Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

MAC (Media Access Control) address table access control method, as well as apparatus and network device for the same

A technology of MAC address table and MAC address, applied in the field of network communication, can solve the problems of affecting device performance, small capacity of hardware MAC address table, low packet forwarding speed and efficiency, etc.

Inactive Publication Date: 2012-02-15
RUIJIE NETWORKS CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The embodiment of the present invention provides a MAC address table access control method and device, which are used to solve the problem of the small capacity of the hardware MAC address table in the prior art, and the problem of message forwarding when the software MAC address table is used for address filtering. Issues with low speed and efficiency that affect device performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MAC (Media Access Control) address table access control method, as well as apparatus and network device for the same
  • MAC (Media Access Control) address table access control method, as well as apparatus and network device for the same
  • MAC (Media Access Control) address table access control method, as well as apparatus and network device for the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102]In this embodiment, the configuration communication protocol is used as an example to illustrate the specific process of the MAC address table access control method. The specific steps are as follows: Image 6 Shown:

[0103] Step S501: Monitor the number of MAC addresses in the software MAC address table.

[0104] Step S502: Determine whether the number of MAC addresses in the software MAC address table is greater than the capacity of the hardware MAC address table, if yes, execute step S503; otherwise, execute step S501.

[0105] Step S503: Count the number of MAC addresses in each communication mode in the software MAC address table; set the communication mode with the largest number of MAC addresses as the selected communication mode.

[0106] When the communication mode with the largest number of MAC addresses is one, the selected communication mode is one; when the communication mode with the largest number of MAC addresses is two, the selected communication mode ...

Embodiment 2

[0121] In this embodiment, the specific flow of the MAC address table access control method is described by taking the deletion of the communication protocol as an example. The specific steps are as follows: Figure 7 Shown:

[0122] Step S601: Determine the communication protocol that needs to be deleted.

[0123] Step S602: Determine whether the communication protocol to be deleted is the communication protocol of the selected communication mode that has been turned on, and if so, perform step S603; otherwise, perform step S604.

[0124] Step S603: Execute step S609 without performing the operation of deleting the MAC address in the MAC address table.

[0125] Step S604: Delete the MAC address of the communication protocol to be deleted configured in the MAC address table, and execute step S605.

[0126] Step S605: Monitor the number of MAC addresses in the software MAC address table.

[0127] Step S606: Determine whether the number of MAC addresses in the software MAC ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an MAC (Media Access Control) address table access control method, as well as an apparatus and a network device for the same. The method comprises the following steps of: refusing to execute the operation of adding the MAC address of a configured communication protocol to an MAC address table while configuring the communication protocol which is opened already on a device port and has a selected communication mode, and running the communication protocol; and when some messages reach the port, receiving the messages while judging that the messages are opened already and have a selected communication mode. With the method, space in the MAC address table is saved, and the problem of smaller capacity of the MAC address table is solved; and memory occupation ratio is reduced, speed and efficiency of message forwarding are improved and performance of the device is improved.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a MAC address table access control method, device and network equipment. Background technique [0002] There are three existing network communication modes: unicast, broadcast, and multicast. The reason why the routing device can directly send the message to the node receiving the message, instead of sending the message to all nodes in broadcast mode like a hub, is that the routing device can identify the media access control (media access control) of all nodes connected to the network. Access Control (MAC) addresses, and store them in a MAC address table, where the MAC address is an identifier for identifying a local area network (Local Area Network, LAN) node. The MAC address table is stored in the cache of the routing device. When it is necessary to send a message to the node with the destination MAC address, the routing device looks up the node position of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L12/56H04L45/74
Inventor 肖宇
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products