Method for securing special line user access network

A user and private line technology, applied in the network field, can solve the problems of heavy configuration workload, easy IP address theft, difficult management, etc., to achieve the effect of avoiding theft

Active Publication Date: 2009-07-15
HUAWEI TECH CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The technical problem to be solved by the present invention is: to overcome the problems of difficult management, heavy configuration workload and easy theft of IP addresses existing in the prior art us

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securing special line user access network
  • Method for securing special line user access network
  • Method for securing special line user access network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0034] The following describes the present invention in further detail based on the drawings and embodiments:

[0035] Many options are defined in the DHCP protocol, one of which is Option82, such as figure 1 As shown, two sub-options, Circuit ID Sub-option (CID) and Remote ID Sub-option (RID) are defined, among which:

[0036] CID is the link identifier, generally used to identify the user's access location information (partial information);

[0037] RID is the remote identification, and is generally used to identify the attribute information (global information) of the device.

[0038] The general flow of the DHCP protocol is as follows figure 2 As shown, the DHCPDiscovery message sent by the user indicates the beginning of a user's dynamic address acquisition, and a DHCPACK (response) message returned by the server indicates the end of a successful address acquisition.

[0039] The access device (such as DSLAM) of the present invention first captures the uplink DHCP messages ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of ensuring individual line subscriber to get on the Internet pre-configures configuration information aiming at DHCP optional information on DHCP server supporting DHCP optional function; the DHCP message sent by user is added with the DHCP optional information after passing through the access apparatus and then transmitted to the DHCP server; the DHCP server searches the matched configuring information according to the received optional information in DPCH message and returns the corresponding configuring information to the access apparatus by response message, and backfills the optional information in the response message; the access apparatus obtains the configuring information of the user by the response message and utilizes the configuring information to generate dynamic binding relationship to the user terminal. The invention conquers the problem the static IP address binding function used in the prior art is difficult for being managed, has large configuration workload and the IP address is easy to be stolen; the invention can simplify the configuration and is convenient for management and increases the safety of IP address.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for ensuring dedicated line users to access the Internet. Background technique [0002] Dynamic Host Configuration Protocol (DHCP) is the most commonly used protocol for controlling Internet access. The protocol itself is mature and simple, and existing computer operating systems such as Windows and Unix support this protocol. Using this protocol, users do not need to care about themselves What is the IP address? Every time you go online, you only need to use this protocol to dynamically obtain an address from the address pool on a specific DHCP server, and then you can go online without any additional configuration or installation of additional dial-up tools. For network managers and general It is very simple for users. [0003] But for some dedicated line users, the user may prefer to use a fixed address for a period of time, such as the user wants to open various se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/12H04L29/06H04L12/28
Inventor 施汝军
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products