Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for forwarding message, and method and device for generating table entry

A technology for forwarding messages and entries, which is applied in the field of communication and can solve problems such as large storage space

Active Publication Date: 2012-01-25
XFUSION DIGITAL TECH CO LTD
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect described in this patented technology relates to methods or devices called hash tables (a type of database) which are commonly used when transferring data between networks with varying levels of security requirements such as encryption techniques like Transport Layer Security Network TLS). These systems use various algorithms to determine if any packets have been sent through them based on their source IP address(IP), destination port number, etc., without requiring custom coding for each specific communication session being carried out. By doing these calculations, it becomes possible to generate unique tables containing important pieces of evidence about network communications.

Problems solved by technology

This patented technical solution described in this patents solves issues with current methods where each type of network requires its own unique hardware or programmed logic circuitry for extraction of certain features such as identifiers called traffics during transmission over networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for forwarding message, and method and device for generating table entry
  • Method for forwarding message, and method and device for generating table entry
  • Method for forwarding message, and method and device for generating table entry

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] The embodiment of the present invention provides a method for forwarding a message, which can be used in a scenario where a hash operation is required. For example, when a router forwards an IP packet whose tunnel protocol is the GRE protocol, according to the packet forwarding method provided by the embodiment of the present invention, a hash factor can be obtained from the IP packet, and then hash operation is performed. see figure 1 , figure 1 It is a flowchart of a method for forwarding a message provided by an embodiment of the present invention, and the method includes:

[0036] 101: Receive an IP packet, where the IP packet includes a public network IP header and a tunnel protocol header. The Internet Protocol packet contains a Tunneling Protocol Identification field. The tunnel protocol identification field is used to identify the tunnel protocol of the Internet protocol packet.

[0037] During specific implementation, the Internet Protocol of the Internet P...

Embodiment 2

[0083] An embodiment of the present invention provides a device for forwarding messages, which can be used in scenarios where hash operations are required. For example, when a router forwards an IP packet whose tunneling protocol is the GRE protocol, the device for forwarding a packet according to the embodiment of the present invention can obtain a hash factor from the IP packet, and then perform a hash operation. see figure 2 , figure 2 It is a schematic diagram of a device for forwarding a message provided by an embodiment of the present invention, and the device includes:

[0084] The receiver 201 is configured to receive an IP packet, and the IP packet includes a public network IP header and a tunnel protocol header. The Internet Protocol packet contains a Tunneling Protocol Identification field. The tunnel protocol identification field is used to identify the tunnel protocol of the Internet protocol packet.

[0085] During specific implementation, the Internet Prot...

Embodiment 3

[0132] The embodiment of the present invention provides a method for generating table entries, which can be used in scenarios where hash operations are required. For example, when a router forwards an IP packet whose tunneling protocol is the GRE protocol, according to the method for generating an entry provided by the embodiment of the present invention, a hash factor may be obtained from the IP packet, and then a hash operation may be performed. see image 3 , image 3 It is a flowchart of a method for generating entries provided by an embodiment of the present invention, and the method includes:

[0133] 301: Generate an entry of the hash control table, the entry includes a tunnel protocol judgment field and a hash factor extraction field, and the tunnel protocol judgment field is used to judge whether the tunnel protocol identification field of the Internet Protocol packet matches the tunnel protocol judgment field , the IP packet includes a public network IP header and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method for forwarding a message. The method comprises the following steps of: receiving an Internet protocol packet, wherein the Internet protocol packet comprises an Internet protocol header of a public network, a tunnel protocol header and a tunnel protocol identifier field; searching a first table entry in which a tunnel protocol judgment field is matched with the tunnel protocol identifier field in a Hash control table according to the tunnel protocol identifier field; extracting a Hash factor from the Internet protocol packet according to a Hash factor extraction field of the first table entry; performing Hash operation according to the Hash factor; and determining a physical output interface used for forwarding the Internet protocol packet according to the result of the Hash operation. Moreover, the invention also provides a device for forwarding the message, and a method and a device for generating the table entry. By the method for forwarding the message, the method for generating the table entry, the device for forwarding the message and the device for generating the table entry, the problem that software occupies large storage space because different software which is used for extracting the factor used for Hash operation is needed to be developed aiming at different tunnel protocols can be solved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products