Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

404 results about "Telnet" patented technology

Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).

Network physical topology discovering method and network management server based on SNMP

ActiveCN101764709AOvercoming incomplete buildsPromote resultsData switching networksIp addressNetwork management
The invention relates to the field of network topology discovery, in particular to a network physical topology discovering method and a network management server based on SNMP. The method comprises the following steps: obtaining IP addresses and corresponding MAC addresses of all devices in subnets in the network and gateway devices of the subnets; utilizing a telnet protocol to perform remote login to all the devices in the subnets, controlling each logged-in device to send an inquiry request message to all other devices in the subnet at which the device is located; utilizing the telnet protocol to read address forwarding tables which are established by logged-in exchangers based on the received inquiry response messages; and carrying out network physical topology discovery based on the address forwarding tables which are read from the exchangers in the subnets. The network management server utilizes the telnet protocol to complete the network physical topology discovery. The method and the network management server enable the exchangers in the network to establish relatively complete address forwarding tables, and compared with the results of a traditional network physical topology discovery, the results of the physical topology discovery have a great improvement.
Owner:RUIJIE NETWORKS CO LTD

Network device monitoring method and system

The invention relates to a network device monitoring method and system. The network device monitoring method comprises the following steps: (1) according to the types of network devices, creating device model files for the network devices, wherein monitoring project protocols borne by the network devices are indicated in the device model files; the monitoring project protocols can be SNMPs (Simple Network Management Protocols) and / or Telnet protocols; if the monitoring project protocols are the SNMPs, OIDs (Object Identifiers) corresponding to monitoring projects are indicated in the device model files; if the monitoring project protocols are Telnet protocols, command statements and result analysis grammar corresponding to the monitoring projects are indicated in the device model files; (2) adding network devices to be monitored, and selecting monitoring projects for the network devices to be monitored; (3) reading the device model files of the network devices to be monitored, and acquiring protocols borne by the monitoring projects and selected for the network devices to be monitored, and related information corresponding to the protocols; (4) according to the selected monitoring projects and the protocols borne by the monitoring projects, monitoring the network devices to be monitored. The network device monitoring method and system have high expansibility and compatibility.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Full-automatic firing method for wideband individual line subscriber based on flowpath optimization

The invention relates to a fully-automatic subscribing method for broadband special line users based on process optimization, which comprises the steps: a special line automatic subscribing system receives a work order from BSS, resolves the work order, obtains information of such as equipment to be configured, and searches upper and lower correlative equipment information, login manner and login password according to the existing equipment information, and then logins in the equipment according to the equipment information to configure related data order; the special line automatic subscribing system is configured with thread counts for processing the work order, starts a work order receiving module, and selects a system operation mode through reading configuration files, namely a parent-child process or an automatic reset mode; socket communication is utilized to simulate telnet to login in the equipment and issue orders, the port information of the equipment is validated and judged during the process of issuing orders and the execution result of the orders issued currently is validated and judged; if other socket demands are connected at the same time, other thread counts are assigned to do the work so as to fulfill the long connection asynchronous communication between the automatic subscribing system and the socket of BSS.
Owner:LINKAGE SYST INTEGRATION

Secure access logic control method based on terminal access behavior and platform server

ActiveCN102984159ASimplify the difficulty of resource managementAvoid log audit complexityUser identity/authority verificationDot matrixFree interface
The invention discloses a secure access logic control method based on a terminal access behavior and a secure access platform server. A logic control module of the terminal access behavior is arranged at a secure access platform server terminal; information, such as terminal access authority, scene judging parameters, a dot matrix area command comparison table and the like is configured; each data package of terminal access intranet resource is redirected into an agent program which corresponds to the logic control module; and the logic control module identifies the terminal access behavior in various modes to control forwarding or discard. The method of the invention executes classification and identification of character commands, such as FTP (File Transfer Protocol), TELNET, SSH (Secure Shell) and the like, RDF (Resource Description Framework) graphical interface operation and user free interface system operation for the terminal access behavior on the secure access platform server terminal, and judges whether the execution is permitted or not according to identified commands and user authority logic control, so that the difficulty of resource management is simplified, the repeated authentication of each system is avoided; and the identification and the logic control of the character commands, the graphical interface operation and the like are solved.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +3

Selective address table aging in a network switch based on application state determined from a received data packet

InactiveUS7002955B1Minimizing relearningMore precise aging intervalsNetworks interconnectionBus networksData streamNetwork packet
A network switch, configured for performing layer 2 and layer 3 switching in an Ethernet (IEEE 802.3) network without blocking of incoming data packets, includes a network switch port having a packet classifier module configured for evaluating an incoming data packet on an instantaneous basis. The packet classifier module performs simultaneous comparisons between the incoming data stream of the data packet and multiple templates configured for identifying respective data protocols. Each template is composed of a plurality of min terms, wherein each min term specifies a prescribed comparison operation within a selected data byte of the incoming data packet. Hence, the packet classifier module is able to monitor data flows between two network nodes interacting according to a prescribed network application. The packet classifier module determines the application state for a prescribed network application from a received layer 2 data packet, enabling switching logic within the network switch to utilize application-specific aging intervals for respective network applications such as HTTP, SNMP, ftp, Telnet, etc. in order to delete aged address entries from a network switch address table based on the supported network application. Determination of the application state from the received layer 2 data packet also enables the network switch to detect the end of a data flow for deletion of the corresponding address entry from the network switch address table.
Owner:ADVANCED MICRO DEVICES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products