Abstract:
A method and an apparatus for controlling a network service of an Internet of things terminal, and a related storage medium are disclosed. In the method, after receiving a uniform resource locator (URL) sent by an Internet of things terminal in an authentication process, a network management device obtains a manufacturer usage descriptions (MUD) file based on the URL, and parses the MUD file to obtain content of at least one field included in the MUD file, where the MUD file includes at least one of: a first-type field or a second-type field, the first-type field is used to describe a security isolation requirement, and the second-type field is used to describe a quality assurance requirement.
Abstract:
A Virtual eXtensible Local Area Network (VXLAN) method comprises obtaining, by a network device, a mapping from a virtual local area network identifier VLAN ID to a VXLAN network identifier VNI; receiving, by the network device through a port, an Ethernet frame forwarded by an access device, where a VLAN tag field in the Ethernet frame includes the VLAN ID; adding, by the network device, a VXLAN header to the Ethernet frame based on the VLAN ID and the mapping to obtain a VXLAN packet, where a VNI field in the VXLAN header includes the VNI; and sending, by the network device, the VXLAN packet.
Abstract:
This application discloses a network and a data transmission method and apparatus, and belongs to the field of communication technologies. The network includes a core device and an edge device. The edge device identifies a service type of a first service packet from the core device, and reports a service type identifier of the first packet to the core device. The core device determines a priority corresponding to the service type identifier based on a stored service priority correspondence, and forwards, based on the priority, a service packet belonging to a same service flow as the first service packet. A strong service identification capability of the edge device is used to precisely identify thousands of service types, and a strong entry storage capability of the core device is used to store a correspondence that records thousands of service types and priorities. This effectively avoids problems such as transmission congestion and a packet loss that are caused by an incapability of precisely identifying a service type and allocation of a same priority to service packets of different service types.
Abstract:
A method for implementing an IP Multimedia Subsystem (IMS) registration, includes: a Home Subscriber Server (HSS) recording a current registration state of a User Equipment (UE) in response to receiving a Multimedia Authentication Request (MAR) initiated by a Service Call Session Control Function (S-CSCF) selected for the UE when a first Register request is sent by the UE; in response to receiving a second Register request initiated by an Interrogating Call Session Control Function (I-CSCF), the HSS sends the S-CSCF Name to the I-CSCF when the current registration state of the UE is an assigned S-CSCF state. By the scheme, a same S-CSCF is ensured to be used in the two User Authentication Request/User Authentication Answer (UAR/UAA) procedures of the initial IMS registration procedure, and the initial IMS registration of the UE is implemented successfully.
Abstract:
A Virtual eXtensible Local Area Network (VXLAN) method comprises obtaining, by a network device, a mapping from a virtual local area network identifier VLAN ID to a VXLAN network identifier VNI; receiving, by the network device through a port, an Ethernet frame forwarded by an access device, where a VLAN tag field in the Ethernet frame includes the VLAN ID; adding, by the network device, a VXLAN header to the Ethernet frame based on the VLAN ID and the mapping to obtain a VXLAN packet, where a VNI field in the VXLAN header includes the VNI; and sending, by the network device, the VXLAN packet.
Abstract:
A loop avoidance method, device and system. The system includes a first network device and a second network device in an internal network, a first Ethernet port and a second Ethernet port of the two network devices are of a first type, and loop avoidance priorities of the Ethernet ports are different from each other; root media access control (MAC) addresses of the two network devices are the same, and are different from respective network bridge MAC addresses; the second network device receives a loop detection frame from the first Ethernet port through the second Ethernet port, where a source address of the loop detection frame is the root MAC address, and blocks the second Ethernet port according to the loop avoidance priority. A network device blocks, according to a loop avoidance priority, an Ethernet port connected to an external network to avoid changing a topology of an internal network.
Abstract:
A method, an apparatus, a device, and a system for generating a Dynamic Host Configuration Protocol snooping (DHCP) Snooping binding table. The method includes: constructing a request packet for obtaining information about a DHCP client, and sending the request packet to a DHCP server; receiving a response packet corresponding to the request packet, and extracting the information about the client from the response packet, where the information about the client includes the client's Internet Protocol (IP) address and Media Access Control (MAC) address; and obtaining the client's virtual local area network (VLAN) number and ingress port number through the MAC address, and generating the DHCP Snooping binding table. The technical solutions solve the problem that traffic of some clients is lost due to a lack of a DHCP Snooping binding table of these clients in a process of enabling DHCP Snooping.
Abstract:
A loop avoidance method, device and system. The system includes a first network device and a second network device in an internal network, a first Ethernet port and a second Ethernet port of the two network devices are of a first type, and loop avoidance priorities of the Ethernet ports are different from each other; root media access control (MAC) addresses of the two network devices are the same, and are different from respective network bridge MAC addresses; the second network device receives a loop detection frame from the first Ethernet port through the second Ethernet port, where a source address of the loop detection frame is the root MAC address, and blocks the second Ethernet port according to the loop avoidance priority. A network device blocks, according to a loop avoidance priority, an Ethernet port connected to an external network to avoid changing a topology of an internal network.
Abstract:
A method for authenticating an IP phone and negotiating a voice domain includes receiving an authentication request packet sent by an IP Phone, encapsulating a user name and password of the IP Phone in a RADIUS request packet, and sending the RADIUS packet encapsulating the user name and password of the IP Phone to a RADIUS server. If a result of the authentication performed by the RADIUS server on the IP Phone is that the authentication succeeds, sending a Voice VLAN value to the IP Phone through an extensible authentication protocol EAP extension packet. In the present application, dynamic security authentication and negotiation functions between a client and a server, and rapid deployment of an internal network of an enterprise may be implemented.
Abstract:
A network configuration method and apparatus are provided. The method includes: a first execution device sends to a management device, a device discovery message which is a layer 2 packet and includes a first port identifier, wherein a port identified by the first port identifier is a port, in an up state, of the first execution device. The first execution device receives from the management device a first configuration message which is a layer 2 packet and includes a configuration parameter which is for a second execution device and includes an internet protocol address of the second execution device that is connected to the port identified by the first port identifier. The first execution device sends the first configuration message through the port. According to the application, large amount of manpower is saved and network configuration efficiency is improved.