Got it

Basic knowledge of fast entry broadband access network for beginners

Latest reply: Dec 27, 2018 09:27:13 950 5 10 0 0

Hi there!

This time, I will share with you about basic knowledge of fast entry broadband access network for beginners.


The broadband access network is still relatively common, so I studied the basic knowledge of the broadband access network, and here out to share with you, hoping to be useful to you.


Upstream direction, because the user's ad hoc network is uncontrolled, malicious users or malicious programs can construct illegal protocol messages and send them upwards. This will not only lead to the degradation of network equipment processing performance but also sometimes cause network equipment system disorder or even crash. In addition, if malicious users or programs send protocols and broadcasting messages over-the-top, whether legitimate or illegal, the performance of system equipment will also be significantly reduced, because the processing of protocols and broadcasting messages consumes equipment resources. Despite being in a controllable network domain, the downlink direction may also cause illegal or excessive message sending due to the stability of the device itself and the complexity of the network, which also needs to be prevented. Illegal messages include:


(1) Illegal source MAC address message. Source MAC addresses cannot be broadcast or multicast addresses because some MAC addresses have been reserved by standard organizations and cannot be used by ordinary users.


(2) Illegal agreement message. Theoretically, there is no Query message in the upstream direction of Internet Group Management Protocol (IGMP), no Report/Leave/Join message in the downstream direction, no OFFER/ACK message in the upstream direction of DHCP, no DISCOVER/REQUEST message in the downstream, no PADO and PADS message in the upstream and no ADS message in the downstream. There will be PADI and PADR messages. These messages are intercepted and filtered as needed.


(3) Super-long, ultra-short or error-checking messages, such as messages less than 64 bytes or messages greater than 1,518 bytes. Extra-long messages are allowed under certain circumstances.

For illegal messages, the general technology is to use filters to filter and discard them. The basic principle of filters is to match data messages according to the characteristics of filtered data messages defined by users. If the predefined feature is met, the message is filtered out. Most of the current switching chips have the function of message feature extraction and matching, which can complete the extraction and matching of the data link layer, network layer, an even higher level data message feature information.


The first three kinds of excessive messages will consume a lot of equipment processing resources, and the fourth kind will occupy the limited MAC address table resources of switching chips, which need to be controlled. The first three steps of processing excessive messages are: matching a specific type of message, characterized by a specific protocol message, a broadcast message (or a more specific broadcast message), a multicast message (or a more specific multicast message); counting the transmission rate of such messages; discarding the message if the transmission rate exceeds the predefined rate. The technology of overhandling protocols, broadcasting, and multicasting messages are also called message suppression. It is simple to solve the problem of excessive source MAC addresses: the upper limit of the number of user-side port MAC addresses can be set. In this way, once the port reaches the predefined number of MAC addresses, subsequent messages with new MAC addresses will be discarded. Illegal and excessive messages need to be processed at all levels of the broadband access networks, but for access nodes, because of their location in the broadband access networks, the realization of the above functions is particularly important.


That's all, I welcome everyone to leave a message and exchange in the comment area!

Thank you!

Such a good sharing ,it helps a lot.
View more
  • x
  • convention:

Network security should be great consideration in network maintenance.
View more
  • x
  • convention:

helpful
View more
  • x
  • convention:

he first three kinds of excessive messages will consume a lot of equipment processing resources.Can you provide a more detailed explanation?
View more
  • x
  • convention:

The first three kinds of excessive messages will consume a lot of equipment processing resources, and the fourth kind will occupy the limited MAC address table resources of switching chips, which need to be controlled.
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.