processor for executing output processing of the result data and allocating a security key to the processor based on the matching information of the encryption key pool when a security key exists. The security key is allocated to the computing node which is determined to perform the request in the INC agent.
Abstract:
The present invention relates to an apparatus and method for returning execution result of function in name-based in network distributed computing system. The present invention includes sending a first packet requesting execution of a function to a first node; transmitting a second packet requesting the execution result of the function to a second node; and receiving, after transmitting the second packet, a third packet, which comprises the execution result of the function, from the second node.
Abstract:
A system for controlling a carrier virtual network is disclosed. The system includes at least one virtual network controller for controlling resources of a carrier virtual network based on customer request information received from a customer network controller, and at least one physical network controller for controlling resources of a carrier physical network based on a service profile received from the at least one virtual network controller. The at least one virtual network controller interworks with the at least one physical network controller in a one to one, one to N (N is an integer equal to or larger than 2), or N to one correspondence.