Unlock instant, AI-driven research and patent intelligence for your innovation.

Information processing method, network node, verification method and server

Through the collaborative work of central nodes and virtual access nodes, automatic configuration and security authentication of access nodes in the optical access network are realized, solving the problems of remote access node management complexity and illegal node access, and improving efficiency. Network management efficiency and security.

Active Publication Date: 2020-09-15
HUAWEI TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the existing method, for each remote access node, it must be manually configured before it is connected to the network. The existence of a large number of remote access nodes increases the complexity of device management.
[0006] In addition, in the communication network, the identity of the user of the device is usually authenticated, which cannot prevent illegal nodes from accessing the communication network, resulting in the possibility of a large number of illegal nodes in the communication network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0145] Embodiments of the present invention provide an information processing method and a network node, which are used to reduce the complexity of remote access node management in the communication network when there are a large number of remote access nodes in the communication network.

[0146] An information processing method provided by an embodiment of the present invention includes:

[0147] 2201. The central node determines that the first access node goes online;

[0148]2202. The virtual access node in the central node acquires configuration information related to the first access node;

[0149] 2203. After the first access node goes online, the virtual access node sends the configuration information related to the first access node to the first access node.

[0150] The configuration information related to the first access node may be configuration information of the first access node, or may be configuration information of a first user-side port in the first access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication, in particular to an information processing method, a network node, a verification method and a server. In the information processing method provided by the embodiment of the invention, a central node determines that a first access node is online, and a virtual access node in the central node acquires configuration information related to the first access node; and after the first access node is online, the virtual access node sends the configuration information related to the first access node to the first access node. The first access node operates after self-configuration according to the received configuration information, thereby realizing plug-and-play, and reducing the management complexity of the remote access node. According to the verification method provided by the embodiment of the invention, the verification server verifies the legality of the node, so that illegal nodes are prevented from accessing the network.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an information processing method, a network node, a verification method and a server. Background technique [0002] figure 1 The network architecture of a common optical access network is shown, and the optical access network includes a passive optical access network, such as: fiber access (Fiber To The X, FTTX); and an active access network, such as: A digital subscriber line access multiplexer (DSLAccess Multiplexer, DSLAM) is connected to an optical line terminal (Optical Line Termination, OLT) through an Ethernet (ETHernet, ETH). [0003] FTTX is divided into Fiber To The Home (FTTH), Fiber To The Drop / Distribution point (FTTDp), Fiber To The Building (Fiber To The Building) according to the position of the Optical Network Unit (ONU). , FTTB) and fiber to the curb (Fiber To The Curb, FTTC) and so on. [0004] At present, the optical access network mainly adopts Passi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/24H04Q11/00
CPCH04L9/32H04L41/0809H04L41/084H04L41/0889H04L12/2885H04Q11/0067H04L61/5014H04L41/0895H04L41/0806H04L63/0884H04L63/0892H04L67/141
Owner HUAWEI TECH CO LTD