Method and device for processing message

A message processing and message technology, which is applied in the field of network communication, can solve problems such as invalid broadcast flow and inability to realize source filtering, and achieve the effect of suppressing invalid broadcast problems

Active Publication Date: 2014-10-29
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the tunnel ID is not the same as the uplink port ID. That is to say, source filtering cannot be implemented, so that broadcast packets are broadcast back to BEB1, resulting in invalid broadcast streams.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing message
  • Method and device for processing message
  • Method and device for processing message

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0039] Example 1: Hub-Spoken networking for VPLS, such as Figure 5 Shown.

[0040] On the Spoken PE1 device, the incoming interface ID of the broadcast message from the CE1 device is AC1. After learning the source MAC address, the Spoken PE1 device learns AC 1 to the interface ID corresponding to the source MAC address in the MAC address forwarding table. At the same time, add the VC label to the broadcast message and forward it to the HUB PE device. HUB PE peels off the VC label and forwards the broadcast message to HUB CE, and HUB CE returns it to HUB PE after processing. After HUB PE receives the message, it adds the VC label to broadcast it in the VSI again. At this time, both Spoken PE1 and Spoken PE3 will receive the broadcast message.

[0041] After Spoken PE1 receives the broadcast message, it strips off the VC label. The MAC forwarding table is searched based on the destination MAC address and the source MAC address. The destination MAC address is the broadcast address...

example 2

[0049] Example 2: Applied to star PBB networking, such as Image 6 Shown.

[0050] The broadcast message entered from CE1, after passing the BEB1 device, adds a MinM tunnel header and broadcasts it along the upstream port 1 to BEB4. At this time, after BEB4 receives the MinM message from the public network side upstream port 1, it pops off the MinM tunnel header, and Source MAC address learning is performed in the I-SID domain. At this time, the incoming interface of the source MAC address is upstream port 1, which is recorded in the MAC forwarding table.

[0051] When a message entering BEB4 performs a search based on the destination MAC address, it also performs a search based on the source MAC address. Since the destination MAC address of the broadcast message is the broadcast address, the MAC forwarding table cannot be hit, and the default outbound interface ID is used, that is, multiple broadcast outbound interface IDs: uplink port 1, uplink port 2, and uplink port 3. Althoug...

example 3

[0061] Example 3: Access restrictions applied to different VLAN domains in the same VSI instance, such as Figure 7 Shown.

[0062] in Figure 7 In the network shown, the ACs where CE1, CE2, CE3, and CE4 are located belong to the same VSI instance, but there are multiple VLAN domains in the VSI domain, and each VLAN domain is distinguished by VLANTag, namely CE1 and CE3 The AC where CE2 and CE4 are located is bound to VLAN1, and the AC where CE2 and CE4 are located is bound to VLAN2. When each PE device learns the source MAC address, it sends the VLAN Tag of the message as the interface ID to the MAC forwarding table.

[0063] In this example, it is assumed that VLAN1 can only be accessed to this VLAN domain, and VLAN2 can be accessed to all VLAN domains. Then it can be set in advance in the action matrix as shown in Table 3.

[0064] table 3

[0065]

[0066] The packets sent by CE1 with the destination MAC address of the user's MAC address on the CE4 side are sent to PE2 via PE1 a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for processing message, wherein the method comprises the steps of finding a Multi-Address Call (MAC) transmission table in the received message based on an source MAC address and a target MAC address, determining an input interface ID and an output interface ID; performing following operations for every determined output interface ID: finding a preset action matrix, determining processing actions corresponding to combinations of the input interface ID and present output interface ID and performing the determined processing action for the message in the output interface corresponding to the present output interface ID, wherein the action matrix comprises processing actions corresponding to combinations of the input interface ID and output interface ID. According to the invention, the invalid broadcasting problem of the message in the Hub-Spoken networking and star-shaped Provider Backbone Bridge (PBB) networking of the Virtual Private LAN Service (VPLS) can be inhibited effectively.

Description

Technical field [0001] The present invention relates to network communication technology, in particular to a method and device for message processing. Background technique [0002] Virtual Private Local Area Network Service (VPLS) is a point-to-multipoint Layer 2 virtual private network (L2VPN) service provided in public networks. VPLS enables geographically isolated user sites to be connected via a metropolitan area network (MAN) or a wide area network (WAN), and the connection effect between the sites is the same as in a LAN. The carrier backbone bridging (PBB) technology is defined by the IEEE802.1ah draft standard and adopts MinM (MAC-in-MAC) encapsulation. PBB is based on the operator's MAC address instead of forwarding traffic based on the user's MAC address. [0003] In the above-mentioned VPLS and PBB technologies, both provide a local source filtering mechanism and a split horizon mechanism based on the inbound interface. [0004] Among them, the local source filtering mec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/46H04L12/70H04L12/18H04L29/12H04L45/74
Inventor 宋小恒
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products