IGMP Snooping realizing method of ONU based on VLAN

An implementation method and core technology, applied in multiplexing system selection devices, digital transmission systems, electrical components, etc., can solve the problems of IGMPSnooping function failure and failure to take into account

Inactive Publication Date: 2013-12-18
SHENZHEN GONGJIN ELECTRONICS CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the IGMP Snooping of many ONUs cannot handle multicast data streams with VLANs, because ordinary IGMP Snooping processes packets without VLANs, and does not take into account Figure 2 is the application scenario of VLAN transparent transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IGMP Snooping realizing method of ONU based on VLAN
  • IGMP Snooping realizing method of ONU based on VLAN
  • IGMP Snooping realizing method of ONU based on VLAN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Embodiment 1, this embodiment provides a kind of similar as figure 2 The implementation method of IGMP Snooping of VLAN in the home network of the shown fiber-to-the-home topology. The method of the present invention will be described in detail below.

[0022] In this embodiment, another hook function igmp_snooping_handler needs to be hung in the hook function br_handle_frame_finish of the hook point NF_BR_PRE_ROUTING in the kernel netfilter. In addition, an igmp_snooping kernel module needs to be implemented. When the igmp_snooping kernel module is initialized, the actual processing function br_handle_igmp_snooping(struct sk_buff *skb) of igmp_snooping is assigned to igmp_snooping_handler.

[0023] like image 3 As shown in the figure, it is a flowchart of the implementation of IGMP Snooping with VLAN, including the following steps:

[0024] Steps M1 to M8 in this embodiment are to judge that the received message is an IGMP control message, and only the IGMP contro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an IGMP Snooping realizing method of an ONU based on a VLAN. The method is mainly about secondary bridge processing of a linux kernel. According to the method, another hook function igmp_snooping_handler is hooked onto a hook function br_handle_frame_finish of a hook point NF_BR_PRE_ROUTING of a bridgenetfilter, and an igmp_snooping.ko kernel module is realized; when the igmp_snooping.ko kernel module is initialized, an igmp_snooping actual manipulation function br_handle_igmp_snooping (structsk_buff*skb) is assigned to an igmp_snooping_handler.

Description

technical field [0001] The invention relates to the field of network communication terminals, in particular to an ONU-based VLAN-based IGMP Snooping implementation method. Background technique [0002] IGMP Snooping is the abbreviation of Internet Group Management Protocol Snooping (Internet Group Management Protocol Snooping), which is a multicast restriction mechanism running on Layer 2 devices and is used to manage and control multicast groups. [0003] The Layer 2 device running IGMP Snooping analyzes the received IGMP packets, establishes a mapping relationship between ports and MAC multicast addresses, and forwards multicast data according to the mapping relationship. When the Layer 2 device does not run IGMP Snooping, the multicast data is broadcast on the Layer 2; when the Layer 2 device runs IGMP Snooping, the multicast data of the known multicast group will not be broadcast on the is multicast to the specified receivers. [0004] Many network devices have impleme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/761H04L29/06H04Q11/00H04L45/16
Inventor 伍国祥郭小东黄铮张炜
Owner SHENZHEN GONGJIN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products