Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protecting method for digital user line cut-in multiplexing device

A digital subscriber line and access multiplexer technology, which is applied in the field of computer network and telecommunication network, can solve the problems of high CPU usage rate of DSLAM equipment, the danger of device reset, high CPU usage rate, etc., to achieve convenient operation management and equipment safety , the effect of reducing the occupancy rate

Active Publication Date: 2006-11-08
HUAWEI TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main defect of using this method is that there is no subdivision of packet types, and some packets that are not attack packets but need to be processed by the CPU may also be discarded, resulting in the disorder of important protocol states. At the same time, the packets are unified Processed by the host, its CPU usage is still high
[0006] Attack packets on the current network are generally initiated from the user side, that is, the ADSL access side. Illegal users use some packet sending tools of the computer to send a large number of packets to the upper network, and the DSLAM device mainly processes ARP from the user side. (Address Resolution Protocol), IGMP (Internet Group Management Protocol), PPPOE (PPP over Ethernet Point-to-Point Protocol) and DHCP (Dynamic Host Configuration Protocol). If the user side Sending a large number of these protocol packets to the DSLAM, and if the DSLAM needs to be processed, the CPU usage of the DSLAM device will be very high, which may lead to the danger of device reset, even if the above two methods can be used to a certain extent However, it is difficult to manage or may cause the loss of other important protocol packets, which is not a complete solution to the problem.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protecting method for digital user line cut-in multiplexing device
  • Safety protecting method for digital user line cut-in multiplexing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Taking ADSL (Asymmetric Digital Subscriber Line) as an example below in conjunction with accompanying drawing the present invention is further elaborated:

[0022] Such as figure 1 As shown, it is a schematic diagram of the network of the distributed bus mechanism of the DSLAM device. The dotted line box in the figure is the DSLAM device, which includes a host and multiple ADSL boards. The multiple ADSL boards are connected to the host respectively. The uplink port is connected to the upper-layer network, and the PC on the user side is connected to the corresponding ADSL board through the MODEM. The host computer is provided with a host CPU, and each ADSL board is also provided with its own single-board CPU. When the network is normal, various protocol packets sent by the PC on the user side are transmitted to the host through the MODEM and the ADSL board in turn. When the protocol packets are sent from the PC on the user side to the ADSL board, the single The board ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a safety protection method for digit user line accessing multiplexer, referring to computer network and telecommunication network technology field. Said method includes single board hard ware catching special protocol message from corresponded each XDSL port and sending to single board CPU; single board CPU detecting received special protocol message and judging in unit time whether said special protocol message flow rate exceeding predetermined threshold, if it is not then single board CPU uploading said special protocol message to host computer CPU processing, otherwise single board CPU stopping uploading said special protocol message to host computer CPU. The present invention does not need manually configuring MAC address or MAC address maximum learning number in subscriber access port, reducing maintenance quantity and important protocol message lose, and reducing CPU use rate.

Description

[technical field] [0001] The invention relates to the technical fields of computer network and telecommunication network, in particular to a safety protection method for a digital subscriber line access multiplexer. [Background technique] [0002] As operators put forward the demand for broadband network flattening (that is, the reduction of network layers) to save investment, DSLAM (Digital Subscriber Line Access Multiplexer) realizes more high-level protocol message processing, and Functions such as IP forwarding and other Layer 2 and Layer 3 switches or routers can only be implemented. Since a large number of protocol packets need to be analyzed by software modules, the CPU load of the DSLAM device is usually very high. If too many protocol packets are processed, the As a result, the CPU occupancy rate is 100%, which in turn causes other important processes to be "starved to death" because they cannot be processed in time. The harm brought is unpredictable and may cause v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L63/1458H04M11/062H04Q11/04H04Q2213/13003H04Q2213/13039H04Q2213/13106H04Q2213/13164H04Q2213/13166H04Q2213/13204H04Q2213/13298H04Q2213/13339
Inventor 钟宇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products