Method and device for strengthening safety of protocol message

A technology of protocol messages and messages, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of protocol message processing delay, limited number of messages, protocol message discarding, etc., and reduce maintenance costs , Improve timeliness and continuity, and improve stability

Inactive Publication Date: 2007-02-14
ZTE CORP
1 Cites 42 Cited by

AI-Extracted Technical Summary

Problems solved by technology

Due to the limitation of CPU processing capacity, the number of packets that can be sent per second is limited. When a large number of packets need to be sent, some packets are discarded due to the limitation of queue length, which may cause protocol packets to be discarded.
In addition, because the number of protocol packets is relatively small compared with the number of ordinary packets, when they are sent to the processor on a queue, they can only be sent sequentially, so that when the CPU processes the packets, it can only process them sequentially , resulting in a delay in the processing of protocol packet...
View more

Method used

[0044] Step 4, the message processing module processes the sent message. Because the packets with...
View more

Abstract

This invention discloses a method and a device for strengthening safety of protocol messages, in which, the device includes a message receiving module, a buffer storage modull, a message despatch module, a message process module, a sorting mapping module and a configuratioin module, first of all, the configuration module sets different priorities for different kinds of messages, and the message needing to be processed mostly has the maximum priority and related receiving queues are set for different priority messages in the buffer stored module, after receiving the message, the mapping module first of all decides the kind of the message, then maps the message to the receiving queue corresponding to the priority of the buffer module then again the message despatch module transmits messages in the receiving queue with higher priorities to the processor according to the despatch algorithm, which can transmit protocol messages to CPU in three-layer network devices.

Application Domain

Data switching networks

Technology Topic

Process moduleDistributed computing

Image

  • Method and device for strengthening safety of protocol message
  • Method and device for strengthening safety of protocol message

Examples

  • Experimental program(1)

Example Embodiment

[0029] The technical scheme of the present invention will be further described below in conjunction with the accompanying drawings:
[0030] The device for enhancing the security of protocol messages in this embodiment is as follows figure 2 As shown, it includes a message receiving module, a configuration module, a message classification and mapping module, a message buffer module, a message scheduling module, and a message processing module. Each module is implemented by corresponding software and hardware on a three-layer network device. among them:
[0031] The message receiving module is used to receive various messages sent to the device, including data messages and protocol messages.
[0032] The configuration module is used to provide a man-machine interface, and set the priority according to the message type, and the message that needs to be processed first has a higher priority.
[0033] The message classification and mapping module is used to determine the type of the message according to the characteristics of the received message, and then map it to the corresponding queue according to the priority set for it.
[0034] The message buffer module is divided into a plurality of receiving queues with different priorities, which are respectively used for buffering messages with corresponding priorities. This embodiment is divided into 8 queues.
[0035] The message scheduling module is used to send the messages in the higher priority queues to the message processing module first according to the set scheduling algorithm. The scheduling algorithm can be set as a strict priority scheduling algorithm or a weighted scheduling algorithm, etc., which can be implemented by using the queue scheduling characteristics of the ASIC chip itself.
[0036] The message processing module is used to process messages.
[0037] Based on the above device, the method for enhancing protocol message security in this embodiment includes the following steps:
[0038] Step 1: Use the man-machine interface provided by the configuration module to set the priority of the message according to the message type, and the message that needs to be processed first has a higher priority;
[0039] Generally, network devices mostly support 8 queues, with queue 0 having the lowest priority and queue 7 having the highest priority. Therefore, in this embodiment, the priority of the message is set to 8, and the priority of the ordinary data message is the lowest, which corresponds to queue 0. In protocol messages, because BPDU messages have high requirements for delay, based on the normal operation of network equipment, the priority of BPDU messages is set to the highest, which corresponds to queue 7. Other protocol messages, such as OSPF, BGP, etc., have a priority only lower than BPDU messages, which corresponds to queue 6. In another embodiment, other settings can be made for the priority of the protocol message, which are not limited to the above settings.
[0040] Step 2: After the message receiving module receives the message, it classifies the message on the receiving port, and then maps it to the corresponding receiver in the buffer module according to the relationship between the set message type and priority. queue;
[0041] According to the setting in step 1, if a BPDU message is received, it will be mapped to the highest priority queue 7. If it is an OSPF and BGP message, it will be mapped to queue 6. If a normal datagram is received Text is mapped to queue 0.
[0042] Step 3: When the message enters different queues, the message scheduling module sends the message to the message processing module according to its priority according to the strict priority algorithm;
[0043]When the strict priority algorithm is used, the packets in the high priority queue are always scheduled first. For example, if there is a BPDU message in queue 7, the scheduling algorithm always selects the BPDU message to be sent to the processor until the message in queue 7 is scheduled, and then other protocol messages in queue 6, and so on. This method ensures that protocol messages are always sent for processing in time, but may prevent messages in other low-priority queues from getting service opportunities, resulting in "starvation".
[0044] Step 4: The message processing module processes the sent message. Since the packets with higher priority are sent first, it can ensure that the protocol packets can be processed in time.
[0045] On the basis of the above-mentioned embodiment, the present invention can also have multiple transformations. For example, in another embodiment, the message scheduling module adopts a weighted scheduling method to set the service weight of the high-priority queue higher. Low priority queues have a lower weight setting to ensure that high priority queues get more service opportunities, but low priority queues are not "starved". For example, the weight of queue 7 is set to 15, the weight of queue 6 is set to 13, and so on, the weight of queue 0 is set to 1, so that queue 7 gets 15 service opportunities, while queue 0 can only get 1. Service opportunities.
[0046] For another example, the correspondence between message type and priority can also be directly written in the software of the message classification and mapping module.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Automatic pet feeder

ActiveUS20160007564A1improve stability
Owner:TONGFU MFG

Stamping equipment applied to motor rotor punching sheet production

Owner:SHENGZHOU LIDA ELECTRIC APPLIANCES FACTORY

Method for recycling manganese ion in electrolytic manganese production tail end wastewater

InactiveCN101838064AImprove stabilityReduce the number of operators
Owner:CHINESE RES ACAD OF ENVIRONMENTAL SCI

Coverage rate test processing method and device and coverage rate test server and system

ActiveCN103095518AImprove stabilityReduce the probability of failure
Owner:ALIBABA GRP HLDG LTD

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products