Method for preventing service interruption and network equipment

A technology for intermediate network equipment and network equipment, applied in the field of communication, can solve problems such as affecting services, and achieve the effect of avoiding business interruption and preventing business interruption.

Active Publication Date: 2014-04-23
HUAWEI TECH CO LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The path removal notification message belongs to the control plane message, and the forwarding time of the control plane message is 1-3 seconds. Therefore, it takes 1-3 seconds for network device A to receive the path removal notification message sent by B. Within 3 seconds, network device B has

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing service interruption and network equipment
  • Method for preventing service interruption and network equipment
  • Method for preventing service interruption and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0065] figure 1 A flow chart of a method for preventing service interruption provided by an embodiment of the present invention, such as figure 1 As shown, the method of this embodiment may include:

[0066] Step 101. When service packets are transmitted on the pre-established active path, the intermediate network device on the active path obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method for preventing service interruption and network equipment. Middle network equipment actively detects whether the middle network equipment is subjected to protocol attack according to a detection period; because the detection period is shorter than protocol conversion interruption duration, the middle network equipment informs upstream network equipment that the middle network equipment is subjected to the protocol attack before service is actively removed due to abandonment of keep-alive messages, and the upstream network equipment timely switches the service to a standby path before service interruption, so that before the service interruption of the middle network equipment due to the protocol attack, the upstream network equipment switches the service from a main path to the standby path to avoid the service interruption.

Description

technical field [0001] The embodiments of the present invention relate to communication technologies, and in particular to a method and network equipment for preventing service interruption. Background technique [0002] With the development of the Internet, the network environment is becoming more and more complex, and network attacks are becoming more and more frequent. Flooding attacks are a common network attack. Flooding attacks send a large number of protocol packets to network devices in a short period of time. The processor (Central Process Unit, referred to as CPU) is responsible for processing various protocol packets, but the processing capability of the CPU is limited, that is, the rate of protocol packets that can be processed is limited. If there is a network attack that causes the protocol packets received by the CPU to exceed the The processing capability of the CPU may cause normal packets not to be processed and service interruption may occur, or it may cau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/26H04L12/707H04L45/24
Inventor 李德根
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products