Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multicast message processing method and device and equipment

A technology of multicast message and processing method, which is applied in the branch office to provide special service devices, data exchange details, digital transmission system, etc., and can solve the problem of affecting multicast services, inability to distinguish legal multicast streams from illegal multicast streams, etc. It cannot solve the problem of excessive consumption of the multicast table and achieve the effect of reducing the impact

Inactive Publication Date: 2010-11-10
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the above-mentioned technology introduces the following defects: because the CPU of the switching device must directly process the multicast data stream before it can create a multicast forwarding entry and configure it to the switching chip, the multicast packets that cannot be queried for the forwarding entry are all is handed over to the CPU for processing
However, this solution cannot distinguish legal multicast streams from illegal multicast streams, cannot solve the problem of excessive consumption of multicast tables, and will also affect normal multicast services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast message processing method and device and equipment
  • Multicast message processing method and device and equipment
  • Multicast message processing method and device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] image 3 The flow chart of the multicast message processing method provided by Embodiment 1 of the present invention, this embodiment can be specifically executed by a Layer 2 switching device or a routing device supporting a Layer 2 switching function, wherein a defense device is added, and the defense device can be implemented by a CPU It can also be a control component independent of the CPU. The concrete process of this embodiment is as follows:

[0032] Step 310, when the defense device receives the multicast message reported by the switching chip, extract the defense parameters of the multicast flow corresponding to the multicast message;

[0033] Each multicast flow generally includes multiple multicast packets, and in step 310, the defense parameters of the multicast flow corresponding to the multicast packets are specifically extracted.

[0034] Step 320, the defense device counts the defense parameters of each multicast flow to form a defense statistics valu...

Embodiment 2

[0046] Figure 4 It is a flow chart of the method for processing multicast packets provided by Embodiment 2 of the present invention. On the basis of Embodiment 1, this embodiment further includes the following steps:

[0047] Step 410, when the defense device acquires the aging information of the multicast flow, delete the multicast flow from the defense statistics;

[0048] Step 420: When the defense device determines that the defense statistics value is lower than the set deletion threshold, delete the defense parameter from the defense policy of the switch chip.

[0049] In this embodiment, a dynamic deletion mechanism of defense policies is added. When a multicast flow ages out, that is, almost no packets of this multicast flow will be received, the defense statistics value can be reduced by one. When the defense statistic value decreases below the set deletion threshold, it means that the attack behavior corresponding to the defense parameter has basically ended or is ...

Embodiment 3

[0055] Figure 5 The flow chart of the multicast packet processing method provided by Embodiment 3 of the present invention, this embodiment provides a preferred example of implementing the solution of the present invention by a Layer 2 switching device, the Layer 2 switching device includes a switching chip and a CPU, and in the CPU It includes a multicast flow attack defense module and a snooping module (MLD Snopping). This defense module is equivalent to a defense device, which is used to collect statistics on multicast flow packets and determine whether to trigger the activation of defense strategies. The snooping module can create a multicast forwarding entry according to the multicast packet as a conventional operation. The defense strategy of this embodiment is illustrated by taking the defense parameter statistics of the receiving port and the host that initiates the message as an example. The defense parameters can be set in advance in the defense module as the receiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multicast message processing method, a multicast message processing device and multicast message processing equipment. The method comprises the following steps that: when receiving a multicast message reported by an exchange chip, a defense device extracts defense parameters of a multicast flow corresponding to the multicast message; the defense device counts the defenseparameters of the multicast flow to generate a defense statistic value; and when judging that the defense statistic value is equal to or more than a set defense threshold value, the defense device configures the defense parameters into a defense strategy of the exchange chip, wherein the defense strategy is used for instructing the exchange chip to discard the multicast message which is matched with the defense parameters. In the invention, dynamic statistics and analysis are adopted and the customized defense strategy is carried out to deal with the corresponding defense parameters, so a multicast table entry resource is effectively protected from occupation by an attack multicast flow on the basis of guaranteeing the normal multicast flow forwarding as much as possible, the too much consumption of a CPU processing resource by the attack multicast flow is avoided, and the too much consumption of the hardware source of the exchange core is also avoided due to the fact that the defensestrategy is dynamically configured in the exchange chip.

Description

technical field [0001] The embodiment of the present invention relates to a multicast message forwarding technology, in particular to a multicast message processing method, device and equipment. Background technique [0002] In the Internet (Internet), multimedia services such as video conferencing and Internet TV are becoming an important part of information transmission. In order to avoid wasting bandwidth resources, multicast technology is often used as the basis for such services. way of communication. Using multicast technology, when the sender sends data to a group of receivers, it only needs to send the data message with a group address of a reserved multicast group, and only the receivers who join the multicast group can receive the multicast message datagram. For the sender, the data message can be sent to all receivers only once, which greatly reduces the load on the network and the sender. [0003] The forwarding of data packets in the network needs to be compl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L12/18H04L29/06
Inventor 倪宏
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products