Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for protecting network equipment

A technology of network equipment and messages, which is applied in the field of communication, can solve problems such as data core protection, and achieve the effect of protecting network equipment

Active Publication Date: 2021-07-13
HANGZHOU DPTECH TECH
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in related technologies, a threshold of the total number of packets is preset in the packet receiving queue of the control core to protect the control core from being invalidly occupied by packets exceeding the threshold, but it does not provide protection for the data core, and the data core may still receive A large number of packets that should be throttled

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting network equipment
  • Method and device for protecting network equipment
  • Method and device for protecting network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0022] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network equipment protection method and device, and the method comprises the steps: discarding a to-be-processed message if a forwarding chip determines that the message feature of the to-be-processed message hits a current limiting control table; if the forwarding chip determines that the message feature of the to-be-processed message does not hit the current limiting control table, forwarding the to-be-processed message to a corresponding data core; if the corresponding data core determines that the to-be-processed message is a control message, transferring the to-be-processed message to a corresponding packet receiving queue in the control core; if the control core determines that the to-be-processed message is the target current limiting message, sending the message characteristics of the to-be-processed message to the current limiting control table. According to the scheme, when the control core detects that the to-be-processed message is the target current-limiting message, the message feature of the to-be-processed message is added into the current-limiting control table item, so that subsequent messages of the same message type are directly discarded by the forwarding chip after arriving without causing invalid occupation to the data core and the control core, and network equipment can be accurately and effectively protected.

Description

technical field [0001] The present application relates to the technical field of communications, in particular to a method and device for protecting network equipment. Background technique [0002] A network device configured with a forwarding chip and a multi-core CPU is usually provided with several data cores and control cores. Wherein, the data core is used to process data messages, that is, messages carrying actual application interaction data, and the control core is used to process control messages, for example, management messages for managing the interaction of various applications and determining routing methods routing protocol packets, etc. [0003] After the forwarding chip of the network device receives the message to be processed, it first transfers to the data core. If the data core judges it as a data message, it will be processed by the data core. If the data core judges it as a control message, it will be transferred to the control core for processing. ....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/813H04L12/815H04L47/20H04L47/22
CPCH04L47/23H04L47/20
Inventor 吕召钰汤永翔
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products