2017
DOI: 10.17487/rfc8151
|View full text |Cite
|
Sign up to set email alerts
|

Use Cases for Data Center Network Virtualization Overlay Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…• Segment Routing [5] • Data Center Network Virtualization Overlay (NVO3) Networks [6] • Generic Network Virtualization Encapsulation (GENEVE) [7] • Smart Grid [8] • Constrained Application Protocol (CoAP)…”
Section: As Of the Date Of Publication And Following Call(s) For The mentioning
confidence: 99%
See 1 more Smart Citation
“…• Segment Routing [5] • Data Center Network Virtualization Overlay (NVO3) Networks [6] • Generic Network Virtualization Encapsulation (GENEVE) [7] • Smart Grid [8] • Constrained Application Protocol (CoAP)…”
Section: As Of the Date Of Publication And Following Call(s) For The mentioning
confidence: 99%
“…When a user wants to transfer data across networks, the data is passed from the highest layer through intermediate layers to the lowest layer, with each layer adding additional information. 6 The lowest layer sends the accumulated data through the physical network; the data is then passed up through the layers to its destination. Essentially, the data produced by a layer is encapsulated in a larger container by the layer below it.…”
Section: The Need For Network Layer Securitymentioning
confidence: 99%
“…In 183 practice, the terms "IPsec VPN," "IKEv2 VPN," "Cisco IPsec," "IPsec XAUTH," and 184 "L2TP/IPsec" all refer to IPsec-based VPN connections. Some examples of technologies and 185 protocols that use IKE and/or IPsec are: 186 • Ethernet VPN (EVPN) and Virtual eXtensible Local Area Network (VXLAN) [4] • Software-Defined Networking (SDN) and Software-Defined Wide Area Network (SDWAN) • Segment Routing [5] • Data Center Network Virtualization Overlay (NVO3) Networks [6] • Generic Network Virtualization Encapsulation (GENEVE) [7] • Smart Grid [8] • Constrained Application Protocol (CoAP) • Low-Power Wireless Personal Area Network (6LowPAN) [9] • Routing protocol protection [10] such as Border Gateway Protocol (BGP)/BGP Monitoring Protocol (BMP) [11] and Open Shortest Path First (OSPFv3) [12] VPNs protect communications carried over public networks such as the Internet as well as private networks such as fiber networks or Multi-Protocol Label Switching (MPLS) networks. A VPN can provide several types of data protection, including confidentiality, integrity, data origin authentication, replay protection, and access control.…”
Section: Executive Summarymentioning
confidence: 99%
“…Common algorithms that are used to generate and verify digital signatures include RSA, the Digital Signature Algorithm (DSA), and the Elliptic Curve Digital Signature Algorithm (ECDSA). 6 NIST-approved digital 754 signature algorithms are specified in [29]. 755 3 Triple DES is deprecated and is expected to be disallowed in the near future.…”
Section: Peer Authenticationmentioning
confidence: 99%
See 1 more Smart Citation