A transmission method for cut packets

A sending method and pruning technology, which is applied in the field of sending pruned messages, can solve the problems of CPU resource consumption, router performance impact, waste of path network bandwidth, etc., and achieve the effect of simple implementation and elimination of data transmission

Inactive Publication Date: 2009-10-14
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will cause data to be continuously transmitted on the source tree path, consuming the CPU resources of all routers on the path
In other words, although there is no receiver, the data is forwarded downstream, the performance of all routers along the path is affected, and the network bandwidth of the entire path is wasted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A transmission method for cut packets
  • A transmission method for cut packets
  • A transmission method for cut packets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solution and advantages of the present invention clearer, the following examples are given to further describe the present invention in detail.

[0030] The core idea of ​​the present invention is: when the assertion loser fails in the assertion, that is, when entering the loser state from the no-information state, or the assertion fails again, that is, when the assertion message of the new winner is received again in the loser state, the assertion The loser sets the status information as unpruned; when the status information is unpruned, the assertion loser satisfies the trigger condition and sends a pruning message to the assertion winner.

[0031] refer to figure 2 , when there is no downstream router or no downstream router receiving data, the process of the embodiment of the present invention is as follows:

[0032] After the assertion fails, the assertion loser (RTB) sets the prune status flag bit to indicate the unprune s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A transmitting method of pruning message includes the following steps: after the assert fails, the assert loser sets a state information to un-pruning; the assert loser transmits the pruning message to the assert winner after it satisfies the trigger condition. And there is a router. By using the present invention, the assert loser can transmit the pruning message exactly to further ensure that the assert winner can receive the pruning message from the assert loser exactly and the interface corresponding to the assert winner changes to the pruned state. The present invention can eliminate the extra data transmission in the network, so it will not waste the network bandwidth. And even if the pruning response message transmitted by the winner has lost, the loser can also know agilely whether the winner has been pruned and transmit the pruning message exactly. The present invention has a feature of implementing simply.

Description

technical field [0001] The invention relates to the field of multicast technology, in particular to a method for sending a pruned (Prune) message. Background technique [0002] Dense mode Protocol Independent Multicast-Dense Mode (PIM-DM) is a commonly used intra-domain multicast mode. According to this mode, if there are multiple forwarding routers on a multi-access LAN, after the assertion (Assert) occurs, one of the forwarding routers will be selected as the winner (winner) to forward data, and the other forwarding routers will be the losers. (loser) Do not forward data. Since PIM-DM is a flood-and-prune protocol, assertions occur frequently. [0003] see figure 1 , the assertion loser (loser) will send a pruning message including (Source Address of Data (S), Group Address of Data (G)) to the winner. If no receiver or downstream router is willing to receive data, the winner can prune the corresponding interface according to the pruning message, and can clear the downs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L29/06H04L12/54
CPCH04L12/56
Inventor 王柏南沙拉达·普拉萨德郭锋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products