Communication method and device, storage medium and processor
A communication method and processor technology, applied in transmission systems, electrical components, etc., can solve the problems of inability to configure management addresses, separate management addresses, and complex configuration of management addresses, and improve the convenience of deployment.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] figure 1 It is a flowchart of a communication method according to an embodiment of the present application. Such as figure 1 As shown, the method includes the following steps:
[0036] In step S101, in the process of the target device transmitting a message, the network source address information of the target host of the downstream interface is obtained, and the network source address information is determined as the network address information of the target device itself.
[0037] Specifically, such as figure 2 Shown is the deployment diagram of the target device. The target device is a network device, such as network bridging equipment, network monitoring equipment, network security equipment, and general equipment such as switches and routers. The target equipment is connected in a transparent manner in the network. The device's lower connection port (LAN) is connected to the terminal device or the upper connection port of the access switch connected to the terminal dev...
Embodiment 2
[0066] Figure 4 It is a schematic diagram of another communication method according to an embodiment of the present application. This method is a method for accessing the network of network equipment with a dedicated chip architecture, such as Figure 4 As shown, the method includes:
[0067] First, the network processing chip extracts the header information of the message received by the downstream interface, and sends the extracted information to the embedded CPU of the target device.
[0068] Next, the network processing chip performs matching filtering on the source IP, destination IP, destination MAC, and protocol number of the message received by the uplink port. Decrypt the UDP packet content of the filtered messages, filter the identification keywords in the decrypted content, and check the protocol format. The filtered and checked messages are the management messages sent by the management platform, and the chip forwards the management messages The text is sent to the em...
Embodiment 3
[0073] Figure 5 It is a flowchart of another communication method according to an embodiment of the present application. In this method, the target device deployed into the network is a network device with a dedicated chip architecture. Such as Figure 5 As shown, the method includes:
[0074] Configure the remote network management destination address on the target device.
[0075] When the target device just connects to the network, the default initial working state is transparent transmission and listening. The machine is transparently deployed online by stringing into the network to collect the host address information encapsulated in the packets from the downlink port. Specifically, The packet header information is extracted, and the extracted content is the source MAC, source IP address, destination MAC, destination IP address and protocol type, and the extracted information is sent to the embedded CPU.
[0076] Determine whether the host address information can be used for ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com