Supercharge Your Innovation With Domain-Expert AI Agents!

Message processing method and device

A packet processing and packet technology, applied in the field of communications, can solve the problems of wasted bandwidth of switches, uneven packet load sharing, and inability to group packets normally, and achieve consistent hash paths, even load sharing, and high utilization. Effect

Pending Publication Date: 2021-10-08
NEW H3C SECURITY TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the current mainstream switch chip does not involve the judgment of whether the packet is fragmented in the hash operation logic. For the fragmented non-first packet, since the position of the four-layer port number is actually the data field, if the five-tuple is selected When used as a hash key, the data field will be mistakenly used as the l4 port to participate in the calculation of the hash value. This will cause multiple fragmented messages of the same message to be forwarded through different links and reach different servers. business operation
[0007] Therefore, the hash key can only be set as the triplet source ip, destination ip, and ipprotocol of the packet, but this will lead to uneven load sharing of the packet and waste the bandwidth of the switch

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message processing method and device
  • Message processing method and device
  • Message processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art based on this application belong to the scope of protection of this application.

[0044] In order to solve the technical problem that in the prior art, the switch configures quintuples to perform hash operations, which causes fragmented messages to be unable to be packaged normally, and configures triplets to perform hash operations, which will lead to uneven load sharing of messages, the embodiment of the present application Provided are a message processing method and device.

[0045] In the field of data communication, network devices usually support hash algorithms...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a message processing method and device, and the method comprises the steps: obtaining the triple information of a to-be-forwarded message, and carrying out the first Hash operation based on the triple information, and obtaining a first Hash operation result; obtaining port number information of the message to be forwarded, wherein the port number information comprises a source port number and a destination port number, and carrying out second Hash operation based on the port number information to obtain a second Hash operation result; determining a message type of the to-be-forwarded message, wherein the message type comprises a fragmented message and a non-fragmented message; if the to-be-forwarded message is a fragmented message, determining a first forwarding link based on the first hash operation result; and if the to-be-forwarded message is a non-fragmented message, performing a third hash operation based on the first hash operation result and the second hash operation result to obtain a third hash operation result, and determining a second forwarding link based on the third hash operation result. On the premise that the utilization rate of the bandwidth of the switch is high, the Hash path consistency of the fragmented message can be guaranteed.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a message processing method and device. Background technique [0002] Hash is usually transliterated into hash, and can also be translated into hash, which is to convert fixed or arbitrary length input into fixed length output through hash algorithm, and the output is hash value. [0003] In the field of data communication, network devices usually support hash algorithms, which can be used to implement load sharing for data packets. [0004] The specific process is: when there are multiple forwarding links, the switch chip obtains the five-tuple of the message as the hash key, that is, the hash key. The five-tuple includes source ip address source ip, destination ip address destination ip, protocol number ipprotocol, The l4 layer source port number l4srcport and the l4 layer destination port number l4 destination port are hashed according to the five-tuple, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/935H04L12/801H04L12/743H04L29/06H04L49/111
CPCH04L49/30H04L63/101H04L47/33H04L45/7453
Inventor 闫波况玲
Owner NEW H3C SECURITY TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More