Multicast security control method, system and transmission node

A transmission node and security control technology, applied in the field of communication, to achieve the effect of ensuring security, avoiding attacks, and improving security

Active Publication Date: 2010-08-04
RUIJIE NETWORKS CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The embodiment of the present invention provides a multicast security control method, system and transmission node, which are used to solve the security problem of the upstream node of the multicast data stream existing in the prior art, and prevent the attack of the transmission node in the network by the illegal multicast source

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast security control method, system and transmission node
  • Multicast security control method, system and transmission node
  • Multicast security control method, system and transmission node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The multicast security control system provided by the embodiment of the present invention may include: a multicast source, a transmission node, and a receiver. Wherein, the multicast source is used to provide multicast flow data packets, and send them to the transmission nodes connected to itself. The transmission node is used to transmit the received multicast flow data message to the downstream node or the receiving end. The receiving end is used to receive the multicast flow data message sent by the transmission node.

[0033] Such as figure 1 Shown is a structural example of the multicast security control system. figure 1 The multicast sources shown in include: legal multicast sources S1, illegal multicast sources S2 and S3, etc.; transmission nodes include: transmission nodes A, B, C, D, E, etc.; and receivers include: receivers R1 and R2 etc.

[0034] The multicast source is used to provide multicast flow data packets to the transit nodes.

[0035] The transm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multicast security control method, a system and a transmission node. The method includes the following steps that: the transmission node receives a multicast stream data message from an upstream port; according to multicast address information and upstream port information contained in the data message, a preestablished matched upstream port item containing the multicast address information and the upstream port information are queried; if the upstream port item exists, the data message is forwarded according to a data forwarding table of a multicast group owning the data message; if the upstream port item does not exist, whether the upstream port is a preconfigured valid upstream port is judged, if yes, a new upstream port item is created according to the multicast address information and the upstream port information, the data message is forwarded according to a data forwarding table of a forwarding path corresponding to the multicast group owning the data message, and if no, the data message is discarded. The invention effectively ensures the security of an upstream node of a multicast stream and prevents the attack of invalid multicast sources on transmission nodes.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a multicast security control method, system and transmission node for multicast data flow forwarding in a local area network. Background technique [0002] On the Internet, multimedia services such as video conferencing and Internet TV are becoming an important part of information transmission. Multicast is to effectively solve the problem of single-point transmission and multi-point reception. When the sender sends data to a group of receivers, it only needs to send the data with a reserved group address. Only the receivers who join the multicast group can receive the multicast data, and other users on the network will not receive the data. to the multicast data. In this way, the sender only needs to send data once, and it can be sent to all receivers, which greatly reduces the load on the network and the sender. [0003] Based on the IP multicast model of RFC 1112, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L12/18H04L45/16
Inventor 倪宏
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products