Unlock instant, AI-driven research and patent intelligence for your innovation.

Information processing method, network node, verification method and server

An information processing method and technology of network nodes, applied in the fields of network nodes, verification methods and servers, and information processing methods, can solve problems such as increasing the complexity of equipment management

Active Publication Date: 2020-04-03
HUAWEI TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the existing method, for each remote access node, it must be manually configured before it is connected to the network. The existence of a large number of remote access nodes increases the complexity of device management.
[0006] In addition, in the communication network, the identity of the user of the device is usually authenticated, which cannot prevent illegal nodes from accessing the communication network, resulting in the possibility of a large number of illegal nodes in the communication network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method, network node, verification method and server
  • Information processing method, network node, verification method and server
  • Information processing method, network node, verification method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0145] Embodiments of the present invention provide an information processing method and a network node, which are used to reduce the complexity of remote access node management in the communication network when there are a large number of remote access nodes in the communication network.

[0146] An information processing method provided by an embodiment of the present invention includes:

[0147] 2201. The central node determines that the first access node goes online;

[0148]2202. The virtual access node in the central node acquires configuration information related to the first access node;

[0149] 2203. After the first access node goes online, the virtual access node sends the configuration information related to the first access node to the first access node.

[0150] The configuration information related to the first access node may be configuration information of the first access node, or may be configuration information of a first user-side port in the first access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication, in particular to an information processing method, a network node, a verification method and a server. In the information processing method provided in the embodiment of the present invention, the central node determines that the first access node is online, and the virtual access node in the central node acquires configuration information related to the first access node; After the node goes online, the virtual access node sends the configuration information related to the first access node to the first access node. It is realized that the first access node operates after self-configuration according to the received configuration information, thereby realizing plug-and-play and reducing the complexity of remote access node management. In the verification method provided by the embodiment of the present invention, the verification server verifies the legitimacy of nodes to prevent illegal nodes from accessing the network.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an information processing method, a network node, a verification method and a server. Background technique [0002] figure 1 The network architecture of a common optical access network is shown, and the optical access network includes a passive optical access network, such as: fiber access (Fiber To The X, FTTX); and an active access network, such as: A digital subscriber line access multiplexer (DSLAccess Multiplexer, DSLAM) is connected to an optical line terminal (Optical Line Termination, OLT) through an Ethernet (ETHernet, ETH). [0003] FTTX is divided into Fiber To The Home (FTTH), Fiber To The Drop / Distribution point (FTTDp), Fiber To The Building (Fiber To The Building) according to the position of the Optical Network Unit (ONU). , FTTB) and fiber to the curb (Fiber To The Curb, FTTC) and so on. [0004] At present, the optical access network mainly adopts Passi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L12/24
CPCH04L9/32H04L41/0809H04L41/084H04L41/0889H04L12/2885H04Q11/0067H04L61/5014H04L41/0895H04L41/0806H04L63/0884H04L63/0892H04L67/141
Inventor 郑若滨
Owner HUAWEI TECH CO LTD