Method for implementing network bridge IGMP (internet group management protocol) Snooping based on DSA TAG (digital signature algorithm tag) and user-defined protocol stack

A technology of self-defined protocol and implementation method, which is applied in the direction of network interconnection, data exchange network, data exchange through path configuration, etc. It can solve the problems affecting the VLAN function of the device and the inability to realize the IGMPSnooping function, so as to fill the gap in the market and save Effect of hardware cost

Active Publication Date: 2012-08-22
网经科技(苏州)有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this kind of division of each port into a VLAN will inevitably affect the VLAN function of the device itse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing network bridge IGMP (internet group management protocol) Snooping based on DSA TAG (digital signature algorithm tag) and user-defined protocol stack
  • Method for implementing network bridge IGMP (internet group management protocol) Snooping based on DSA TAG (digital signature algorithm tag) and user-defined protocol stack
  • Method for implementing network bridge IGMP (internet group management protocol) Snooping based on DSA TAG (digital signature algorithm tag) and user-defined protocol stack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention proposes a bridge IGMP (Internet Group Management Protocol) Snooping implementation method based on DSA (Distributed Switching Architecture) TAG and self-defined protocol stack, using the combination of software and hardware to realize the IGMP Snooping function well, saving hardware cost, filling a gap in the market.

[0021] The implementation method of bridge IGMP Snooping based on DSA TAG and custom protocol stack involves bridge IGMP Snooping algorithm module, custom data link layer IGMP protocol stack and switching chip, and the three work together to realize IGMP Snooping function under Linux bridge. The positions of the three in the three-layer network equipment are as follows: figure 1 As shown, it is set that the switch chip of this network device has n physical ports, eth1 is the network device node, and is the abstraction of the main processor MAC (Media Access controller) in the Linux system. On the LAN side, the main processor MAC an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for implementing network bridge IGMP snooping based on DSA TAG and a user-defined protocol stack. The method comprises the following steps: a network bridge IGMP Snooping algorithm module constructs the mapping relationship between a network bridge port and the MAC (media access control) addresses of a multicast group by analyzing the received IGMP messages, and forwards a multicasting data according to the mapping relationship; a user-defined data link layer protocol stack as the communication bridge between the network bridge port and a switch chip constructs the corresponding relationship between the network bridge port and the physical port of the switch chip according to the DSA TAG information in the IGMP message; and the switch chip forwards the message to an appointed physical port according to the internal DSA TAG information of the IGMP message and further to multicast members of the multicast group. Based on cooperation and interaction of software and hardware, the method provided by the invention can perfectly implement IGMP Snooping function.

Description

technical field [0001] The invention relates to a bridge IGMP Snooping implementation method based on DSA TAG and a self-defined protocol stack, belonging to the technical field of network communication. Background technique [0002] Many multimedia network applications, such as video conferencing systems, distance learning systems, multimedia on-demand systems, etc., require information to be sent from one source to multiple destinations, that is, one-to-many transmission. Since the data volume of the multimedia information is very large, using the one-to-one method to simulate the one-to-many method will waste a lot of bandwidth. If the broadcast method is adopted, it will cause information flooding. Therefore, a one-to-many IP multicast protocol is implemented on the IP protocol stack. IP multicast protocols are divided into two categories: communication protocols between Layer 3 network devices (gateways, routers) and protocols between Layer 3 network devices, hosts, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L12/46H04L29/08H04L12/753
Inventor 吴先亮刘继明林恩峰程杰谢炜
Owner 网经科技(苏州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products