Production method, device and network equipment of binding table

A technology for generating a device and a binding table, which is applied in the field of network communication and can solve the problems that terminals 11 cannot communicate normally and cannot sense

Active Publication Date: 2010-12-08
RUIJIE NETWORKS CO LTD
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But when figure 2 In the shown network topology, if the port of ND Snooping12 connected to HUB 14 changes, for example, from port G0 / 1 of ND Snooping12 to port G0 / 2, or when connecting to other ND Snooping12, terminal 11 will be due to Unable to perceive this change, it will not send NS packets for DAD detection, so port G0 / 2 of ND Snooping12 or new ND Snooping12 will not generate binding entries for terminal 11, so the packets of terminal 11 will be is filtered out, so that terminal 11 cannot communicate normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Production method, device and network equipment of binding table
  • Production method, device and network equipment of binding table
  • Production method, device and network equipment of binding table

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] image 3 It is a flowchart of a method for generating a binding entry provided in Embodiment 1 of the present invention. The execution subject of this embodiment is a device for generating binding entries, such as image 3 As shown, the method for generating a binding entry in this embodiment includes:

[0024] Step 301, monitor the local MAC address table;

[0025] Wherein, the device for generating a binding entry in this embodiment may be independent of the network device and be connected to the network device, or may be set in the network device as a functional module of the network device. The network device may be, for example, an ND Snooping device or a routing device (such as a Layer 3 switch) with an ND Snooping function.

[0026] In this step 301, the device for generating binding entry entries monitors a local Medium Access Control (MAC) address table to find out whether network migration occurs in the network through changes in the MAC address table. For...

Embodiment 2

[0034] Figure 4 It is a flow chart of a method for generating a binding entry provided by Embodiment 2 of the present invention. This embodiment can be implemented based on Embodiment 1, and its execution subject is also a device for generating binding entries, such as figure 2 As shown, the method for generating a binding entry in this embodiment includes:

[0035] Step 401, monitor the local MAC address table;

[0036] Step 402, judging whether the monitored MAC address table has changed; when the binding entry generating device detects that the MAC address table has changed, execute step 403; otherwise, return to step 401, and continue to perform the monitoring operation.

[0037] Step 403, generate a detection message according to the change entry information in the MAC address table and the pre-stored RA message information, and execute step 404;

[0038] This step 403 is used for when the binding entry generation device detects that its MAC address table has changed...

Embodiment 3

[0053] Figure 5 It is a schematic structural diagram of an apparatus for generating a binding entry provided by Embodiment 3 of the present invention. The binding entry generation device in this embodiment can be connected to the network equipment independently of the network equipment, or can be set in the network equipment as a part of the network equipment, and is mainly used to generate binding entries and perform data processing on the data sent by the terminal. Source address security filtering. Wherein, the network device may be an independent ND Snooping device, or a routing device (for example, a layer-3 switch) capable of ND Snooping. like Figure 5 As shown, the device for generating a binding entry in this embodiment includes: a monitoring module 51 and a generating module 52 .

[0054] Wherein, the monitoring module 51 is connected with the generating module 52, and is used for monitoring the MAC address table of the local binding entry generating device. Spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides production method, device and network equipment of a binding table. The method comprises the following steps of monitoring a local MAC (Media Access control) address table; when monitoring that the MAC address table varies, producing a binding table of a variation port in variation table information according to the variation table information and prestored RA message information in the MAC address table. The invention has the technical scheme that network migration is discovered by monitoring the MAC address table, a corresponding binding table is produced according toa varied MAC address entry, production of the binding table does not depend on an address conflict detection message sent by a terminal, the terminal does not need to perceive the network migration, and the traditional binding table can be produced under a network topology structure that the terminal is not directly connected with the network equipment.

Description

technical field [0001] The present invention relates to network communication technology, in particular to a binding table entry generation method, device and network equipment. Background technique [0002] In the IPv6 stateless automatic address assignment environment, the common network topology is as follows: figure 1 As shown, the network topology includes a terminal 11, an ND Snooping 12 connected to the terminal 11, and a routing device 13 connected to the NDSnooping 12. Among them, the terminal 11 refers to various network access devices that pre-acquire IPV6 addresses, such as personal computers (Personal Computer; PC for short); the routing device 13 is used to allocate IPV6 addresses for the terminal 11; the role of ND Snooping 12 is to generate security entries , performing source address security filtering on the data sent by the terminal 11. [0003] Wherein, the terminal 11 sends a router solicitation message (Router Solicitation Message; RS for short) messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L29/12H04L45/74
Inventor 郑寒曦
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products