Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for ensuring the security of ring network protocol operation

A technology with protocol security and operation security, applied in the field of network communication, it can solve the problems of link flapping, network paralysis, logical looping of protocol packets, etc., and achieve the effect of improving security.

Active Publication Date: 2022-02-25
ZTE CORP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These spoofed messages will lead to drastic changes in the state of the ring network, rapid link vibration, and a large number of protocol messages. The most serious consequence is that the protocol packets logically form a loop and the network is paralyzed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for ensuring the security of ring network protocol operation
  • A method and device for ensuring the security of ring network protocol operation
  • A method and device for ensuring the security of ring network protocol operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0044] figure 1 It is a flow chart for ensuring the security of the operation of the ring network protocol provided by the embodiment of the present invention, such as figure 1 As shown, the steps include:

[0045] Step S101: The ring node in the Ethernet ring network receives the protocol message, and obtains the encrypted information carried by the protocol message to ensure the safe operation of the ring network protocol.

[0046] The ring nodes in the Ethernet ring network obtain the encrypted information from the reserved field of the protocol message by analyzing the received protocol message.

[0047] Step S102: The ring node determines, accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for ensuring the safe operation of a ring network protocol, and relates to the field of network communication. The method includes: a ring node in an Ethernet ring network receives a protocol message, and obtains a protocol message carried by the protocol message for Encrypted information to ensure the safe operation of the ring network protocol; the ring node determines that the source node of the protocol message is another ring node or a non-ring network node of the Ethernet ring network according to the encrypted information; if it is determined that the protocol The source node of the message is other ring nodes of the Ethernet ring network, then the ring node processes and forwards the protocol message; if it is determined that the source node of the protocol message is a non-ring network node, then the The ring node discards the protocol packet. The embodiments of the present invention can effectively improve the security of ring network protocol operation by encrypting and decrypting protocol messages, and prevent the ring network nodes from affecting the stability of the ring network due to responding to disguised attack messages.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method and device for ensuring the safe operation of a ring network protocol. Background technique [0002] The Ethernet ring network refers to the Ethernet composed of a physical ring structure. It prevents logical ring formation by blocking the backup links in the Ethernet ring network. If a loop is logically formed, the broadcast information will propagate infinitely in the ring network, and the ring network will be flooded with a large amount of broadcast information. [0003] In actual engineering applications, some extreme situations sometimes occur, such as being attacked by protocol packets. These spoofed messages will lead to drastic changes in the state of the ring network, rapid link vibration, and a large number of protocol messages. The most serious consequence is that the protocol packets logically form a loop and the network is paralyzed. Therefore, it is v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L12/42
CPCH04L63/126H04L63/0876H04L12/42H04L63/0428H04L9/40
Inventor 许进林
Owner ZTE CORP