Method of isolation of bilayer VLAN port

A port isolation and port technology, applied in data exchange through path configuration, digital transmission system, electrical components, etc., can solve the problems of wasting user bandwidth, enlarging the broadcast domain, reducing security and reliability, etc., to improve security performance, the effect of increasing the communication rate

Inactive Publication Date: 2004-10-20
BEIJING HUAWEI DIGITAL TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on this protocol, data packets between users can be transparently transmitted during VLAN networking, but these data packets include user ARP (Address Resolution Protocol) requests, etc., so that users under the same VLAN (Virtual Local Area Network) can communicate with each other. The security of the network is reduced. At the same time, this networking method will cause the broadcast domain to become larger, which not only wastes the user's bandwidth, but also causes intercommunication between users, reducing security and reliability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of isolation of bilayer VLAN port

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention realizes the isolation of two-layer VLAN ports in this way: a user port restriction module is added to the FPGA on the VLAN service board, and the user port restriction module is used to restrict downlink broadcasting to users;

[0015] The service board receives the downlink message from the main control board, if the message is a broadcast message (ARP request, etc.), it discards it; if it is a unicast message, it releases it. The isolation user port restriction module of the present invention judges the message specifically by marking the VLAN port bitmap, that is, the broadcast domain position of the port is zero, and the port prohibits downlink broadcasting. Broadcast packets such as ARP requests from other port users to this port user are discarded, which not only controls invalid broadcasts, but also realizes isolation between users. Moreover, the user port restriction module of the present invention will not affect the passage of other mess...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method for separating two ports includes such steps as user port restriction module of restricting down going broadcasting is added to FPGA on VLAN service board; with down going packets from main control board being received by service board, user port restriction module determines whether the packet is broadcasting packet (discarded) or other packets (passing). The invention is capable of turning broadcasting field off to realize isolation between users, and raise safety. Down going broadcasting is prohibited. Thus, communication speed in network is raised.

Description

Technical field: [0001] The invention relates to a layer-2 VLAN (virtual local area network), in particular to a port isolation method of the layer-2 VLAN. Background technique: [0002] At present, broadband Internet access is popular with users for its large and stable file transfer rate, and it is also being accepted by more and more people, and has obtained large-scale commercial applications. Broadband technology is mainly realized by connecting users to switches, and the general way to control users' access to the Internet is to use PPPOE (point-to-point protocol based on Ethernet) authentication, which can verify the legitimacy of user accounts and charge users at the same time . [0003] PPPOE authentication can be directly provided locally by the BRAS (Broadband Authentication Server) embedded in the access switch, or can be authenticated by transparently transmitting PPPOE data packets to a remote BRAS. Based on this protocol, data packets between users can be tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L12/24H04L12/28
Inventor 赵志旺
Owner BEIJING HUAWEI DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products