Method and equipment for removing media access control forwarding table entries

A technology of media access control and forwarding table items, which is applied in the field of network communication, can solve problems such as forwarding failure, and achieve the effect of guaranteed forwarding

Active Publication Date: 2013-12-25
HUAWEI TECH CO LTD
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the topology of the network accessed by the terminal (End Station, ES) switches, the RB accessed by the local terminal device will switch. If the alias ( Nickname) MAC forwarding entries corresponding to the relationship cannot be cleared in time, and the remote RB will forward through the old MAC forwarding entries, which will cause forwarding failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for removing media access control forwarding table entries
  • Method and equipment for removing media access control forwarding table entries
  • Method and equipment for removing media access control forwarding table entries

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] figure 1 A schematic flow diagram of an embodiment of a method for clearing MAC forwarding entries in the present invention, including:

[0036] Step 11: The first RB detects that the topology of the network accessed by the local terminal changes.

[0037] Wherein, the first RB may refer to an edge RB of the TRILL network. In the ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and equipment for removing media access control (MAC) forwarding table entries. The method comprises the following steps: a first route bridge (RB) detects that the topology of a network to which a local end station is connected changes; and the first RB sends a first message to a second RB so as to enable corresponding forwarding table entries to be removed after the second RB receives the first message, wherein the second RB refers to an RB which is configured with at least one same VLAN as the first RB. According to the method and the equipment in the embodiment of the invention, MAC forwarding table entries of related equipment of the whole network can be timely removed to avoid forwarding errors when the topology of the network to which the local end station is connected changes.

Description

technical field [0001] The present invention relates to network communication technology, in particular to a method and device for clearing media access control (Media Access Control, MAC) forwarding entries. Background technique [0002] The Transparent Interconnect of Lots of Links (TRILL) protocol is a routing protocol based on link state calculations on a Layer 2 network. The device running the TRILL protocol is called a Route Bridge (RB). A network composed of RBs is called a TRILL network (TRILL Campus). TRILL can implement a large Layer 2 network and overcome the shortcomings of traditional Layer 2 networks such as low bandwidth utilization and slow convergence time. [0003] The traditional Layer 2 local Ethernet (native ethernet) can be connected to the TRILL network. In order to improve the reliability of the access network, it is generally connected through multi-homing. If the topology of the network accessed by the terminal (End Station, ES) switches, the RB a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/741H04L12/46H04L45/02H04L45/74
CPCH04L45/66H04L45/02H04L41/34H04L12/462H04L12/4641H04L41/12
Inventor 郝卫国厉益舟李振斌阴元斌丁成龙
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products