Network for securing special line user to access to network
A user, network technology, applied in the network field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Below according to accompanying drawing and embodiment the present invention will be described in further detail:
[0033] Many options are defined in the DHCP protocol, one of which is Option82, such as figure 1 As shown, two sub-options, Circuit ID Sub-option (ie CID) and Remote ID Sub-option (ie RID), are defined, where:
[0034] CID is the link identifier, which is generally used to identify the user's access location information (local information);
[0035] The RID is a remote identifier, which is generally used to identify attribute information (global information) of a device.
[0036] The general process of the DHCP protocol is as follows: figure 2 As shown, a DHCP Discovery (probing) message sent by the user indicates the beginning of a user dynamically obtaining an address, and a DHCPACK (response) message returned by the server indicates the end of a successful address acquisition.
[0037] The access device (such as DSLAM) of the present invention capt...
PUM
![No PUM](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
Description
Claims
Application Information
![application no application](https://static-eureka.patsnap.com/ssr/23.2.0/_nuxt/application.06fe782c.png)
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com