Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device and medium for updating nd snooping binding table

A binding table and binding technology, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve problems such as network communication failures, NDSnooping binding tables cannot be updated, and network device port migration cannot be sensed.

Active Publication Date: 2020-10-27
浪潮思科网络科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when a network device is connected to a hub or a Layer 2 switch to connect to the device, the terminal cannot perceive the port migration of the network device and will not initiate the DAD process. Therefore, the ND Snooping binding table of the network device cannot be updated, resulting in network communication failures.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and medium for updating nd snooping binding table
  • A method, device and medium for updating nd snooping binding table
  • A method, device and medium for updating nd snooping binding table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0025] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0026] An embodiment of the present application provides a method for updating a ND Snooping binding table, which is applied in an IPv6 network. Such as image 3 As shown, the IP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method, device and medium for updating an ND Snooping binding table, which are applied in an IPv6 network. The method includes: in the network device, determining that the first port is offline; determining in the ND Snooping file the corresponding The first binding entry, and modify the port status corresponding to the first port to be offline; determine that the second port is online; determine the IPv6 address of the terminal corresponding to the first port through the first binding entry, and send the NS message; receive NA packets returned by the terminal, and update the ND Snooping binding table. By setting ND Snooping files and sending address resolution NS packets through network devices, and then updating the ND Snooping binding table according to the feedback address resolution NA packets, even if there are cascaded devices, the ND Snooping binding table can also be updated. renew. Of course, if there is no cascaded device, but the network device is directly connected to the terminal, the same method can also be used to update the ND Snooping binding table to avoid the occurrence of network communication failures.

Description

technical field [0001] The present application relates to the field of ND Snooping, in particular to a method, device and medium for updating an ND Snooping binding table. Background technique [0002] When the network device is directly connected to the terminal, and the interface between the network device and the terminal is migrated, the terminal can sense the port migration and re-initiate the duplicate address detection (Duplicate Address Detection, DAD) process. The network device detects the neighbor solicitation ( The Neighbor Solicitation (NS) message and the Neighbor Advertisement (NA) message update the ND Snooping binding table. [0003] Specifically, in an IPv6 network, a network device uses a neighbor discovery (Neighbor Discovery Protocol, ND) protocol to perform functions such as router and prefix discovery, address resolution, duplicate address detection, neighbor unreachability detection, and route redirection. Due to the lack of inherent security of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/12H04L12/721
CPCH04L61/10H04L45/26H04L2101/659H04L2101/622
Inventor 杜芳向荣
Owner 浪潮思科网络科技有限公司