Unlock instant, AI-driven research and patent intelligence for your innovation.
BFD session establishment method and bfd session system for unidirectional path detection
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of path detection and session establishment, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve the problem of not being able to satisfy simple, flexible security at the same time, and achieve the effect of improving security
Active Publication Date: 2016-12-14
MAIPU COMM TECH CO LTD
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0010] The technical problem to be solved by the present invention is: to provide a BFD session establishment method and session system for unidirectional path detection, so as to solve the problem that the solution of using BFD to detect unidirectional paths in the traditional technology cannot meet the requirements of simplicity, flexibility, and multi-hop support at the same time. , high security issues
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0060] In this embodiment 1, the implementation process of the active end is as follows figure 2 shown, including the following steps:
[0061] Step 201: Pre-configure the authentication type as SimplePassword for establishing a BFD session for a unidirectional upper-layer application protocol, and configure Key ID and Password at the same time.
[0062] Step 202: Receive a unidirectional instruction to establish a BFD session from an upper layer application protocol, create a BFD session and trigger the session state machine to run.
[0063] Step 203: Whether the session state is Down, if yes, execute step 204; otherwise, execute step 205.
[0064] Step 204: According to the authentication type Simple Password configured at the local end, as well as the Key ID and the corresponding Password, construct a BFD control packet with the A bit (Authentication Present, authentication identifier) set to 1 and send the authentication information to the passive terminal, where the ...
Embodiment 2
[0079] In this embodiment 2, the implementation process of the active end is as follows Figure 5 shown, including the following steps:
[0080] Step 501: Pre-configure the authentication type as Keyed MD5 for establishing a BFD session for a unidirectional upper-layer application protocol, and configure Key ID and Secret Key at the same time.
[0081] Step 502: After receiving an instruction to establish a BFD session from a unidirectional upper-layer application protocol, establish a BFD session and trigger the session state machine to run.
[0082] Step 503: Whether the session state is Down, if yes, execute step 504, otherwise execute step 505.
[0083] Step 504: According to the Keyed MD5 authentication type configured at the local end, as well as the Key ID and the corresponding SecretKey, construct a BFD control packet with the A bit (Authentication Present, authentication identifier) set to 1 and send the authentication information to On the passive side, the authe...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to a bidirectional forwarding detection technology in the field of network communication equipment, which discloses a BFD session establishment method for unidirectional path detection, so as to solve the problem that the solutions in the traditional technology cannot simultaneously meet the requirements of simplicity, flexibility, multi-hop support, and high security The problem. The main points of the technical solution are: the active end and the passive end predetermine the authentication information for establishing a BFD session, and the active end establishes a BFD session after receiving an instruction to establish a BFD session from the one-way upper-layer application protocol and sends a message containing the corresponding authentication information to the passive end. The passive end receives the BFD control packet sent by the active end, and detaches the packet to the corresponding BFD session after the packet validity check is successful. When detaching the packet, if it determines that there is no corresponding BFD session The BFD control message needs to be authenticated, and the authentication information predetermined with the active end is used for authentication. After the authentication is passed, a BFD session is established. In addition, the invention also discloses a BFD conversation system, which is suitable for network communication.
Description
technical field [0001] The present invention relates to a bidirectional forwarding detection (Bidirectional Forwarding Detection, BFD) technology in the field of network communication equipment, in particular to a method for establishing a BFD session for unidirectional path detection and a BFD session system. Background technique [0002] BFD is a set of standardized lightweight detection protocols, which are used to quickly detect and monitor the connectivity status of paths or IP routing and forwarding in the network. It provides a general, standardized, medium-independent, and protocol-independent fault detection mechanism, which can provide unified, continuous, and rapid fault detection for various upper-layer routing protocols, MPLS (Multiprotocol Label Switching, multi-protocol label switching), etc. ability. [0003] In many respects, BFD is similar to the simple Hello protocol used in known routing protocols to detect neighbor failures. Before BFD detects, a BFD s...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.