CN114884806A - Loop identification and blocking method based on high aggregation scene - Google Patents
Loop identification and blocking method based on high aggregation scene Download PDFInfo
- Publication number
- CN114884806A CN114884806A CN202210348330.4A CN202210348330A CN114884806A CN 114884806 A CN114884806 A CN 114884806A CN 202210348330 A CN202210348330 A CN 202210348330A CN 114884806 A CN114884806 A CN 114884806A
- Authority
- CN
- China
- Prior art keywords
- loop
- detection
- message
- port
- vlan
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000000903 blocking effect Effects 0.000 title claims abstract description 24
- 230000002776 aggregation Effects 0.000 title claims abstract description 11
- 238000004220 aggregation Methods 0.000 title claims abstract description 11
- 238000001514 detection method Methods 0.000 claims abstract description 124
- 238000011084 recovery Methods 0.000 claims abstract description 12
- 238000012544 monitoring process Methods 0.000 claims abstract description 7
- 230000008859 change Effects 0.000 claims description 6
- 230000007246 mechanism Effects 0.000 claims description 5
- 230000008569 process Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 4
- 239000000523 sample Substances 0.000 description 4
- 230000000694 effects Effects 0.000 description 2
- 206010033799 Paralysis Diseases 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2801—Broadband local area networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0677—Localisation of faults
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a loop identification and blocking method based on a high aggregation scene, which comprises the following steps: based on the loop prediction of flow monitoring, judging whether a loop occurs or not by recording the time when the table entry interface changes; detecting and identifying the loop position, recording the position of the loop where the vlan occurs, and alarming the position of the loop according to the Ifindex in the loop message and the port where the message is received; loop superposition detection, namely actively increasing the packet sending quantity of loop detection messages, further detecting whether a loop exists, and when the loop cannot be found even if the loop is increased in quantity, performing blocking operation on an interface, resending the detection messages and verifying whether the loop exists; and (3) loop recovery judgment, namely setting a loop recovery detection mark for the generated loop, recording detection time, sending a loop detection message, and judging loop recovery if the loop message is not received within a preset time length. The invention repeatedly identifies and verifies the loop by a plurality of detection steps based on the flow state of the equipment, thereby improving the identification accuracy.
Description
Technical Field
The invention relates to the field of network security, in particular to a loop identification and blocking method based on a high aggregation scene.
Background
In a large-scale local area network environment, a network loop is easily caused by improper configuration of network equipment, damage of network equipment hardware, network topology connection errors and virus attack on a network. The network loop can cause the device to continuously copy and forward the broadcast, multicast and unknown unicast messages, thereby causing network paralysis and influencing normal services.
In the prior art, a device is usually adopted to actively send a detection message, and when the detection message sent by the device is received, a network loop is identified.
The disadvantage of this method is that the device needs to send the detection message at regular time, if the timing time is short, the device will send the detection message all the time, which affects the forwarding process of the device to the normal service flow, and the too many detection messages in the network will cause the network congestion and affect the normal service; if the timing time is long, when a loop exists in the network, the loop cannot be found in time, and the network is disconnected during the loop.
The device sends the detection message based on the vlan, and the uplink port is generally configured with trunkvlan 1-4094. The actual use of several vlans leads to the fact that the equipment sends a large amount of meaningless messages and occupies the equipment packet sending resources.
When a loop occurs in the network, the traffic in the network will fill up the device bandwidth, and the loop detection packet may be directly lost by the network device due to the bandwidth problem, so that the loop cannot be detected.
Therefore, in order to find a network loop in time, a technique of detecting a loop and restoring the network is required.
Disclosure of Invention
Aiming at the problem that the prior art cannot accurately detect the loop, the invention provides a loop identification and blocking method based on a high aggregation scene, which repeatedly identifies and verifies the existence of the loop through a plurality of detection steps, improves the identification accuracy and recovers.
The technical scheme of the invention is as follows.
A loop identification and blocking method based on a high aggregation scene comprises the following steps:
based on the loop prediction of flow monitoring, judging whether a loop occurs or not by recording the time when the table entry interface changes;
detecting and identifying the loop position, recording the position of the loop where the vlan occurs, and alarming the position of the loop according to the Ifindex in the loop message and the port where the message is received;
loop superposition detection, namely actively increasing the packet sending quantity of loop detection messages, further detecting whether a loop exists, and when the loop cannot be found even if the loop is increased in quantity, performing blocking operation on an interface, resending the detection messages and verifying whether the loop exists;
and (3) loop recovery judgment, namely setting a loop recovery detection mark for the generated loop, recording detection time, sending a loop detection message, and judging loop recovery if the loop message is not received within a preset time length.
The terms of art to which the present invention relates include: version: a version number. Order: the type of the message. Vlan _ id: the vlan of the message packet. A Serial: a serial number. Ifindex: port number of the packet. Mac: the mac address of the device.
Preferably, the loop prediction based on flow monitoring includes:
using mac, vlan, incoming interface, interface switching times and interface switching time as record items, and storing flow information;
when the equipment has flow, analyzing the message received by the equipment, and establishing a table entry by taking mac and vlan as main keys; recording the time when the entry interface of the table item changes;
through the time of the change, compared with the time of the change at the last time, the interface is changed within 0.2 second, the interface switching times are increased by 1, and the zero clearing is carried out when the interface switching times exceed 0.2; when the interface switching times reach 5 times, predicting that a network generates a loop, immediately sending a loop detection message, and judging whether the loop occurs or not;
and counting the packet receiving and sending rate of the equipment port, predicting that a loop occurs in the network when the packet receiving and sending rate of the equipment port exceeds 95% of the maximum bandwidth of the port, immediately sending a loop detection message, and judging whether the loop occurs.
Preferably, the loop position detection and identification includes:
after receiving a loop detection message sent by the equipment, the equipment identifies that a loop exists in the network, records the position of a vlan where the loop occurs, and alarms the position of the loop according to Ifindex in the loop message and a port where the message is received;
the device sends a loop detection message:
after the equipment starts loop detection, the equipment sends loop detection messages from each port based on vlan every 1 hour;
the method comprises the steps that a device monitors and predicts a loop mechanism according to flow, and when a loop is predicted in a network, a loop detection message is sent from a specific port based on vlan;
wherein, the equipment sends a loop detection message vlan: based on the device port, creating a bitmap (each vlan occupies 1 bit) of the vlan to which the port belongs; when the equipment receives the message flow, the vlan of the message received by the port is recorded, the corresponding position 1 is corresponding to the vlan, and when the detection message is sent, the detection message is sent according to the vlan bitmap of the port.
Preferably, the loop superposition detection includes:
and taking the vlan, the loop port 1 and the loop port 2 as main keys, and storing information when the loop is predicted to be sent: vlan, loop port 1, loop port 2, loop probe time, weight over duration, loop probe flag.
When the loop is predicted to occur, sending a loop detection message according to the detection time, the weighted value in the duration and the detection mark: when the loop detection mark is true and the detection time is more than 1 minute away from the last detection time, sending a loop detection message with weighted value times, and adding 1 to the weighted value every time the detection message is sent;
when the weighted value is 10, blocking the loop port 1, timing, and sending a detection message from the loop port 2; if receiving the loop detection message from the port 1, the loop is proved to have occurred, the blocking configuration on the port 1 of the loop is removed, and an alarm is given; if the loop does not exist in 1 minute, the blocking setting of a loop port 1 is removed, and a loop detection mark is set to be false;
when the loop detection mark is false, the detection message is sent every 1 minute, and the detection times are not increased.
When a loop occurs, a large number of messages appear in the loop, and a device packet receiving and forwarding queue is full, so that a loop detection message is lost, the loop detection message cannot accurately return to the device, and the judgment of the loop is influenced.
The substantial effects of the invention include: predicting the possibility of a network forming a loop according to mac and vlan information carried in the message and a message input interface; predicting the possibility of forming a loop by a network according to the port rate of the equipment; the device predicts the possibility of the network loop according to the network message flow, sends a detection message in real time according to the prediction result and finds the network loop in time; recording the actual message received by the port, determining vlan information carried in the detection message, and reducing the number of packets sent; and a loop superposition detection mechanism performs deep detection according to the predicted actual situation and the port speed.
Drawings
FIG. 1 is a flow chart of a loop prediction based on traffic monitoring according to an embodiment of the present invention;
fig. 2 is a flow chart of loop overlay detection according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions will be clearly and completely described below with reference to the embodiments, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the internal logic of the processes, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in the present invention, "a plurality" means two or more. "and/or" is merely an association describing an associated object, meaning that three relationships may exist, for example, and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "comprises A, B and C" and "comprises A, B, C" means that A, B, C all comprise, "comprises A, B or C" means comprise one of A, B, C, "comprises A, B and/or C" means comprise any 1 or any 2 or 3 of A, B, C.
The terms of art related to the present embodiment include:
version: a version number. Order: the type of the message. Vlan _ id: the vlan of the message packet. A Serial: a serial number. Ifindex: port number of the packet. Mac: the mac address of the present device.
Vlan (virtual localararea network): a Virtual Local Area Network (VLAN) is a group of logical devices and users, which are not limited by physical location, and can be organized according to functions, departments, applications, and other factors, and communicate with each other as if they are in the same network segment, thereby obtaining a virtual local area network.
VLAN Trunk (virtual local area network relay technology): refers to the ability to interwork hosts in the same VLAN connected to different switches.
The technical solution of the present invention will be described in detail below with specific examples. Embodiments may be combined with each other and some details of the same or similar concepts or processes may not be repeated in some embodiments.
Example (b):
a loop identification and blocking method based on a high aggregation scene comprises the following steps:
s1: based on the loop prediction of flow monitoring, judging whether a loop occurs or not by recording the time when the table entry interface changes; as shown in fig. 1, includes:
using mac, vlan, incoming interface, interface switching times and interface switching time as record items, and storing flow information;
when the equipment has flow, analyzing the message received by the equipment, and establishing a table entry by taking mac and vlan as main keys; recording the time when the entry interface of the table item changes;
through the time of the change, compared with the time of the change at the last time, the interface is changed within 0.2 second, the interface switching times are increased by 1, and the zero clearing is carried out when the interface switching times exceed 0.2; when the interface switching times reach 5 times, predicting that a network generates a loop, immediately sending a loop detection message, and judging whether the loop occurs or not;
and counting the packet receiving and sending rate of the equipment port, predicting that a loop occurs in the network when the packet receiving and sending rate of the equipment port exceeds 95% of the maximum bandwidth of the port, immediately sending a loop detection message, and judging whether the loop occurs.
S2: detecting and identifying the loop position, recording the position of the loop where the vlan occurs, and alarming the position of the loop according to the Ifindex in the loop message and the port where the message is received; the method comprises the following steps:
after receiving a loop detection message sent by the equipment, the equipment identifies that a loop exists in the network, records the position of a vlan where the loop occurs, and alarms the position of the loop according to Ifindex in the loop message and a port where the message is received;
the device sends a loop detection message:
after the equipment starts loop detection, the equipment sends loop detection messages from each port based on vlan every 1 hour;
the method comprises the steps that a device monitors and predicts a loop mechanism according to flow, and when a loop is predicted in a network, a loop detection message is sent from a specific port based on vlan;
wherein, the equipment sends a loop detection message vlan: based on the device port, creating a bitmap (each vlan occupies 1 bit) of the vlan to which the port belongs; when the equipment receives the message flow, the vlan of the message received by the port is recorded, the corresponding position 1 is corresponding to the vlan, and when the detection message is sent, the detection message is sent according to the vlan bitmap of the port.
S3: loop superposition detection, namely actively increasing the packet sending quantity of loop detection messages, further detecting whether a loop exists, and when the loop cannot be found even if the loop is increased in quantity, performing blocking operation on an interface, resending the detection messages and verifying whether the loop exists; as shown in fig. 2, includes:
and taking the vlan, the loop port 1 and the loop port 2 as main keys, and storing information when the loop is predicted to be sent: vlan, loop port 1, loop port 2, loop probe time, weight over duration, loop probe flag.
When the loop is predicted to occur, sending a loop detection message according to the detection time, the weighted value in the duration and the detection mark: when the loop detection mark is true and the detection time is more than 1 minute away from the last detection time, sending a loop detection message with weighted value times, and adding 1 to the weighted value every time the detection message is sent;
when the weighted value is 10, blocking the loop port 1, timing, and sending a detection message from the loop port 2; if receiving the loop detection message from the port 1, the loop is proved to have occurred, the blocking configuration on the port 1 of the loop is removed, and an alarm is given; if the loop does not exist in 1 minute, the blocking setting of a loop port 1 is removed, and a loop detection mark is set to be false;
when the loop detection mark is false, the detection message is sent every 1 minute, and the detection times are not increased.
When a loop occurs, a large number of messages appear in the loop, and a device packet receiving and forwarding queue is full, so that a loop detection message is lost, the loop detection message cannot accurately return to the device, and the judgment of the loop is influenced.
S4: and (3) loop recovery judgment, namely setting a loop recovery detection mark for the generated loop, recording detection time, sending a loop detection message, and judging loop recovery if the loop message is not received within a preset time length.
The substantial effects of the present embodiment include: predicting the possibility of a network forming a loop according to mac and vlan information carried in the message and a message input interface; predicting the possibility of forming a loop by a network according to the port rate of the equipment; the device predicts the possibility of the network loop according to the network message flow, sends a detection message in real time according to the prediction result and finds the network loop in time; recording the actual message received by the port, determining vlan information carried in the detection message, and reducing the number of packets sent; and a loop superposition detection mechanism performs deep detection according to the predicted actual situation and the port speed.
Through the description of the above embodiments, those skilled in the art will understand that, for convenience and simplicity of description, only the division of the above functional modules is used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of a specific device is divided into different functional modules to complete all or part of the above described functions.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (4)
1. A loop identification and blocking method based on a high aggregation scene is characterized by comprising the following steps:
based on the loop prediction of flow monitoring, judging whether a loop occurs or not by recording the time when the table entry interface changes;
detecting and identifying the loop position, recording the position of the loop where the vlan occurs, and alarming the position of the loop according to the Ifindex in the loop message and the port where the message is received;
loop superposition detection, namely actively increasing the packet sending quantity of loop detection messages, further detecting whether a loop exists, and when the loop cannot be found even if the loop is increased in quantity, performing blocking operation on an interface, resending the detection messages and verifying whether the loop exists;
and (3) loop recovery judgment, namely setting a loop recovery detection mark for the generated loop, recording detection time, sending a loop detection message, and judging loop recovery if the loop message is not received within a preset time length.
2. The method for loop identification and blocking based on the high aggregation scene as claimed in claim 1, wherein the loop prediction based on the traffic monitoring comprises:
using mac, vlan, incoming interface, interface switching times and interface switching time as record items, and storing flow information;
when the equipment has flow, analyzing the message received by the equipment, and establishing a table entry by taking mac and vlan as main keys; recording the time when the entry interface of the table item changes;
through the time of the change, compared with the time of the change at the last time, the interface is changed within 0.2 second, the interface switching times are increased by 1, and the zero clearing is carried out when the interface switching times exceed 0.2; when the interface switching times reach 5 times, predicting that a network generates a loop, immediately sending a loop detection message, and judging whether the loop occurs or not;
and counting the packet receiving and sending rate of the equipment port, predicting that a loop occurs in the network when the packet receiving and sending rate of the equipment port exceeds 95% of the maximum bandwidth of the port, immediately sending a loop detection message, and judging whether the loop occurs.
3. The method for loop identification and blocking under the high aggregation scene according to claim 1, wherein the loop position detection identification comprises:
after receiving a loop detection message sent by the equipment, the equipment identifies that a loop exists in the network, records the position of a vlan where the loop occurs, and alarms the position of the loop according to Ifindex in the loop message and a port where the message is received;
the device sends a loop detection message:
after the equipment starts loop detection, the equipment sends loop detection messages from each port based on vlan every 1 hour;
the method comprises the steps that a device monitors and predicts a loop mechanism according to flow, and when a loop is predicted in a network, a loop detection message is sent from a specific port based on vlan;
wherein, the equipment sends a loop detection message vlan: based on the device port, creating a bitmap (each vlan occupies 1 bit) of the vlan to which the port belongs; when the equipment receives the message flow, the vlan of the message received by the port is recorded, the corresponding position 1 is corresponding to the vlan, and when the detection message is sent, the detection message is sent according to the vlan bitmap of the port.
4. The method for loop identification and blocking under the high aggregation scenario according to claim 1, wherein the loop overlap detection includes:
and taking the vlan, the loop port 1 and the loop port 2 as main keys, and storing information when the loop is predicted to be sent: vlan, loop port 1, loop port 2, loop detection time, weight value in duration, and loop detection flag;
when the loop is predicted to occur, sending a loop detection message according to the detection time, the weighted value in the duration and the detection mark: when the loop detection mark is true and the detection time is more than 1 minute away from the last detection time, sending a loop detection message with weighted value times, and adding 1 to the weighted value every time the detection message is sent;
when the weighted value is 10, blocking the loop port 1, timing, and sending a detection message from the loop port 2; if receiving the loop detection message from the port 1, the loop is proved to have occurred, the blocking configuration on the port 1 of the loop is removed, and an alarm is given; if the loop does not exist in 1 minute, the blocking setting of a loop port 1 is removed, and a loop detection mark is set to be false;
when the loop detection mark is false, the detection message is sent every 1 minute, and the detection times are not increased.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210348330.4A CN114884806A (en) | 2022-04-01 | 2022-04-01 | Loop identification and blocking method based on high aggregation scene |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210348330.4A CN114884806A (en) | 2022-04-01 | 2022-04-01 | Loop identification and blocking method based on high aggregation scene |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114884806A true CN114884806A (en) | 2022-08-09 |
Family
ID=82668875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210348330.4A Pending CN114884806A (en) | 2022-04-01 | 2022-04-01 | Loop identification and blocking method based on high aggregation scene |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114884806A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116346585A (en) * | 2023-03-13 | 2023-06-27 | 北京腾达泰源科技有限公司 | Cloud-protogenesis-based network fault self-repairing method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101707538A (en) * | 2009-11-25 | 2010-05-12 | 烽火通信科技股份有限公司 | Method for detecting and automatically recovering Ethernet loopback |
WO2017215291A1 (en) * | 2016-06-12 | 2017-12-21 | 烽火通信科技股份有限公司 | Ipran device-based method for detecting and processing ethernet loop |
CN112702226A (en) * | 2020-12-16 | 2021-04-23 | 杭州迪普科技股份有限公司 | Loop detection method, device, equipment and computer readable storage medium |
-
2022
- 2022-04-01 CN CN202210348330.4A patent/CN114884806A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101707538A (en) * | 2009-11-25 | 2010-05-12 | 烽火通信科技股份有限公司 | Method for detecting and automatically recovering Ethernet loopback |
WO2017215291A1 (en) * | 2016-06-12 | 2017-12-21 | 烽火通信科技股份有限公司 | Ipran device-based method for detecting and processing ethernet loop |
CN112702226A (en) * | 2020-12-16 | 2021-04-23 | 杭州迪普科技股份有限公司 | Loop detection method, device, equipment and computer readable storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116346585A (en) * | 2023-03-13 | 2023-06-27 | 北京腾达泰源科技有限公司 | Cloud-protogenesis-based network fault self-repairing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5636345A (en) | Method and apparatus for detecting and preventing broadcast storms on an emulated local area network | |
EP2590372B1 (en) | Ethernet loop locating method, switching device and system | |
CA2557461C (en) | Dual use counters for routing loops and spam detection | |
EP2933954B1 (en) | Network anomaly notification method and apparatus | |
CN101399711B (en) | Network monitoring system and network monitoring method | |
Wang et al. | SECO: SDN sEcure COntroller algorithm for detecting and defending denial of service attacks | |
CN101090334A (en) | Method for solving mass alarm in NIDS | |
CN111294291B (en) | Protocol message processing method and device | |
JP2006279930A (en) | Method and device for detecting and blocking unauthorized access | |
CN108028828B (en) | Distributed denial of service (DDoS) attack detection method and related equipment | |
CN103095717B (en) | Prevent method and the network equipment of mac address table flooding | |
CN112260899B (en) | Network monitoring method and device based on MMU (memory management unit) | |
CN108259426A (en) | A kind of ddos attack detection method and equipment | |
CN114884806A (en) | Loop identification and blocking method based on high aggregation scene | |
CN110958245B (en) | Attack detection method, device, equipment and storage medium | |
CN101299719B (en) | Detection processing method for data flow, central processing unit and switch | |
CN102223269B (en) | Message processing method, and method and device for detecting medium access control (MAC) address | |
CN112702226B (en) | Loop detection method, device, equipment and computer readable storage medium | |
CN111526064A (en) | Data stream processing method and device, electronic equipment and storage medium | |
CN111031077B (en) | Flow cleaning method, flow cleaning system and equipment | |
US7843829B1 (en) | Detection and recovery from control plane congestion and faults | |
CN109714182A (en) | A kind of network control method, device and computer readable storage medium | |
CN113364722A (en) | Network security protection method and device | |
CN111865716A (en) | Port congestion detection method, device, equipment and machine-readable storage medium | |
CN115766201A (en) | Solution for rapidly blocking large number of IP addresses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |