Communication system, virtual network management apparatus, virtual network management method and program
First Claim
1. A communication system, comprising:
- a network configuration memory that stores;
network configuration information of a first layer in which an area of the first layer whose low level configuration is desired to be concealed is represented by a preset symbol; and
network configuration information of a second layer showing the area represented by the preset symbol;
a network configuration management section that allows;
a first user to manage a network of the first layer using the network configuration information of the first layer; and
a second user to manage a network of the second layer using at least the network configuration information of the second layer;
a mapping information memory that stores a relation of correspondence between a first identifier for identifying a user in the first layer, and a second identifier for identifying a user in the second layer; and
a switch controller that causes a switch on a path of a user packet to write the second identifier in a header of the user packet, based on the first identifier contained in the user packet.
2 Assignments
0 Petitions
Accused Products
Abstract
A communication system includes: a network configuration memory that stores network configuration information of a first layer in which an area of the first layer whose low level configuration is desired to be concealed is represented by a preset symbol and that also stores network configuration information of a second layer showing the area represented by the preset symbol. The system also includes a network configuration management section that allows a first user to manage a network of the first layer using the network configuration information of the first layer and that also allows a second user to manage a network of the second layer using at least the network configuration information of the second layer.
-
Citations
15 Claims
-
1. A communication system, comprising:
-
a network configuration memory that stores; network configuration information of a first layer in which an area of the first layer whose low level configuration is desired to be concealed is represented by a preset symbol; and network configuration information of a second layer showing the area represented by the preset symbol; a network configuration management section that allows; a first user to manage a network of the first layer using the network configuration information of the first layer; and a second user to manage a network of the second layer using at least the network configuration information of the second layer; a mapping information memory that stores a relation of correspondence between a first identifier for identifying a user in the first layer, and a second identifier for identifying a user in the second layer; and a switch controller that causes a switch on a path of a user packet to write the second identifier in a header of the user packet, based on the first identifier contained in the user packet. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A virtual network management apparatus comprising:
-
a network configuration memory that stores; network configuration information of a first layer in which an area of the first layer whose low level configuration is desired to be concealed is represented by a preset symbol; and network configuration information of a second layer showing the area represented by the preset symbol; a network configuration management section that allows; a first user to manage a network of the first layer using the network configuration information of the first layer; and a second user to manage a network of the second layer using at least the network configuration information of the second layer; a mapping information memory that stores a relation of correspondence between a first identifier for identifying a user in the first layer, and a second identifier for identifying a user in the second layer; and a switch controller that causes a switch on a path of a user packet to write the second identifier in a header of the user packet, based on the first identifier contained in the user packet.
-
-
8. A method for management of a virtual network including a network configuration memory that stores network configuration information of a first layer in which an area of the first layer whose low level configuration is desired to be concealed is represented by a preset symbol, and that also stores network configuration information of a second layer showing the area represented by the preset symbol, the method comprising:
-
accepting an operation on a network of the first layer made by a first user with the use of the network configuration information of the first layer; accepting an operation on a network of the second layer made by a second user with the use of at least the network configuration information of the second layer; storing a relation of correspondence between a first identifier for identifying a user in the first layer, and a second identifier for identifying a user in the second layer; and causing a switch on a path of a user packet to write the second identifier in a header of the user packet, based on the first identifier contained in the user packet. - View Dependent Claims (9, 10, 11)
-
-
12. A non-transitory computer-readable recording medium storing a program that causes a computer, arranged in a virtual network including a network configuration memory that stores network configuration information of a first layer in which an area of the first layer whose low level configuration is desired to be concealed is represented by a preset symbol, and that also stores network configuration information of a second layer showing the area represented by the preset symbol, to execute a method, the method comprising:
-
accepting an operation on a network of the first layer made by a first user with the use of the network configuration information of the first layer; accepting an operation on a network of the second layer made by a second user with the use of at least the network configuration information of the second layer; storing a relation of correspondence between a first identifier for identifying a user in the first layer, and a second identifier for identifying a user in the second layer; and causing a switch on a path of a user packet to write the second identifier in a header of the user packet, based on the first identifier contained in the user packet. - View Dependent Claims (13, 14, 15)
-
Specification