Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method, system and equipment for access network

A technology for accessing the network and protecting the system, which is applied in the field of communication, can solve problems such as not providing load sharing protection, achieve the effect of enhancing reliability and scalability, and improving satisfaction

Inactive Publication Date: 2009-06-10
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] As the network capacity continues to increase, the network is required to have high scalability requirements and reliability. Load sharing protection is an important feature of the network. The current IP session access and L2CM / ANCP control architecture does not provide load sharing protection. mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method, system and equipment for access network
  • Protection method, system and equipment for access network
  • Protection method, system and equipment for access network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The basic architecture of the session access protection system in the embodiment of the present invention is as follows: figure 2 As shown, there are at least two AENs (Access Edge Node, Access Edge Node) in the access network. Fee) server, DHCP or AAA server can also be integrated or embedded in AEN equipment as a functional module, AEN downlink connected to AN (Access Node, access node), AN and AEN include aggregation network or direct line, each AN There are communication paths with at least two AENs, and AN and AEN can adopt link redundancy protection, such as AN is connected to different AENs through different links or paths, where the links or paths include VLAN (Virtual Local Area Network, ie virtual local area network), PVC (Permanent Virtual Circuit, permanent virtual circuit), LSP (LabelSwitching Path, label path switching), port, etc. The user terminal (UE or RG) is connected to the AN through an access line, such as DSL (Digital Subscriber Line, Digital Su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting an access network, which comprises the following steps: receiving an access session message which carries with sharing processing indication information and is used for the negotiation and the establishment of an access session; and performing sharing processing on the access session message according to the sharing processing indication information in the access session message. The invention discloses a system and a device for protecting the access network. Through expanding an access session to access a scene and using load sharing to protect the network, the method enhances the reliability and the expandability of the network and improves the degree of satisfaction of users.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a protection method, system and equipment for accessing a network. Background technique [0002] With the popularization of broadband network applications, network access management and control has become an important part of broadband network management and control. Broadband access management and control includes user access management and service deployment control. User access management generally controls and manages access users by establishing access sessions, mainly including access authentication, authorization, and accounting. The current main mode of broadband access management and control is to establish a PPP (Point to Point Protocol, point-to-point protocol) session for access control and management, such as: PPPoE (PPP over Ethernet, PPP based on Ethernet) or PPPoA (PPP over ATM, PPP based on asynchronous transfer mode), not only provides users with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06H04L12/911
Inventor 阳振庭
Owner HUAWEI TECH CO LTD