Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication method and device, storage medium and processor

A communication method and processor technology, applied in transmission systems, electrical components, etc., can solve the problems of inability to configure management addresses, separate management addresses, and complex configuration of management addresses, and improve the convenience of deployment.

Active Publication Date: 2020-07-28
贺雪峰
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present application provides a communication method, device, storage medium and processor to solve the problem in the related art that a management address needs to be configured separately when a network device is connected to the network, the configuration of the management address is complicated and cannot be configured when the management address is in short supply

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method and device, storage medium and processor
  • Communication method and device, storage medium and processor
  • Communication method and device, storage medium and processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] figure 1 It is a flowchart of a communication method according to an embodiment of the present application. Such as figure 1 As shown, the method includes the following steps:

[0036] In step S101, in the process of the target device transmitting a message, the network source address information of the target host of the downstream interface is obtained, and the network source address information is determined as the network address information of the target device itself.

[0037] Specifically, such as figure 2 Shown is the deployment diagram of the target device. The target device is a network device, such as network bridging equipment, network monitoring equipment, network security equipment, and general equipment such as switches and routers. The target equipment is connected in a transparent manner in the network. The device's lower connection port (LAN) is connected to the terminal device or the upper connection port of the access switch connected to the terminal dev...

Embodiment 2

[0066] Figure 4 It is a schematic diagram of another communication method according to an embodiment of the present application. This method is a method for accessing the network of network equipment with a dedicated chip architecture, such as Figure 4 As shown, the method includes:

[0067] First, the network processing chip extracts the header information of the message received by the downstream interface, and sends the extracted information to the embedded CPU of the target device.

[0068] Next, the network processing chip performs matching filtering on the source IP, destination IP, destination MAC, and protocol number of the message received by the uplink port. Decrypt the UDP packet content of the filtered messages, filter the identification keywords in the decrypted content, and check the protocol format. The filtered and checked messages are the management messages sent by the management platform, and the chip forwards the management messages The text is sent to the em...

Embodiment 3

[0073] Figure 5 It is a flowchart of another communication method according to an embodiment of the present application. In this method, the target device deployed into the network is a network device with a dedicated chip architecture. Such as Figure 5 As shown, the method includes:

[0074] Configure the remote network management destination address on the target device.

[0075] When the target device just connects to the network, the default initial working state is transparent transmission and listening. The machine is transparently deployed online by stringing into the network to collect the host address information encapsulated in the packets from the downlink port. Specifically, The packet header information is extracted, and the extracted content is the source MAC, source IP address, destination MAC, destination IP address and protocol type, and the extracted information is sent to the embedded CPU.

[0076] Determine whether the host address information can be used for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication method and device, a storage medium and a processor. The method comprises the following steps: acquiring network source address information of a target host ofa downlink port in a message transmission process of target equipment, and determining the network source address information as network address information of the target equipment; and the target equipment performs network communication with the far-end management platform of the uplink port by adopting the network address information of the target equipment. The problems that the management address needs to be independently configured when the network equipment accesses the network, the management address configuration is complex and the configuration cannot be realized when the management address is in shortage in related technologies are solved.

Description

Technical field [0001] This application relates to the technical field of network equipment deployment, and specifically to a communication method, device, storage medium, and processor. Background technique [0002] In the deployment process of traditional network equipment or security equipment, such as transparent serial connection, routing mode or address translation mode, whether it is in-band management or out-of-band management, it needs to be connected The device is assigned a management address separately so that the administrator can remotely configure and manage it. [0003] However, when the device is actually deployed, it is often encountered that there is no redundant IP address, or the application for a new IP address needs to be approved layer by layer, the process is lengthy, and it may even encounter the need to modify the network and modify the routing for the new management address. Conditions such as configuration and adjustment of VLAN settings have caused ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L29/08
CPCH04L67/141H04L67/145H04L2212/00H04L61/5007H04L2101/622
Inventor 亢蕾
Owner 贺雪峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products