WO2009135422A1 - Procédé et appareil permettant de réaliser une diffusion interne qinq - Google Patents
Procédé et appareil permettant de réaliser une diffusion interne qinq Download PDFInfo
- Publication number
- WO2009135422A1 WO2009135422A1 PCT/CN2009/071568 CN2009071568W WO2009135422A1 WO 2009135422 A1 WO2009135422 A1 WO 2009135422A1 CN 2009071568 W CN2009071568 W CN 2009071568W WO 2009135422 A1 WO2009135422 A1 WO 2009135422A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- packet
- label
- broadcast
- routing device
- qinq
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/16—Multipoint routing
Definitions
- the embodiments of the present invention relate to the field of data transmission, and in particular, to a method and an apparatus for implementing broadcast in a QinQ. Background technique
- the QinQ (802.1Q-in-802.1Q) technology is a technology for extending the VLAN space.
- the network VLAN transparently transmits the public network, which effectively solves the problem that the VLAN ID is not enough.
- packets sent from the CE to the PE have different Tag values. If you configure QinQ, you can save the public network VLAN.
- the packets in the QinQ network use the same public network VLAN when they are transmitted on the ISP network.
- the QinQ protocol is a Layer 2 tunneling protocol based on IEEE 802.1 Q technology.
- the packet transmitted in the backbone network has two layers of 802.1Q Tag headers (a layer of public network tags and a layer of private network tags), that is, 802.1Q-in-802.1Q, so it is called QinQ protocol.
- 802.1Q-in-802.1Q a layer of private network tags
- the ISP network only needs to provide a VLAN ID for the different VLANs from the QinQ network.
- the ISP's VLAN ID is approximated to address the growing tension of the ISP network VLAN ID resources.
- the QinQ packet adds a label to the SA (Source Address).
- the outer label is usually called the public network tag and is used to carry the VLAN ID of the public network.
- the inner label is usually called the private network tag and is used to carry the VLAN ID of the private network.
- the source device sends a packet containing the original Ethernet frame to the switch.
- the switch uploads the packet to the source router.
- the switch adds the 802.1Q frame and the QinQ frame to generate the packet containing the QinQ frame. , sent by the source router to the destination router.
- the destination router sends the packet to the switch.
- the switch removes the QinQ frame and the 802.1Q frame of the packet.
- the packet is restored to the original packet.
- the message containing the original Ethernet frame is sent to the destination terminal.
- the QinQ protocol does not require special signaling to maintain the tunnel establishment, and can be implemented through static configuration.
- the destination router when the destination router sends the packet to the destination terminal, it needs to know the ARP (Address Resolution Protocol) of the destination terminal. At this time, the destination router sends an ARP request packet (broadcast packet). ). Because the two-layer tag corresponding to the destination terminal is unknown, the destination router copies the ARP request packet.
- An outer label corresponding to an outer label can be configured with 4094, and the destination router will copy 4094 ARP request packets. If multiple outer labels are configured on the same interface, and each outer label corresponds to many inner labels, you need to copy a large number of ARP request packets. If several ARP Miss packets are generated at the same time, a large number of packets will be copied. As a result, the channel is blocked or the module is not processed. As a result, normal ARP requests or responses are discarded.
- the device under the router may be required.
- the ARP request is initiated actively, and the router does not actively send ARP requests.
- This solution can reduce the number of packets copied by the router.
- you can only The device is connected to a separate QinQ device.
- This QinQ device can only be uniquely bound to internal and external tags.
- Such a network structure not only increases the difficulty of network management, but also is not conducive to the supervision of network security, and reduces the security of the network. Therefore, the above solution is not the best solution to solve the problem that the network is not smooth due to a large number of copies of the message.
- the problem to be solved by the embodiments of the present invention is to provide a method and apparatus for implementing broadcast in QinQ, which reduces the copying of a large number of useless messages.
- an embodiment of the present invention provides a method for implementing broadcast in QinQ, which includes the following steps:
- the embodiment of the present invention further provides a routing device, including:
- a detecting module configured to detect a quantity of the switching device directly connected to the routing device
- a generating module configured to generate, according to the number of the switching devices detected by the detecting module, an outer layer label or an outer layer label Message
- an embodiment of the present invention further provides a method for implementing broadcast in QinQ, including the following steps:
- the routing device generates a packet with a preset outer layer label
- the routing device broadcasts the packet to each switching device directly connected to the routing device.
- the embodiment of the present invention further provides a routing device, including: a generating module, configured to generate a packet that includes a preset outer layer label;
- the internal broadcast module is configured to broadcast the packet generated by the generating module to each switching device directly connected to the routing device.
- the technical solution of the embodiment of the present invention has the following advantages, because the controllable broadcast function in the QinQ is used to perform special processing on the packet label, thereby solving the problem of copying a large number of useless broadcast packets on the router, thereby achieving the saving.
- Network resources improve the efficiency of network transmission, and further enhance network security through the identification of message labels.
- FIG. 1 is a schematic diagram of a typical networking of QinQ according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of a method for implementing broadcast in a QinQ according to an embodiment of the present invention
- FIG. 3 is a schematic structural diagram of a router according to another embodiment of the present invention
- FIG. 4 is a schematic flowchart of a method for implementing broadcast in a QinQ according to another embodiment of the present invention
- FIG. 5 is a schematic flowchart of a method for protecting a broadcast in a QinQ according to another embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of a protection network networking broadcasted in a QinQ according to another embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of a router according to another embodiment of the present invention. detailed description The embodiment of the invention provides a method and a device for implementing broadcast in QinQ, which are used for reducing copying of a large amount of useless text in a QinQ network.
- the implementation scenario of the technical solution of the present invention includes a source router R1, a destination router R2, and switches Sl-x, S2-x and terminals under two routers.
- FIG. 2 it is a schematic flowchart of a method for implementing broadcast in a QinQ according to an embodiment of the present invention.
- the so-called internal broadcast is to send broadcast information to all users under the QinQ sub-interface of the same router in the network, that is, the routing device sends a broadcast message to the communication device directly connected thereto.
- the prior art needs to broadcast the message.
- the outer label of the ARP request message is the same as that of the target device. Therefore, the routing device needs to copy a large number of packets, which affects network transmission quality.
- the embodiment of the present invention proposes the following technical solutions:
- the router R2 can generate an ARP request message according to the rules of the broadcast message, and broadcast to the device under the router to query the ARP corresponding to the destination terminal.
- the rules of the two broadcast messages are:
- the destination MAC address is a broadcast MAC address of all Fs, with an outer label, and the outer label is consistent with the outer label of the switching device.
- the other is to do all the things in the network with multiple outer labels.
- the rules for changing the internal broadcast of the device, by setting the packet, so that the packet has no label that is, the rule for broadcasting the packet in the network directly connected to the switching device under the routing device, because the network is not included in the setting. If a plurality of outer labels are generated, a large number of duplicates and a heavy network load may be generated. Therefore, the embodiment of the present invention provides a rule for not broadcasting broadcast packets, and performs a network for the network. Broadcast, such a message is used for intra-broadcasting by the routing device to all switching devices directly connected to it in the above network.
- the above-mentioned switching device directly connected to the routing device refers to a router having a message forwarding function in the embodiment of the present invention, which is only a preferred embodiment of the present invention, and may be used in practical applications.
- Including, the server, the terminal or other network constitutes a node or device, such changes do not affect the scope of protection of the present invention.
- Router R2 receives the packet from the network side.
- S202 and R2 detect the number of switches directly connected to the switch, and process the packet according to the detection result, and then the downlink switch Sl-x forwards the packet.
- the above detection result includes: whether the number of switches directly connected to R2 is one or more. When the number of switches directly connected to R2 is one, R2 generates an ARP request packet with only one outer label, to the above A switch performs intra-broadcasting, and the outer label is consistent with the label of the switch; when the detection result is that the number of switches directly connected to R2 is multiple, an ARP request packet without an outer label is generated, to the above All switches are broadcast internally.
- Router R2 identifies that the received packet is a QinQ packet and needs to be forwarded to the QinQ interface.
- Router R2 searches for the ARP table on the QinQ interface. If no entry is found in the ARP table corresponding to the packet, the MAC address of the destination terminal cannot be found. To ensure smooth forwarding, a fake entry is generated in the ARP table, and ARP Miss is sent to the router R2 to request the ARP corresponding to the destination terminal.
- Router R2 determines the number of switches corresponding to the outer tag that is connected to R2 by checking the number of outer tags of the QinQ interface:
- the router R2 If the result of the check is that the QinQ interface contains only one outer tag, that is, the number of switches directly connected to the router R2 is one, the router R2 generates an ARP request packet, and the tag in the packet is the outer tag. The port corresponding to the switch is sent. For example, when the switch directly connected to the R2 has only S1-3, the ARP request packet with the outer tag of the S1-3 is generated as the tag, and is sent to the port corresponding to the S1-3. S1-3;
- an ARP request packet without a tag is generated and sent from the corresponding port to the Sl-x.
- the router R2 when the switch directly connected to R2 includes S1-3 and S1-4, the router R2 generates an ARP request packet without a tag, and sends it to the S1-3 and Sl-4 from the corresponding port.
- the Sl-x processes the received packet and forwards it to S2-x.
- the Sl-x switch copies the packet on the corresponding port that is forwarded downward, and copies one or more copies according to the number of S2-x attached.
- the Layer 2 multicast replication mechanism is sent from each port. S1-4 is used as an example. After receiving packets, S1-4 copies two copies on the corresponding port and sends them to S2-7 and S2-8.
- the S2-x processes the received packet and forwards the packet to the terminal.
- the S2-x switch copies the packet on the corresponding port that is forwarded downwards, according to the number of connected terminals.
- One or more copies similar to the replication mechanism of Layer 2 multicast, forward packets on each port, and send the packets to all terminals. Take S2-7 as an example. After S2-7 receives the packets. After copying two copies of these downward-forwarding corresponding ports, send them to the two terminals that are connected.
- the above-mentioned network structure including Sl-x, S2-x and the terminal is a preferred network structure selected for convenience of description, and the above processing procedure is also only a preferred embodiment of the present invention, in actual technical implementation process.
- the network may include a multi-layer structure, such as S3-x, S4-x, etc.
- the technical solution of the present invention may also be implemented in the foregoing multi-layer network structure, specifically, a forwarding process between the router and the Sl-x.
- the processing flow of the embodiment is consistent, and the subsequent processing procedures of the switches such as S2-x, S3-x, and S4-x are consistent with the processing flow of S2-x in this embodiment, and such changes are also in this embodiment.
- the scope of protection of the invention is consistent, and the subsequent processing procedures of the switches such as S2-x, S3-x, and S4-x are consistent with the processing flow of S2-x in this embodiment, and such changes are also in this embodiment.
- the embodiment of the present invention adopts the controllable broadcast function in the QinQ, and performs special processing on the packet label according to the number of the connected devices, thereby solving the problem of copying a large number of useless broadcast packets on the router, thereby saving network resources and improving The effect of network transmission efficiency.
- the present invention further provides a corresponding device.
- a schematic structural diagram of a router according to another embodiment of the present invention includes:
- the detecting module 31 is configured to detect the number of switches directly connected by the router.
- the generating module 32 is configured to generate an ARP request packet containing an outer layer label when the detecting module 31 detects the number of switches, or generate an outer layer without detecting the number of switches.
- the ARP request packet of the label includes:
- the first generation sub-module 321 is configured to generate a packet with an outer layer label when the number of switches detected by the detection module 31 is one, and the outer label of the packet is the same as the outer label of the switch;
- the second generation submodule 322 is configured to detect the number of switches detected by the module 31. When there are multiple, the message without the outer label is generated.
- first generation sub-module 321 and the second generation sub-module 322 may exist in the generation module 32 at the same time, or may be set as different modules as needed, and such variations are also within the protection scope of the present invention.
- the internal broadcast module 33 is configured to broadcast the ARP request packet generated by the generating module 32 to the switch directly connected to the router, and request the ARP of the destination terminal.
- FIG. 4 it is a schematic flowchart of a method for implementing broadcast in a QinQ according to another embodiment of the present invention.
- the VLAN tag 4095 can be used as a broadcast message label.
- the message forwarding process can be described by the following procedure.
- Router R2 receives the packet from the network side.
- the specific processing procedure includes: IP forwarding on R2, finding the outbound interface of QinQ, and discovering the interface that should be forwarded to the tag;
- Router R2 finds the ARP table on the interface and finds that there is no entry in the ARP table. The MAC address is not found. To ensure smooth forwarding, a fake entry is generated in the ARP table.
- Router R2 generates a packet with a special tag, for example, a packet with a tag of 4095.
- the generated packet is sent to the corresponding port and sent to the Sl-x from the corresponding port. For example, the packet is copied to two and sent to S1-3. And Sl-4.
- the Sl-x processes the received packet and forwards it to S2-x.
- the corresponding configuration On the uplink interface of the Sl-x switch, the corresponding configuration is allowed to receive the packet containing the preset special tag. For example, the broadcast packet with the tag of 4095 is allowed. System to the corresponding downstream interface.
- Receive a packet with a special tag (ie 4095), copy the packet to the corresponding port that is forwarded downward, and use a replication mechanism similar to Layer 2 multicast according to the number of S2-xs connected.
- the message is copied one or more copies and sent from each port. For example, for S1-4, the message with the tag of 4095 is copied into two copies and sent to S2-7 and S2-8.
- S404 and S2-x process the received packet and forward it to the terminal.
- the uplink interface of the S2-x switch is configured to allow receiving packets with the special tag specified above. For example, the broadcast packet with the tag of 4095 is copied to the corresponding downlink interface.
- the packet is copied on the corresponding port, and one or more broadcast packets with a special tag are copied according to the number of the connected terminals, similar to Layer 2 multicast.
- the replication mechanism forwards the packet to each port and sends the packet with the special tag to the connected terminal. Take S2-7 as an example. After receiving the packet, S2-7 copies the packet to two copies on the corresponding port. Give the two terminals hanging down.
- the embodiment of the present invention adopts the controllable broadcast function in the QinQ, and processes the packet according to the preset special label, so that it only carries the label with the special tag, which reduces the number of labels carried when the packet is forwarded, thereby solving the problem.
- the problem of copying a large number of useless broadcast packets on the router achieves the effect of saving network resources and improving network transmission efficiency.
- FIG. 5 it is a schematic flowchart of a method for protecting a broadcast in a QinQ according to another embodiment of the present invention.
- the embodiment of the present invention further provides a method for configuring a routing device by using a network management system.
- the specific configuration steps are the same as those of the foregoing embodiment, but the configuration steps are performed by The network management system performs the boot operation, and the network management system can guide the user to complete the configuration of the router in a single and intuitive manner.
- the QinQ network that has joined the network management system can improve the security of the network. Sex, identify dangerous packets in the network and alert them to prevent broadcast packets from attacking the router.
- configuring a corresponding command on the interface to allow packets with a tag of 4095 to enter the router is a special operation. If such a command is not configured, the network should not exist. This kind of message.
- the router detects the label of the packet in the network in real time. If there is a packet containing the unconfigured label, the router may consider that the router is attacked by the network and alarms to the network management system through the management information base MIB. Specifically:
- the router identifies a label of the packet in the network.
- S503. Determine, according to the result of the matching, whether the packet is a security packet.
- the packet is determined to be secure, and the process is completed, and the process is re-entered into the S501 to enter a new round of protection process;
- the label of the packet is When the preset outer label does not match, the packet is judged to be an attack packet, and the packet is transferred to S504.
- the router only alerts the network management system through the MIB.
- the networking structure implementation based on the foregoing method is as shown in FIG. 6, and includes a router 1, a router 2, and a network management system, wherein the router 1 and the router 2 are configured to detect a packet label, and when detecting an outer label that is preset to be included in the network When the packet of the outer label does not match, it is judged as a network attack and alarms to the network management center.
- FIG. 7 is a schematic structural diagram of a router according to another embodiment of the present invention. , including:
- the generating module 71 is configured to generate a packet that includes a preset outer layer label, and further includes:
- the label setting sub-module 711 is configured to set a special outer label different from an outer label of each switch directly connected to the router.
- the internal broadcast module 72 is configured to broadcast the packet generated by the generating module 71 to each switching device directly connected to the routing device.
- the router further includes a security module 73, configured to detect whether the packet in the network is secure, and specifically includes:
- the identification submodule 731 is configured to identify a label of a packet in the network
- the matching sub-module 732 is configured to match the label of the packet identified by the identification sub-module 731 with the preset outer label
- the determining sub-module 733 is configured to determine, according to the matching result of the matching sub-module 732, whether the packet is secure;
- the alarm sub-module 734 is configured to: when the judging sub-module 733 judges that the message is unsafe, by alarming to the network management center.
- the technical solution of the embodiment of the present invention has the following advantages: the special control of the packet label is implemented by using the controllable broadcast function in the QinQ, thereby solving the problem of copying a large number of broadcast packets on the router, thereby saving network resources. Improve the efficiency of network transmission, and further enhance the network security through the identification of message labels.
- the broadcast packet provided by the foregoing embodiment of the present invention is used to solve the problem of ARP request by ARP Miss, but does not exclude the use of the broadcast packet of the present invention for other types of services, based on the present invention.
- Corresponding changes made by technical ideas are also within the scope of the invention.
- a computer device which may be a personal computer, server, or network device, etc. performs the methods described in various embodiments of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
La présente invention concerne un procédé et un appareil pour la diffusion interne QinQ. Le procédé comprend les étapes suivantes: la détection du nombre de dispositifs de commutation qui se relient directement sous le dispositif de routage; la génération d'un message qui comprend une étiquette de couche externe lorsqu'il n'existe qu'un seul dispositif de commutation relié directement sous le dispositif de routage, ladite étiquette de couche externe étant identique à l'étiquette de couche externe du dispositif de commutation; ou la génération d'un message sans étiquette de couche externe lorsqu'il existe plusieurs dispositifs de commutation reliés directement sous le dispositif de routage. Le message comprenant une étiquette de couche externe ou le message sans étiquette de couche externe est diffusé aux dispositifs de commutation lorsque les dispositifs de commutation sont reliés directement sous le dispositif de routage. Ceci résout le problème de la duplication d'une multiplicité de messages de diffusion inutiles sur le routeur, au moyen du procédé selon l'invention, et ceci a pour effet d'économiser les ressources réseau et d'améliorer l'efficacité de la transmission réseau, de surcroît, ceci améliore la sécurité du réseau par l'identification de l'étiquette du message.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810088747.1 | 2008-05-04 | ||
CN2008100887471A CN101572648B (zh) | 2008-05-04 | 2008-05-04 | 一种QinQ内广播的实现方法和装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009135422A1 true WO2009135422A1 (fr) | 2009-11-12 |
Family
ID=41231887
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/071568 WO2009135422A1 (fr) | 2008-05-04 | 2009-04-29 | Procédé et appareil permettant de réaliser une diffusion interne qinq |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101572648B (fr) |
WO (1) | WO2009135422A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108076068A (zh) * | 2017-12-27 | 2018-05-25 | 新华三技术有限公司 | 一种防攻击方法以及装置 |
CN112787928A (zh) * | 2019-11-07 | 2021-05-11 | 中兴通讯股份有限公司 | 多业务转发方法、交换机、电子设备及可读介质 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104579942B (zh) * | 2013-10-17 | 2019-04-16 | 中兴通讯股份有限公司 | 网络报文的转发方法及装置 |
CN108243262B (zh) * | 2016-12-26 | 2020-04-21 | 大唐移动通信设备有限公司 | Arp表的学习方法、装置及网络三层设备 |
CN107547686B (zh) * | 2017-08-29 | 2021-05-28 | 新华三技术有限公司 | Arp请求报文处理方法和装置 |
CN108768677A (zh) * | 2018-05-02 | 2018-11-06 | 河南应用技术职业学院 | 一种基于Android平台的计算机网络数据广播通信系统 |
CN109660438A (zh) * | 2018-12-07 | 2019-04-19 | 北京卫星信息工程研究所 | 一种卫星通信的地面系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1838627A (zh) * | 2005-03-22 | 2006-09-27 | 杭州华为三康技术有限公司 | 一种实现QinQ接入的方法 |
CN101098289A (zh) * | 2006-06-29 | 2008-01-02 | 中兴通讯股份有限公司 | 一种基于双vlan的传递用户端口信息的方法 |
CN101110764A (zh) * | 2007-08-13 | 2008-01-23 | 中兴通讯股份有限公司 | 一种以太网交换机数据帧划分虚拟局域网并转发的方法 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100505746C (zh) * | 2004-02-07 | 2009-06-24 | 华为技术有限公司 | 实现虚拟租用线的方法 |
FR2867642B1 (fr) * | 2004-03-09 | 2006-08-18 | Cit Alcatel | Dispositif et procede de traitement de trames a champ a utilisation multiprotocolaire, pour un reseau de communications |
-
2008
- 2008-05-04 CN CN2008100887471A patent/CN101572648B/zh not_active Expired - Fee Related
-
2009
- 2009-04-29 WO PCT/CN2009/071568 patent/WO2009135422A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1838627A (zh) * | 2005-03-22 | 2006-09-27 | 杭州华为三康技术有限公司 | 一种实现QinQ接入的方法 |
CN101098289A (zh) * | 2006-06-29 | 2008-01-02 | 中兴通讯股份有限公司 | 一种基于双vlan的传递用户端口信息的方法 |
CN101110764A (zh) * | 2007-08-13 | 2008-01-23 | 中兴通讯股份有限公司 | 一种以太网交换机数据帧划分虚拟局域网并转发的方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108076068A (zh) * | 2017-12-27 | 2018-05-25 | 新华三技术有限公司 | 一种防攻击方法以及装置 |
CN108076068B (zh) * | 2017-12-27 | 2021-05-07 | 新华三技术有限公司 | 一种防攻击方法以及装置 |
CN112787928A (zh) * | 2019-11-07 | 2021-05-11 | 中兴通讯股份有限公司 | 多业务转发方法、交换机、电子设备及可读介质 |
Also Published As
Publication number | Publication date |
---|---|
CN101572648A (zh) | 2009-11-04 |
CN101572648B (zh) | 2012-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016101646A1 (fr) | Procédé et appareil d'accès destinés à un réseau virtuel ethernet | |
CN106453025B (zh) | 一种隧道创建方法及装置 | |
WO2009135422A1 (fr) | Procédé et appareil permettant de réaliser une diffusion interne qinq | |
WO2019184752A1 (fr) | Procédé, appareil et système de gestion de dispositifs de réseau | |
WO2009094928A1 (fr) | Procédé et équipement de transmission d'un message basé sur le protocole de tunnel de niveau 2 | |
WO2012075731A1 (fr) | Procédé et dispositif de détection d'incident sur liaison et de reprise subséquente par interaction par protocole de résolution d'adresse (arp) | |
WO2008017270A1 (fr) | Procédé, dispositif et système ethernet supportant un acheminement multidiffusion à source spécifique | |
WO2012167697A1 (fr) | Procédé et processeur pour supprimer une tempête de réseau | |
WO2018214809A1 (fr) | Procédé et dispositif de transmission de message, et support de stockage | |
WO2009033428A1 (fr) | Procédé, système et dispositif pour retirer une adresse de commande d'accès au support | |
WO2010072096A1 (fr) | Procédé et dispositif d'accès à bande large pour améliorer la sécurité d'une découverte de voisins dans un environnement ipv6 | |
WO2008080314A1 (fr) | Procédé, moteur de retransmission et dispositif de communication pour la commande d'accès aux messages | |
WO2013056585A1 (fr) | Procédé d'authentification d'accès à un cloud privé virtuel et appareil correspondant | |
WO2011072532A1 (fr) | Procédé, équipement d'accès et système de communication pour le traitement de messages | |
WO2012106892A1 (fr) | Procédé, appareil et système de traitement de flux de service | |
WO2011140795A1 (fr) | Procédé et dispositif de commutation permettant d'empêcher une attaque par mystification d'adresse de contrôle d'accès au support | |
WO2009030173A1 (fr) | Procédé de traitement et dispositif pour la configuration de raccordement qinq | |
WO2014008820A1 (fr) | Procédé, dispositif et système de traitement de service | |
WO2011020254A1 (fr) | Procédé et dispositif pour prévenir des attaques de réseau | |
WO2007062592A1 (fr) | Systeme, procede et routeur de l2vpn d'interconnexions point a multipoints, et multipoints a multipoints | |
WO2013139159A1 (fr) | Procédé de transmission de paquet dans un réseau et dispositif côté fournisseur | |
WO2011032321A1 (fr) | Procédé d'acheminement de données, procédé de traitement de données, système et dispositif correspondants | |
WO2013053266A1 (fr) | Procédé, dispositif et système de prise de connaissance de messages | |
WO2011140919A1 (fr) | Procédé, dispositif, serveur et système permettant d'accéder à un réseau de vente de services en gros | |
WO2019223534A1 (fr) | Procédé et dispositif de surveillance d'une entrée de table de transfert |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09741697 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09741697 Country of ref document: EP Kind code of ref document: A1 |