ADTRAN Vanta 1335 Bedienungsanleitung Seite 7

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 13
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 6
US
8,380,828
B1
1
SYSTEM
AND
METHOD
FOR
LOCATING
OFFENDING
NETWORK
DEVICE
AND
MAINTAINING
NETWORK
INTEGRITY
FIELD
OF
THE
INVENTION
This
invention
relates
to
communications
systems,
and
more
particularly,
this
invention
relates
to
locating
an
offend
ing
network
device
that
has
been
adversely
affecting
a
com
munications
network
and
maintaining
network
integrity.
BACKGROUND
OF
THE
INVENTION
A
common
problem
that
occurs
in
a
Local
Area
Network
(LAN)
or
other
IP
networks
is
when
one
network
device
connected
to
the
network
adversely
affects
the
entire
network
performance.
The
behavior
of
that
offending
network
device
often
impacts
normal
network
performance.
Usually,
it
is
necessary
to
determine
where
the
offending
network
device
is
physically
located
in
a
building
and
its
connection
status
to
network
switches
and
other
network
resources
or
network
devices.
This information
needs
to
be
determined
quickly
so
action
can
be
taken
to
restore
the
network
to
normal
perfor
mance.
It
is
well
known
that
each
network
device
includes
a
uni
versally
unique
identi?er
as
its
Media
Access
Control
(MAC)
address.
In a
network
that
uses
a
plurality
of
network
switches,
for
example,
layer
2
Ethernet
switches,
each
net
work
switch maintains
a
table
of
MAC
addresses
and
the
physical
port
on
which
that
MAC
address
was
learned.
For
example,
a
faulty
network
device
could
have
a
bad
MAC
card
and
transmit
packets
in
an
out-of-control
manner.
In
another
example,
a server
could
use
an
IP
address
of
x.x.x.x
with
its
MAC
information
and
address.
A
computer
as
a
network
device
could
previously
have
had
that
IP
address
of
x.x.x.x.
The
user
of
that
computer
may
not
have
used
that
computer
for
six
months.
When
the
offending
user
boots
six
months
later,
that
user
maintains
the
static
IP
address
of
x.x.x.x
for
their
computer,
which
advertises
itself
to
the
network
and
other
users
as
that
IP
address.
In
operation,
other
users
(in
cluding
the
offending
user)
may
be
trying
to
access
the server
that
has
the
IP
address
of
x.x.x.x.
Because
tra?ic
is
redirected
from
that
correct
server
to
the
computer
of
the
offending
user,
the
network
does
not
operate
properly.
Again,
the
offending
computer
with
the
wrong
IP
address
needs
to
be
located
quickly
and
ef?ciently.
Even
worse
is
when
an
offending
user
must
be
located
because
of
malicious
behavior.
Then
it
often
becomes
more
critical
to
locate
the
offending
user
quickly
and
ef?ciently.
One
current
solution
to
locate
the
offending
network
device
and
its
MAC
address
is
for
a
technician
or
other
user
to
lo
g-in
manually
into
each
network
switch
and
determine
if
the
offending
or
faulty
network
device
is
directly
connected
to
that
network
switch
and
take
any
necessary
actions
such
as
shutting
down
the
port,
isolating
the
offending
or
faulty
net
work
device
on
a separate
VLAN,
rate
limiting
that
offending
or
faulty
network
device,
blocking
all
traf?c
from
that
located
MAC
address
and/or
similar
solutions.
This
manual
log-in
technique
is
a
lengthy,
cumbersome
process,
especially
in
larger
networks
where
there
are
many
network
switches
to
search.
Also,
a
detailed
knowledge
of
the
network
architec
ture
is
required,
thus
requiring
the
technician
hunting
for
the
offending
network
device
to
determine
if
the
device
is
directly
connected
to
the
network
switch
or
if
the
MAC
address
was
20
25
30
35
45
50
55
60
65
2
learned
on
a
switchport
that
is
tied
to
another
network
switch.
For
example,
the
faulty
or
offending
network
device
could
be
located
multiple
hops
away.
SUMMARY
OF
THE
INVENTION
A
system
and
method
detects
within
an
internet
protocol
(IP)
network
an
offending
network
device
that
has
been
adversely
affecting
the
IP
network
performance.
In
one
aspect,
a
discovery
protocol
frame
is
propagated
to
successive
network
switches
within
the
IP
network
and
is
formed
as
a
?eld
having
a
query
for
inquiring
within
each
network
switch
to
which
the
frame
is
propagated
whether
the
network
switch
has
a
database
entry
regarding
the
Media
Access
Control
(MAC)
address
and
switch
port
for
the
offending
network
device
to
locate
the
offending
network
device.
This
discovery
protocol
frame
includes
a
command
for
any
network
switch
that
has
the
offending
network
device
connected
thereto
to
disable
the
switch
port
to
which
the
offending
network
device
is
connected
or
block
all
data
traf?c
from
the
MAC
address
of
the
offending
network
device.
When
the
offending
network
device
location
is
found,
the
switch
port
to
which
the
offend
ing
network
device
is
connected
is
disabled or
all
data
traf?c
from
the
MAC
address
of
the
offending
network
is
blocked.
In
one
aspect,
the
discovery
protocol
is
formed
as
a
one
way
neighbor
discovery
protocol
such
as
a
Link
Layer
Dis
covery
Protocol
(LLDP).
If
the
network
switch has
a
database
entry
and
the
MAC
address
was
learned
on
a
switch
port
where
there
is
not
an
LLDP
neighboring
switch,
the
location
of
the
offending
network
device
has
been
determined.
In
yet
another
aspect,
a
Management
Information
Base
(MIB)
is
accessed
at
each
network
switch
using
the
Simple
Network
Management
Protocol
(SNMP).
In
one
aspect,
the
discovery
protocol
frame
is
formed
as
a
user-de?ned
?eld
as
a
command
that
indicates
information
should
be
given
by
a
network
switch
concerning
any
knowledge
about
stored
MAC
addresses.
In
one
aspect,
the
network
switches
are
formed
as
Ethernet switches
or
routers,
and
in
another
aspect,
at
least
one
is
formed
as
a
Local
Area
Network
(LAN)
access
point.
In
yet
another
aspect,
the
discovery
protocol
frame
is
propagated
from
an
administrator
or
other
module
as
a net
work
management
station.
This
discovery
protocol
frame
in
one
example
includes
an
organiZationally
speci?c
Type
Length
Value
(TLV)
and
OrganiZationally
Unique
Identi?er
(OUI)
and
de?ned
information
string
to
de?ne
a
MAC
address
for
the
offending
network
device
and
de?ne
the
query.
A
communications
system
is
also
set
forth
in
detail.
BRIEF
DESCRIPTION
OF
THE
DRAWINGS
Other
objects,
features
and
advantages
will
become
appar
ent
from
the
detailed
description
which
follows
when
consid
ered
in
light
of
the
accompanying
drawings
in
which:
FIG.
1
is
a
high-level
block
diagram
of
a
communications
system
showing
a
plurality
of
network
elements
as
network
switches
forming
a
communications
network
and
an
offend
ing
network
device
as
a
user
computer
having
a
static
IP
address
and
a
server
that
uses
the
same
IP
address,
wherein
the
system
and
method,
in
accordance
with
a
non-limiting
example,
locates
the
offending
network
device
and
disables
the
switch
port
or
blocks
all
data
traf?c
the
MAC
address
of
the
offending
network
device
to
maintain
network
integrity.
FIG.
2
is
high-level
?owchart
of
an
example
method
that
can be used
in
accordance
with
a
non-limiting
example
for
locating
the
offending
network
device
and
maintaining
net
work
integrity.
Seitenansicht 6
1 2 3 4 5 6 7 8 9 10 11 12 13

Kommentare zu diesen Handbüchern

Keine Kommentare