Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual multicast field controlled identification method and router participating method

An authentication method and multicast domain technology, applied in the virtual multicast domain controlled authentication method and router participation field, can solve the problems of uncontrollable multicast data, illegal multicast stream attacks on PIM routers, etc. Facilitate centralized management and maintenance, and control the effect of receiving permissions

Inactive Publication Date: 2011-06-15
NEW H3C TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem solved by the present invention is to provide a virtual multicast domain controlled authentication method and router participation method to solve the problem that the PIM router of the multicast network is affected by external illegal group due to the inability to control the flow of multicast data in the prior art. Technical Issues of Streaming Attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual multicast field controlled identification method and router participating method
  • Virtual multicast field controlled identification method and router participating method
  • Virtual multicast field controlled identification method and router participating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The core of the present invention is: the administrator divides the multicast domain into multiple virtual multicast domains according to the network topology, and assigns a globally unique virtual multicast identifier for each virtual multicast domain; adds the designated downstream PIM router to the designated In the virtual multicast domain, and the downstream PIM router periodically sends the PIM HELLO message with the virtual multicast domain identifier of the additional option; when the upstream PIM router receives the PIMHELLO message, by judging the PIM HELLO message to detect whether the joined downstream PIM router belongs to the virtual multicast domain where the upstream PIM router is located. And perform corresponding authentication and management on the downstream PIM router according to the judgment result. Through the scheme of the present invention, the problem that the PIM router in the multicast network is illegally attacked by the outside can be bett...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a controlled authentication method for virtual multicast domain participated by route, which comprises: A. sending hand-hold message carried virtual multicast domain label to near route; B. receiving the message, deciding whether the carried label belongs to local domain; if yes, treating the message and building neighborhood; or else, does not build relation. This invention overcomes the problem that the PIM route of multicast network is easy attacked by outer illegal multicast flow for it can not control the multicast flow direction, as well as the treatment right of PIM route to multicast flow by controlling efficiently lower PIM route receive right and dynamic changing PIM route access right.

Description

technical field [0001] The invention relates to network communication technology, in particular to a virtual multicast domain controlled authentication method and a router participation method. Background technique [0002] Traditional Internet applications use point-to-point IP transmission (unicast technology), while point-to-multipoint IP transmission (broadcast technology) is limited to the internal application of the LAN, and multicast technology realizes point-to-multipoint IP transmission technology in the wide area network . [0003] In the 1980s, a doctoral dissertation titled "Multicast in a Datagram Network" at Stanford University described the multicast group management IGMP protocol, which successfully advanced the multicast technology to the IP layer. Exploration on IP multicast technology has been going on, and on this basis, people have completed multicast routing protocols such as Protocol Independent Multicast (PIM, Protocol Independent Multicast), thereby...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/56H04L12/701
Inventor 孙广新
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products