Unlock instant, AI-driven research and patent intelligence for your innovation.

A message sending control method and device

A technology of message sending and control method, applied in the network field, can solve the problems of not being forwarded, reducing forwarding addresses, and not being able to limit the sending range of TC messages, and achieve the effect of enhancing stability

Active Publication Date: 2018-01-09
NEW H3C TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In solution A of the prior art, when topology changes or flapping occurs, the TC protection mechanism can only reduce the number of TC packets processed in the entire network and reduce the number of forwarding addresses, but cannot limit the sending range of TC packets, that is, the TC packet However, in the prior art scheme B, only the transmission of TC messages in the downstream access network to the core network is restricted, and it is only applicable to the case where the downstream network has only one uplink accessing the core network
When there is more than one uplink accessing the core network in the downstream network, such as figure 2 As shown, when D4 performs uplink transmission, there are two uplinks connected to D1 and D2 respectively. When the uplink of D4 is switched, TC packets will be sent. Since the link between D4 and D2 is blocked, according to the protocol D1 needs to send the TC message to D2, but at this time, the TC message is restricted by D1, so it cannot be forwarded to D2. Therefore, this forwarding mechanism will conflict with the existing protocol, which will cause the downlink traffic of D2 to interrupt

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A message sending control method and device
  • A message sending control method and device
  • A message sending control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The technical solutions in this application will be clearly and completely described below in conjunction with the drawings in this application. Apparently, the described embodiments are part of the embodiments of this application, not all of them. Based on the embodiments in this application, other embodiments obtained by those skilled in the art all belong to the protection scope of this application.

[0049] Such as image 3 As shown, the access network subtree 1 and the access network subtree 2 hang under the edge access devices D1 and D2 of the core network. In this application, by adding the ID of the corresponding access network subtree to the downlink port of the access device at the edge of the core network, the TC packet transmission isolation between the access network subtrees is realized, and the topology in the access network subtree The impact of the change is limited to the current access network subtree, thereby increasing the stability of traffic forw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a message sending control method, which includes the following steps: the edge access device of the core network receives the message sent by the access network subtree, and determines the downlink port for receiving the message, and the access device stored in it. The ID of the access network subtree of the downlink port; the access device at the edge of the core network judges the ID of the access network subtree stored in the downlink port of the adjacent device that accesses the corresponding downlink port of the adjacent device The same ID as the downlink port on which the edge access device of the core network receives the message, the edge access device of the core network sends the message with the ID added to the adjacent device, so that the adjacent device according to the ID to send the message to the downlink port of the adjacent device with the same ID, this application can avoid sending the message of the access network subtree to the core network, and at the same time avoid sending the message to other access in the network subtree.

Description

technical field [0001] The present application relates to the field of network technologies, and in particular to a message sending control method and device. Background technique [0002] In a Layer 2 network with redundant backup links, it is necessary to rely on topology control protocols to block redundant links to eliminate data forwarding loops in the network, and when the current forwarding link fails, the blocked backup link Switch to the active link to take over the forwarding of data traffic. The most typical link layer topology protocol is the STP (Spanning Tree Protocol, Spanning Tree Protocol) protocol family, including the STP (Spanning Tree Protocol, Spanning Tree Protocol) to RSTP (Rapid Spanning Tree Protocol, Rapid Spanning Tree Protocol) defined in the 802.1W standard, to MSTP (Multiple Spanning Tree Protocol, Multiple Spanning Tree Protocol) defined in the later 802.1S standard. [0003] The STP protocol calculates a tree-like network topology without d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/801H04L12/827H04L12/751H04L45/02H04L47/265
CPCH04L45/02H04L47/10H04L47/12
Inventor 王明军
Owner NEW H3C TECH CO LTD