A flow suppression method and device
A technology for suppressing devices and traffic, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve problems such as users being unable to go online and messages unable to be sent for a long time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment 1
[0062] When the router device performs Layer 3 forwarding, when the ARP entry of the next-hop device cannot be found, the forwarding plane will trigger the device to actively learn the ARP entry of the peer device by traffic. It is a NOARP message.
[0063] Figure 6 It is the network diagram of the user's three-layer access mode provided by the embodiment of the present invention. The user accesses the router device in a three-layer manner. When the user has not exchanged messages with the router device, there is no user's ARP on the router device. entry, so it is necessary to trigger the router device to learn the user's ARP by forwarding traffic. If there is a large flow of messages sent to these users at a certain moment, the method provided by the present invention can be used.
[0064] Figure 7 It is a flow chart of the NO ARP suppression implementation algorithm provided by the embodiment of the present invention, such as Figure 7 As shown, the detailed descriptio...
specific Embodiment 2
[0077] When the router device performs Layer 2 forwarding, when the source MAC address of the packet cannot be found in the MAC forwarding table, the forwarding plane of the device will actively send information such as the source MAC address of the packet to the CPU to learn the source MAC address.
[0078] Figure 8 It is the network diagram of the user layer 2 access mode provided by the embodiment of the present invention, as shown in Figure 8 As shown, the traffic source simulates N users sending packets to the device. Before the traffic enters the device, there is no MAC forwarding table for the traffic source on the device. Therefore, it is necessary to trigger the router device to generate a MAC forwarding table by forwarding traffic. When the traffic source has N MAC addresses and needs to generate a MAC forwarding table on the device, the method provided by the present invention can be used.
[0079] Figure 9 is a flow chart of the MAC learning suppression implem...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


