Access control method and equipment

A technology of access control and access control strategy, which is applied in the field of network communication, can solve the problems of intercommunication and failure of site network C, and achieve the effect of access control

Active Publication Date: 2012-11-14
XINHUASAN INFORMATION TECH CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, there are often specific requirements for access control. For example, site network A can o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and equipment
  • Access control method and equipment
  • Access control method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0030] The method provided by the present invention is applied to the ED in the site network, for example, figure 1 Any ED shown from ED1 to ED3. Among them, in order to provide access control for specific data center networking requirements, the present invention needs to deploy the roles of EDs in each site network in the networking according to the actual application of the networking. Among them, the roles of EDs are mainly divided into two types: one is neighbor Discovery Server (ENDS), and the other is Neighbor Discovery Client (ENDC). In the networking, the number of ENDS is relatively small, generally 1 or 2, while the number of ENDCs is relatively large. figure 2 It shows the networking in which EDs in site network 1 serve as ENDS, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method and equipment. The method comprises that an ED is used as a neighbor discovery server ENDS, receives the registration which is sent out by the ED which is used as a neighbor discovery client EDNC, and informs any other ENDCs which are registered to the ENDS to the ENDCs which initiate the registration; and the ED is used as the ENDC, initiates the registration to the ED which is used as the ENDS, and acquires any other ENDCs which are registered in the ENDS from the ENDS, the ENDC which is alternately accessed to the ENDC from all the acquired ENDCs to establish a virtual forwarding passage according to the visit control strategy of the ENDC, so the established virtual forwarding passage is used to alternately accessed the selected ENDC.

Description

technical field [0001] This application relates to network communication technology, in particular to an access control method and device. Background technique [0002] Ethernet Virtualization Interconnection (EVI: Ethernet Virtualization Interconnection) technology is based on existing service provider networks and enterprise networks, and provides flexible Layer 2 interconnection functions for dispersed sites. The EVI solution is very simple and low-cost. It only needs to deploy one or more EVI-enabled devices, referred to as edge devices (ED: Edge Device), at the edge of the site, and the enterprise network and service provider network do not need to make any changes. [0003] EVI is an advanced MAC in IP technology used to implement L2VPN technology based on IP core network. EVI only maintains routing and forwarding information on the ED of the site without changing the internal and core networks of the site. The overall network of EVI is composed of Core network, Site...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 曹霞
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products