Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hierarchical access control method of communication network

A communication network and access control technology, applied in the field of network communication, can solve problems such as poor reliability and security, inability to cross 3-tier network authentication, data accumulation, etc.

Inactive Publication Date: 2012-07-11
BEIJING JIAOTONG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is no PPP packaging process in the authentication process, and there is no participation of IP addresses, so it cannot be authenticated across the Layer 3 network
Normally, 802.1x authentication is enabled on the device closest to the user, and the same port cannot control different users separately
The disadvantage of 802.1x is that the multicast data packets sent at the beginning of user authentication may cause a large amount of data accumulation in an uncertain network, affecting the normal operation of the network. In addition, because the equipment used for authentication is generally a low-cost switch, its Reliability and security are not very good, and the ability to resist attacks is relatively poor
[0006] In summary, there are the following problems in the access control technology in the existing network: First, the existing access control methods have some deficiencies, and the use of a single technical means usually cannot solve the problem of network user access management well ; Secondly, there is no unified access control method for the entire network, and there is no access control method that can fully support service billing, QoS mechanism, network mobility and network security. In different management domains, in order to achieve different purposes, Different access control methods and access control systems are often used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical access control method of communication network
  • Hierarchical access control method of communication network
  • Hierarchical access control method of communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described below in conjunction with the accompanying drawings, but not as a limitation of the present invention. The illustration uses vector nets as an example, but the method can also be applied to other types of communication networks.

[0054]The vector network is a new type of communication network, which inherits the separation system of the transmission plane and the control plane of the telecommunication network. In the vector network, the forwarding device that implements the function of the transmission plane is called a vector switch, or a switch for short. According to the tree-like hierarchical structure of the control plane, the subnet corresponding to each subtree can be designed as an object, and a clear logical structure can be defined externally for use by other external networks, and a specific implementation structure can be designed internally as needed. A logical subnet seen from the outside can be implemented...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hierarchy access control method for a communication network, which belongs to the field of the communication network. By adopting the method of the invention, the whole communication network is divided into hierarchic domains and each domain is provided with a domain server. Each port of each domain is provided with a border controller, and furthermore, identity authentication is realized by a call progress and admission control is realized by a routing progress. The technique provided by the invention provides a basic support for the communication network, in particular to service accounting, QoS mechanism, network mobility, and network security, etc. in a vector network.

Description

technical field [0001] The invention relates to the field of network communication, in particular to an access control method of a communication network. Background technique [0002] The purpose of access control is to distinguish the type of user who is using the network, distinguish the user's current access type (QoS requirements and destination), prevent illegal users from using the network, and prevent users from using the network beyond authorization, so as to charge for services, QoS mechanisms, Provide basic support for network mobility and network security. [0003] Currently, the commonly used access control technologies in the network include PPPoE, Web, and 802.1x. The PPPoE protocol is a protocol for transmitting PPP on the Ethernet. It establishes a point-to-point link on the Ethernet by re-encapsulating the PPP frame into the Ethernet frame. Each user of a physical link can be individually controlled and managed using the PPPoE protocol. Therefore, even fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/56H04L12/44H04L1/16H04L12/715
Inventor 梁满贵赵阿群张金鑫王雪芬
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products