[go: up one dir, main page]

CN107948065B - Link state information acquisition method and device - Google Patents

Link state information acquisition method and device Download PDF

Info

Publication number
CN107948065B
CN107948065B CN201711480361.0A CN201711480361A CN107948065B CN 107948065 B CN107948065 B CN 107948065B CN 201711480361 A CN201711480361 A CN 201711480361A CN 107948065 B CN107948065 B CN 107948065B
Authority
CN
China
Prior art keywords
link state
message
domain authentication
state message
domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711480361.0A
Other languages
Chinese (zh)
Other versions
CN107948065A (en
Inventor
赵军
王朝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201711480361.0A priority Critical patent/CN107948065B/en
Publication of CN107948065A publication Critical patent/CN107948065A/en
Application granted granted Critical
Publication of CN107948065B publication Critical patent/CN107948065B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a link state information acquisition method, which is characterized in that the method is applied to any router from an intermediate system to an intermediate system network, and the method comprises the following steps: under the condition that the domain authentication of the received link state message fails, assembling a corresponding partial serial number message according to the link state message with the domain authentication failure; sending the assembled partial serial number message to a neighbor router to inform the router sending the link state message with domain authentication failure, and resending the link state message based on the current domain authentication password; receiving the retransmitted link state message and performing domain authentication; and acquiring the link state information in the received link state message under the condition that the domain authentication of the received link state message is successful. By applying the scheme, other routers can be informed to resend the link state message under the condition of not causing the routing oscillation, so that the link state information in the link state message is acquired.

Description

Link state information acquisition method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for acquiring link state information.
Background
In an ISIS network based on an ISIS (Intermediate System-to-Intermediate System) protocol, each router generates and transmits an LSP (Link State PDU, Link State protocol packet) to the entire network, advertises Link State information such as its own neighbor router, Link type, bandwidth, and the like, and receives LSP messages of other routers to acquire Link State information between other routers. After receiving the LSP message, each router needs to perform domain authentication on the LSP message according to a preconfigured domain authentication password, store the LSP message passing the authentication in an LSDB (Link State Data Base), and calculate a routing forwarding path according to Link State information therein. Each router can maintain the LSDB synchronization among different routers through a CSNP (Complete Sequence Number PDU) including summaries of all link state information in the LSDB, and confirm or request the link state information missing from the local LSDB through a PSNP (Partial Sequence Number PDU).
Each LSP message sent and received in the ISIS network has a time-to-live to age and clear old or invalid link state information in each LSDB in time. For any router in the network, after configuring a new domain authentication password, when receiving an LSP packet retransmitted by an opposite-end router after aging, if the opposite-end router does not configure the same new password, for example, the domain authentication password configured by the router is wrong, a situation of failed verification will occur. In order to obtain correct link state information, in the prior art, a home router generally sets the remaining lifetime of an LSP packet that fails to be authenticated to 0, and issues the LSP packet to the entire network through forwarding of a neighboring router, so as to notify an opposite router that the LSP packet is aged, and cause the opposite router to resend the LSP packet to the home router. However, after the home-end router issues the aged LSP packet to the entire network, other routers delete the LSP packet and recalculate the routing path within a period of time before receiving a new LSP packet, which may cause network routing oscillation, that is, when a certain router and any other router in the network configure different domain authentication passwords, network routing oscillation may be caused.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for acquiring link state information, and the technical scheme is as follows:
a method for obtaining link state information, the method being applied to any router from an intermediate system to an intermediate system network, the method comprising:
under the condition that the domain authentication of the received link state message fails, assembling a corresponding partial serial number message according to the link state message with the domain authentication failure;
sending the assembled partial serial number message to a neighbor router to inform the router sending the link state message with domain authentication failure, and resending the link state message based on the current domain authentication password;
receiving the retransmitted link state message and performing domain authentication;
and acquiring the link state information in the received link state message under the condition that the domain authentication of the received link state message is successful.
A link state information obtaining apparatus, applied to any router in an intermediate system-to-intermediate system network, the apparatus comprising:
the message assembly module is used for assembling a corresponding part of serial number messages according to the link state messages with domain authentication failure under the condition that the domain authentication of the received link state messages fails;
the message sending module is used for sending the assembled partial serial number message to a neighbor router so as to inform the router sending the link state message with domain authentication failure, and resending the link state message based on the current domain authentication password;
the message receiving module is used for receiving the retransmitted link state message and performing domain authentication;
and the information acquisition module is used for acquiring the link state information in the received link state message under the condition that the domain authentication of the received link state message is successful.
According to the technical scheme provided by the application, the LSP message which fails in authentication is not announced to be aged in the network, but the opposite-end router is directly required to resend the LSP message through the PSNP message, if the domain authentication passwords of the local end and other routers are uniform, the resent LSP cannot fail in authentication, link state information can be obtained from the LSP, and network routing oscillation cannot be caused.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application. Moreover, not all of the above-described effects need to be achieved by any of the embodiments in this application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic flowchart of a link state information obtaining method according to an embodiment of the present application;
fig. 2 is a first structural diagram of a link state information obtaining apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a message assembly module according to an embodiment of the present application;
fig. 4 is a second schematic structural diagram of a link state information obtaining apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a third link state information acquisition apparatus according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
The ISIS protocol is a widely used network routing protocol applied to routers in a network running ISIS. Based on the ISIS protocol, a router usually needs to determine a routing forwarding path through 4 steps, which are respectively: establishing and maintaining adjacency relation, generating LSP message, diffusing and synchronizing LSP, and calculating route. In the ISIS network, after each router which completes the establishment of the neighbor relation generates LSP messages, other routers in the network receive the LSP messages through mutual forwarding among the neighbor routers, and therefore link state information of the neighbor routers, link types and the like of the routers are announced.
When the router in the network sends the LSP message generated by the router, the router carries a pre-configured domain authentication password, and the routers in the same ISIS network should be configured with a uniform domain authentication password. After receiving the LSP message, other routers perform domain authentication on the LSP message according to a preconfigured domain authentication password, if the domain authentication of the received LSP message is successful, the LSP message with the successful domain authentication is stored in the LSDB, and a routing forwarding path is calculated by using link state information in the LSP message.
In a certain router, if the domain authentication of the received LSP message fails, the router notifies other routers that the LSP message is aged, so that the router that sends the LSP message regenerates and sends the LSP message. But at the same time, other routers delete the LSP packet and recalculate the routing path a period of time before receiving a new LSP packet, which causes network routing oscillation. Therefore, when the routers in the network change the domain authentication password uniformly, and there is a time difference between the changes of different routers, or the domain authentication password configured by a router newly accessing the ISIS network is incorrect, the LSP packet domain authentication in the router may fail, and further network routing may oscillate. In order to solve the above problem, a router having the above situation is caused to notify other routers to retransmit an LSP without causing network oscillation, so as to obtain link state information, the present application provides a link state information obtaining method, which can be applied to any router from an intermediate system to an intermediate system network, and referring to fig. 1, the method can include the following steps:
s101, under the condition that the domain authentication of the received link state message fails, assembling a corresponding partial serial number message according to the link state message with the domain authentication failure;
s102, sending the assembled partial serial number message to a neighbor router to inform the router sending the link state message with domain authentication failure, and resending the link state message based on the current domain authentication password;
s103, receiving the retransmitted link state message and performing domain authentication;
s104, under the condition that the domain authentication of the received link state message is successful, the link state information in the received link state message is obtained.
According to the scheme, when domain authentication of the received link state message fails, the corresponding PSNP message is directly assembled according to the LSP message of the domain authentication failure, and the PSNP message is forwarded and issued to the whole network through the neighbor routers so as to inform the router sending the LSP message of the domain authentication failure, and the LSP message carrying the current domain authentication password of the router is retransmitted. And after receiving the retransmitted LSP message, performing domain authentication on the LSP message again.
When a router in the ISIS network sends a PSNP message, the router carries the domain authentication password of the router, when other routers receive the PSNP message, the other routers carry out authentication on the domain authentication password carried in the PSNP message, and if the password is correct, the router continues to respond to the request of the PSNP message. Therefore, if the domain authentication password of the router or the router is reconfigured and unified before the router receives the PSNP packet sent by the router, the router will resend the LSP packet according to the request in the PSNP packet, and the resent LSP packet will be successfully authenticated in the router domain, the router can obtain the link state information according to the resent LSP packet, that is, S104, and the LSP packet with the successfully authenticated domain can be stored locally in the router.
However, if the domain authentication passwords of the router and the router are not reconfigured yet, or the domain authentication passwords of the router are configured incorrectly, that is, the domain authentication passwords of the router and the router are not uniform, the router will not respond to the request in the PSNP message sent by the router, and in order to wait for the domain authentication passwords of the router or the router to be reconfigured and uniform, in a specific embodiment of the present application, the PSNP message can be periodically and circularly sent within a preset waiting termination duration, and the domain authentication waiting duration after the domain authentication of the received link state message fails is monitored. For example, it may be set that a PSNP packet is sent every 30 seconds, and the cycle is performed for 2 minutes in total, and if the domain authentication passwords in the ISIS network are unified within 2 minutes, the PSNP packet sent by the router will be responded, and an LSP packet retransmitted by other routers is received, and it is obvious that the LSP packet will be successfully authenticated in the router domain. If the PSNP packet is not responded all the time within a period of time, there may be other problems to be solved, and continuously repeating the receiving and sending of the PSNP packet and the domain authentication of the PSNP packet by the router will possibly cause the waste of network resources and routing resources, so if the domain authentication of the received link state packet is failed and exceeds a certain time, the LSP packet retransmitted by other routers is still not received, and the timing cycle transmission of the assembled PSNP packet is also stopped. The specific time duration statistical process may be implemented in various ways, for example, the LSP packet and the domain authentication wait time duration thereof may be recorded, and the basic scheme of the present application does not need to be limited in theory, and a person skilled in the art may flexibly select an appropriate way in practical application.
In a specific embodiment of the present application, when the domain authentication of the received link state packet fails, the domain authentication may be further performed on the LSP packet received and stored before, that is, the LSP packet locally stored in the domain authentication is traversed again to determine the LSP packet that fails in the domain authentication. Because the locally stored LSP messages before also include LSP messages generated by the router and including link state information of the router, and these LSP messages are based on the domain authentication password before, and may also fail in the current domain authentication, for the LSP message that fails in the domain authentication again, the locally generated LSP message can be removed, and according to the non-locally generated LSP message, a corresponding partial serial number message is assembled and sent to the neighboring router.
It can be understood that the scheme of the present application can be theoretically applied to any router in the ISIS network, and therefore, when any router in the ISIS network receives a PSNP packet sent by a neighbor router and generated by the neighbor router or other routers, if a domain authentication password carried in the PSNP packet is correct, the PSNP packet is further responded, that is, an LSP packet requested to be retransmitted is checked to see whether the LSP packet generated by the router exists or not, if so, the corresponding LSP packet needs to be retransmitted, and the PSNP packet can be forwarded to the neighbor router no matter whether the LSP packet needs to be retransmitted or not, so that routers in the whole network can receive the PSNP packet through forwarding of the neighbor router.
Corresponding to the above method embodiment, the present application further provides a link status information obtaining apparatus, as shown in fig. 2, the apparatus may include:
a message assembling module 110, configured to, when domain authentication of the received link state message fails, assemble a corresponding partial serial number message according to the link state message with the domain authentication failure;
a message sending module 120, configured to send the assembled partial serial number message to a neighboring router, so as to notify the router that sends the link state message with domain authentication failure, and resend the link state message based on the current domain authentication password;
a message receiving module 130, configured to receive the retransmitted link state message and perform domain authentication;
the information obtaining module 140 is configured to obtain the link state information in the received link state message when the domain authentication of the received link state message is successful.
In one embodiment of the present application, referring to fig. 3, the apparatus may further include:
a duration counting module 150, configured to perform domain authentication waiting duration counting on the received link state packet when domain authentication of the received link state packet fails;
a duration monitoring module 160, configured to monitor whether a domain authentication waiting duration of the received link state packet exceeds a preset waiting termination duration;
the message sending module is further configured to periodically and circularly send the assembled corresponding part of serial number messages at a fixed time, and stop sending the assembled corresponding part of serial number messages when domain authentication of the received retransmitted link state messages is successful or the domain authentication waiting duration of the received link state messages exceeds the preset waiting termination duration.
In a specific embodiment of the present application, referring to fig. 4, the message assembling module 110 may include:
the message authentication unit 111 is configured to traverse the link state message locally stored in the domain authentication again and determine the link state message with the domain authentication failure under the condition that the domain authentication of the received link state message fails;
a message determining unit 112, configured to determine, for a link state message for which authentication of any domain fails, whether the message is generated locally;
a message assembling unit 113, configured to assemble a corresponding partial serial number message according to the link state message that determines that the domain authentication that is not locally generated fails.
In one embodiment of the present application, referring to fig. 5, the apparatus may further include:
the message deleting module 170 is configured to delete the link state message that is determined to be not locally generated and fails in domain authentication from the locally stored link state message.
The instruction receiving module 180 is configured to generate a link state message with a domain authentication password included in the instruction when receiving the domain authentication configuration instruction;
and a message replacement module 190, configured to replace the locally stored link state message generated by the router with the generated link state message.
It can be understood that the message deleting module 170, the instruction receiving module 180, and the message replacing module 190 are two independent modules with independent functions, and may be configured in the apparatus at the same time as shown in fig. 5, or may be configured in the apparatus separately, and therefore the structure shown in fig. 5 should not be construed as a limitation to the present application.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. A method for obtaining link state information, the method being applied to any router from an intermediate system to an intermediate system network, the method comprising:
under the condition that the domain authentication of the received link state message fails, assembling a corresponding partial serial number message according to the link state message with the domain authentication failure;
sending the assembled partial serial number message to a neighbor router to inform the router sending the link state message with domain authentication failure, and resending the link state message based on the current domain authentication password;
receiving the retransmitted link state message and performing domain authentication;
and acquiring the link state information in the received link state message under the condition that the domain authentication of the received link state message is successful.
2. The method of claim 1, further comprising:
under the condition that the domain authentication of the received link state message fails, carrying out domain authentication waiting time statistics on the received link state message;
monitoring the domain authentication waiting time of the received link state message, and judging whether the domain authentication waiting time exceeds the preset waiting termination time;
and periodically and circularly sending the assembled corresponding part of the serial number messages, and stopping sending the assembled corresponding part of the serial number messages under the condition that the domain authentication of the received retransmitted link state messages is successful or the domain authentication waiting time of the received link state messages exceeds the preset waiting termination time.
3. The method according to claim 1 or 2, wherein, in the case that the received link state packet fails to perform domain authentication, assembling a corresponding partial sequence number packet according to the link state packet that fails to perform authentication, includes:
under the condition that the domain authentication of the received link state message fails, traversing the link state message locally stored in the domain authentication again, and determining the link state message which fails in the domain authentication again;
judging whether the message is generated locally or not for the determined link state message with the domain re-authentication failure;
and assembling the corresponding partial serial number message according to the link state message which is judged to be generated non-locally and fails in domain re-authentication.
4. The method of claim 3, further comprising:
and deleting the link state message which is generated locally and fails in domain re-authentication from the link state message stored locally.
5. The method of claim 3, further comprising:
when a domain authentication configuration instruction is received, generating a link state message with a domain authentication password included in the instruction;
and replacing the locally stored router with the generated link state message to generate the link state message.
6. A link state information obtaining apparatus, applied to any router in an intermediate system-to-intermediate system network, the apparatus comprising:
the message assembly module is used for assembling a corresponding part of serial number messages according to the link state messages with domain authentication failure under the condition that the domain authentication of the received link state messages fails;
the message sending module is used for sending the assembled partial serial number message to a neighbor router so as to inform the router sending the link state message with domain authentication failure, and resending the link state message based on the current domain authentication password;
the message receiving module is used for receiving the retransmitted link state message and performing domain authentication;
and the information acquisition module is used for acquiring the link state information in the received link state message under the condition that the domain authentication of the received link state message is successful.
7. The apparatus of claim 6, further comprising:
the time length counting module is used for counting the waiting time length of the domain authentication of the received link state message under the condition that the domain authentication of the received link state message fails;
the time length monitoring module is used for monitoring the domain authentication waiting time length of the received link state message whether the domain authentication waiting time length exceeds the preset waiting termination time length;
the message sending module is further configured to periodically and circularly send the assembled corresponding part of serial number messages at a fixed time, and stop sending the assembled corresponding part of serial number messages when domain authentication of the received retransmitted link state messages is successful or the domain authentication waiting duration of the received link state messages exceeds the preset waiting termination duration.
8. The apparatus according to claim 6 or 7, wherein the message assembly module comprises:
the message authentication unit is used for traversing the link state message locally stored in the domain authentication again under the condition that the domain authentication of the received link state message fails, and determining the link state message which fails in the domain authentication again;
a message judging unit, configured to judge whether the message is generated locally for the determined link state message for which the domain re-authentication fails;
and the message assembling unit is used for assembling the corresponding partial serial number message according to the link state message which is judged to be generated non-locally and fails in domain re-authentication.
9. The apparatus of claim 8, further comprising:
and the message deleting module is used for deleting the link state message which is generated locally and fails in domain re-authentication from the link state message stored locally.
10. The apparatus of claim 8, further comprising:
the instruction receiving module is used for generating a link state message with a domain authentication password included in the instruction when receiving the domain authentication configuration instruction;
and the message replacement module is used for replacing the locally stored router with the generated link state message to generate the link state message.
CN201711480361.0A 2017-12-29 2017-12-29 Link state information acquisition method and device Active CN107948065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711480361.0A CN107948065B (en) 2017-12-29 2017-12-29 Link state information acquisition method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711480361.0A CN107948065B (en) 2017-12-29 2017-12-29 Link state information acquisition method and device

Publications (2)

Publication Number Publication Date
CN107948065A CN107948065A (en) 2018-04-20
CN107948065B true CN107948065B (en) 2021-02-26

Family

ID=61937990

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711480361.0A Active CN107948065B (en) 2017-12-29 2017-12-29 Link state information acquisition method and device

Country Status (1)

Country Link
CN (1) CN107948065B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11252162B2 (en) * 2019-04-02 2022-02-15 Ciena Corporation Enhancement to the IS-IS protocol for eliminating unwanted network traffic

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834855A (en) * 2010-04-14 2010-09-15 杭州华三通信技术有限公司 Method and equipment for preventing serial number from being attacked
CN102647473A (en) * 2012-04-11 2012-08-22 北京星网锐捷网络技术有限公司 Information synchronization method, device and communication equipment
CN107360572A (en) * 2016-05-10 2017-11-17 普天信息技术有限公司 A kind of safety enhancing authentication method and device based on WIFI

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932785B (en) * 2011-08-12 2015-07-01 中国移动通信集团浙江有限公司 Rapid authentication method, system and equipment of wireless local area network
CN102546426B (en) * 2012-02-02 2014-09-24 杭州华三通信技术有限公司 Route generation method and device for implementing fiber channel over Ethernet
CN104539461B (en) * 2015-01-09 2018-05-29 烽火通信科技股份有限公司 A kind of device and method for inhibiting protocol port vibration and reporting
US9705752B2 (en) * 2015-01-29 2017-07-11 Blackrock Financial Management, Inc. Reliably updating a messaging system
CN105207911B (en) * 2015-10-12 2018-11-23 安徽皖通邮电股份有限公司 A kind of Intermediate System to Intermediate System message authentication method and its system
CN105429874A (en) * 2015-10-29 2016-03-23 中国科学院计算技术研究所 A routing information collection method, system, device and equipment for IS-IS network
CN106789673B (en) * 2016-04-22 2020-11-20 新华三技术有限公司 Link state synchronization method and device
CN106059850A (en) * 2016-05-17 2016-10-26 中国科学院计算技术研究所 Link abnormity detection method, system, apparatus, and chip in IS-IS network
CN106357679B (en) * 2016-10-24 2019-09-13 北京明华联盟科技有限公司 Method, system and the client of cipher authentication, server and smart machine
CN106603512B (en) * 2016-11-30 2019-07-09 中国人民解放军国防科学技术大学 A kind of authentic authentication method of the Intermediate System-Intermediate System based on SDN framework

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834855A (en) * 2010-04-14 2010-09-15 杭州华三通信技术有限公司 Method and equipment for preventing serial number from being attacked
CN102647473A (en) * 2012-04-11 2012-08-22 北京星网锐捷网络技术有限公司 Information synchronization method, device and communication equipment
CN107360572A (en) * 2016-05-10 2017-11-17 普天信息技术有限公司 A kind of safety enhancing authentication method and device based on WIFI

Also Published As

Publication number Publication date
CN107948065A (en) 2018-04-20

Similar Documents

Publication Publication Date Title
US8082340B2 (en) Technique for distinguishing between link and node failure using bidirectional forwarding detection (BFD)
CN111447101B (en) Link detection method, device, computer equipment and storage medium
JP2006229967A (en) Fast multicast path switching
EP2279589B1 (en) Methods and apparatus for advertising a route for transmitting data packets
RU2010141754A (en) METHOD AND DEVICE FOR ACKNOWLEDGING THE CONDITION OF A COMMUNICATION LINE FOR PREVENTING A CYCLE
EP2604001B1 (en) Distributed connectivity verification protocol redundancy
US9781005B2 (en) Technique for ensuring congruency in link aggregation
JP6008761B2 (en) Independent distributed network system
US8971195B2 (en) Querying health of full-meshed forwarding planes
CN112737949A (en) Fault detection method and device, electronic equipment and computer readable medium
CN103095573A (en) Method for virtual router redundancy protocol backup set switching and switch
JP2014064252A (en) Network system, transmission device and fault information notification method
CN105637806A (en) Method and apparatus for determining network topology, and centralized network state information storage device
JP6203821B2 (en) Message processing method and control node between nodes of radio access network
CN108449276B (en) Route convergence method and device
CN112994839A (en) Flexible Ethernet overhead multiframe receiving method, device, equipment and medium
CN107948065B (en) Link state information acquisition method and device
US7035209B2 (en) Control communications in communications networks
CN111917577B (en) BGP route information acquisition method, device, computer equipment and storage medium
US7542413B1 (en) Method and apparatus for delaying start of restoration of low priority services
CN112073270B (en) Link fault detection method and device
EP2523401B1 (en) Virtual networks within a physical network
US12316488B2 (en) Expediting correction of WAN or LAN traffic loss
US20240259255A1 (en) Expediting correction of wan or lan traffic loss
CN105721395B (en) Data synchronous configuration method, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant