Unlock instant, AI-driven research and patent intelligence for your innovation.

A flow suppression method and device

A technology for suppressing devices and traffic, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve problems such as users being unable to go online and messages unable to be sent for a long time

Active Publication Date: 2020-06-05
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a traffic suppression method and device, which can better solve the problem that the user cannot go online for a long time due to the long-term failure of the message to be sent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A flow suppression method and device
  • A flow suppression method and device
  • A flow suppression method and device

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0062] When the router device performs Layer 3 forwarding, when the ARP entry of the next-hop device cannot be found, the forwarding plane will trigger the device to actively learn the ARP entry of the peer device by traffic. It is a NOARP message.

[0063] Figure 6 It is the network diagram of the user's three-layer access mode provided by the embodiment of the present invention. The user accesses the router device in a three-layer manner. When the user has not exchanged messages with the router device, there is no user's ARP on the router device. entry, so it is necessary to trigger the router device to learn the user's ARP by forwarding traffic. If there is a large flow of messages sent to these users at a certain moment, the method provided by the present invention can be used.

[0064] Figure 7 It is a flow chart of the NO ARP suppression implementation algorithm provided by the embodiment of the present invention, such as Figure 7 As shown, the detailed descriptio...

specific Embodiment 2

[0077] When the router device performs Layer 2 forwarding, when the source MAC address of the packet cannot be found in the MAC forwarding table, the forwarding plane of the device will actively send information such as the source MAC address of the packet to the CPU to learn the source MAC address.

[0078] Figure 8 It is the network diagram of the user layer 2 access mode provided by the embodiment of the present invention, as shown in Figure 8 As shown, the traffic source simulates N users sending packets to the device. Before the traffic enters the device, there is no MAC forwarding table for the traffic source on the device. Therefore, it is necessary to trigger the router device to generate a MAC forwarding table by forwarding traffic. When the traffic source has N MAC addresses and needs to generate a MAC forwarding table on the device, the method provided by the present invention can be used.

[0079] Figure 9 is a flow chart of the MAC learning suppression implem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of network communication devices. Disclosed are a traffic suppression method and device. The method comprises: when transmitting a packet to a CPU, generating a transmitting suppression table according to key information of the packet; for a current packet required to be transmitted to the CPU, determining, by utilizing the transmitting suppression table, whether the current packet has been transmitted; and if so, then performing packet traffic suppression on the current packet. The present invention ensures data packets of each user to be transmitted, and avoids a single user from transmitting massive data to the CPU, thus protecting a router device.

Description

technical field [0001] The invention relates to the field of network communication equipment, in particular to a traffic suppression method and device. Background technique [0002] With the rapid development of the Internet, more and more enterprises rely on network services to accelerate their own development. However, the Internet is an open network environment, and network security has increasingly become an issue considered and valued by enterprises and operators, and network attacks on core routers have also become more and more common. Common attacks include Distributed Denial of Service (Distributed Denial of Service, DDOS) attack, Address Resolution Protocol (Address Resolution Protocol, ARP) attack, Internet Control Message Protocol (Internet Control Message Protocol, ICMP) attack, etc. These traffic belongs to legal traffic. However, due to the excessive traffic, the processing load of the control plane of the router is too large, and the central processing unit ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/801
Inventor 魏涛叶正鑫钟炜
Owner ZTE CORP