Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Figure 4

Topology of the testing network.