Self-loop detection method and device used for access network

A detection method and self-loop technology, applied in the field of communication, can solve the problem of not being able to detect and process in time

Active Publication Date: 2008-06-11
ZTE CORP
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But for the network environment similar to Fig. 3 (HUB also can be the PC host computer of dual network card), above-mentioned detection method ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-loop detection method and device used for access network
  • Self-loop detection method and device used for access network
  • Self-loop detection method and device used for access network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be described in detail below with reference to the accompanying drawings and in combination with embodiments.

[0015] FIG. 4 shows a flowchart of a self-loop detection method for an access network according to an embodiment of the present invention, including the following steps:

[0016] Step S10, periodically sending a self-loop detection message with an authentication domain field;

[0017] Step S20, determining that the received message is a self-loop detection message;

[0018] Step S30, extracting the authentication domain field carried in the message and its MAC address; and

[0019] Step S40, if it is determined that the authentication domain field carried in the message is the same as the second authentication domain field in the self-loop detection message, it is confirmed that there is a self-loop abnormality in the access network.

[0020] This embodiment improves the self-loop detection method in the related art. When the port...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a self-loop detection method and a self-loop detection device which are used for an access network. The method comprises the following steps: a self-loop detection message provided with authentication domain fields is transmitted in definite time; judgment is made whether a received message is a self-loop detection message; an authentication domain field carried by the message and an MAC address of the message are extracted; moreover, if judgment is made that the authentication domain field carried by the message is the same with a second authentication domain field of the self-loop detection message, self-loop exception of the access network is determined. The invention can detect various self-loop conditions in the access network.

Description

technical field [0001] The present invention relates to the communication field, in particular to a self-loop detection method and device for an access network. Background technique [0002] Figure 1, Figure 2 and Figure 3 show self-loops in three different situations in the access network. In an access network, a self-loop is a relatively common network abnormality. As a result, the lighter MAC address is learned incorrectly, and the user cannot access the Internet normally. In severe cases, a network storm occurs, causing large-scale network paralysis. In order to eliminate the harm caused by the self-loop to the network, most network equipment suppliers provide the self-loop detection function, the basic principle of which is to send a message, if the message is received back from this port intact, Or just adding a Tag header, it means that there is a self-loop in the network connected to this port, and it is necessary to close this port and send an alarm message to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L1/20H04L12/26
Inventor 宋保科
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products