Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for ensuring operation safety of looped network protocol

A protocol security and operation security technology, applied in the field of network communication, can solve the problems of link oscillation, network paralysis, logical looping of protocol packets, etc., to avoid stability and improve security.

Active Publication Date: 2019-07-23
ZTE CORP
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These spoofed messages will lead to drastic changes in the state of the ring network, rapid link vibration, and a large number of protocol messages. The most serious consequence is that the protocol packets logically form a loop and the network is paralyzed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for ensuring operation safety of looped network protocol
  • Method and device for ensuring operation safety of looped network protocol
  • Method and device for ensuring operation safety of looped network protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0044] figure 1 It is a flow chart for ensuring the security of the operation of the ring network protocol provided by the embodiment of the present invention, such as figure 1 As shown, the steps include:

[0045] Step S101: The ring node in the Ethernet ring network receives the protocol message, and obtains the encrypted information carried by the protocol message to ensure the safe operation of the ring network protocol.

[0046] The ring nodes in the Ethernet ring network obtain the encrypted information from the reserved field of the protocol message by analyzing the received protocol message.

[0047] Step S102: The ring node determines, accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for ensuring the operation safety of a ring network protocol, and relates to the field of network communication, the method comprises the following steps:receiving a protocol message by a ring node in an Ethernet ring network, and obtaining encryption information carried by the protocol message and used for guaranteeing the safe operation of the ringnetwork protocol; enabling the ring node to determine that the source node of the protocol message is other ring nodes or non-ring network nodes of the Ethernet ring network according to the encryption information; if it is determined that the source node of the protocol message is other link nodes of the Ethernet ring network, enabling the link nodes to process and forward the protocol message; and if it is determined that the source node of the protocol message is a non-looped network node, enabling the link node to discard the protocol message. According to the embodiment of the invention,the protocol message is encrypted and decrypted, so that the running safety of the looped network protocol can be effectively improved, and the looped network node is prevented from responding to thedisguised attack message to influence the stability of the looped network.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method and device for ensuring the safe operation of a ring network protocol. Background technique [0002] The Ethernet ring network refers to the Ethernet composed of a physical ring structure. It prevents logical ring formation by blocking the backup links in the Ethernet ring network. If a loop is logically formed, the broadcast information will propagate infinitely in the ring network, and the ring network will be flooded with a large amount of broadcast information. [0003] In actual engineering applications, some extreme situations sometimes occur, such as being attacked by protocol packets. These spoofed messages will lead to drastic changes in the state of the ring network, rapid link vibration, and a large number of protocol messages. The most serious consequence is that the protocol packets logically form a loop and the network is paralyzed. Therefore, it is v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/42
CPCH04L63/126H04L63/0876H04L12/42H04L63/0428H04L9/40
Inventor 许进林
Owner ZTE CORP