Message processing method and device

A message processing and message technology, applied in the field of communication, can solve the problems of high operation cost and maintenance cost, low utilization rate, etc.

Active Publication Date: 2014-04-16
TONGDING INTERCONNECTION INFORMATION CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the problems of low utilization rate, high operating cost and high maintenance cost of the existing technology, the embodiment of the present invention provides a message processing method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message processing method and device
  • Message processing method and device
  • Message processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] The embodiment of the present invention provides a message processing method, the execution subject of the method may be a security device or other listening device, see figure 1 , the method includes:

[0095] Step 101: Obtain a first packet.

[0096] In this embodiment, the first packet includes first packet content, a first source MAC address, and a first destination MAC address.

[0097] In practical applications, the first message may be a message transmitted between a domestic gateway and a foreign gateway, may also be a message transmitted between inter-provincial gateways, or may be a message transmitted between metropolitan gateways.

[0098] Step 102: Generate a second message according to the first message.

[0099] In this embodiment, the second packet includes a second packet content, a second source MAC address, and a second destination MAC address, the second packet content includes the first packet content, and the second source MAC address includes ta...

Embodiment 2

[0106]The embodiment of the present invention provides a message processing method, the execution subject of the method may be a traffic analysis server or a statistics server, see figure 2 , the method includes:

[0107] Step 201: Receive a second packet.

[0108] In this embodiment, the second packet includes a second packet content, a second source MAC address, and a second destination MAC address, the second packet content includes the first packet content, and the second source MAC address includes tag information.

[0109] Among them, the label information may include the link number of the link transmitting the first message, the ACL identifier used to determine the first message, the port number of the port through which the first message passes, and the device number of the device through which the first message passes. one or more of .

[0110] Specifically, the second packet may be sent by the security device in Embodiment 1 or other monitoring devices.

[0111]...

Embodiment 3

[0122] This embodiment uses the second source MAC address to replace the first source MAC address, and uses the second destination MAC address to replace the first destination MAC address to generate a second message as an example, and specifically describes the message processing method provided by the present invention . The embodiment of the present invention provides a message processing method, see Figure 4 , the method includes:

[0123] Step 301: The security device acquires the first packet.

[0124] In this embodiment, the first packet includes first packet content, a first source MAC address, and a first destination MAC address.

[0125] Optionally, this step 301 may include:

[0126] Match the received message with the ACL, which is used to determine the message that needs to be forwarded;

[0127] The packet matching the ACL is used as the first packet.

[0128] Optionally, ACLs can be configured as required.

[0129] Step 302: The security device generates ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a message processing method and device, and belongs to the technical field of communication. The method includes the steps of obtaining a first message, wherein the first message includes first message content, a first source MAC address and a first target MAC address; generating a second message according to the first message, wherein the second message includes second message content, a second source MAC address and a second target MAC address, the second message content includes the first message content, and the second source MAC address includes tag information; sending the second message to a network device corresponding to the second target MAC address. The second message is sent to the network device corresponding to the second target MAC address, the second message includes the second message content, the second source MAC address and the second target MAC address, the second source MAC address includes the tag information, and an original unconcerned source MAC address is used for carrying the tag information, so that the utilization rate of message information is improved, and extra cost of a network is not caused.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a message processing method and device. Background technique [0002] Security devices are usually set up between routers (gateways) on the national backbone network, provincial backbone network or metropolitan area network to analyze the packets transmitted between the two gateways, and according to the analysis results, the transmitted packets Drop, passthrough or return redirection. [0003] When the security device judges that a packet needs to be redirected, the security device first records the source MAC (Medium Access Control, Media Access Control) address and destination MAC address of the packet, and replaces the packet with the MAC address of the traffic analysis server. The destination MAC address of the packet is replaced by the MAC address of the security device to replace the source MAC address of the packet, so as to generate a new packet and send ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/741H04L12/26H04L45/74
Inventor 阳鹏
Owner TONGDING INTERCONNECTION INFORMATION CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products