Tree traversal method and device

A table entry and traversal technology, applied in the direction of data exchange, digital transmission system, electrical components, etc. through path configuration, can solve problems such as message channel blockage, business abnormality, long processing time, etc., to avoid timeout, improve traversal efficiency, Guaranteed to work properly

Inactive Publication Date: 2010-08-04
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case of few effective MAC entries, NP still needs to traverse all MAC entries for aging or deletion, which is extremely inefficient
In particular, when the VPLS service is restarted, all MAC entries need to be deleted. At this time, due to the long processing time, it will time out, and the upper layer module will repeatedly issue the delete command, so that the original delete has not been processed, and a new delete is received. commands, resulting in a vicious circle, resulting in blockage of message channels and business exceptions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tree traversal method and device
  • Tree traversal method and device
  • Tree traversal method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The method for traversing the tree table entries of the network processor in the embodiment of the present invention is to establish a tree table entry mapping table of the pre-traversal tree table in the network processor in advance, and the mapping table is set in a one-to-one correspondence with the tree table entries of the tree table Flag bit, each flag bit identifies whether its corresponding tree table entry is valid (for example, if the flag bit is 1, its corresponding tree table entry is valid, and if it is 0, its corresponding tree table entry is invalid), that is, to identify its corresponding tree table entry The table entry is a valid tree table entry or an invalid tree table entry; the network processor obtains the valid tree table entry by identifying the valid flag bit of the corresponding tree table entry in the tree table entry mapping table The address of the item.

[0039] In this embodiment, the flag bits of the tree table entry mapping table corres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method of traversing tree table entries, which preset a tree table entries mapping table of a pre-traversing tree table. In traversing the tree table entries, firstly inquire the preset tree table entries mapping table and obtain a valid tree table entries address therefrom; and then process the valid tree table entries in the tree table, according to the acquired validtree table entries. The invention also relates to a device traversing the tree table entries. The invention greatly improves the traversal efficiency of the tree table entries and can effectively avoid traversal processing overtime and guarantee the normal operation of business.

Description

technical field [0001] The present invention relates to virtual private LAN service (Virtual Private LAN service, VPLS for short), and more specifically, relates to a method and device for traversing tree table entries in VPLS. Background technique [0002] Currently, Layer 2 and Layer 3 forwarding devices of VPLS mostly use Network Processor (NP for short) as the underlying forwarding module. When forwarding packets, it often involves traversal processing of table entries, that is, deleting, aging, adding and other processing of user table entries and forwarding table entries. [0003] When these table items are static table items, the effective index is issued by the upper module for traversal, and the operation is convenient. [0004] When these entries are tree table entries, the inventor found in the process of implementing the present invention that the tree table entries cannot be directly indexed, and need to be searched by key value. However, if the key value is d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L12/46H04L45/74
Inventor 於少峰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products