Message forwarding method based on forwarding table of medium access control and system

A message forwarding and forwarding table technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as network storms, network broadcast storms, and operators' telecommunication network oscillations, improve forwarding efficiency, and save network resources, and the effect of improving search efficiency

Inactive Publication Date: 2009-10-14
ZTE CORP
0 Cites 17 Cited by

AI-Extracted Technical Summary

Problems solved by technology

Among them, the dynamic MAC forwarding table established by flooding is generally used in the local area network. If it is applied to a large-scale carrier-class network, it will easily cause a broadcast storm on the network, which does not meet the requirements of the carrier-class network.
This is because the site connected to the LAN is very small, that is, the small business traffic of an office, but the carrier-class Ethernet belongs to the metropolitan area Ethernet, which is located at the aggregation layer of the telecom operator and aggregates from several cities to hundreds of For the huge business volume in the city, if the MAC forwarding table is established by flooding in the carrier Ethernet, it will broadcast and forward the huge unkno...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

[0097] It can be seen that the present invention aggregates existing multiple table items into one table item, so network resources are saved, and, due to the reduction of t...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a message forwarding method based on a forwarding table of medium access control, comprising the following steps of: carrying out MAC network level division to all nodes in the network; setting MAC network segments of all MAC network levels, MAC mask codes of all MAC network segments and virtual MAC addresses of all nodes according to the division to the MAC network levels; converging into the MAC forwarding table according to the set MAC network segments, the set MAC mask codes and the set virtual MAC addresses; and after the nodes receive the message, forwarding the message by inquiring the converged MAC forwarding table. The invention also discloses a message forwarding system based on the MAC forwarding table correspondingly, comprising a network division unit, a set unit, a converging unit and a message forwarding unit. The invention converges the existing plurality of entries into one entry, thus saving network resource; in addition, as the entries are reduced, the times for inquiring the entries are correspondingly reduced when a switch forwards the message, thus improving the forwarding efficiency of the message.

Application Domain

Technology Topic

Network levelMedia access control +7

Image

  • Message forwarding method based on forwarding table of medium access control and system
  • Message forwarding method based on forwarding table of medium access control and system
  • Message forwarding method based on forwarding table of medium access control and system

Examples

  • Experimental program(1)

Example Embodiment

[0022] The basic idea of ​​the present invention is to divide all nodes in the network by MAC network level, and according to the division of MAC network levels, set the MAC network segment of each MAC network level, the MAC mask of each MAC network segment, and each node Then aggregate all the MAC entries in each network segment into one entry to build a MAC forwarding table aggregated by network segment; after receiving the message, the node queries the aggregated MAC forwarding table to obtain the forwarding Address forwarding the received message.
[0023] The implementation of the technical solution will be further described in detail below in conjunction with the drawings.
[0024] figure 1 It is a schematic flow chart of the method for forwarding messages based on the MAC forwarding table of the present invention, such as figure 1 As shown, the message forwarding method based on the MAC forwarding table of the present invention includes the following steps:
[0025] Step 11: Perform MAC network level division on all nodes in the network.
[0026] Here, the MAC network level is generally divided according to geographic location and business needs. For example, MAC network levels can be classified according to country, province, city...
[0027] figure 2 It is a schematic diagram of the MAC network level division in an embodiment of the present invention, such as figure 2 As shown, in this embodiment, there are sixteen nodes from node 1 to node 16 in the network, and all nodes are divided into five network levels, of which:
[0028] The first level includes: node 1, node 2, ..., node 16;
[0029] The second level includes: node 2, node 3, ..., node 16;
[0030] The third level includes: node 5, node 6, ..., node 16;
[0031] The fourth level includes: node 10, node 11, ..., node 16;
[0032] The fifth level includes: node 14, node 15, and node 16.
[0033] Step 12: According to the division of MAC network levels, set the MAC network segment of each MAC network level and the MAC mask of each MAC network segment.
[0034] When dividing a network segment, the number of bits of the network segment is generally a multiple of 8, such as 8, 16, 24, 32, 40, etc. The specific number of bits is determined by the network segment level. The higher the level, the more nesting levels are included. The more the number of network segments, the more switches, and accordingly, the fewer the number of MAC mask bits. However, MAC network segments belonging to the same network level have the same number of mask bits. For example, the level of the province is higher than that of the city. The number of bits in the MAC mask of the province should be less than that of the city, but the number of bits in the MAC mask of all cities in a province should be equal and less than that of the province. For example, for figure 2 In the illustrated embodiment, the MAC network segment and MAC mask of each MAC network level can be set as follows:
[0035] The first level: MAC network segment is 2-0-0-0-0-0, MAC mask is FF-0-0-0-0-0, that is, the number of bits of MAC mask is 8.
[0036] The second level: MAC network segment is 2-3-0-0-0-0, MAC mask is FF-FF-0-0-0-0, that is, the number of MAC mask bits is 16.
[0037] The third level: MAC network segment is 2-3-3-0-0-0, MAC mask is FF-FF-FF-0-0-0, that is, the number of MAC mask bits is 24.
[0038] The fourth level: MAC network segment is 2-3-3-3-0-0, MAC mask is FF-FF-FF-FF-0-0, that is, the number of bits of MAC mask is 32.
[0039] Level 5: The MAC network segment is 2-3-3-3-3-0, and the MAC mask is FF-FF-FF-FF-FF-0, that is, the number of bits in the MAC mask is 40.
[0040] Step 13: According to the MAC network segment set in step 12, set the virtual MAC address of each node.
[0041] for figure 2 In the illustrated embodiment, the virtual MAC address of each node can be set according to the MAC network segment as follows:
[0042] Node 1: 2-0-0-0-0-1
[0043] Node 2: 2-3-0-0-0-2
[0044] Node 3: 2-3-0-0-0-3
[0045] Node 4: 2-3-0-0-0-4
[0046] Node 5: 2-3-3-0-0-5
[0047] Node 6: 2-3-3-0-0-6
[0048] Node 7: 2-3-3-0-0-7
[0049] Node 8: 2-3-3-0-0-8
[0050] Node 9: 2-3-3-0-0-9
[0051] Node 10: 2-3-3-3-0-10
[0052] Node 11: 2-3-3-3-0-11
[0053] Node 12: 2-3-3-3-0-12
[0054] Node 13: 2-3-3-3-0-13
[0055] Node 14: 2-3-3-3-3-14
[0056] Node 15: 2-3-3-3-3-15
[0057] Node 16: 2-3-3-3-3-16
[0058] Step 14: Each node aggregates the MAC forwarding table according to the network segment.
[0059] Specifically, all MAC table entries in a MAC network segment are aggregated into one MAC table entry, and each table entry of multiple MAC network segments at the same level can be aggregated to form a MAC table entry of a higher-level MAC network segment. Here , The higher-level MAC network segment generally refers to a higher-level MAC network segment. The keywords of the aggregated MAC table entry are the destination MAC network segment and MAC mask.
[0060] Take node 1, node 2, node 6, and node 11 in the embodiment as examples. Tables 1 to 4 are the ordinary MAC forwarding tables of node 1, node 2, node 6, and node 11 in this embodiment, and Table 5 to Table 8 are the MAC forwarding tables of node 1, node 2, node 6, and node 11 in the present invention in this embodiment:
[0061] Destination MAC subnet
[0062] Table 1
[0063] Destination MAC subnet
[0064] Table 2
[0065] Destination MAC subnet
[0066] table 3
[0067] Destination MAC subnet
[0068] Table 4
[0069] Destination MAC subnet
[0070] table 5
[0071] Destination MAC subnet
[0072] Table 6
[0073] Destination MAC subnet
[0074] Table 7
[0075] Destination MAC subnet
[0076] Table 8
[0077] It can be seen from the above table that the present invention can aggregate the MAC forwarding table at node 1 as follows: all destination MAC subnets are 2-3-3-0-0-0, the MAC mask is 24 bits, and the message is forwarded through the interface Int1 , The next hop node is node 2;
[0078] The MAC forwarding table can be aggregated at node 2 as follows: all destination MAC subnets are 2-3-3-3-0-0, MAC mask is 32 bits, packets are forwarded through interface Int1, and the next hop node is node 6;
[0079] The MAC forwarding table can be aggregated at node 6 as follows: all destination MAC subnets are 2-3-3-3-3-0, MAC mask is 40 bits, packets are forwarded through interface Int1, and the next hop node is node 11;
[0080] In addition, the node 11 is connected to the smallest level switch, which is directly connected without aggregation.
[0081] Step 15: After receiving the message, the node queries the aggregated MAC forwarding table, obtains the forwarding address and forwards the message.
[0082] Here, after receiving the message, the node queries the aggregated MAC forwarding table, calculates according to the MAC mask of the current node and the virtual MAC address of the message forwarding destination node, and obtains the forwarding address to forward the message.
[0083] Here, the message received by the node generally carries the MAC address of the destination node.
[0084] When querying the aggregated MAC forwarding table, the query is specifically based on the keywords of the MAC entries in the MAC forwarding table.
[0085] According to the setting in step 13, the node can obtain the virtual MAC address of the destination node according to the MAC address of the destination node, and then calculate the virtual MAC address of the destination node with the MAC mask of the current node to obtain the next hop node, and The message is forwarded to the next hop node through the designated interface, ..., and so on, until the message is forwarded to the destination node.
[0086] Take node 1 as an example, using the prior art MAC forwarding table, the MAC network segment to which the destination node belongs is 2-3-3-3-0-0, and the MAC mask is FF-FF-FF-FF-0 For the message of -0, it is necessary to create an entry for each destination MAC address in the network segment. A total of 12 MAC entries must be created. To facilitate comparison with the solution of the present invention, the virtual MAC address of the node needs to be created here. Distinguish the nodes. As shown in Table 1, when forwarding packets whose destination node belongs to the MAC network segment 2-3-3-3-0-0 and the MAC mask is FF-FF-FF-FF-0-0, the forwarding table is required The entries in the table are queried in sequence until the forwarding address is obtained. In the worst case, 12 entries are queried, and 12 entries are occupied.
[0087] When node 1 uses the aggregated MAC forwarding table of the present invention, it only needs to target the MAC network segment 2-3-3-3-0-0 and the MAC mask FF-FF-FF-FF-0-0. Create an entry in the segment. As shown in Table 5, nodes 5-16 belong to the MAC network segment of 2-3-3-3-0-0, and the forwarding destination MAC network segment is 2-3-3-3-0- 0. When the MAC mask is FF-FF-FF-FF-0-0, it only needs to query the table entry once and occupy one entry resource.
[0088] In fact, for node 1, the maximum number of MAC entries that can be aggregated is 2 16 , The efficiency of storage and search can be greatly improved.
[0089] image 3 It is a schematic diagram of the composition structure of the message forwarding system based on the MAC forwarding table of the present invention, such as image 3 As shown, the message forwarding system based on the MAC forwarding table of the present invention includes: a network dividing unit 31, a setting unit 32, an aggregation unit 33, and a message forwarding unit 34; among them,
[0090] The network dividing unit 31 is configured to perform MAC network level division on all nodes in the network.
[0091] Here, the MAC network level is generally divided according to geographic location and business needs. For example, the MAC network level and MAC network segment can be divided according to country, province, city...
[0092] The setting unit 32 is configured to set the MAC network segments of each MAC network level, the MAC mask of each MAC network segment, and the virtual MAC address of each node according to the division of the MAC network level by the network dividing unit 31.
[0093] Here, the MAC network segment and the MAC mask of each network segment are generally set according to the number of divided MAC network levels.
[0094] The aggregation unit 33 is configured to aggregate the MAC forwarding table according to the network segment according to the MAC network segment, MAC mask, and virtual MAC address set by the setting unit 32.
[0095] Here, specifically, all MAC table entries in a MAC network segment are aggregated into one MAC table entry, and the key of the MAC forwarding table after aggregation is the destination MAC network segment + MAC mask.
[0096] The message forwarding unit 34 is configured to receive a message, query the aggregated MAC forwarding table, and forward the message according to the MAC mask of the current node and the virtual MAC address of the message forwarding destination node.
[0097] It can be seen that the present invention aggregates multiple existing table items into one table item, so network resources are saved, and because the table items are reduced, the number of times that the switch queries the table items when forwarding a message is also reduced accordingly, thereby Improve the search efficiency of the forwarding table.
[0098] The above are only the preferred embodiments of the present invention, and are not used to limit the protection scope of the present invention.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Classification and recommendation of technical efficacy words

  • Improve search efficiency
  • Save network resources

Convenient information search method, system and an input method system

ActiveCN101231636AImprove search efficiencyReduce stepsSpecial data processing applicationsInternet searchingInternet search engines
Owner:BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD

Group protein structure prediction method based on Rosetta local reinforcement

ActiveCN106778059AImprove search capabilitiesImprove search efficiencyProteomicsGenomicsEnergy functionalPhases of clinical research
Owner:ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products