Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for detecting medium access control (MAC) address conflicts

A technology of conflict detection and multicast address, which is applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problems of Layer 2 switches sending service response interaction messages by mistake, network devices not being able to access the network normally, attacks, etc. Achieve the effects of reducing the risk of network attacks, ensuring normal access, and avoiding MAC address conflicts

Active Publication Date: 2012-01-25
ZTE CORP
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the MAC addresses of existing network devices are mostly 48-bit addresses that are randomly solidified and generated at the factory, they cannot be changed.
In this way, with the increasing number of network devices connected to the Layer 2 switching network, it is more and more likely that different network devices have the same MAC address, which will lead to MAC address conflicts.
[0003] Since the data packet forwarding of the Layer 2 switch is based on the MAC address, when there is a MAC address conflict in the Layer 2 switching network, it will cause the MAC forwarding table to fluctuate, causing the Layer 2 switch to send a service response interaction message by mistake. , service access messages and other messages, which will cause network devices with MAC address conflicts to fail to access the network normally and cannot provide users with network services normally.
[0004] In addition, because the packets exchanged by the network will be directed to another device with conflicting MAC by the Layer 2 switch, it will not only lead to the risk of leakage of network confidential information, but also cause network attacks to be directed to undesired network devices or virtual devices, thus bringing risk of cyber attack
[0005] At present, although some network devices can automatically generate new MAC addresses according to preset policies and rules, the automatically generated MAC addresses will still conflict with the MAC addresses of other network devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for detecting medium access control (MAC) address conflicts
  • Method, device and system for detecting medium access control (MAC) address conflicts
  • Method, device and system for detecting medium access control (MAC) address conflicts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The invention discloses a network device as a network access initiation side, such as figure 1 As shown, the network device includes: a request message sending unit, a MAC address extraction unit, a detection unit and a MAC address generation unit; wherein,

[0051] The request message sending unit is used to send a MAC address conflict detection request message to the target multicast address before the network device accesses the network;

[0052] The MAC address extracting unit is used to extract the MAC address from the received MAC address conflict detection response message;

[0053] The detection unit is used to detect the extracted MAC address, and judge whether the extracted MAC address is the same as its own MAC address;

[0054] The MAC address generation unit is configured to generate a new MAC address when the extracted MAC address is the same as its own MAC address.

[0055] Optionally, the MAC address generation unit is specifically configured to genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for detecting medium access control (MAC) address conflicts. The method comprises: before the access to a network, local network equipment sends an MAC address conflict detection request message to a target multicast address; target network equipment which receives the request message sends an MAC address conflict detection response message to a request multicast address, wherein the conflict detection response message carries an MAC address of the target network equipment; and the local network equipment which receives the response message extracts the MAC address from the response message, performs detection, and generates a new MAC address while judging that the extracted MAC address is the same as the own MAC address. The invention also discloses a device and a system for detecting the MAC address conflicts. By utilizing the method, the device and the system, the MAC address conflicts can be effectively avoided to ensure the normal access to the network by the network equipment, provide normal network services for users, and reduce the risk of network attack.

Description

technical field [0001] The present invention relates to Ethernet access technology, in particular to a medium access control (Medium / Media Access Control, MAC) conflict detection method, device and system. Background technique [0002] At present, the Internet is an Internet Protocol Version 6 (IPv6) network. With the development of network technologies such as smart cities, electronic earth, and the Internet of Things, people's demand for access to IPv6 networks continues to expand anytime and anywhere. A variety of wired and wireless network devices are constantly connected to the IPv6 network. Moreover, with the development of virtualization technology, virtual network devices are also continuously added to the IPv6 network. However, since the MAC addresses of existing network devices are mostly 48-bit addresses that are randomly solidified and generated when they leave the factory, they cannot be changed. In this way, with the increasing number of network devices conne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L29/12H04L12/26H04L45/741H04L69/40
Inventor 赵真富喻敬海
Owner ZTE CORP