Control strategy generation method and apparatus

A control strategy and forwarding chip technology, applied in the field of communication, can solve problems such as inability to achieve results

Active Publication Date: 2016-02-17
HANGZHOU DPTECH TECH
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, the rate limit of each protocol or port is used to reduce the number of messages sent to the CPU. However, the rate limit only red

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control strategy generation method and apparatus
  • Control strategy generation method and apparatus
  • Control strategy generation method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Aiming at the problems encountered in the prior art, the present invention provides a method and device for generating a control strategy. The method for generating the control strategy generates at least one sending control strategy and at least one discarding control strategy respectively according to the protocol characteristics of the enabled protocol module and the IP address of the network device by checking the opening status of the protocol module of the CPU protocol stack, and sends them out to the forwarding chip to control the forwarding chip to send the received local message to the CPU or discard it.

[0019] Please refer to figure 1 , the control policy generation device provided by the present invention is applied to network equipment, the network equipment can be switches and routers, etc., the basic hardware environment of the network equipment includes CPU, forwarding chip, memory, non-volatile memory and other hardware. figure 2 It is a schematic di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a control strategy generation method and an apparatus which are applied to network equipment including a forwarding chip and a central processor CPU. The method comprises the following steps of examining a protocol module started by the CPU; according to a protocol characteristic of the started protocol module, generating at least one up-supply control strategy, wherein the up-supply control strategy is used to make the forwarding chip send a message which hits the up-supply control strategy and whose objective IP address is a local host to the CPU; according to an IP address of the local host, generating at least one discarding control strategy, wherein the discarding control strategy is used to discard the message which hits the discarding control strategy; issuing the up-supply control strategy and the discarding control strategy to the forwarding chip. By using the method and the apparatus, a quantity of messages sent to the CPU can be effectively controlled; and phenomena that protocol interruption occurs and equipment can not be managed because that a protocol message or a management message which needs to be sent to the CPU for processing is discarded during a message attack are avoided.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for generating a control strategy. Background technique [0002] With the advancement of network communication technology, network security issues caused by various network attacks have attracted increasing attention. At present, when a network device is attacked by a large number of packets that need to be sent to the CPU (including multicast and unicast packets sent to the local machine), due to the limited processing power of the CPU, no matter how ingenious the architecture design, no matter how high The algorithm with high performance will still be powerless in the face of a large number of attack packets. At this time, the packet receiving queue will be blocked because the CPU cannot process it in time, and subsequent packets sent to the CPU will be discarded. If the discarded packets are protocol packets or management packets, the proto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/813H04L47/20
Inventor 王富涛
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products