2016 International Conference on Information Networking (ICOIN) 2016
DOI: 10.1109/icoin.2016.7427149
|View full text |Cite
|
Sign up to set email alerts
|

Evaluations of a multiple flow tables construction scheme for service function chaining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 2 publications
0
2
0
1
Order By: Relevance
“…Different mechanisms can be used to differentiate traffic containers such as VLANs, VxLAN or tunnels. With the aim of better explaining the proposal, an approach based on VLANs as mentioned by Kim et al [25] is embraced. The residential network traffic is double-tagged using the 802.1ad standard (Q-in-Q).…”
Section: B Differentiated Traffic Treatment Conceptmentioning
confidence: 99%
“…Different mechanisms can be used to differentiate traffic containers such as VLANs, VxLAN or tunnels. With the aim of better explaining the proposal, an approach based on VLANs as mentioned by Kim et al [25] is embraced. The residential network traffic is double-tagged using the 802.1ad standard (Q-in-Q).…”
Section: B Differentiated Traffic Treatment Conceptmentioning
confidence: 99%
“…Different options to differentiate the network segments could be used, for instance: VLANs, VxLAN, tunnels or Network Service Header (NSH). To better explain the proposal, a VLAN-based network segmentation approach as mentioned in [12] is embraced.…”
Section: A Comprehensive Management Systemmentioning
confidence: 99%
“…Se pueden utilizar diferentes opciones para diferenciar los contenedores de tráfico, por ejemplo: VLANs, VXLAN o túneles. Con el objetivo de explicar de mejor manera la propuesta, se adopta un enfoque basado en VLANs, como el que mencionan Kim et al[106], para crear los contenedores.De esta manera, se pretende etiquetar doblemente el tráfico de la red residencial utilizando el estándar 802.1ad (Q-in-Q). Se utiliza la etiqueta externa S para identificar a la red residencial y se utiliza la etiqueta interna C para identificar el contenedor de tráfico.…”
unclassified