[go: up one dir, main page]

WO2003055180A1 - Address duplication detection in a network - Google Patents

Address duplication detection in a network Download PDF

Info

Publication number
WO2003055180A1
WO2003055180A1 PCT/GB2002/005201 GB0205201W WO03055180A1 WO 2003055180 A1 WO2003055180 A1 WO 2003055180A1 GB 0205201 W GB0205201 W GB 0205201W WO 03055180 A1 WO03055180 A1 WO 03055180A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
address
node
nodes
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/GB2002/005201
Other languages
French (fr)
Inventor
Timothy John Hunneyball
Martin John Asprey
Lee Stephen Gray
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Marconi Communications Ltd
Marconi UK Intellectual Property Ltd
BAE Systems Electronics Ltd
Original Assignee
Marconi Communications Ltd
Marconi Co Ltd
Marconi UK Intellectual Property Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Marconi Communications Ltd, Marconi Co Ltd, Marconi UK Intellectual Property Ltd filed Critical Marconi Communications Ltd
Priority to AU2002366818A priority Critical patent/AU2002366818A1/en
Publication of WO2003055180A1 publication Critical patent/WO2003055180A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5046Resolving address allocation conflicts; Testing of addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast

Definitions

  • This invention relates to communications networks, and in particular to the detection of addressing errors in communications or computer networks.
  • Ethernet Local Area Network (LAN) technology is widely used to interconnect computers. Ethernet is very well established and is now used internally within equipment to link component circuit boards. The availability of low cost dedicated integrated circuits makes this possible.
  • Ethernet uses the MAC (Media Access Control) address of each node in the network to address nodes.
  • the MAC address is carried in the data layer (layer 2 in the OSI model).
  • layer 2 in the OSI model
  • each node will have a public MAC address.
  • some parts of the Ethernet protocol may not be observed. For example, there are no constraints as to how addressing of individual components is used if the internal network will never be connected to a local area network.
  • Ethernet technology has progressed from being based on a shared media (bus) topology to a centrally switched star topology.
  • the complexity of the central switch function has increased progressively such that there are a number of address processing functions present.
  • Central switching functions were originally merely repeated hubs providing an electrical boosting function. They then progressed to Ethernet switches providing the equivalent of multi-port bridging functions using the layer 2 Ethernet MAC address.
  • processing is based on layer 3 (IP) and layer 4 (TCP/UDP) packet header information.
  • Address processing in a layer 2 switch can result in message packets being sent directly to their intended addressed destinations instead of the previous behaviour in which message packets were broadcast through the network and therefore seen by all nodes connected to the Ethernet. This has resulted in some subtle changes in the behaviour of some protocols used within Ethernet networks in this environment.
  • Figures 1 to 3 show the registering behaviour of end stations in a layer 2 switch.
  • Ethernet In some systems that use Ethernet as an internal control system, using a proprietary format for the MAC address can be advantageous. These addresses are not globally unique public addresses and do not need to be so as there is no external network connection. These private addresses may be generated algorithmically based on an internal system variable. This can create problems when equipment misconfigurations can cause duplicate MAC addresses to be present on the control system. This is clearly undesirable as it prevents a given system component from being addressed uniquely and prevents the equipment from working properly, if at all.
  • the present invention aims to meet that need and, in its broadest form, provides a system and method in which each address is sent a message and more than a single reply from any given address indicates address duplication.
  • a method of checking for duplicate hardware addresses assigned to nodes on a network comprising: sending a message from a first node on the network to all other nodes on the network, the message including a specific hardware address for which duplication is to be checked; receiving at the first node a response message from any node on the network containing the specific hardware address; noting the number of responses; and identifying an address as duplicate if more than one response is received.
  • the invention also provides apparatus for checking for duplicate hardware addresses on a network, comprising; at a source node: means for sending a message to all other nodes on the network, the message including a specific hardware address for which duplication is to be checked; means for receiving at the first node a response message from any node on the network containing the specific hardware address; and means for noting the number of responses and for identifying an address as duplicate if more than one response is received.
  • the message is broadcast as an ARP type packet within an Ethernet network to which each target node replies enabling the source node to look for duplicates. If a duplicate is found an alarm can be raised.
  • Embodiments of the invention have the advantage that duplicate MAC addresses can be identified and then the misconfiguration resolved.
  • the first node sending the message is an initiator and the nodes that reply are responders.
  • Figure 2 shows a layer 2 switch with one station registered on a switch port
  • Figure 3 shows how subsequent packets are sent directly to the registered port
  • Figure 4 shows, schematically, a centrally switched Ethernet network
  • Figures 5a and 5b show, respectively, correct and duplicate address responses using a method and system embodying the invention.
  • Figures 6a and 6b show respectively, the process at a DMADP Initiator node and a DMADP responder node.
  • FIG. 4 shows a simple Ethernet centrally switched network, by way of example.
  • a central hub node 10 communicates with a number of other nodes 12 and all nodes communicate across the network by passing data through the hub.
  • FIGs 5a and 5b illustrate a Duplicate MAC Address Detection Protocol (DMADP), which intended to detect the presence of duplicate MAC addresses on the system. These addresses are detected by pinging each MAC address from the hub 10 with a DMADP request packet. If the addresses are correctly assigned, and there is a unique MAC address per node, the hub will only detect a single DMADP reply for each MAC address, as indicated in Figure 5a. However, if an address has been duplicated, two DMADP replies will be received identifying the same MAC address. This situation is shown in Figure 5b. On detection of the duplicate address, and in theory there could be more than two nodes with the same address, action can be taken, for example an alarm or a fault condition can be raised.
  • DMADP Duplicate MAC Address Detection Protocol
  • the protocol packet uses a broadcast address as its destination address. This will get through Ethernet switches if duplicate MACs are present.
  • the DMADP packet format is preferably based on the ARP packet structure.
  • ARP Address Resolution Protocol
  • IP addresses into physical addresses and is set down in RFC-826/STD-37.
  • ARP structure is as follows:
  • Protocol Type (Ether-Type) (Ethernet Payload)
  • Protocol Address Opcode (Request/Reply) Hardware Address of Source Protocol Address of Source Hardware Address of Target Protocol Address of Target
  • the DMADP packet differs from the above ARP packet in that the Ether-Type is changed from that used for ARP (0806) to a new value specific to DMADP for example AOOl.
  • the protocol address fields are not used but retained to maintain a common structure with ARP to allow re-use of some software in the implementation.
  • the DMADP packet has the following structure:
  • FIG. 6a shows the procedure at the DMAPDP Initiator, the node that sends out the message including the hardware address suspected of being duplicated.
  • Figure 6b shows the procedure at the DMADP responder.
  • the Initiator mode sends a DMADP request message to all other nodes on the network.
  • the message includes a specific hardware address that is suspected of being duplicated.
  • a timer window is started and a counter set to zero. The Initiator node then waits for responses within a time window before the timer expires.
  • a DMADP packet is received from a node having the hardware address contained in the request message.
  • the counter which counts the number of responses, is incremented.
  • the process determines at step 106 whether the time has expired and the window closed. If it has not, the process reverts to waiting for further responses from nodes having the same MAC address. If it has expired, the system looks at the counter value (108). If it is greater than one, the hardware address in the original message is, at least, duplicated and an alarm is raised at step 110. If the count is less than or equal to one, the process terminates at step 112 without raising an alarm.
  • Figure 6b shows the process from the point of view of the intended recipient.
  • the target node receives the DMADP packet and at step 122 decides whether it is the target of the request. If it is not it discards thepacket at 130. If it is the intended target it modifies the packet content by swapping, at 124, the hardware address fields of the Source and Target at the end of the payload of the packet.
  • the node sends the modified packet back to the original source that is now the new target address by changing the destination Ethernet Address at the front of the packet (i.e. in the packet header) and inserting its own Ethernet address (its MAC (Hardware) address) as the source.
  • the embodiment described provides a simple efficient protocol for detecting duplicate MAC addresses on an Ethernet network. It is particularly suited to equipment that uses an internal Ethernet between component circuit boards but may be used in any environment in which addresses other than public MAC addresses are used. Although described in relation to a star network, the protocol is suitable for use with any network topology.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

In order to identify duplicate MAC addresses in a network, a protocol is used which sends a packet from a source node to all other nodes on the network. The message packet includes a specific hardware address that is suspected of being duplicate. A receiving node, which has that hardware address responds by sending a response to the source node. The response, if received within a time window, increments a counter. At the end of the window, if the counter value is more than one, the address is duplicated and an alarm raised.

Description

ADDRESS DUPLICATION DETECTION IN A NETWORK
This invention relates to communications networks, and in particular to the detection of addressing errors in communications or computer networks.
Ethernet Local Area Network (LAN) technology is widely used to interconnect computers. Ethernet is very well established and is now used internally within equipment to link component circuit boards. The availability of low cost dedicated integrated circuits makes this possible.
Ethernet uses the MAC (Media Access Control) address of each node in the network to address nodes. The MAC address is carried in the data layer (layer 2 in the OSI model). In an external network, each node will have a public MAC address. However, in a closed system, such as Ethernet used within a piece of equipment, some parts of the Ethernet protocol may not be observed. For example, there are no constraints as to how addressing of individual components is used if the internal network will never be connected to a local area network.
Ethernet technology has progressed from being based on a shared media (bus) topology to a centrally switched star topology. The complexity of the central switch function has increased progressively such that there are a number of address processing functions present. Central switching functions were originally merely repeated hubs providing an electrical boosting function. They then progressed to Ethernet switches providing the equivalent of multi-port bridging functions using the layer 2 Ethernet MAC address. Currently, processing is based on layer 3 (IP) and layer 4 (TCP/UDP) packet header information.
Address processing in a layer 2 switch can result in message packets being sent directly to their intended addressed destinations instead of the previous behaviour in which message packets were broadcast through the network and therefore seen by all nodes connected to the Ethernet. This has resulted in some subtle changes in the behaviour of some protocols used within Ethernet networks in this environment.
Figures 1 to 3 show the registering behaviour of end stations in a layer 2 switch. In
Figure 1, all end stations 0, 1, 2, 3 and 4 are unregistered. In Figure 2, the second end station (1) registers on switch port, and in Figure 3, subsequent packets are sent directly to end station 1. The first time a packet is received by the switch for any of the end stations it is sent out on all ports of the layer 2 switch 10 apart from the port on which it was received on. Thus, in Figure 1, a packet received from end station 0 is sent out to end stations 1 to 4. If an end station transmits a packet then its MAC address will be registered against that switch port. Any further packets for that end station are sent just to that end station.
If end stations with duplicate MAC addresses are present, then erratic behaviour may occur. Any packets (strictly only uni-cast packets, that is packets which are not broadcast or multicast) addressed to the end-station will be sent to the port that last received a packet from that address. Thus, individual, uni-cast, addresses cannot be used to discover address duplication on a layer-2 switched environment.
In some systems that use Ethernet as an internal control system, using a proprietary format for the MAC address can be advantageous. These addresses are not globally unique public addresses and do not need to be so as there is no external network connection. These private addresses may be generated algorithmically based on an internal system variable. This can create problems when equipment misconfigurations can cause duplicate MAC addresses to be present on the control system. This is clearly undesirable as it prevents a given system component from being addressed uniquely and prevents the equipment from working properly, if at all.
There is, therefore, a need for a capability to detect duplicated Ethernet MAC addresses so that appropriate action can be taken.
The present invention aims to meet that need and, in its broadest form, provides a system and method in which each address is sent a message and more than a single reply from any given address indicates address duplication.
More specifically, there is provided a method of checking for duplicate hardware addresses assigned to nodes on a network comprising: sending a message from a first node on the network to all other nodes on the network, the message including a specific hardware address for which duplication is to be checked; receiving at the first node a response message from any node on the network containing the specific hardware address; noting the number of responses; and identifying an address as duplicate if more than one response is received.
The invention also provides apparatus for checking for duplicate hardware addresses on a network, comprising; at a source node: means for sending a message to all other nodes on the network, the message including a specific hardware address for which duplication is to be checked; means for receiving at the first node a response message from any node on the network containing the specific hardware address; and means for noting the number of responses and for identifying an address as duplicate if more than one response is received.
Preferably, the message is broadcast as an ARP type packet within an Ethernet network to which each target node replies enabling the source node to look for duplicates. If a duplicate is found an alarm can be raised.
Embodiments of the invention have the advantage that duplicate MAC addresses can be identified and then the misconfiguration resolved.
The first node sending the message is an initiator and the nodes that reply are responders.
A preferred embodiment of the invention will now be described, by way of example only, and with reference to the accompanying drawings in which: Figure 1, referred to above, shows a layer 2 switch with all stations unregistered;
Figure 2, referred to above, shows a layer 2 switch with one station registered on a switch port;
Figure 3, referred to above, shows how subsequent packets are sent directly to the registered port;
Figure 4 shows, schematically, a centrally switched Ethernet network;
Figures 5a and 5b show, respectively, correct and duplicate address responses using a method and system embodying the invention; and
Figures 6a and 6b show respectively, the process at a DMADP Initiator node and a DMADP responder node.
Figure 4 shows a simple Ethernet centrally switched network, by way of example. A central hub node 10 communicates with a number of other nodes 12 and all nodes communicate across the network by passing data through the hub.
Figures 5a and 5b illustrate a Duplicate MAC Address Detection Protocol (DMADP), which intended to detect the presence of duplicate MAC addresses on the system. These addresses are detected by pinging each MAC address from the hub 10 with a DMADP request packet. If the addresses are correctly assigned, and there is a unique MAC address per node, the hub will only detect a single DMADP reply for each MAC address, as indicated in Figure 5a. However, if an address has been duplicated, two DMADP replies will be received identifying the same MAC address. This situation is shown in Figure 5b. On detection of the duplicate address, and in theory there could be more than two nodes with the same address, action can be taken, for example an alarm or a fault condition can be raised.
The protocol packet uses a broadcast address as its destination address. This will get through Ethernet switches if duplicate MACs are present.
The DMADP packet format is preferably based on the ARP packet structure. ARP
(Address Resolution Protocol) is used to convert IP addresses into physical addresses and is set down in RFC-826/STD-37. ARP structure is as follows:
(Ethernet Header)
Ethernet Address of Destination (Broadcast)
Ethernet Address of Source
Protocol Type (Ether-Type) (Ethernet Payload)
Hardware Address Space
Protocol Address Space
Length of Hardware Address
Length of Protocol Address Opcode (Request/Reply) Hardware Address of Source Protocol Address of Source Hardware Address of Target Protocol Address of Target
The DMADP packet differs from the above ARP packet in that the Ether-Type is changed from that used for ARP (0806) to a new value specific to DMADP for example AOOl. In addition the protocol address fields are not used but retained to maintain a common structure with ARP to allow re-use of some software in the implementation. Thus, the DMADP packet has the following structure:
Ethernet Header
Ethernet Address of Destination (Broadcast) Ethernet Address of Source
Protocol Type (AOOl)
Ethernet Payload
Hardware Address Space
Protocol Address Space Length of Hardware Address
Length of Protocol Address
Opcode (Request/Reply)
Hardware Address of Source
Protocol Address of Source Hardware Address of Target Protocol Address of Target
When a target node receives a DMADP packet it will perform the following steps as exemplified in Figures 6a and 6b. Figure 6a shows the procedure at the DMAPDP Initiator, the node that sends out the message including the hardware address suspected of being duplicated. Figure 6b shows the procedure at the DMADP responder. At step 100 in figure 6a, the Initiator mode sends a DMADP request message to all other nodes on the network. The message includes a specific hardware address that is suspected of being duplicated. A timer window is started and a counter set to zero. The Initiator node then waits for responses within a time window before the timer expires. At step 102, a DMADP packet is received from a node having the hardware address contained in the request message. At step 104 the counter, which counts the number of responses, is incremented. The process then determines at step 106 whether the time has expired and the window closed. If it has not, the process reverts to waiting for further responses from nodes having the same MAC address. If it has expired, the system looks at the counter value (108). If it is greater than one, the hardware address in the original message is, at least, duplicated and an alarm is raised at step 110. If the count is less than or equal to one, the process terminates at step 112 without raising an alarm.
Figure 6b shows the process from the point of view of the intended recipient. At step 120, the target node receives the DMADP packet and at step 122 decides whether it is the target of the request. If it is not it discards thepacket at 130. If it is the intended target it modifies the packet content by swapping, at 124, the hardware address fields of the Source and Target at the end of the payload of the packet. At 128, the node sends the modified packet back to the original source that is now the new target address by changing the destination Ethernet Address at the front of the packet (i.e. in the packet header) and inserting its own Ethernet address (its MAC (Hardware) address) as the source.
Thus, the embodiment described provides a simple efficient protocol for detecting duplicate MAC addresses on an Ethernet network. It is particularly suited to equipment that uses an internal Ethernet between component circuit boards but may be used in any environment in which addresses other than public MAC addresses are used. Although described in relation to a star network, the protocol is suitable for use with any network topology.
The embodiment described is based on the ARP packet structure. It will be appreciated that the invention is not limited to such a packet structure and covers any system in which node addresses are sought and then compared to identify duplicates. The scope of the invention is limited by the following claims.

Claims

1. A method of checking for duplicate hardware addresses assigned to nodes on a network comprising: sending a message from a first node on the network to all other nodes on the network, the message including a specific hardware address for which duplication is to be checked; receiving at the first node a response message from any node on the network having the specific hardware address; noting the number of responses; and identifying an address as duplicate if more than one response is received.
2. A method according to claim 1, wherein the network is an Ethernet network and the hardware address is a MAC address.
3. A method according to claim 2, wherein the message sent by the first node is a packet having a header and a payload including source and target address fields.
4. A method according to any preceding claim, wherein the message sent by the first node is broadcast to all other nodes on the network.
5. A method according to claim 3, wherein each of the other nodes on the network receiving the sent message swap the hardware addresses of the source and target in the received packet, insert the hardware address value of the node and send the packet back to the source node.
6. A method according to any preceding claim, comprising raising an alarm on detection of two nodes having the same address.
7. A method according to any preceding claim, wherein the comparison includes the source node address.
8. A method according to any preceding claim, wherein the network is an internal network within a piece of equipment.
9. Apparatus for checking for duplicate hardware addresses on a network, comprising; at a source node: means for sending a message to all other nodes on the network, the message including a specific hardware address for which duplication is to be checked; means at the first node for receiving a response message from any node on the network having the specific hardware address; and means for noting the number of responses and for identifying an address as duplicate if more than one response is received.
10. Apparatus according to claim 9, wherein the network is an Ethernet network and the hardware address is a MAC address.
11. Apparatus according to claim 9, the message sending means comprises means for sending a packet having a header and a payload including source and target address fields.
12. Apparatus according to any of claims 9 to 11, wherein means comprises means for sending a broadcast message to all other nodes on the network.
13. Apparatus according to claim 11, wherein each of the other nodes on the network receiving the message sent from the source node comprise means for swapping the hardware addresses of the source and target in the received packet, means for inserting the hardware address value of the node, and means for sending the packet back to the source node.
14. Apparatus according to any of claims 9 to 13, wherein the source node comprises means for raising an alarm on detection by the comparing means of two nodes having the same address.
15. Apparatus according to any of claims 9 to 14, wherein the comparing means compares the address of all the nodes on the network including the source node address.
16. Apparatus according to any of claims 9 to 15, wherein the network is an internal network within a piece of equipment.
17. A protocol for checking for duplicate hardware addresses assigned nodes on a network, comprising program code, which, when run on a network, causes the network to perform the method of any of claims 1 to 8.
18. A communication or computer network comprising the apparatus according to any of claims 9 to 16.
19. A communications or computer network comprising means for implementing the method according to any of claims 1 to 8 or the protocol according to claim 17.
PCT/GB2002/005201 2001-12-20 2002-11-18 Address duplication detection in a network Ceased WO2003055180A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002366818A AU2002366818A1 (en) 2001-12-20 2002-11-18 Address duplication detection in a network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0130531.7A GB0130531D0 (en) 2001-12-20 2001-12-20 Duplicate address detection in networks
GB0130531.7 2001-12-20

Publications (1)

Publication Number Publication Date
WO2003055180A1 true WO2003055180A1 (en) 2003-07-03

Family

ID=9928070

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2002/005201 Ceased WO2003055180A1 (en) 2001-12-20 2002-11-18 Address duplication detection in a network

Country Status (3)

Country Link
AU (1) AU2002366818A1 (en)
GB (1) GB0130531D0 (en)
WO (1) WO2003055180A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1569419A1 (en) * 2004-02-25 2005-08-31 Lg Electronics Inc. Method of assigning addresses to a plurality of devices on a network and a network system therefor
WO2008152807A1 (en) 2007-06-13 2008-12-18 Panasonic Corporation Mac address overlap eliminating method, network device managing system, server, and information device
US20090182928A1 (en) * 2007-06-22 2009-07-16 Daniel Lee Becker Method and system for tracking a virtual machine
WO2009156777A1 (en) * 2008-06-23 2009-12-30 Telefonaktiebolaget Lm Ericsson (Publ) Media access control (mac) address collision avoidance in ethernet switched networks
WO2014203113A1 (en) * 2013-06-18 2014-12-24 Telefonaktiebolaget L M Ericsson (Publ) Duplicate mac address detection
US9354960B2 (en) 2010-12-27 2016-05-31 Red Hat, Inc. Assigning virtual machines to business application service groups based on ranking of the virtual machines
WO2016167509A1 (en) * 2015-04-13 2016-10-20 Samsung Electronics Co., Ltd. Display device and method of setting the same
EP3382998A1 (en) * 2017-03-29 2018-10-03 Juniper Networks, Inc. Detecting hardware address conflicts in computer networks
US10133607B2 (en) 2007-06-22 2018-11-20 Red Hat, Inc. Migration of network entities to a cloud infrastructure
US10931628B2 (en) 2018-12-27 2021-02-23 Juniper Networks, Inc. Duplicate address detection for global IP address or range of link local IP addresses
US10965637B1 (en) 2019-04-03 2021-03-30 Juniper Networks, Inc. Duplicate address detection for ranges of global IP addresses
US10992637B2 (en) 2018-07-31 2021-04-27 Juniper Networks, Inc. Detecting hardware address conflicts in computer networks
US11165744B2 (en) 2018-12-27 2021-11-02 Juniper Networks, Inc. Faster duplicate address detection for ranges of link local addresses

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11275119A (en) * 1998-03-19 1999-10-08 Toshiba Tec Corp Terminal communication address duplication detection method and device
US20010017857A1 (en) * 2000-02-29 2001-08-30 Kenji Matsukawa IP address duplication detection method using address resolution protocol

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11275119A (en) * 1998-03-19 1999-10-08 Toshiba Tec Corp Terminal communication address duplication detection method and device
US20010017857A1 (en) * 2000-02-29 2001-08-30 Kenji Matsukawa IP address duplication detection method using address resolution protocol

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
"DETECTION AND ISOLATION OF DUPLICATE UNIQUE ADDRESSES", IBM TECHNICAL DISCLOSURE BULLETIN, IBM CORP. NEW YORK, US, vol. 35, no. 6, 1 November 1992 (1992-11-01), pages 93 - 96, XP000314076, ISSN: 0018-8689 *
ANONYMOUS: "Fast Duplicate Address Detection During Registration with a Wireless LAN", RESEARCH DISCLOSURE, vol. 41, no. 412, 1 August 1998 (1998-08-01), Havant, UK, article No. 41270, XP002238532 *
KORINEK F ET AL: "METHOD OF ACCEPTING AND REJECTING NEW DEVICES ON A NETWORK", MOTOROLA TECHNICAL DEVELOPMENTS, MOTOROLA INC. SCHAUMBURG, ILLINOIS, US, vol. 36, September 1998 (1998-09-01), pages 132 - 135, XP000850393, ISSN: 0887-5286 *
LOUCKS E M ET AL: "IMPLEMENTATION OF A DYNAMIC ADDRESS ASSIGNMENT PROTOCOL IN A LOCAL AREA NETWORK", COMPUTER NETWORKS AND ISDN SYSTEMS, NORTH HOLLAND PUBLISHING. AMSTERDAM, NL, vol. 11, no. 2, February 1986 (1986-02-01), pages 133 - 146, XP000211676, ISSN: 0169-7552 *
PATENT ABSTRACTS OF JAPAN vol. 2000, no. 01 31 January 2000 (2000-01-31) *
SUSUMU NAKAYASHIKI ET AL: "MAC ADDRESS TEST PROTOCOL FOR A RECONFIGURABLE DUAL-RING LOCAL AREANETWORK", ELECTRONICS & COMMUNICATIONS IN JAPAN, PART I - COMMUNICATIONS, SCRIPTA TECHNICA. NEW YORK, US, vol. 78, no. 10, 1 October 1995 (1995-10-01), pages 1 - 14, XP000546394, ISSN: 8756-6621 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1569419A1 (en) * 2004-02-25 2005-08-31 Lg Electronics Inc. Method of assigning addresses to a plurality of devices on a network and a network system therefor
US7564804B2 (en) 2004-02-25 2009-07-21 Lg Electronics Inc. Method of assigning addresses to a plurality of devices on a network and a network system therefor
EP2051446A4 (en) * 2007-06-13 2013-07-10 Panasonic Corp METHOD FOR REMOVING MAC ADDRESS OVERLAPPING, NETWORK DEVICE MANAGEMENT SYSTEM, SERVER AND INFORMATION DEVICE
WO2008152807A1 (en) 2007-06-13 2008-12-18 Panasonic Corporation Mac address overlap eliminating method, network device managing system, server, and information device
US10133607B2 (en) 2007-06-22 2018-11-20 Red Hat, Inc. Migration of network entities to a cloud infrastructure
US20090182928A1 (en) * 2007-06-22 2009-07-16 Daniel Lee Becker Method and system for tracking a virtual machine
US8949827B2 (en) * 2007-06-22 2015-02-03 Red Hat, Inc. Tracking a virtual machine
WO2009156777A1 (en) * 2008-06-23 2009-12-30 Telefonaktiebolaget Lm Ericsson (Publ) Media access control (mac) address collision avoidance in ethernet switched networks
US9354960B2 (en) 2010-12-27 2016-05-31 Red Hat, Inc. Assigning virtual machines to business application service groups based on ranking of the virtual machines
WO2014203113A1 (en) * 2013-06-18 2014-12-24 Telefonaktiebolaget L M Ericsson (Publ) Duplicate mac address detection
US20150016461A1 (en) * 2013-06-18 2015-01-15 Telefonaktiebolaget L M Ericsson (Publ) Duplicate mac address detection
CN105594185A (en) * 2013-06-18 2016-05-18 瑞典爱立信有限公司 Duplicate mac address detection
CN105594185B (en) * 2013-06-18 2019-05-28 瑞典爱立信有限公司 Repeat MAC Address detection
US9794176B2 (en) 2013-06-18 2017-10-17 Telefonaktiebolaget Lm Ericsson (Publ) Duplicate MAC address detection
US9854613B2 (en) 2015-04-13 2017-12-26 Samsung Electronics Co., Ltd. Display device and method of setting the same
WO2016167509A1 (en) * 2015-04-13 2016-10-20 Samsung Electronics Co., Ltd. Display device and method of setting the same
EP3382998A1 (en) * 2017-03-29 2018-10-03 Juniper Networks, Inc. Detecting hardware address conflicts in computer networks
US10992637B2 (en) 2018-07-31 2021-04-27 Juniper Networks, Inc. Detecting hardware address conflicts in computer networks
US10931628B2 (en) 2018-12-27 2021-02-23 Juniper Networks, Inc. Duplicate address detection for global IP address or range of link local IP addresses
US11165744B2 (en) 2018-12-27 2021-11-02 Juniper Networks, Inc. Faster duplicate address detection for ranges of link local addresses
US10965637B1 (en) 2019-04-03 2021-03-30 Juniper Networks, Inc. Duplicate address detection for ranges of global IP addresses
US11606332B1 (en) 2019-04-03 2023-03-14 Juniper Networks, Inc. Duplicate address detection for ranges of global IP addresses
US11909717B1 (en) 2019-04-03 2024-02-20 Juniper Networks, Inc. Duplicate address detection for ranges of global IP addresses

Also Published As

Publication number Publication date
GB0130531D0 (en) 2002-02-06
AU2002366818A1 (en) 2003-07-09

Similar Documents

Publication Publication Date Title
US5708654A (en) Method for detecting proxy ARP replies from devices in a local area network
US6597700B2 (en) System, device, and method for address management in a distributed communication environment
EP2100406B1 (en) Method and apparatus for implementing multicast routing
US20110149960A1 (en) Method and apparatus for filtering multicast packets
US7974192B2 (en) Multicast switching in a distributed communication system
US20070223533A1 (en) Reception of redundant and non-redundant frames
KR20020017265A (en) Communication method for plural virtual lan consisted in identical ip subnet
US20010017857A1 (en) IP address duplication detection method using address resolution protocol
US20070195793A1 (en) Methods, systems, and computer program products for selective layer 2 port blocking using layer 2 source addresses
US10397085B1 (en) Offloading heartbeat responses message processing to a kernel of a network device
WO2011012582A2 (en) Multicast traffic management in a network interface
WO2003055180A1 (en) Address duplication detection in a network
US12266225B2 (en) On-vehicle communication system, switch device, communication control method, and communication control program
US7009974B1 (en) Method and apparatus for updating addresses in network processing device
US6430610B1 (en) TCP/IP address protection mechanism in a clustered server environment
US20030018804A1 (en) Method and apparatus for deriving a standard MAC address from physical location
US6738829B1 (en) System and method for implementing a generic enhanced network driver
CN100493073C (en) Method for implementing neighbor discovery of different link layer separated domain
US7626937B2 (en) System and method for network connection detection
US8508773B2 (en) Media access control address installation for tandem print engine configurations
US7480250B2 (en) Apparatus and method for establishing network
CN113497752B (en) A message sending method, first network device and network system
US9282061B1 (en) Systems and methods for handling ARP messages in modular network devices
JP7417395B2 (en) Fraud detection device and fraud detection method
KR20120059724A (en) System and method for configurating and managing dhcp server of a subnet in a data transfer apparatus using virtual lan

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP