Method and device for processing message

A message processing and message technology, which is applied in the field of network communication, can solve problems such as invalid broadcast flow and inability to realize source filtering, and achieve the effect of suppressing invalid broadcast problems

Active Publication Date: 2012-04-04
NEW H3C TECH CO LTD
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the tunnel ID is not the same as the uplink port ID. That is to say, source filtering cannot be implemented, so that broadcast packets are broadcast back to BEB1, resulting in invalid broadcast streams.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing message
  • Method and device for processing message
  • Method and device for processing message

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0039] Example 1: Hub-Spoken networking applied to VPLS, such as Figure 5 shown.

[0040] On the Spoken PE1 device, the incoming broadcast packet from the CE1 device has an inbound interface ID of AC1. The Spoken PE1 device learns the source MAC address from AC1 to the interface ID corresponding to the source MAC address in the MAC address forwarding table. At the same time, add the VC label to the broadcast message and forward it to the HUB PE device. The HUB PE strips off the VC label and forwards the broadcast message to the HUB CE, and the HUB CE returns it to the HUB PE after processing. After the HUB PE receives the message, it adds a VC label and broadcasts it in the VSI again. At this time, both Spoken PE1 and Spoken PE3 will receive the broadcast message.

[0041] After receiving the broadcast message, Spoken PE1 strips off the VC label. Search the MAC forwarding table based on the destination MAC address and the source MAC address respectively. The destination M...

example 2

[0049] Example 2: Applied to star PBB networking, such as Figure 6 shown.

[0050] The broadcast message entering from CE1, after passing through the BEB1 device, adds the MinM tunnel header and broadcasts to BEB4 along the uplink port 1. At this time, BEB4 pops off the MinM tunnel header after receiving the MinM message from the uplink port 1 of the public network side, and The source MAC address is learned in the I-SID domain. At this time, the inbound interface of the source MAC address is uplink port 1, and is recorded in the MAC forwarding table.

[0051] When the packet entering BEB4 is searched based on the destination MAC address, it also searches based on the source MAC address. Since the destination MAC address of the broadcast message is the broadcast address, the MAC forwarding table cannot be matched. The default outbound interface ID is used, that is, multiple broadcast outbound interface IDs: uplink port 1, uplink port 2, and uplink port 3. Although the broad...

example 3

[0061] Example 3: Access restrictions applied to different VLAN domains in the same VSI instance, such as Figure 7 shown.

[0062] exist Figure 7 In the shown network, the ACs where CE1, CE2, CE3, and CE4 are located belong to the same VSI instance, but this VSI domain is divided into multiple VLAN domains, and each VLAN domain is distinguished by VLANTag, that is, CE1 and CE3 The AC where CE2 and CE4 reside is bound to VLAN1, and the AC where CE2 and CE4 reside is bound to VLAN2. When each PE device learns the source MAC address, it sends the VLAN Tag of the packet as the interface ID to the MAC forwarding table.

[0063] In this example, it is assumed that VLAN1 is restricted to only have access to this VLAN domain, and VLAN2 is allowed to access all VLAN domains. Then it can be set in advance in the action matrix as shown in Table 3.

[0064] table 3

[0065]

[0066] The packet whose destination MAC address is sent by CE1 is the MAC address of the user on CE4 is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for processing message, wherein the method comprises the steps of finding a Multi-Address Call (MAC) transmission table in the received message based on an source MAC address and a target MAC address, determining an input interface ID and an output interface ID; performing following operations for every determined output interface ID: finding a preset action matrix, determining processing actions corresponding to combinations of the input interface ID and present output interface ID and performing the determined processing action for the message in the output interface corresponding to the present output interface ID, wherein the action matrix comprises processing actions corresponding to combinations of the input interface ID and output interface ID. According to the invention, the invalid broadcasting problem of the message in the Hub-Spoken networking and star-shaped Provider Backbone Bridge (PBB) networking of the Virtual Private LAN Service (VPLS) can be inhibited effectively.

Description

technical field [0001] The invention relates to network communication technology, in particular to a message processing method and device. Background technique [0002] Virtual Private Local Area Network Service (VPLS) is a point-to-multipoint Layer 2 Virtual Private Network (L2VPN) service provided in public networks. VPLS enables geographically isolated user sites to be connected through a metropolitan area network (MAN) or a wide area network (WAN), and the connection effect between each site is the same as in a LAN. Provider Backbone Bridging (PBB) technology is defined by the draft IEEE802.1ah standard and adopts MinM (MAC-in-MAC) encapsulation. PBB forwards traffic based on the MAC address of the operator instead of the user MAC address. [0003] In the above-mentioned VPLS and PBB technologies, a local source filtering mechanism and a horizontal split mechanism based on the ingress interface are provided. [0004] Wherein, the local source filtering mechanism is use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L12/56H04L12/18H04L29/12H04L45/74
Inventor 宋小恒
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products