CN103095603A - Restraining method for Ethernet storm - Google Patents

Restraining method for Ethernet storm Download PDF

Info

Publication number
CN103095603A
CN103095603A CN2013100553128A CN201310055312A CN103095603A CN 103095603 A CN103095603 A CN 103095603A CN 2013100553128 A CN2013100553128 A CN 2013100553128A CN 201310055312 A CN201310055312 A CN 201310055312A CN 103095603 A CN103095603 A CN 103095603A
Authority
CN
China
Prior art keywords
fcs
message
flow
storm
life span
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100553128A
Other languages
Chinese (zh)
Other versions
CN103095603B (en
Inventor
庞吉耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Paneng Electric Power Technology Co.,Ltd.
Yantai Pan Neng electric control system company limited
Original Assignee
NANJING PANENG ELECTRIC POWER TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING PANENG ELECTRIC POWER TECHNOLOGY CO LTD filed Critical NANJING PANENG ELECTRIC POWER TECHNOLOGY CO LTD
Priority to CN201310055312.8A priority Critical patent/CN103095603B/en
Publication of CN103095603A publication Critical patent/CN103095603A/en
Application granted granted Critical
Publication of CN103095603B publication Critical patent/CN103095603B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed is a restraining method for Ethernet storm. The restraining method comprises (1) a step of constructing a multi-access computer (MAC) receiving part composed of a MAC address recognizer, a receiving framer, flow calculation, a message filter, a hash table, a receiving judger and a microprocessor control unit ( MCU) interface, wherein a table item of the hash table can comprise a message feature code and message generated time, (2) a step of calculating peak flow of normal application business data and setting a flow limiting value for starting storm suppression, and (3) a step of filtering datagram: counting up in-band flow of a data packet, wherein the flow in the data packet band enters the MAC receiving part after passing the MAC address recognizer, if the flow in the band is out-of-limit, a fourth step is carried out for checking and receiving message, if the flow in the band is within a limiting value, then a step of (8) is carried out for receiving the data packet directly. Through the fact that the data packet is continuously and repeatedly filtered, and influence of the network storm on a real-end central processing unit (CPU) is reduced.

Description

A kind of Ethernet storm inhibition method
One, technical field
A kind of Ethernet storm inhibition method belongs to ethernet communication and power automation field, is used in Suppression network being applicable to the weak embedded intelligence communication terminal device of processor disposal ability to repeat to be sent as the network storm of feature.
Two, background technology
Along with the development of China's power industry, the putting into operation and build up and put into operation of increasing intelligent substation is because intelligent substation adopts communication protocol framework based on the IEC61850 of Ethernet [14], the intelligent communications terminal equipment with real time communication requirement a large amount of in transformer station are endowed network function, make substation safety reliability service height rely on network service.And these intelligent communications terminal equipment adopt the low and middle-end flush bonding processor usually, and disposal ability is not enough to compare with BCS.If device hardware device damage or the individual device software of networking go wrong, cause network traffics to increase suddenly and even arrive the storm level, this will seriously reduce protection equipment calculating and communication performance in real time, thereby affect power supply safety [7] [8]
Promote this theme of network performance about the Suppression network storm, tissue has launched research widely to this both at home and abroad, but research direction reduces total flow on network mainly for switch and bridge etc. by the technology such as packet loss of dividing VLAN isolation broadcast domain or utilize switch will get over Flow Limit.And transformer station physically or be all a closed system on network, and the multicasts that adopt substitute broadcasting more in the intelligent substation standard [14] [15] [16] [4], only have that seldom broadcast frame is useful to intelligent communications terminal, and in transformer station, intelligent communications terminal all using embedded system or dedicated system, the probability that infects outside virus is very low.The reason that causes network storm is mainly network interface and damages [1] [2]Or the interface software defective, show as a large amount of in a short time packets that repeats to send.According to these characteristics, the present invention proposes a kind of storm inhibition method for intelligent communications terminal, repeats in a short time the datagram that sends and coordinates flow detection by inhibition, comes the limiting network flow, keep as far as possible again the regular traffic message, guarantee well the stable operation of intelligent terminal.
At the Suppression network storm, guarantee that the effort of intelligent communications terminal safe operation is mainly reflected in the following aspects at present:
1. divide VLAN and suppress the storm transmission [5]
Divide from isolating in logic different segment by VLAN, isolate simultaneously different broadcast domains, so just limited the propagation of broadcasting in net, the quantity of having reduced the useless broadcasting that to receive.Due to the devices exchange information that does not affect in same VLAN, so can configure three-layer equipment, dwindle broadcast domain, reduce as much as possible broadcast storm, improve access to netwoks efficient.
2. based on the inhibition technology of STP agreement and loop detection [11]
This method is in same ethernet device, divide the logic bridge according to spanning tree running environment, for each spanning tree running environment is divided a logic bridge, incorporating respectively the port of needs isolation into described logic bridge makes and needs the port of isolation to belong to different logic bridges, and identify this bridge, thereby realize suppressing broadcast storm by Spanning-Tree Protocol in containing the Ethernet of a plurality of network segments according to the relevant Spanning-Tree Protocol generation of the logic bridge identifier operation topology of each ethernet device and port thereof.
3. flow compact technique
Come the supervising the network port by a period of time and measurement of comparison with the method for predefined compacting rank threshold value, if the threshold value of discharge pattern has reached, how such flow will be subject to compacting (simply abandoning), until the flow that pushes on drops to below the threshold value rank.The independent storm of switch support is controlled thresholding to broadcast group broadcast and clean culture.
4. software query filter method [6]
A plurality of CPU of configuration in system, business datum is completed by a core, and ethernet communication is completed by another kernel.Be responsible for the kernel of communication by the driving Network Interface Unit of polling mode, the number that restriction simultaneously receives buffering limits the CPU. that too much packet enters the business of being responsible for
5. dynamically close the hardware Receiving [9]
With receive buffer length half as the storm decision threshold, think that the broadcast receiving function of network interface card occurs and closes storm when data in reception buffer zone overstock when arriving this thresholding.Judge simultaneously the storm persistent state in idle task, and reopen network interface card hardware broadcast receiving function at storm time-delay later.
In above several method, method 1, method 2 and method 3 are mainly for network equipments such as switch and bridges, be intended to reduce storm data in network, method 3 also can cause the regular traffic message to be dropped, method 4 need to configure a plurality of cpu system more complicated in system, method 5 need to take the certain expense of CPU and need MAC to support dynamically to close broadcast receiving function [17] [18], other Frame is not had inhibitory action.
List of references
1. how suppress laboratory science the 3rd phase of June in 2005 my opinion about broadcast storm from hardware in Liu Jin young tiger local area network (LAN)
2. the reason that produces of the male network broadcasting windstorm of Lee one and countermeasure Guangxi Technical College journal in June, 2007 supplementary issue 1
3. Xiao's loud and clear LAN broadcast storm origin cause of formation and process Hunan agricultural machinery in March, 2011
4. trying to gain true jade Wang Xing becomes industrial control system to use multicasting technology inhibition broadcast storm observation and control technology the 8th phase in 2009
5. Cao Yue fine jade LAN broadcast storm is analyzed and the application computer knowledge of vlan technology and technology in December, 2009
Zhu come strong, Chen Xin it, control Electric Power Automation Equipment in the November, 2010 of broadcast storm in the Gao Zhiyong digital transformer substation
7. network storm Hongsuihe River the 4th phase in 2007 that can not be ignored in the female electric power monitoring system of Zhu Zi
8. the Ceng Ruijiang beam is known high-new power station automation system Analysis of Network Malfunction in January, 2008 Guangdong Electric Power of mutinying of soldier
9. king's Xiao Ling is easily sent out victory and is avoided broadcast storm adaptive algorithm Southwest University for Nationalities journal in September, 2005 in a kind of intelligent terminal
10. trip ripple Mu Rong increases PREQ broadcast storm inhibition scheme computer application research in the August, 2012 of a kind of IEEE802.11s tree network of Yan Yuepeng
11. suppress the implementation method patent No. CN03101275.2 Huawei Tech Co., Ltd of broadcast storm in a kind of Ethernet of Zheng Ping Yang Yang
14. the company standard intelligent substation Protection Technology standard Q/GDW441-2010 of State Grid Corporation of China
15. the power industry standard merge cells technical conditions DL/T282-20122012-03-01 of the People's Republic of China (PRC) implements
16.IEC61850-9-2∶Communication networks and systems in substations Part9-2∶
Specific Communication Service Mapping(SCSM)Sampled values over ISO/IEC8802-3link
17.LAN91C11110/100Non-PCI Ethernet single chip MAC+PHY SMSC standard Microsystems corporation Rev1.4(12-12-03)
18.MCF54455Reference Manual Freescale Semiconductor Rev.54/2009
Three, summary of the invention
The objective of the invention is to propose a kind of because repeating to send the Ethernet storm inhibition method that causes network traffics to increase severely.
The present invention realizes by such scheme, a kind of Ethernet storm inhibition method, and step is as follows:
(1) at first build a MAC receiving-member that is comprised of MAC Address identifier, reception framer, flow rate calculation, packet filtering device, hash table and reception decision device and MCU interface, wherein the list item of hash table should comprise message characteristic code and message rise time;
(2) calculate the peak flow of normal use business datum, set on this basis the flow limit value that starts the storm compacting;
(3) statistics is by flow in the data band that enters the MAC receiving-member after the MAC Address identifier, if in band, the out-of-limit step 4 that turns of flow checks the reception message, if in band, flow directly receives this packet at limit value with the interior step (8) that turns;
(4) extract by receiving framer the frame check code (FCS) that receives message, and according to this as the condition code of this message;
(5) input as hash function with frame check code FCS, calculate Hash-table index and search corresponding hash table entry with this;
(6) if the FCS of corresponding hash table entry is consistent with current FCS and life span is not 0 and abandons this packet and simultaneously the life span of this list item is subtracted 1 (when life span is 0, FCS being set to 0 simultaneously), turns step (9) and wait for new datagram;
(7) if corresponding list item FCS and current FCS are inconsistent, the FCS field of list item is made as current FCS, simultaneously the life span field is set to maximum;
(8) the MAC receiving-member is revised reception buffer zone pointer and accepting state mark confirmation reception current data packet;
(9) wait for that next packet arrives and turns step (3);
Realize that by repeating step (3) to (8) constantly the repeating data newspaper filters, and reduces network storm to the impact of rear end CPU.
Further, each of the hash search table that packet filtering of the present invention is used all comprises message characteristic code and life span field, when realizing with message checking code (FCS) as the message characteristic code, utilize simultaneously FCS to calculate the index of hash table and the respective items of fast finding hash table.The replacement policy of hash search table is: when life span field that in the hashed value of the datagram of newly receiving and table, a certain will this item when identical subtracts 1, use new FCS to replace the condition code field of this list item when inconsistent and the life span field of resetting is maximum; The packet filtering strategy is in the out-of-limit rear startup of flow, and when identical and life span corresponding list item is not 0 when the message characteristic code field of a certain in newly arrived message FCS and hash table, this message is not dropped.
The invention has the beneficial effects as follows:
1. based on the harmless filtration of message characteristic, what be dropped is the datagram that repeats to send of nearest a period of time;
5. build the dynamic hashing table based on frame check (FCS), search and filter rapidly, resource overhead is little, be convenient to hardware and realize;
3. each feature list item has certain ageing time, avoids the normal business datum of filtering;
4. the message rejection ratio can be controlled flexibly by the maximum of revising message life span field;
5. can monitor simultaneously and filter many different duplicate messages;
6. packet filtering is started by flow detection unit, receives all messages during low discharge, and the regular traffic flow is unaffected.
The present invention passes through to extract the frame check code FCS of network message, and with this foundation as message characteristic and calculating Hash-table index.Start packet filtering mechanism after in Netowrk tape, flow reaches preset threshold, and life span consistent with condition code field in hash table is not that 0 duplicate message abandons with message FCS, by constantly repeating data newspaper filtration, reduce network storm and the impact of rear end CPU is namely reduced the purpose of pressure and the compacting network storm of application processor.
Four, description of drawings
Fig. 1 is that pure software of the present invention is realized system construction drawing
Fig. 2 is the pure system for implementing hardware structure chart of the present invention
Fig. 3 is status transition chart of the present invention
Five, specific implementation
The Ethernet storm inhibition method that the present invention provides can be incorporated into MAC and realize based on pure hardware, also can be based on the ASIC network controller realizes with pure software, below provide Hardware Implementation of the present invention, pure software implementation method and hardware approach difference only are Address Recognition and receive framing to be processed by ASIC.
1. system realizes block diagram
Accompanying drawing 2 provides hardware of the present invention and realizes block diagram, by address recognition logic, receive framer, flow rate calculation unit, packet filtering device, hash table and reception decision device and the MCU interface forms.Wherein address recognition logic is screened the ethernet frame that receives according to the Address Recognition strategy of MCU configuration, and the frame that meets condition of acceptance enters framer and flow rate calculation unit, and ineligible directly abandons.The calculating with interior flow is responsible in the flow rate calculation unit, and framer will be completed calculating and the judgement of data framing and the check code (FCS) of MII interface.The packet filtering device calculates Hash-table index and Dynamic Maintenance hash table according to FCS, and after in band, flow surpassed preset threshold, every reception message FCS duplicate message consistent with hash table FCS will be labeled.The output (FEN) that receives decision device synthetic address recognition logic output (RXEN), framer output (FCS_OK), packet filtering device provides and receives enable signal (RCV_EN), and arbitrary condition does not satisfy all will directly abandon this frame.
2. flow detection unit
Packet filtering mechanism of the present invention is the out-of-limit startup later on of flow in band, thereby avoids the impact on the regular traffic flow.Flow detection unit is only added up flow in band, i.e. Frame by Address Recognition.Flow detection unit comprises a frame counter Q and a summary counter S, rising edge at the receive data useful signal (RXDV) of MII interface is removed counter Q, start-of-frame (SFD) detected and begin counting afterwards under receive clock (RXCLK) drives, the trailing edge of RXDV stops counting when arriving and incites somebody to action, if this frame by Address Recognition Q be added on total counter S.After a period of time Δ T observation, utilize the following formula method to calculate current real-time traffic.When startup is observed next time, remove total counter S.
flux = S ΔT = 1 ΔT Σ i N Q i · B w - - - ( 1 )
In formula: the current real-time traffic Δ of flux---T--observation time
N---is the Frame by Address Recognition in observation time
Q i---the frame counter that observes for the i time
B w--MII interface data highway width (the MII interface is 4, and gmii interface is 8)
3. status transition chart
The present invention adopts state machine shown in accompanying drawing 2 to control Address Recognition, message reception, check code calculating, hash table management and packet and receives judgement.
The IDLE state: idle condition will enter this state after system's startup or reception finish.At the state of this state-detection MII interface data useful signal (RXDV), enter the Recognize state when starting character (SFD) being detected after the rising edge of RXDV;
The Recognize state: the Address Recognition state, screen at this state received frame, turn the Receive state and carry out message and receive if destination-mac address meets condition of acceptance, otherwise turn the IDLE state and abandon the current data newspaper;
Receive state: accepting state, move under the driving of receive clock (RXCLK) in these state network data (RXD) and receive framer, calculate simultaneously local frame check code (FCS) and extract reception check code (FCS), change the PostReceive state over to after the trailing edge of RXDV arrives;
The PostReceive state: receive the reprocessing state, flow in the current band of this state computation carries out the check code inspection to received frame, turns the IDLE state if verification makes mistakes, otherwise further checks present flow rate.If in current band, flow turns the Commit state lower than default thresholding, submit current bag to, carry out the duplicate packages examination otherwise turn the Filter state;
The Commit state: the confirmation of receipt state, submit current bag and modification reception buffer zone pointer to system, turn afterwards the IDLE state and wait for new packet;
Filter state: packet filtering state, FCS according to current bag calculates Hash-table index and searches accordingly hash table at this state, the qualified Commit state that turns is submitted current bag to system, ineligible turn the IDLE state after directly abandoning and waits for new packet.
4. hash table management and packet filtering
4.1 hash table structure
Hash table of the present invention is a linear list, is comprised of some list items, and each list item comprises message characteristic code and two fields of life span.Be simple implementation, the capacity of getting the hash search table herein is 256 * 36 linear list, each list item is represented by 36 hytes, adopt 32-bit ethernet frame check code (FCS) as the message characteristic code, with the calculating Hash-table index (for simplicity getting the least-significant byte of FCS herein as index) of FCS, be used for each list item of fast finding.Each field implication of list item is as follows:
<D35 ..., D32〉--the list item life span represents this out of date can substituting when this field is 0;
<D31 ..., D0〉--the frame condition code, the present invention substitutes with frame check code (FCS).
4.2. hash table replacement and packet filtering
The present invention adopts the hash table that is used as packet filtering based on the full matching strategy Dynamic Maintenance of hash search and life span, and only just starts when flow is out-of-limit, recovers the normal rear hash table of removing at flow, and concrete steps are as follows:
(1). system initialization, empty all list items, wait for that message arrives;
(2). extract the check code FCS of present frame after new message arrives from receiving framer, with the calculating Hash-table index (for simplicity getting the least-significant byte of FCS herein as index) of FCS, fast search is to corresponding list item;
(3). frame condition code field and present frame FCS in the coupling list item, consistent if (this message was receiving not long ago) the rise time field of this list item is subtracted 1 (being 0 should be simultaneously the message characteristic code field of list item to be set to 0 when the rise time), the filter output enable signal (FEN) that resets turns step 5, carries out replacement policy otherwise enter next step;
(4). the message characteristic code field that will mate list item replaces with current FCS, then the life span of corresponding list item is set to maximum, the filter of set simultaneously output enable signal (check code is inconsistent, and this is a new datagram, needs to receive);
(5). wait for new datagram, datagram turns step 2 after arriving;
Receive subsequently decision device and will whether receive newly arrived datagram according to the Determines of packet filtering device output enable signal.
4.3. duplicate message rejection ratio
According to 4.2 and 4.3, one datagrams that repeat to send, should coated receive when the life span of its corresponding hash table entry is 0, and new datagram always is made as maximum with the life span of corresponding list item when arriving for the first time.Can establish with following expression formula its rejection ratio of the datagram that repeats to send:
λ=1/(N-1) (2)
In formula: λ-message rejection ratio, N-message maximum lifetime
In hash table, each list item represents a specific message, and the degree of depth of hash table has determined the message amount that the packet filtering device can monitor simultaneously.
4.4. receive judgement
The output (FEN) that receives decision device synthetic address recognition logic output (RXEN), framer output (FCS_OK), packet filtering device provides and receives enable signal (RCV_EN).The Frame that Address Recognition and received frame verification are not passed through is simply discarded, and the packet filtering device is by the flow rate calculation unit starting.The out-of-limit rear packet filtering device output FEN of flow is low, thereby corresponding coated abandoning realizes that the repeating data newspaper effectively suppresses.
5. other considerations
For the effectively impact of Suppression network storm to terminal embedded communication, the present invention's following factor when implementing needs to consider:
(1). according to the data-handling capacity of MCU in system and the startup flow limit value of regular traffic data traffic decision packet filtering device;
(2). the hash search table degree of depth determines to monitor how many kinds of repeating data newspaper, and in the list item of hash search table, the bit wide of life span field determines the rejection ratio of duplicate packages, if resource is allowed the capacity that increases hash table as far as possible.
(3). should be according to the real network environment, the comprehensive means such as broadcasting inhibition, multicast inhibition that adopt are suppressed the flow of crossing the processor ability, but the flow limit value of these means should be higher than limit value of the present invention, just can reach the reasonable effect of stabilizing storm.
(4). different Hash-table index algorithms is different to the hash table utilance, the high but time overhead can increase hard-wired resource overhead and software and realize the time of complicated algorithm hash table utilance.
(5). the observation time Δ T of flow rate calculation unit should determine in conjunction with rear end MCU disposal ability, should guarantee during specific implementation that under possible maximum storm flow in the Δ T time, the load factor of MCU is in the design allowed band.The too little meeting of Δ T causes flow rate calculation result fluctuation large, and too the conference reception buffer zone that causes when burst storm message filter also not start MAC just collapses.
Although the present invention discloses as above with preferred embodiment, so it is not to limit the present invention.The persond having ordinary knowledge in the technical field of the present invention, without departing from the spirit and scope of the present invention, when being used for a variety of modifications and variations.Therefore, protection scope of the present invention is as the criterion when looking claims person of defining.

Claims (5)

1. Ethernet storm inhibition method is characterized in that step is as follows:
(1) at first build a MAC receiving-member that is comprised of MAC Address identifier, reception framer, flow rate calculation, packet filtering device, hash table and reception decision device and MCU interface, wherein the list item of hash table should comprise message characteristic code and message rise time;
(2) calculate the peak flow of normal use business datum, set on this basis the flow limit value that starts the storm compacting;
(3) statistics is by flow in the data band that enters the MAC receiving-member after the MAC Address identifier, if in band, the out-of-limit step 4 that turns of flow checks the reception message, if in band, flow directly receives this packet at limit value with the interior step (8) that turns;
(4) extract by receiving framer the frame check code (FCS) that receives message, and according to this as the condition code of this message;
(5) input as hash function with frame check code FCS, calculate Hash-table index and search corresponding hash table entry with this;
(6) if the FCS of corresponding hash table entry is consistent with current FCS and life span is not 0 and abandons this packet and simultaneously the life span of this list item is subtracted 1 (when life span is 0, FCS being set to 0 simultaneously), turns step (9) and wait for new datagram;
(7) if corresponding list item FCS and current FCS are inconsistent, the FCS field of list item is made as current FCS, simultaneously the life span field is set to maximum;
(8) the MAC receiving-member is revised reception buffer zone pointer and accepting state mark confirmation reception current data packet;
(9) wait for that next packet arrives and turns step (3);
Realize that by repeating step (3) to (8) constantly the repeating data newspaper filters, and reduces network storm to the impact of rear end CPU.
2. Ethernet storm inhibition method according to claim 1, it is characterized in that: each of the hash search table that packet filtering is used all comprises message characteristic code and life span field, and life span is to remove the message characteristic code field of corresponding list item at 0 o'clock.
3. Ethernet storm inhibition method according to claim 1 is characterized in that: the message checking code (FCS) that calculates with the MAC receiving-member utilizes FCS calculate the index of hash table and search the respective items of hash table with this as the message characteristic code simultaneously.
4. Ethernet storm inhibition method according to claim 1, it is characterized in that: the replacement policy of the hash search table that packet filtering is used is, when life span field that in the hashed value of the datagram of newly receiving and table, a certain will this item when identical subtracts 1, use new FCS to replace the condition code field of this list item when inconsistent and the life span field of resetting is maximum.
5. Ethernet storm inhibition method according to claim 1, it is characterized in that: the out-of-limit rear startup of flow in band of packet filtering device, when identical and life span corresponding list item is not 0 when the message characteristic code field of a certain item in newly arrived message FCS and hash table, this message is not dropped.
CN201310055312.8A 2013-02-21 2013-02-21 A kind of Ethernet storm suppressing method Active CN103095603B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310055312.8A CN103095603B (en) 2013-02-21 2013-02-21 A kind of Ethernet storm suppressing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310055312.8A CN103095603B (en) 2013-02-21 2013-02-21 A kind of Ethernet storm suppressing method

Publications (2)

Publication Number Publication Date
CN103095603A true CN103095603A (en) 2013-05-08
CN103095603B CN103095603B (en) 2015-07-29

Family

ID=48207755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310055312.8A Active CN103095603B (en) 2013-02-21 2013-02-21 A kind of Ethernet storm suppressing method

Country Status (1)

Country Link
CN (1) CN103095603B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297298A (en) * 2013-06-27 2013-09-11 山东山大电力技术有限公司 Network storm real-time rapid detecting method used for intelligent substation
CN103457749A (en) * 2013-08-29 2013-12-18 国家电网公司 Method for restraining multicast flooding in intelligent substation
CN103716239A (en) * 2013-12-24 2014-04-09 南京磐能电力科技股份有限公司 Network storm inhibition method in process layer of intelligent transformer station
CN104184671A (en) * 2013-05-23 2014-12-03 广州思唯奇计算机科技有限公司 Method of inhibiting network storm of intelligent substation and device
CN104320339A (en) * 2014-09-18 2015-01-28 无锡锐格思信息技术有限公司 Method of forming correct forwarding table through periodic broadcasting or multicast of CPU (Central Processing Unit)
CN104378186A (en) * 2014-10-31 2015-02-25 南京南瑞继保电气有限公司 Network redundant data processing methods, devices and system
CN104426687A (en) * 2013-08-23 2015-03-18 南京南瑞继保电气有限公司 A network storm filtering method applicable for a digital substation secondary device
CN107566294A (en) * 2017-07-06 2018-01-09 中国南方电网有限责任公司 A kind of network storm suppressing method suitable for IEC62439 standards
CN108881328A (en) * 2018-09-29 2018-11-23 北京东土军悦科技有限公司 Packet filtering method, device, gateway and storage medium
CN109873725A (en) * 2019-03-06 2019-06-11 中国铁道科学研究院集团有限公司通信信号研究所 A kind of railway signal TDCS/CTC system prevents the means of defence of data network storm
CN110247852A (en) * 2019-07-08 2019-09-17 无锡锐格思信息技术有限公司 Broadcasting packet is reduced to the method and apparatus of ethernet switching device CPU impact

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040054925A1 (en) * 2002-09-13 2004-03-18 Cyber Operations, Llc System and method for detecting and countering a network attack
CN1725705A (en) * 2005-05-09 2006-01-25 杭州华为三康技术有限公司 Method for detecting flow attacking message characteristic of network equipment
CN101895446A (en) * 2010-08-11 2010-11-24 广东省电力调度中心 Detection method of broadcast storm and device thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040054925A1 (en) * 2002-09-13 2004-03-18 Cyber Operations, Llc System and method for detecting and countering a network attack
CN1725705A (en) * 2005-05-09 2006-01-25 杭州华为三康技术有限公司 Method for detecting flow attacking message characteristic of network equipment
CN101895446A (en) * 2010-08-11 2010-11-24 广东省电力调度中心 Detection method of broadcast storm and device thereof

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184671B (en) * 2013-05-23 2018-02-09 广州思唯奇计算机科技有限公司 A kind of suppressing method and device of intelligent substation network storm
CN104184671A (en) * 2013-05-23 2014-12-03 广州思唯奇计算机科技有限公司 Method of inhibiting network storm of intelligent substation and device
CN103297298A (en) * 2013-06-27 2013-09-11 山东山大电力技术有限公司 Network storm real-time rapid detecting method used for intelligent substation
CN103297298B (en) * 2013-06-27 2015-10-28 山东山大电力技术有限公司 For the network storm detection method real-time of intelligent substation
CN104426687A (en) * 2013-08-23 2015-03-18 南京南瑞继保电气有限公司 A network storm filtering method applicable for a digital substation secondary device
CN103457749A (en) * 2013-08-29 2013-12-18 国家电网公司 Method for restraining multicast flooding in intelligent substation
CN103716239A (en) * 2013-12-24 2014-04-09 南京磐能电力科技股份有限公司 Network storm inhibition method in process layer of intelligent transformer station
CN103716239B (en) * 2013-12-24 2017-01-04 南京磐能电力科技股份有限公司 The suppressing method of network storm in a kind of transformer station process layer
CN104320339A (en) * 2014-09-18 2015-01-28 无锡锐格思信息技术有限公司 Method of forming correct forwarding table through periodic broadcasting or multicast of CPU (Central Processing Unit)
CN104378186A (en) * 2014-10-31 2015-02-25 南京南瑞继保电气有限公司 Network redundant data processing methods, devices and system
CN107566294A (en) * 2017-07-06 2018-01-09 中国南方电网有限责任公司 A kind of network storm suppressing method suitable for IEC62439 standards
CN108881328A (en) * 2018-09-29 2018-11-23 北京东土军悦科技有限公司 Packet filtering method, device, gateway and storage medium
CN108881328B (en) * 2018-09-29 2021-02-23 北京东土军悦科技有限公司 Data packet filtering method and device, gateway equipment and storage medium
CN109873725A (en) * 2019-03-06 2019-06-11 中国铁道科学研究院集团有限公司通信信号研究所 A kind of railway signal TDCS/CTC system prevents the means of defence of data network storm
CN110247852A (en) * 2019-07-08 2019-09-17 无锡锐格思信息技术有限公司 Broadcasting packet is reduced to the method and apparatus of ethernet switching device CPU impact

Also Published As

Publication number Publication date
CN103095603B (en) 2015-07-29

Similar Documents

Publication Publication Date Title
CN103095603B (en) A kind of Ethernet storm suppressing method
CN103036893B (en) A kind of one deck network data processing method being applicable to intelligent substation
Thomas et al. Reliable, fast, and deterministic substation communication network architecture and its performance simulation
CN101588298B (en) Method for switching flow in stacking system and stacking system
WO2016107210A1 (en) Redundant industrial ethernet system with multistage packet filtering and service classification control
CN100369416C (en) Method for detecting flow attacking message characteristic of network equipment
CN104243350B (en) A kind of exchange of electric power machine processing method for service stream and its system
CN103378654A (en) Method for filtering network messages of process level of intelligent substation
CN105357137B (en) Message filtering method and the FPGA being applicable in, intelligent substation
CN103026664A (en) Determining vlan-ids for a switched-based communication network of a process control system
CN104283746B (en) The system and method for digital transformer substation unification of three nets is realized using FPGA
WO2018049584A1 (en) Method for avoiding data message collision in communication network within substation
CN112821560B (en) Distributed self-healing protection method for overhead line distribution network
CN105790990A (en) Method and system for monitoring and managing power distribution and utilization communication business
CN102916862A (en) Intelligent looped network dynamic protection method of industrial Ethernet switch
CN103916318A (en) Single-loop network implementation method
Shin et al. Performance improvement for the HSR ring protocol with traffic control in smart grid
CN201163781Y (en) Industrial Ethernet switchboard based on DRP protocol
Ingalalli et al. SCD based IEC 61850 traffic estimation for substation automation networks
CN111447149A (en) Shared storage-based GOOSE message dual-network inhibition method
CN101304181A (en) Double-network control method for transformer substation case mechanism based on facing all-purpose object
CN115296412A (en) Distributed feeder automation method for power distribution network with distributed power supply based on 5G
Molina et al. Managing path diversity in layer 2 critical networks by using OpenFlow
CN203135573U (en) Relay protection device
Tournier et al. Precise time synchronization on a high available redundant ring protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: YANTAI PANENG ELECTRICAL CONTROL SYSTEM CO., LTD.

Effective date: 20150225

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150225

Address after: 210061, No. 6, pan Neng Road, Pukou hi tech Development Zone, Jiangsu, Nanjing

Applicant after: Nanjing Paneng Electric Power Technology Co.,Ltd.

Applicant after: Yantai Pan Neng electric control system company limited

Address before: 210061, No. 6, pan Neng Road, Pukou hi tech Development Zone, Jiangsu, Nanjing

Applicant before: Nanjing Paneng Electric Power Technology Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant