Abstract:
An apparatus and an associated method for generating a PUF-based challenge response pair includes a first PUF device configured to receive input challenge information and generate first response information based on the input challenge information. A pseudorandom number generator is configured to generate, based on the first response information, P random number sequences, where P is a positive integer. A second PUF device is configured to obtain P pieces of second address information based on the P random number sequences, and generate P-bit second response information based on the P pieces of second address information.
Abstract:
A control method for collecting traffic statistics includes a control node obtains a statistics collection instruction, where the statistics collection instruction is used to instruct to collect traffic statistics of a target data flow, generates a traffic statistics collection policy according to the statistics collection instruction, where the traffic statistics collection policy includes a matching identifier of the target data flow, a first command, and a second command, and sends the traffic statistics collection policy to a forwarding node. The first command is used to instruct the forwarding node to set a traffic identifier for the target data flow based on the matching identifier, the second command is used to instruct the forwarding node to add traffic generated by a target packet to a traffic statistics collection result corresponding to the traffic identifier which is used to describe the traffic of the target data flow.
Abstract:
A network system includes a first Egress PE1, a second Egress PE2, and an Ingress PE3, the PE1, PE2 separately communicate with a CE, and the PE1, PE2 are located in a same redundancy group, and are separately used as primary/backup devices; the PE1, PE2 separately generate a virtual node, where the virtual node has a global unique Router ID in the network system. The virtual node is used as a next hop node of the PE1, PE2; and the PE1, PE2 send link state information to the PE3, so that the PE3 obtains Router IDs of the PE1 and PE2, a Router ID of the virtual node, and the link state information of the PE1, PE2, and the PE1, PE2 separately allocate a first label to a FEC of a first VPN, and send the first label and the Router ID of the virtual node to the PE3.
Abstract:
A positioning method includes clustering points in a first point cloud through multi-clustering to obtain a target point cloud, where the target point cloud represents a feature of a target object, and the first point cloud includes the target point cloud and a point cloud that represents a feature of an interfering object; and determining a position of the target object based on the target point cloud.
Abstract:
A method, an apparatus, and a system for collecting an access control list (ACL), where a second network device receives a first link-state advertisement (LSA) packet flooded by a first network device, where the first LSA packet includes a first network device identifier and first ACL information, and the first network device and the second network device belong to a same Interior Gateway Protocol (IGP) area, and sends an extended first Border Gateway Protocol-Link State (BGP-LS) packet to a controller, where the extended first BGP-LS packet includes the first network device identifier and the first ACL information such that the controller can collect ACL information of the first network device and manage the ACL information of the first network device.
Abstract:
A control method for collecting traffic statistics includes a control node obtains a statistics collection instruction, where the statistics collection instruction is used to instruct to collect traffic statistics of a target data flow, generates a traffic statistics collection policy according to the statistics collection instruction, where the traffic statistics collection policy includes a matching identifier of the target data flow, a first command, and a second command, and sends the traffic statistics collection policy to a forwarding node. The first command is used to instruct the forwarding node to set a traffic identifier for the target data flow based on the matching identifier, the second command is used to instruct the forwarding node to add traffic generated by a target packet to a traffic statistics collection result corresponding to the traffic identifier which is used to describe the traffic of the target data flow.
Abstract:
A packet loss detection method includes: a receiving end receives a service packet whose color belongs to a first color spectrum; counts the number of the service packets whose color belongs to the first color spectrum; after receiving a detection packet, continues counting the number of the service packets whose color belongs to the first color spectrum, where the detection packet carries the number of service packets whose color belongs to the first color spectrum and that are sent by a sending end; when a preset condition is satisfied, the receiving end stops counting the number of the service packets whose color belongs to the first color spectrum, where the number of the service packets counted by the receiving end and the number of the service packets sent by the sending end carried in the detection packet are used for calculating the number of lost packets.