ADTRAN Vanta 1335 Manual de usuario Pagina 8

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 13
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 7
US
8,380,828
B1
3
FIGS.
3A
through
3C
show
respectively
a
Link
Layer
Discovery
Protocol
(LLDP)
frame
format,
an
LLDPU
frame
format
and
TLV
format
that
can
be
modi?ed
and
used
in
accordance
with
non-limiting
examples.
FIG.
4A
is
a
diagram
showing
an
example
frame
format
for
an Link
Layer
Discovery
Protocol
(LLDP)
organiZationally
speci?c
TLV
that
can be
modi?ed
and
used
in
accordance
with
a
non-limiting
example.
FIG.
4B
is
a
diagram
showing
an
example
frame
format
for
a
MAC
address
TLV
that
can be
modi?ed
and
used
in
accor
dance
with
a
non-limiting
example.
FIG.
5
is
an
example
of
a
communications
system
that
uses
the
method
as
described
and
incorporates
various
compo
nents
shown
in
FIG.
1
and
methodology
and
uses
the
modi?ed
frame
formats
as
shown
in
FIGS.
3A-3C
and
4A
and
4B
in
accordance
with
a
non-limiting
example
for
locating
an
offending
network
device
and
maintaining
network
integrity.
DETAILED
DESCRIPTION
OF
THE
PREFERRED
EMBODIMENTS
Different
embodiments
will
now
be
described
more
fully
hereinafter
with
reference
to
the
accompanying
drawings,
in
which
preferred
embodiments
are
shown.
Many
different
forms
can
be
set
forth
and
described
embodiments
should
not
be
construed
as
limited
to
the
embodiments
set
forth
herein.
Rather,
these
embodiments
are
provided
so
that
this
disclo
sure
will
be
thorough
and
complete,
and
will
fully
convey
the
scope
to
those
skilled in
the
art.
Like
numbers
refer
to like
elements
throughout.
In
accordance
with
a
non-limiting
example,
the
system
and
method
detects
an
offending
network
device
within
an
IP
network
such
as
the
illustrated
communications
system
shown
in
FIG.
1
at
10
that
has
a
plurality
of
network
elements
(NE)
12,
typically
network
switches
and/or
routers,
that
form
a
communications
Internet
protocol
(IP)
network.
The
switches
12
include
ports
with
various
network
devices
13
connected
thereto,
such
as
IP
phones,
computers
and
other
devices.
One
network
element
as
a
switch
is
shown
as
1211
and
is
illustrated
with
components
in
greater
detail,
such
as
a
database
that
includes data
for
a
Management
Information
Base
(MIB)
or
other
database
14,
transceiver
16,
and
various
ports
18
and
processor
20.
Other
components
of
such
network
switches
as
known
to
those
skilled in
the
art
are
included,
but
not
shown
in
detail.
Each
of
the
elements
12
typically
includes
such
components.
This
network
10
includes
the
plu
rality
of
network
elements
as
switches
12
in
some
examples,
such
as
Ethernet
switches,
that
are
connected
together
to
form
the
network.
Many
of
the
network
switches
12 can
be
layer
2
network
switches
and
each
typically
operates
in
conjunction
with
a
database
and
Management
Information
Base
(MIB)
14
such
as
illustrated
with
respect
to
the
switch
12a.
It
should
be
understood
that
the
term
switch
as
described
can
broadly
encompass
different
layer
switches,
routers
and
other
devices,
including
wireless
access
points.
Different data
link
protocols
couldbe
used
such
as
Ethernet
for
a
LAN,
PPP,
HDLC
and
ADCCP.
In the
network
diagram
shown
in
FIG.
1,
for
example,
a
network
device
shown
at
22
could
have
a
bad
MAC
card
and
transmit
packets
in
an
out
of-control
manner.
In
this
particular
illustrated
example,
a
server
24
as
illustrated
has
an
IP
address
of
x.x.x.x
and
the
offending
network
device
is
a
computer
as
a
network
device
such
as
shown
in
the
lower
right
portion
of
the
diagram
at
22,
which
previously
had
an
address
of
x.x.x.x.
In
this
example,
the
user
of
that
offending
network
device
22
did not
use
this
network
device
as
their
computer
for
six
months.
When
that
user
boots
their
computer
six
months
later,
that
computer
20
25
30
35
40
45
50
55
60
65
4
maintains
that
static
address
of
x.x.x.x
and
advertises
itself
as
that
address.
Other
users
at
other
computers
and
network
devices,
perhaps
even
the
offending
user,
may
have
been
trying
to
access
the
proper
server
24
having
the
IP
address
of
x.x.x.x.
Because
tra?ic
is
redirected
from
the
server
24
to
the
offending
network
device
22,
the
network
does
not
operate
correctly.
The
offending
network
device
22
could
be
different
devices,
but
in
this
example
is
a
computer.
In
this
example,
it
includes
a
transceiver
or
modern
22a,
processor
22b,
and
memory
or
database
220
as
is
typical
for
many
network
devices.
Other
components
not
shown
could
be
included.
In
accordance
with
a
non-limiting
example,
the
system
and
method
locates
the
offending
network
device
22
within
this
IP
network
10.
In a
non-limiting
example,
an
administrator
26
in
one
non-limiting
example
issues
a
command
to
the
switch
connected
thereto
to
propagate
a
discovery
protocol
frame
as
a
modi?ed
a
Link
Layer
Discovery
Protocol
(LLDP)
frame.
The
system
inputs
a
command
on
a
network
switch,
and
the
switch
originates
the
LLDP
frame.
This
frame
comprises
a
?eld
having
a
query
for
inquiring
within
each
network
switch
or
device
to
which
the
frame
is
propagated
whether
the net
work
switch
receiving
the
frame
has
a
database
entry
regard
ing
the
Media
Access
Control
(MAC)
address
for
the
offend
ing
network
device
to
locate
the
device.
A
command
is
included
for
con?guring
the
particular
network
switch
to
which
the
offending
network
device
is
connected
to
disable
the
switch
port
to
which
the
offending
device
is
connected
or
block
all
data
from
the
MAC
address
of
that
offending
traf?c
network
device.
In
response
to
locating
the
offending
network
device
based
on
an
af?rmative
response
to
the
query,
that
network
switch
having
the
connected
and
offending
network
device
is
con?gured
to
disable the
network
port
or
block
traf?c
to
that
offending
network
device.
As
will
be
explained
in
greater
detail
below,
a
Link
Layer
Discovery
Protocol
(LLDP)
frame
is
modi?ed
to
allow
almost
instantaneous
hunting
and
location
of
the
offending
network
device.
It
should
be
understood
that
the
discovery
protocol
frame
is
part
of
a
discovery
protocol
that
comprises
a
one-way
neigh
bor
discovery
protocol
such
as
the
Link
Layer
Discovery
Protocol
(LLDP).
At
each
network
switch,
a
database
such
as
a
Management
Information
Base
(MIB)
can
be
accessed
such
as
using
the
Simple
Network
Management
Protocol
(SNMP).
In
another
example,
if
the
network
switch
has
a
database
entry
and
the
MAC
address
was
learned
on
a
switch
port
where
there
is
not
an
LLDP
neighboring
switch,
the
location
of
the
offending
network
device
has
been
determined.
Typically,
the
query
of
the
discovery
protocol
frame
is
a
user-de?ned
?eld
as
a
command
that
indicates
information
should
be
given
by
a
network
switch
concerning
any
knowledge
about
stored
MAC
addresses.
Although
the description
relative
to
FIG.
1
shows
typically
Ethernet
switches
or
routers,
it
should
be
understood
that
the
network
switches
can
comprise
at
least
one
Local
Area
Network
(LAN)
access
point
in
a
non-limiting
example.
The
discovery
protocol
frame can
include
an
orga
niZationally
speci?c
Type
Length
Value
(TLV)
and
Organi
Zationally
Unique
Identi?er
(OUI)
and
de?ned
information
string
to
de?ne
a
MAC
address
for
the
offending
network
device
and
de?ne
the
query.
FIG.
2
shows
a
high-level
?owchart
of
a
sequence
of
opera
tion
for
the
method
as
described.
The
process
starts
(block
50)
and
an
administrator
in
a
non-limiting
example
issues
a
com
mand
to
generate
a
discovery
protocol
frame
as
a
modi?ed
Link
Layer
Discovery
Protocol
(LLDP)
frame
to
de?ne
the
query
and
MAC
address
for
the
offending
network
device
(block
52).
The
administrator
in
this
non-limiting
example
issues
a
command
to
the
switch,
which
will
propagate
the
frame
Vista de pagina 7
1 2 3 4 5 6 7 8 9 10 11 12 13

Comentarios a estos manuales

Sin comentarios