Method, branch node and center node for transmitting multicast in IPsec tunnel

A central node and branch node technology, applied in the field of data communication, can solve problems such as increased operation and maintenance costs, video service delays, etc.

Inactive Publication Date: 2008-01-09
NEW H3C TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Obviously, in the above processing scheme, the multicast data stream needs to be encapsulated and decapsulated twice by GER and IPsec before it can be finally processed. This has a great impact on services that are sensitive to transmission delays, suc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, branch node and center node for transmitting multicast in IPsec tunnel
  • Method, branch node and center node for transmitting multicast in IPsec tunnel
  • Method, branch node and center node for transmitting multicast in IPsec tunnel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] In order to better understand the method for transmitting multicast in the IPsec tunnel described in the embodiment of the present invention, a common WAN multicast on-demand scheme is firstly introduced: in this scheme, the central node enables the IGMP function as a queryer, and the branch nodes enable The IGMP proxy proxies on-demand requests for the branch network. According to the normal multicast on-demand process, first, the client generates an on-demand request, that is, an IGMP join message, and applies to join a certain multicast group G, and then the routing and switching node generates an IGMP multicast entry according to the above join message, namely ( * , G) entry, and at the same time, the interface that receives the IGMP join message is used as the outgoing interface of the multicast group. If there is a source S of the multicast group, the routing and switching node will generate (S, G) multicast table item, and send the multicast stream to all outgoin...

Embodiment 2

[0115] Referring to FIG. 5 , it is a flowchart of a method for transmitting multicast in an IPsec tunnel according to another embodiment of the present invention. The difference between this embodiment and the method described in the embodiment of FIG. 4 is that the central node and the branch nodes run the PIM protocol to maintain the multicast routing, instead of using the IGMP proxy to realize the multicast forwarding, and the nodes running the PIM protocol send greetings (hello) PIM protocol messages such as messages and pruned messages, maintain PIM multicast entries, and the PIM multicast entries include multicast source address, multicast group address, inbound interface, outbound interface list, timer and flag and other information. For example, the PIM protocol is run on the downlink interface of the central node, and the PIM protocol is run on the uplink interface of the branch nodes, so that the central node and the branch nodes send and receive PIM protocol packets...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In the invention, the transmission of encrypted multicast data is realized only after once encapsulation, by configuring the ACL rule of multicast data stream. By the invention, the time of processing multicast data by small node can be reduced.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a method for transmitting multicast in an Internet protocol security (IPsec, IP Security) tunnel, a branch node and a central node. Background technique [0002] With the promotion of high-speed Internet (Internet) access and the continuous spread of employees from centralized office locations, Virtual Private Network (VPN, Virtual Private Network) has become a key part of the company's network architecture. VPN uses the public network to connect to the private network of the enterprise, implements strict access control through the security mechanism, and establishes a logical virtual private network. VPNs provide a cost-effective means of securely exchanging private information over public networks. [0003] The specific implementation of VPN is to use tunnel technology. Tunnel refers to the establishment of a data channel (tunnel) in the public network, and the dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/46H04L12/18
Inventor 彭科周迪
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products