SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

TeraFlowSDN Release 4: Advanced network security

7 Nov 2024

TeraFlowSDN Release 4: Advanced network security
Contact company
Contact ETSI
icon Add as a preferred source Download PDF version
Related Links
  • Unlocking new potential in video security through AI

ETSI is pleased to announce the 4th Release of TeraFlowSDN, the Software-Defined Networking (SDN) controller developed by Software Development Group TFS.

Release 4 brings a large suite of new features designed to provide Quantum Key Distribution (QKD) integration, end-to-end Network Automation and Monitoring, and significant improvements in Network Management, Optical Networks, Security and Blockchain Integration, among others.

Quantum key distribution

South Bound Interface has grown to manage quantum network devices, facilitating dynamic configuration

In response to the growing need for secure communication in the quantum era, TeraFlowSDN Release 4 includes support for quantum key distribution (QKD). This introduces a new network topology model within the controller to accommodate quantum links and nodes, enabling efficient routeing and resource allocation for QKD.

The South Bound Interface has been extended to manage quantum network devices, facilitating dynamic configuration of QKD systems. Additionally, control protocols and specific management features for QKD operations have been implemented, along with a user-friendly interface for QKD management. Finally, a dedicated QKD Application Register has been included.

End-to-end network automation and monitoring

TeraFlowSDN has significantly improved its network automation and monitoring capabilities by aligning with the ETSI Zero-touch network and Service Management (ZSM) architecture. The Monitoring component has been replaced by three new components: KPI Manager, Telemetry and Analytics:

  • The KPI Manager focuses on managing the KPI descriptors that detail the observation points in the network together with the samples type they manage.
  • The Telemetry component focuses on interfacing with the network equipment and collecting the monitoring data.
  • The Analytics component performs data analysis ranging from simple data aggregation and threshold-based alarms to complex statistical analysis and future machine learning algorithms. 

Network and automation framework

A new automation component enhances the controller's abilities, completing the KPI Manager

In addition, a new automation component further enhances the controller's capabilities, complementing the KPI Manager, Telemetry, Analytics and Policy components to enable advanced automation within the network.

This new network and automation framework has been designed using auto-scalable components and front-end/back-end architectures to cope with stringent monitoring requirements imposed by 5G/6G infrastructures.

Network management

TeraFlowSDN Release 4 includes functionality to retrieve logical inventory from network devices, including detailed information such as ACLs, interfaces, routing policies, and VRFs using NETCONF and OpenConfig data models via the device driver. The interface information is saved in network instance configuration rules, providing a more comprehensive view of the network topology.

The North Bound Interface supports the IETF Inventory data model to allow exporting device inventory items using, facilitating integration with external systems. TeraFlowSDN now also supports the IETF network slice format, allowing IETF-formatted slices to be uploaded and processed through the WebUI component.

Optical networks

TeraFlowSDN Controller supports the complete life cycle management of both optical band configuration

The TeraFlowSDN Controller now supports the complete life cycle management of both optical band and media-channel configurations with emulated NETCONF devices. 

Automatic discovery of OpenConfig Multi-Granular Optical Nodes (MG-ONs) is now possible, including interfaces and capabilities for wavelength-based, waveband-based, and fiber-based interfaces.

TeraFlowSDN context

To synchronise the link status among the optical controller module and the TeraFlowSDN context, link spectrum occupation is maintained in the database, optimising storage by representing multi-band slots efficiently. Topology synchronisation between the optical controller and the TeraFlowSDN context eliminates the need for dedicated topology files during bootstrap. 

The WebUI displays the current configuration of OpenConfig devices, with information gathered via NETCONF and synchronised with the context database.

Security and blockchain integration

DLT Gateway functionality has been replaced with a new open-source component-compliant

The existing Distributed Ledger Technology (DLT) Gateway functionality has been replaced with a new open-source component compliant with Hyperledger Fabric v2.4+. 

This new implementation retains the core functionality of enabling TeraFlowSDN to communicate with the blockchain and facilitates operations such as updating, adding, deleting, and fetching assets, handles various asset types in JSON format, and includes automation scripts for its deployment as a Kubernetes service.

Other notable improvements

A new NBI connector based on IETF RFC 8519 has been implemented, enabling the management of network Access Control Lists (ACLs) through standardised YANG data models. A QoSProfile component supports the translation of Quality of Service (QoS) profiles into service and slice constraints, integrating with the LF CAMARA Quality on Demand API via the TeraFlowSDN NBI.

The North Bound Interface has been extended to include Create, Update, and Delete methods for entities such as context, topology, device, link, service, and slice. Service database management has been generalised by optimising CockroachDB secret management and generalising database handling classes, improving consistency and efficiency across components.

Release of TeraFlowSDN

"We are excited to deliver this new Release of TeraFlowSDN, incorporating advanced features that meet the evolving needs of modern networks," said Ricard Vilalta, Chair of ETSI SDG TeraFlowSDN.

"The integration of quantum key distribution capabilities, enhanced automation, and improved network inventory management positions TeraFlowSDN the most competitive Network Automation and Security Framework in the Open-Source community. These enhancements provide our users with the tools they need to build secure, efficient, and future-proof networks."

Discover TeraFlowSDN Release 4 at the ETSI SNS4SNS event

TeraFlowSDN Release 4 was shown during the ETSI Software and Standards for Smart Networks 

TeraFlowSDN Release 4 will be extensively demonstrated during the ETSI Software and Standards for Smart Networks and Services event, that will take place in ETSI premises, in Sophia Antipolis, France 12-14 November 2024.

The event will bring together experts and decision makers from industry standardisation, open source communities and research initiatives, for a 1.5 days of conference and several Hackfests, including the 5th TeraFlowSDN Hackfest. Participation is free and open to all, but seats are limited.

Register to the TeraFlowSDN Release 4 overview webinar

The TeraFlowSDN Release 4 Webinar will take place on 10th December 2024, 14:00 CET, to provide an extended overview of this latest release, where TeraFlowSDN becomes a Network Automation and Security Framework that is redefining the future of network management.

The webinar will showcase new features such as Quantum Key Distribution (QKD) control, enhancements to network automation, and improvements on inventory management.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security management
  • Security monitoring system
  • Network monitoring
  • Video analytics
  • Identity management
  • Wireless security
  • Network cameras
  • Security software
  • Security service
  • IP security solutions
  • Integration software
  • Internet of Things (IoT)
  • Incident Management
  • Machine Learning
  • Related links
  • ETSI Software and Standards for Smart Networks and Services
  • Control Software CCTV software
  • Detection Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Recording Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • Bollards
  • Power supplies & batteries
  • CCTV software
  • Barricades
  • Video servers (IP transmission)
  • Gates
  • Barriers
  • Storage
Related white papers
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Open credential standards and the impact on physical access control

Open credential standards and the impact on physical access control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
2026 Trends in retail security: Interface Systems insights

2026 Trends in retail security: Interface Systems insights

Why open matters in the age of AI

Why open matters in the age of AI

Verkada: AI-driven security revolution & $5.8B valuation

Verkada: AI-driven security revolution & $5.8B valuation

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Product news
About this page

Discover TeraFlowSDN Release 4: advanced network security, automation, and Quantum Key Distribution integration for enhanced modern network management. Join our webinar for an in-depth overview. Register now!

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec