Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method of two-dimension routing protocol and device using protocol

A technology of routing protocol and implementation method, applied in the direction of digital transmission system, electrical components, transmission system, etc., can solve problems such as network security problems that cannot be solved, and achieve the effect of improving transmission security

Inactive Publication Date: 2015-05-27
SHENZHEN OUDMON TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional routing protocol based on the destination address can no longer meet the needs of users, for example, it cannot solve serious security problems in the network. The traditional routing protocol only looks at the destination address and treats all sources equally. However, in reality, some source addresses Malicious attackers should not reach the currently considered destination address

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of two-dimension routing protocol and device using protocol
  • Implementation method of two-dimension routing protocol and device using protocol
  • Implementation method of two-dimension routing protocol and device using protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Embodiment 1 of the present invention provides a method for implementing a two-dimensional routing protocol, wherein each router in the routing network is provided with its own security weight according to the security level, and the ingress router receives the data message that needs to be sent to the egress router , and when establishing a transmission path for sending this datagram, such as figure 1 As shown, the method includes:

[0032] In step 201, the ingress router sends a two-dimensional advertisement report carrying a source prefix and a destination prefix to the routing network in a flooding manner.

[0033] Wherein, the source prefix and the destination prefix are the network addresses of the ingress router and the egress router respectively. The ingress router is a router sending data packets in the routing network; the egress router is a router on the destination terminal side in the routing network, for example: the egress router is a router directly con...

Embodiment 2

[0073] In Embodiment 1 of the present invention, a method for implementing a two-dimensional routing protocol is proposed. Steps 201-204 of the main solution are how to obtain a safe and efficient transmission path. The scheme of performing security verification on the routers on the transmission path in the network (steps 401-404), however, in the actual implementation process, the authority owned by the operator may only exist on the exit router, while for other routers on the transmission path There is no function of setting a blacklist (it is common when the egress router is used as a router for individual users). Therefore, this embodiment 2 proposes a method for how to solve the router security problem for the egress router, wherein each router in the routing network is provided with its own security weight according to the security level, such as Figure 5 Said, the method includes the following steps:

[0074] In step 601, the egress router receives the data packet de...

Embodiment 3

[0085] The embodiment of the present invention also provides a device suitable for two-dimensional routing protocols, such as Figure 6 As shown, it includes a storage device 1, an input and output device 2, and a processing device 3. The storage device is connected to the processing device, and the input and output device is connected to the processing device. Specifically:

[0086] The storage device 1 is used for storing a blacklist, and the blacklist includes network addresses of routers with security problems.

[0087] The input and output device 2 is used to receive the data message sent by the router on the transmission path.

[0088] The processing device 3 is configured to obtain the source prefix and the destination prefix carried in the data message; verify the security of the router corresponding to the source prefix; and use the input and output device 2 to forward the The data message is sent to the destination terminal.

[0089] It is worth noting that the inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of router transmission, and provides an implementation method of a two-dimension routing protocol. Respective safety weight is set for each router in a routing network according to the safety level. When an ingress router receives a data message required to be sent to an egress router and establishes a transmission path for the data message, the method comprises steps as follows: the ingress router sends a two-dimension announcement report carrying a source prefix and a target prefix to the routing network in a flooding manner; the ingress router receives a two-dimension announcement response returned by each router in the routing network, and the two-dimension announcement response carriers path weight and safety weight of each router; the transmission path with the optimal comprehensive weight is calculated according to the path weight and the safety weight; the data message is transmitted through the transmission path. Double indexes of the shortest transmission path and the transmission path safety are balanced, and the transmission safety of a data pack in the conventional routing network is improved.

Description

【Technical field】 [0001] The invention relates to the technical field of routing transmission, in particular to a method for realizing a two-dimensional routing protocol and a device using the protocol. 【Background technique】 [0002] With the development of the network, the needs of the network are also increasingly personalized. For example, in a home network, both the number and complexity of devices have increased significantly compared to the past. The current home network may include wired or wireless devices, and it may be necessary to transmit data packets with privacy characteristics along a specified path, or transmit data packets with non-privacy characteristics along another path. In a traditional home network, the network topology is very simple. Generally, it is only necessary to place a router at the exit and set a default route inside. [0003] The traditional routing protocol based on the destination address can no longer meet the needs of users, for examp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/733H04L12/757H04L12/753H04L45/122
CPCH04L45/02H04L45/021H04L45/122H04L45/32H04L63/1441H04L63/18
Inventor 杨术明中行潘岱吴振洲杨超
Owner SHENZHEN OUDMON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products