Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for detecting and controlling user access by using Internet control protocol

A technology for controlling message protocols and users. It is used in data exchange details, data exchange through path configuration, and digital transmission systems. It can solve problems such as resource occupation, waste of network resources, and IP address occupation, achieving strong versatility and real-time performance. Good performance, easy maintenance and management

Inactive Publication Date: 2006-11-15
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, the ARP table on the access device still has the entry of computer A, but computer A has actually left the network, and other devices on the network cannot communicate with this computer A.
But the computer also takes up a lot of resources on the access device
[0007] If the access computer dynamically obtains an IP address from the access device (or through the DHCP relay function of the access device) through the DHCP protocol, even if the computer leaves the access network, the access device cannot determine whether the user is really online again, so in During the lease time of the IP address, the IP address will always be occupied
This will make the IP address not effectively use
[0008] For these typical situations, the existing technology cannot determine whether the user is online in real time, thus causing a waste of network resources, and it is also not conducive to the real-time and accurate billing of the access computer by the access device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting and controlling user access by using Internet control protocol
  • Method for detecting and controlling user access by using Internet control protocol
  • Method for detecting and controlling user access by using Internet control protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] refer to figure 1 , when the computer is allowed to access the network normally through a certain method, the access device system internally maintains a user access data information table, and the access information table includes the user's IP address and MAC address information.

[0023] In order to determine the access state of the user who has accessed the network, that is, to determine whether the user is online, at first the access device in the network sends an Internet Control Message Protocol (abbreviated as ICMP protocol) echo (Echo) request message to the access user, and then The access device judges the user status according to the response message, and if it receives the user's response message within the predetermined time, it determines that the corresponding user is online; if it does not receive the user's response message within the predetermined time, it determines that the user is online. offline. In order to avoid the error of judgment of the acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting and processing offline by using the Internet control message protocol. The method is as follows: an access device in the network sends an Internet control message protocol echo request message to an access user; If the user's response message is received within a predetermined time, it is determined that the corresponding user is online; if the user's response message is not received within the predetermined time, it is determined that the user has gone offline and the user is logged off. Adopting the present invention facilitates maintenance and management of access users, and the method can also be used to charge the access users according to the access time. The invention is completely realized based on the standard protocol, so it has the characteristics of strong versatility and good real-time performance.

Description

technical field [0001] The invention relates to a method for detecting whether a user is online in a network, in particular to a method for detecting and processing an offline user by using the Internet control message protocol. Background technique [0002] With the development of Ethernet technology in commercial operation networks, the management requirements for Ethernet access users are getting stronger and stronger. Common Ethernet networking methods such as figure 1 As shown, the network card of the computer is connected to the hub (HUB) or Ethernet switch (LANSwitch) through a network cable, one HUB or LANSwitch can be connected to multiple computers, and the HUB or LANSwitch is connected to the access device through an Ethernet line. Wherein, the access device may be an Ethernet switch (LANSwitch) or a router with a user management function, or an Ethernet user access management device with a similar function. [0003] figure 1 It is a common networking diagram. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/28H04L12/24H04L29/06H04L12/26H04L12/14
Inventor 孙一峰金涛
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More