CN114884806A - Loop identification and blocking method based on high aggregation scene - Google Patents

Loop identification and blocking method based on high aggregation scene Download PDF

Info

Publication number
CN114884806A
CN114884806A CN202210348330.4A CN202210348330A CN114884806A CN 114884806 A CN114884806 A CN 114884806A CN 202210348330 A CN202210348330 A CN 202210348330A CN 114884806 A CN114884806 A CN 114884806A
Authority
CN
China
Prior art keywords
loop
detection
message
port
vlan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210348330.4A
Other languages
Chinese (zh)
Inventor
钱锦
徐晓华
李昂
杜猛俊
徐汉麟
徐李冰
向新宇
黄佳斌
陈元中
倪夏冰
李强强
蒋建
周昕悦
董文亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202210348330.4A priority Critical patent/CN114884806A/en
Publication of CN114884806A publication Critical patent/CN114884806A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2801Broadband local area networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a loop identification and blocking method based on a high aggregation scene, which comprises the following steps: based on the loop prediction of flow monitoring, judging whether a loop occurs or not by recording the time when the table entry interface changes; detecting and identifying the loop position, recording the position of the loop where the vlan occurs, and alarming the position of the loop according to the Ifindex in the loop message and the port where the message is received; loop superposition detection, namely actively increasing the packet sending quantity of loop detection messages, further detecting whether a loop exists, and when the loop cannot be found even if the loop is increased in quantity, performing blocking operation on an interface, resending the detection messages and verifying whether the loop exists; and (3) loop recovery judgment, namely setting a loop recovery detection mark for the generated loop, recording detection time, sending a loop detection message, and judging loop recovery if the loop message is not received within a preset time length. The invention repeatedly identifies and verifies the loop by a plurality of detection steps based on the flow state of the equipment, thereby improving the identification accuracy.

Description

Loop identification and blocking method based on high aggregation scene
Technical Field
The invention relates to the field of network security, in particular to a loop identification and blocking method based on a high aggregation scene.
Background
In a large-scale local area network environment, a network loop is easily caused by improper configuration of network equipment, damage of network equipment hardware, network topology connection errors and virus attack on a network. The network loop can cause the device to continuously copy and forward the broadcast, multicast and unknown unicast messages, thereby causing network paralysis and influencing normal services.
In the prior art, a device is usually adopted to actively send a detection message, and when the detection message sent by the device is received, a network loop is identified.
The disadvantage of this method is that the device needs to send the detection message at regular time, if the timing time is short, the device will send the detection message all the time, which affects the forwarding process of the device to the normal service flow, and the too many detection messages in the network will cause the network congestion and affect the normal service; if the timing time is long, when a loop exists in the network, the loop cannot be found in time, and the network is disconnected during the loop.
The device sends the detection message based on the vlan, and the uplink port is generally configured with trunkvlan 1-4094. The actual use of several vlans leads to the fact that the equipment sends a large amount of meaningless messages and occupies the equipment packet sending resources.
When a loop occurs in the network, the traffic in the network will fill up the device bandwidth, and the loop detection packet may be directly lost by the network device due to the bandwidth problem, so that the loop cannot be detected.
Therefore, in order to find a network loop in time, a technique of detecting a loop and restoring the network is required.
Disclosure of Invention
Aiming at the problem that the prior art cannot accurately detect the loop, the invention provides a loop identification and blocking method based on a high aggregation scene, which repeatedly identifies and verifies the existence of the loop through a plurality of detection steps, improves the identification accuracy and recovers.
The technical scheme of the invention is as follows.
A loop identification and blocking method based on a high aggregation scene comprises the following steps:
based on the loop prediction of flow monitoring, judging whether a loop occurs or not by recording the time when the table entry interface changes;
detecting and identifying the loop position, recording the position of the loop where the vlan occurs, and alarming the position of the loop according to the Ifindex in the loop message and the port where the message is received;
loop superposition detection, namely actively increasing the packet sending quantity of loop detection messages, further detecting whether a loop exists, and when the loop cannot be found even if the loop is increased in quantity, performing blocking operation on an interface, resending the detection messages and verifying whether the loop exists;
and (3) loop recovery judgment, namely setting a loop recovery detection mark for the generated loop, recording detection time, sending a loop detection message, and judging loop recovery if the loop message is not received within a preset time length.
The terms of art to which the present invention relates include: version: a version number. Order: the type of the message. Vlan _ id: the vlan of the message packet. A Serial: a serial number. Ifindex: port number of the packet. Mac: the mac address of the device.
Preferably, the loop prediction based on flow monitoring includes:
using mac, vlan, incoming interface, interface switching times and interface switching time as record items, and storing flow information;
when the equipment has flow, analyzing the message received by the equipment, and establishing a table entry by taking mac and vlan as main keys; recording the time when the entry interface of the table item changes;
through the time of the change, compared with the time of the change at the last time, the interface is changed within 0.2 second, the interface switching times are increased by 1, and the zero clearing is carried out when the interface switching times exceed 0.2; when the interface switching times reach 5 times, predicting that a network generates a loop, immediately sending a loop detection message, and judging whether the loop occurs or not;
and counting the packet receiving and sending rate of the equipment port, predicting that a loop occurs in the network when the packet receiving and sending rate of the equipment port exceeds 95% of the maximum bandwidth of the port, immediately sending a loop detection message, and judging whether the loop occurs.
Preferably, the loop position detection and identification includes:
after receiving a loop detection message sent by the equipment, the equipment identifies that a loop exists in the network, records the position of a vlan where the loop occurs, and alarms the position of the loop according to Ifindex in the loop message and a port where the message is received;
the device sends a loop detection message:
after the equipment starts loop detection, the equipment sends loop detection messages from each port based on vlan every 1 hour;
the method comprises the steps that a device monitors and predicts a loop mechanism according to flow, and when a loop is predicted in a network, a loop detection message is sent from a specific port based on vlan;
wherein, the equipment sends a loop detection message vlan: based on the device port, creating a bitmap (each vlan occupies 1 bit) of the vlan to which the port belongs; when the equipment receives the message flow, the vlan of the message received by the port is recorded, the corresponding position 1 is corresponding to the vlan, and when the detection message is sent, the detection message is sent according to the vlan bitmap of the port.
Preferably, the loop superposition detection includes:
and taking the vlan, the loop port 1 and the loop port 2 as main keys, and storing information when the loop is predicted to be sent: vlan, loop port 1, loop port 2, loop probe time, weight over duration, loop probe flag.
When the loop is predicted to occur, sending a loop detection message according to the detection time, the weighted value in the duration and the detection mark: when the loop detection mark is true and the detection time is more than 1 minute away from the last detection time, sending a loop detection message with weighted value times, and adding 1 to the weighted value every time the detection message is sent;
when the weighted value is 10, blocking the loop port 1, timing, and sending a detection message from the loop port 2; if receiving the loop detection message from the port 1, the loop is proved to have occurred, the blocking configuration on the port 1 of the loop is removed, and an alarm is given; if the loop does not exist in 1 minute, the blocking setting of a loop port 1 is removed, and a loop detection mark is set to be false;
when the loop detection mark is false, the detection message is sent every 1 minute, and the detection times are not increased.
When a loop occurs, a large number of messages appear in the loop, and a device packet receiving and forwarding queue is full, so that a loop detection message is lost, the loop detection message cannot accurately return to the device, and the judgment of the loop is influenced.
The substantial effects of the invention include: predicting the possibility of a network forming a loop according to mac and vlan information carried in the message and a message input interface; predicting the possibility of forming a loop by a network according to the port rate of the equipment; the device predicts the possibility of the network loop according to the network message flow, sends a detection message in real time according to the prediction result and finds the network loop in time; recording the actual message received by the port, determining vlan information carried in the detection message, and reducing the number of packets sent; and a loop superposition detection mechanism performs deep detection according to the predicted actual situation and the port speed.
Drawings
FIG. 1 is a flow chart of a loop prediction based on traffic monitoring according to an embodiment of the present invention;
fig. 2 is a flow chart of loop overlay detection according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions will be clearly and completely described below with reference to the embodiments, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the internal logic of the processes, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in the present invention, "a plurality" means two or more. "and/or" is merely an association describing an associated object, meaning that three relationships may exist, for example, and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "comprises A, B and C" and "comprises A, B, C" means that A, B, C all comprise, "comprises A, B or C" means comprise one of A, B, C, "comprises A, B and/or C" means comprise any 1 or any 2 or 3 of A, B, C.
The terms of art related to the present embodiment include:
version: a version number. Order: the type of the message. Vlan _ id: the vlan of the message packet. A Serial: a serial number. Ifindex: port number of the packet. Mac: the mac address of the present device.
Vlan (virtual localararea network): a Virtual Local Area Network (VLAN) is a group of logical devices and users, which are not limited by physical location, and can be organized according to functions, departments, applications, and other factors, and communicate with each other as if they are in the same network segment, thereby obtaining a virtual local area network.
VLAN Trunk (virtual local area network relay technology): refers to the ability to interwork hosts in the same VLAN connected to different switches.
The technical solution of the present invention will be described in detail below with specific examples. Embodiments may be combined with each other and some details of the same or similar concepts or processes may not be repeated in some embodiments.
Example (b):
a loop identification and blocking method based on a high aggregation scene comprises the following steps:
s1: based on the loop prediction of flow monitoring, judging whether a loop occurs or not by recording the time when the table entry interface changes; as shown in fig. 1, includes:
using mac, vlan, incoming interface, interface switching times and interface switching time as record items, and storing flow information;
when the equipment has flow, analyzing the message received by the equipment, and establishing a table entry by taking mac and vlan as main keys; recording the time when the entry interface of the table item changes;
through the time of the change, compared with the time of the change at the last time, the interface is changed within 0.2 second, the interface switching times are increased by 1, and the zero clearing is carried out when the interface switching times exceed 0.2; when the interface switching times reach 5 times, predicting that a network generates a loop, immediately sending a loop detection message, and judging whether the loop occurs or not;
and counting the packet receiving and sending rate of the equipment port, predicting that a loop occurs in the network when the packet receiving and sending rate of the equipment port exceeds 95% of the maximum bandwidth of the port, immediately sending a loop detection message, and judging whether the loop occurs.
S2: detecting and identifying the loop position, recording the position of the loop where the vlan occurs, and alarming the position of the loop according to the Ifindex in the loop message and the port where the message is received; the method comprises the following steps:
after receiving a loop detection message sent by the equipment, the equipment identifies that a loop exists in the network, records the position of a vlan where the loop occurs, and alarms the position of the loop according to Ifindex in the loop message and a port where the message is received;
the device sends a loop detection message:
after the equipment starts loop detection, the equipment sends loop detection messages from each port based on vlan every 1 hour;
the method comprises the steps that a device monitors and predicts a loop mechanism according to flow, and when a loop is predicted in a network, a loop detection message is sent from a specific port based on vlan;
wherein, the equipment sends a loop detection message vlan: based on the device port, creating a bitmap (each vlan occupies 1 bit) of the vlan to which the port belongs; when the equipment receives the message flow, the vlan of the message received by the port is recorded, the corresponding position 1 is corresponding to the vlan, and when the detection message is sent, the detection message is sent according to the vlan bitmap of the port.
S3: loop superposition detection, namely actively increasing the packet sending quantity of loop detection messages, further detecting whether a loop exists, and when the loop cannot be found even if the loop is increased in quantity, performing blocking operation on an interface, resending the detection messages and verifying whether the loop exists; as shown in fig. 2, includes:
and taking the vlan, the loop port 1 and the loop port 2 as main keys, and storing information when the loop is predicted to be sent: vlan, loop port 1, loop port 2, loop probe time, weight over duration, loop probe flag.
When the loop is predicted to occur, sending a loop detection message according to the detection time, the weighted value in the duration and the detection mark: when the loop detection mark is true and the detection time is more than 1 minute away from the last detection time, sending a loop detection message with weighted value times, and adding 1 to the weighted value every time the detection message is sent;
when the weighted value is 10, blocking the loop port 1, timing, and sending a detection message from the loop port 2; if receiving the loop detection message from the port 1, the loop is proved to have occurred, the blocking configuration on the port 1 of the loop is removed, and an alarm is given; if the loop does not exist in 1 minute, the blocking setting of a loop port 1 is removed, and a loop detection mark is set to be false;
when the loop detection mark is false, the detection message is sent every 1 minute, and the detection times are not increased.
When a loop occurs, a large number of messages appear in the loop, and a device packet receiving and forwarding queue is full, so that a loop detection message is lost, the loop detection message cannot accurately return to the device, and the judgment of the loop is influenced.
S4: and (3) loop recovery judgment, namely setting a loop recovery detection mark for the generated loop, recording detection time, sending a loop detection message, and judging loop recovery if the loop message is not received within a preset time length.
The substantial effects of the present embodiment include: predicting the possibility of a network forming a loop according to mac and vlan information carried in the message and a message input interface; predicting the possibility of forming a loop by a network according to the port rate of the equipment; the device predicts the possibility of the network loop according to the network message flow, sends a detection message in real time according to the prediction result and finds the network loop in time; recording the actual message received by the port, determining vlan information carried in the detection message, and reducing the number of packets sent; and a loop superposition detection mechanism performs deep detection according to the predicted actual situation and the port speed.
Through the description of the above embodiments, those skilled in the art will understand that, for convenience and simplicity of description, only the division of the above functional modules is used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of a specific device is divided into different functional modules to complete all or part of the above described functions.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (4)

1. A loop identification and blocking method based on a high aggregation scene is characterized by comprising the following steps:
based on the loop prediction of flow monitoring, judging whether a loop occurs or not by recording the time when the table entry interface changes;
detecting and identifying the loop position, recording the position of the loop where the vlan occurs, and alarming the position of the loop according to the Ifindex in the loop message and the port where the message is received;
loop superposition detection, namely actively increasing the packet sending quantity of loop detection messages, further detecting whether a loop exists, and when the loop cannot be found even if the loop is increased in quantity, performing blocking operation on an interface, resending the detection messages and verifying whether the loop exists;
and (3) loop recovery judgment, namely setting a loop recovery detection mark for the generated loop, recording detection time, sending a loop detection message, and judging loop recovery if the loop message is not received within a preset time length.
2. The method for loop identification and blocking based on the high aggregation scene as claimed in claim 1, wherein the loop prediction based on the traffic monitoring comprises:
using mac, vlan, incoming interface, interface switching times and interface switching time as record items, and storing flow information;
when the equipment has flow, analyzing the message received by the equipment, and establishing a table entry by taking mac and vlan as main keys; recording the time when the entry interface of the table item changes;
through the time of the change, compared with the time of the change at the last time, the interface is changed within 0.2 second, the interface switching times are increased by 1, and the zero clearing is carried out when the interface switching times exceed 0.2; when the interface switching times reach 5 times, predicting that a network generates a loop, immediately sending a loop detection message, and judging whether the loop occurs or not;
and counting the packet receiving and sending rate of the equipment port, predicting that a loop occurs in the network when the packet receiving and sending rate of the equipment port exceeds 95% of the maximum bandwidth of the port, immediately sending a loop detection message, and judging whether the loop occurs.
3. The method for loop identification and blocking under the high aggregation scene according to claim 1, wherein the loop position detection identification comprises:
after receiving a loop detection message sent by the equipment, the equipment identifies that a loop exists in the network, records the position of a vlan where the loop occurs, and alarms the position of the loop according to Ifindex in the loop message and a port where the message is received;
the device sends a loop detection message:
after the equipment starts loop detection, the equipment sends loop detection messages from each port based on vlan every 1 hour;
the method comprises the steps that a device monitors and predicts a loop mechanism according to flow, and when a loop is predicted in a network, a loop detection message is sent from a specific port based on vlan;
wherein, the equipment sends a loop detection message vlan: based on the device port, creating a bitmap (each vlan occupies 1 bit) of the vlan to which the port belongs; when the equipment receives the message flow, the vlan of the message received by the port is recorded, the corresponding position 1 is corresponding to the vlan, and when the detection message is sent, the detection message is sent according to the vlan bitmap of the port.
4. The method for loop identification and blocking under the high aggregation scenario according to claim 1, wherein the loop overlap detection includes:
and taking the vlan, the loop port 1 and the loop port 2 as main keys, and storing information when the loop is predicted to be sent: vlan, loop port 1, loop port 2, loop detection time, weight value in duration, and loop detection flag;
when the loop is predicted to occur, sending a loop detection message according to the detection time, the weighted value in the duration and the detection mark: when the loop detection mark is true and the detection time is more than 1 minute away from the last detection time, sending a loop detection message with weighted value times, and adding 1 to the weighted value every time the detection message is sent;
when the weighted value is 10, blocking the loop port 1, timing, and sending a detection message from the loop port 2; if receiving the loop detection message from the port 1, the loop is proved to have occurred, the blocking configuration on the port 1 of the loop is removed, and an alarm is given; if the loop does not exist in 1 minute, the blocking setting of a loop port 1 is removed, and a loop detection mark is set to be false;
when the loop detection mark is false, the detection message is sent every 1 minute, and the detection times are not increased.
CN202210348330.4A 2022-04-01 2022-04-01 Loop identification and blocking method based on high aggregation scene Pending CN114884806A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210348330.4A CN114884806A (en) 2022-04-01 2022-04-01 Loop identification and blocking method based on high aggregation scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210348330.4A CN114884806A (en) 2022-04-01 2022-04-01 Loop identification and blocking method based on high aggregation scene

Publications (1)

Publication Number Publication Date
CN114884806A true CN114884806A (en) 2022-08-09

Family

ID=82668875

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210348330.4A Pending CN114884806A (en) 2022-04-01 2022-04-01 Loop identification and blocking method based on high aggregation scene

Country Status (1)

Country Link
CN (1) CN114884806A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116346585A (en) * 2023-03-13 2023-06-27 北京腾达泰源科技有限公司 Cloud-protogenesis-based network fault self-repairing method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101707538A (en) * 2009-11-25 2010-05-12 烽火通信科技股份有限公司 Method for detecting and automatically recovering Ethernet loopback
WO2017215291A1 (en) * 2016-06-12 2017-12-21 烽火通信科技股份有限公司 Ipran device-based method for detecting and processing ethernet loop
CN112702226A (en) * 2020-12-16 2021-04-23 杭州迪普科技股份有限公司 Loop detection method, device, equipment and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101707538A (en) * 2009-11-25 2010-05-12 烽火通信科技股份有限公司 Method for detecting and automatically recovering Ethernet loopback
WO2017215291A1 (en) * 2016-06-12 2017-12-21 烽火通信科技股份有限公司 Ipran device-based method for detecting and processing ethernet loop
CN112702226A (en) * 2020-12-16 2021-04-23 杭州迪普科技股份有限公司 Loop detection method, device, equipment and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116346585A (en) * 2023-03-13 2023-06-27 北京腾达泰源科技有限公司 Cloud-protogenesis-based network fault self-repairing method and system

Similar Documents

Publication Publication Date Title
US5636345A (en) Method and apparatus for detecting and preventing broadcast storms on an emulated local area network
EP2590372B1 (en) Ethernet loop locating method, switching device and system
CA2557461C (en) Dual use counters for routing loops and spam detection
EP2933954B1 (en) Network anomaly notification method and apparatus
CN101399711B (en) Network monitoring system and network monitoring method
Wang et al. SECO: SDN sEcure COntroller algorithm for detecting and defending denial of service attacks
CN101090334A (en) Method for solving mass alarm in NIDS
CN111294291B (en) Protocol message processing method and device
JP2006279930A (en) Method and device for detecting and blocking unauthorized access
CN108028828B (en) Distributed denial of service (DDoS) attack detection method and related equipment
CN103095717B (en) Prevent method and the network equipment of mac address table flooding
CN112260899B (en) Network monitoring method and device based on MMU (memory management unit)
CN108259426A (en) A kind of ddos attack detection method and equipment
CN114884806A (en) Loop identification and blocking method based on high aggregation scene
CN110958245B (en) Attack detection method, device, equipment and storage medium
CN101299719B (en) Detection processing method for data flow, central processing unit and switch
CN102223269B (en) Message processing method, and method and device for detecting medium access control (MAC) address
CN112702226B (en) Loop detection method, device, equipment and computer readable storage medium
CN111526064A (en) Data stream processing method and device, electronic equipment and storage medium
CN111031077B (en) Flow cleaning method, flow cleaning system and equipment
US7843829B1 (en) Detection and recovery from control plane congestion and faults
CN109714182A (en) A kind of network control method, device and computer readable storage medium
CN113364722A (en) Network security protection method and device
CN111865716A (en) Port congestion detection method, device, equipment and machine-readable storage medium
CN115766201A (en) Solution for rapidly blocking large number of IP addresses

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination