Method and device for processing message
A message processing and message technology, which is applied in the field of network communication, can solve problems such as invalid broadcast flow and inability to realize source filtering, and achieve the effect of suppressing invalid broadcast problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0039] Example 1: Hub-Spoken networking for VPLS, such as Figure 5 Shown.
[0040] On the Spoken PE1 device, the incoming interface ID of the broadcast message from the CE1 device is AC1. After learning the source MAC address, the Spoken PE1 device learns AC 1 to the interface ID corresponding to the source MAC address in the MAC address forwarding table. At the same time, add the VC label to the broadcast message and forward it to the HUB PE device. HUB PE peels off the VC label and forwards the broadcast message to HUB CE, and HUB CE returns it to HUB PE after processing. After HUB PE receives the message, it adds the VC label to broadcast it in the VSI again. At this time, both Spoken PE1 and Spoken PE3 will receive the broadcast message.
[0041] After Spoken PE1 receives the broadcast message, it strips off the VC label. The MAC forwarding table is searched based on the destination MAC address and the source MAC address. The destination MAC address is the broadcast address...
example 2
[0049] Example 2: Applied to star PBB networking, such as Image 6 Shown.
[0050] The broadcast message entered from CE1, after passing the BEB1 device, adds a MinM tunnel header and broadcasts it along the upstream port 1 to BEB4. At this time, after BEB4 receives the MinM message from the public network side upstream port 1, it pops off the MinM tunnel header, and Source MAC address learning is performed in the I-SID domain. At this time, the incoming interface of the source MAC address is upstream port 1, which is recorded in the MAC forwarding table.
[0051] When a message entering BEB4 performs a search based on the destination MAC address, it also performs a search based on the source MAC address. Since the destination MAC address of the broadcast message is the broadcast address, the MAC forwarding table cannot be hit, and the default outbound interface ID is used, that is, multiple broadcast outbound interface IDs: uplink port 1, uplink port 2, and uplink port 3. Althoug...
example 3
[0061] Example 3: Access restrictions applied to different VLAN domains in the same VSI instance, such as Figure 7 Shown.
[0062] in Figure 7 In the network shown, the ACs where CE1, CE2, CE3, and CE4 are located belong to the same VSI instance, but there are multiple VLAN domains in the VSI domain, and each VLAN domain is distinguished by VLANTag, namely CE1 and CE3 The AC where CE2 and CE4 are located is bound to VLAN1, and the AC where CE2 and CE4 are located is bound to VLAN2. When each PE device learns the source MAC address, it sends the VLAN Tag of the message as the interface ID to the MAC forwarding table.
[0063] In this example, it is assumed that VLAN1 can only be accessed to this VLAN domain, and VLAN2 can be accessed to all VLAN domains. Then it can be set in advance in the action matrix as shown in Table 3.
[0064] table 3
[0065]
[0066] The packets sent by CE1 with the destination MAC address of the user's MAC address on the CE4 side are sent to PE2 via PE1 a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com