CN104270297A - Message transmitting method and device - Google Patents

Message transmitting method and device Download PDF

Info

Publication number
CN104270297A
CN104270297A CN201410502465.7A CN201410502465A CN104270297A CN 104270297 A CN104270297 A CN 104270297A CN 201410502465 A CN201410502465 A CN 201410502465A CN 104270297 A CN104270297 A CN 104270297A
Authority
CN
China
Prior art keywords
protocol
access control
media access
target mac
field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410502465.7A
Other languages
Chinese (zh)
Other versions
CN104270297B (en
Inventor
徐鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201410502465.7A priority Critical patent/CN104270297B/en
Publication of CN104270297A publication Critical patent/CN104270297A/en
Application granted granted Critical
Publication of CN104270297B publication Critical patent/CN104270297B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a message transmitting method and device. According to the message transmitting method and device, when a protocol message enters a BPDU Tunnel, fuzzy processing is firstly carried out on protocol characteristic fields and target MAC address fields of the protocol message, then the protocol message is transmitted through the BPDU Tunnel, and therefore possible blocking of a PE to the message due to the protocol type of the message can be effectively avoided.

Description

Message forwarding method and equipment
Technical field
The application relates to the network communications technology, particularly message forwarding method and equipment.
Background technology
In actual networking, the special line that user often utilizes operator to provide is to build the double layer network of oneself, and this makes the user network of same user usually all be distributed in the both sides of runner public-network.As shown in Figure 1, user A has two the equipment CE 1 and CE 2 that belong to identical VLAN, and this user network is divided into user network 1 and user network 2, and the two is connected by carrier network.When two-layer protocol message in the operator network cannot transparent transmission time, calculating such as the spanning tree of STP agreement that user network independently cannot carry out two-layer protocol calculates, thus calculates with the two-layer protocol of carrier network and influence each other.
The two-layer protocol message of user network can be made to carry out transparent transmission by the dedicated tunnel in carrier network by configuring BPDU (BPDU:Bridge Protocol Data Unit) tunnel (Tunnel) in the carrier network devices (PE) at two ends.Suppose between PE1, PE2, to establish BPDU Tunnel, shown the forwarding of this two-layer protocol message for the two-layer protocol message of user A by user network 1 thick line mail in user network 2, Fig. 2.As shown in Figure 2, PE1 receives by user-side port 1 two-layer protocol message that user network 1 sends, (this multicast mac address is the MAC Address specified by BPDU Tunnel forwarding specially the target MAC (Media Access Control) address of this two-layer protocol message such as 0x0180-C200-0000 to be revised as preassigned multicast mac address, be assumed to be default 0x010F-E200-0003), amended message is called BPDU message (i.e. BPDU Tunnel message), afterwards, BPDU message is used as data message and is forwarded in the operator network by PE1.After the other end PE2 of carrier network receives BPDU message, the target MAC (Media Access Control) address 0x010F-E200-0003 of this BPDU message is identified, this target MAC (Media Access Control) address is reduced to initial 0x0180-C200-0000, then by reduction after message repeating in user network 2.
Can find out, the two-layer protocol message of user network can be made to carry out transparent transmission by carrier network by BPDU Tunnel, but, can be there is following possibility in this: PE may tackle this message transmitted by BPDU Tunnel when using protocol type to tackle message because of the protocol type of message, and this causes message cannot proceed transmission.Such as, the PE2 in Fig. 2 tackles the BPDU message that PE1 is transmitted by BPDU Tunnel.
Summary of the invention
This application provides message repeating mode and equipment, tackled by PE to prevent message.。
The technical scheme that the application provides comprises:
A kind of message forwarding method, the method is applied to carrier network devices PE, comprising:
Receive the protocol massages needing to enter BPDU BPDU tunnel Tunnel and forward, Fuzzy Processing is carried out to the protocol characteristic field of described protocol massages and target MAC (Media Access Control) address field, the protocol massages after Fuzzy Processing is forwarded by BPDU Tunnel; Wherein, perform according to following principle when Fuzzy Processing being carried out to protocol characteristic field: the protocol characteristic field after Fuzzy Processing is not conflicted with existing any protocol characteristic field;
Protocol massages is received by BPDU Tunnel, the method corresponding with described Fuzzy Processing is adopted to carry out Recovery processing to the protocol characteristic field of this protocol massages and target MAC (Media Access Control) address field, to recover initial protocol massages, and the protocol massages recovered is sent to user network side.
A kind of message forwarding equipment, this equipment is applied to carrier network devices PE, comprising:
First receiving element, for receiving the protocol massages needing to enter BPDU BPDU tunnel Tunnel forwarding;
Processing unit, carries out Fuzzy Processing for the protocol characteristic field of protocol massages that receives described first receiving element and target MAC (Media Access Control) address field; Wherein, perform according to following principle when Fuzzy Processing being carried out to protocol characteristic field: the protocol characteristic field after Fuzzy Processing is not conflicted with existing any protocol characteristic field;
Retransmission unit, for forwarding the protocol massages after described processing unit Fuzzy Processing by BPDU Tunnel;
Second receiving element, for receiving protocol massages by BPDU Tunnel;
Recovery unit, for adopting the method corresponding with described Fuzzy Processing to carry out Recovery processing to the protocol characteristic field of this protocol massages and target MAC (Media Access Control) address field, to recover initial protocol massages;
The protocol massages of described retransmission unit also for being recovered by described recovery unit sends to user network side.
As can be seen from the above technical solutions, in the present invention, when protocol massages enters BPDU Tunnel, by carrying out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field, the interception that effectively can solve PE and may carry out message because of the protocol type of message.
Accompanying drawing explanation
Fig. 1 is existing network networking schematic diagram;
Fig. 2 is existing message repeating schematic diagram;
The method flow diagram that Fig. 3 provides for the embodiment of the present invention;
The device structure schematic diagram that Fig. 4 provides for the embodiment of the present invention;
The hardware device structural representation that Fig. 5 provides for the embodiment of the present invention.
Embodiment
In order to make the object, technical solutions and advantages of the present invention clearly, describe the present invention below in conjunction with the drawings and specific embodiments.
Method provided by the invention can effectively penetrate carrier network and not be blocked, and is described method provided by the invention below by Fig. 3:
See the method flow diagram that Fig. 3, Fig. 3 provide for the embodiment of the present invention.As shown in Figure 3, the method can comprise:
Step 301, PE1 receives the protocol massages needing to enter BPDU Tunnel forwarding.
Here, PE1 is just for making the application know marked numbering, and non-limiting the application.
For networking shown in Fig. 2, as shown in Figure 2, PE1 receives the protocol massages of user network 1 transmission by user-side port.Because this protocol massages needs to be pass-through to user network 2 by carrier network, it is designated as the protocol massages needing to enter BPDU Tunnel forwarding.
Step 302, PE1 carries out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field, is forwarded by the protocol massages after Fuzzy Processing by BPDU Tunnel.
Here, perform according to following principle during Fuzzy Processing to protocol characteristic field: the principle that the protocol characteristic field after Fuzzy Processing is not conflicted with existing any protocol characteristic field.
How Fuzzy Processing is carried out to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field for example describes in three ways below:
Mode 1:
Partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange.Because whole protocol characteristic field and whole target MAC (Media Access Control) address field are also non-isometric, so when exchanging, not requiring that the location of content exchanged must be corresponding, only requiring the content size of exchange equally.Such as, the content of some bytes in the content of a byte in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange.With the protocol characteristic field of protocol massages for 88CC, target MAC (Media Access Control) address field is 0180-C200-000E is example, the content (content of overstriking) of second byte in the content (content of overstriking) of first character joint in protocol characteristic field and target MAC (Media Access Control) address field is supposed to carry out isometric exchange, after then exchanging, the target MAC (Media Access Control) address field of protocol massages is 0188-C200-000E, and the protocol characteristic field after exchange is 80CC.
Generally, the protocol characteristic field of protocol massages is not oversize, even if the content of equal length in whole protocol characteristic field and target MAC (Media Access Control) address field is carried out exchange also uncomplicated, therefore, a kind of alternative also can be: the partial content in whole protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange.Such as, the protocol characteristic field of protocol massages is ethernet type field, and its size is generally two bytes, then the content being just 2 bytes by size in whole protocol characteristic field and target MAC (Media Access Control) address field is exchanged.With the protocol characteristic field of protocol massages for 88CC, target MAC (Media Access Control) address field is 0180-C200-000E is example, the content (content of overstriking) of second byte, the 3rd byte in whole protocol characteristic field (content of overstriking) and target MAC (Media Access Control) address field is supposed to carry out isometric exchange, after then exchanging, the target MAC (Media Access Control) address field of protocol massages is 0188-CC00-000E, and the protocol characteristic field after exchange is 80C2.
As a kind of optimal way, when the above-mentioned content being 2 bytes by size in whole protocol characteristic field and target MAC (Media Access Control) address field is exchanged, in target MAC (Media Access Control) address field, size is the content that the content of 2 bytes is preferably in target MAC (Media Access Control) address field in second byte, the 3rd byte.Protocol characteristic field after this can ensure final exchange is not as much as possible conflicted with existing protocol feature field.
It should be noted that, partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange 1 time by the manner, or the partial content in whole protocol characteristic field and target MAC (Media Access Control) address field being carried out isometric exchange is perform under the not identical prerequisite of content to be exchanged.
And when finding when the content of exchanging is identical, then need to perform following manner 2:
Mode 2:
The manner 2 is carried out under the identical prerequisite of content to be exchanged in aforesaid way 1.When when the content of exchanging is identical, the first set algorithm process is carried out respectively to content to be exchanged in protocol characteristic field and target MAC (Media Access Control) address field.Described first set algorithm is exchange the invalid algorithm set for preventing.Such as, be negate or other algorithms of arranging.
Such as, the target MAC (Media Access Control) address field of protocol massages is 0180-C200-000E, protocol characteristic field is 80C2, if by second byte in whole protocol characteristic field and target MAC (Media Access Control) address field, content in 3rd byte is exchanged, then can find second byte in target MAC (Media Access Control) address field, content in 3rd byte is 80C2, just in time identical with protocol characteristic field 80C2, now, if merely exchanged, then not in all senses, based on this, just no longer exchange, only to needing the content of exchanging to carry out the first set algorithm process respectively, if the first set algorithm is negate, then just to the content 80C2 negate in whole protocol characteristic field, obtain 7F3D, and to second byte in target MAC (Media Access Control) address field, content negate in 3rd byte, obtain 017F-3D00-000E, this also in a disguised form changes protocol characteristic field and target MAC (Media Access Control) address field.
So far, the description of mode 2 is completed.
Mode 3:
The manner 3 relative mode 1, mode 2 are fairly simple, are specially:
Second set algorithm process is carried out to the protocol characteristic field of protocol massages;
Change the target MAC (Media Access Control) address field of described protocol massages into the preassigned multicast mac address for transmitting at BPDU Tunnel.
Here, the second set algorithm process and the first above-mentioned set algorithm process have nothing to do, and it can be negate, and add 1, subtract the operation such as 1, the present invention does not specifically limit.And, the manner 2 times, carry out the second set algorithm process to the protocol characteristic field of protocol massages to can be and carry out the second set algorithm process to the partial content in the protocol characteristic field of protocol massages, or for carry out the second set algorithm process to the whole protocol characteristic field of protocol massages, the present invention does not specifically limit.
Further, the manner 2 times, changes the target MAC (Media Access Control) address field of described protocol massages into the preassigned multicast mac address for transmitting at BPDU Tunnel, similar with existing mode, repeats no more here.
So far, the description of mode 3 is completed.
It should be noted that, aforesaid way 1 to mode 3 just carries out clearly the lifted embodiment of Fuzzy Processing for the protocol characteristic field to protocol massages that makes the application describe and target MAC (Media Access Control) address field, itself and non-limiting the present invention.
Step 303, PE2 receives the protocol massages of PE1 transmission by BPDU Tunnel.
As PE1, PE2 is just for making the application know marked numbering here, and non-limiting the application.
As described in above-mentioned steps 302, PE1 can carry out Fuzzy Processing to the protocol characteristic field of this message and target MAC (Media Access Control) address field before sending protocol massages by BPDU Tunnel.So, when performing this step 303, in the protocol massages that PE2 is received by BPDU Tunnel, its protocol characteristic field and target MAC (Media Access Control) address field all have passed through Fuzzy Processing.
Still for networking shown in Fig. 2, if PE1 being described in by Fuzzy Processing can be carried out to the protocol characteristic field of this protocol massages and target MAC (Media Access Control) address field before BPDU Tunnel transmission protocol massages based on step 302.So, when PE2 receives protocol massages by BPDU Tunnel, in the protocol massages of this reception, its protocol characteristic field and target MAC (Media Access Control) address field all have passed through Fuzzy Processing by PE1.
Step 304, PE2 adopts the method corresponding with described Fuzzy Processing to carry out Recovery processing to the protocol characteristic field of this protocol massages and target MAC (Media Access Control) address field, to recover initial protocol massages, and is sent to user network side by the protocol massages recovered.
Here, the Fuzzy Processing in this step 304 complete corresponding step 302 of Recovery processing of carrying out.In order to ensure the Fuzzy Processing in the complete corresponding step 302 of Recovery processing that this step 304 is carried out, the application can carry out corresponding configuration at PE1, PE2 in advance respectively.
Such as, in step 302, PE1 is by second byte in whole protocol characteristic field 88CC and target MAC (Media Access Control) address field 0180-C200-000E, the content of the 3rd byte carries out isometric exchange, the target MAC (Media Access Control) address field of the protocol massages that then in step 303, PE2 receives is just 0188-CC00-000E, protocol characteristic field is 80C2, based on this, in this step 304, PE2 just adopts the mode corresponding with the Fuzzy Processing that PE1 adopts by the whole protocol characteristic field 80C2 of protocol massages that receives and second byte of target MAC (Media Access Control) address field 0188-CC00-000E, the content of the 3rd byte carries out isometric exchange, whole protocol characteristic field after exchange is 88CC, target MAC (Media Access Control) address field after exchange is 0180-C200-000E, it is exactly just in time the initiation protocol message sended over from user network 1 that PE1 receives.
For another example, in step 302, the whole protocol characteristic field 80C2 negate of protocol massages is obtained 7F3D by PE1, and to second byte in target MAC (Media Access Control) address field 0180-C200-000E, content in 3rd byte and 80C2 negate, obtain new target MAC (Media Access Control) address field 017F-3D00-000E, so, the target MAC (Media Access Control) address field of the protocol massages that in step 303, PE2 receives is just 017F-3D00-000E, protocol characteristic field is 7F3D, based on this, in this step 304, PE2 just adopts the mode corresponding with the Fuzzy Processing that PE1 adopts that the whole protocol characteristic field 7F3D negate of the protocol massages received is obtained 80C2, by second byte of the target MAC (Media Access Control) address field 017F-3D00-000E of protocol massages received, the content of the 3rd byte carries out negate, obtain target MAC (Media Access Control) address field 0180-C200-000E, it is exactly just in time the initiation protocol message sended over from user network 1 that PE1 receives.
So far, complete method provided by the invention to describe.
Can be found out by method provided by the invention, in the present invention, when protocol massages enters BPDU Tunnel, by carrying out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field, PE effectively can be solved because use the interception that protocol type carries out message.
Below equipment provided by the invention is described:
Be equipment structure chart provided by the invention see Fig. 4, Fig. 4.This equipment is applied to carrier network devices PE, and as shown in Figure 4, this equipment can comprise:
First receiving element, for receiving the protocol massages needing to enter BPDU BPDU tunnel Tunnel forwarding;
Processing unit, carries out Fuzzy Processing for the protocol characteristic field of protocol massages that receives described first receiving element and target MAC (Media Access Control) address field; Wherein, perform according to following principle when Fuzzy Processing being carried out to protocol characteristic field: the protocol characteristic field after Fuzzy Processing is not conflicted with existing any protocol characteristic field;
Retransmission unit, for forwarding the protocol massages after described processing unit Fuzzy Processing by BPDU Tunnel;
Second receiving element, for receiving protocol massages by BPDU Tunnel;
Recovery unit, for adopting the method corresponding with described Fuzzy Processing to carry out Recovery processing to the protocol characteristic field of this protocol massages and target MAC (Media Access Control) address field, to recover initial protocol massages;
The protocol massages of described retransmission unit also for being recovered by described recovery unit sends to user network side.
In the application, preferably, described processing unit carries out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field and comprises:
Partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange; Or,
Partial content in whole protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange.
In the application, preferably, the size of described protocol characteristic field is 2 bytes, describedly partial content in whole protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange comprises:
The content being 2 bytes by size in whole protocol characteristic field and target MAC (Media Access Control) address field is exchanged.
Preferably, in described target MAC (Media Access Control) address field, size is that the content of 2 bytes comprises:
Content in described target MAC (Media Access Control) address field in second byte, the 3rd byte.
In the application, preferably, partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange by described processing unit, or the partial content in whole protocol characteristic field and target MAC (Media Access Control) address field being carried out isometric exchange is perform under the not identical prerequisite of content to be exchanged;
When the content of exchanging is identical, described processing unit carries out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field and comprises:
Carry out the first set algorithm process respectively to content to be exchanged in protocol characteristic field and target MAC (Media Access Control) address field, described first set algorithm is exchange the invalid algorithm set for preventing.
In the application, preferably, described processing unit carries out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field and comprises:
Second set algorithm process is carried out to the protocol characteristic field of protocol massages;
Change the target MAC (Media Access Control) address field of described protocol massages into the preassigned multicast mac address for transmitting at BPDU Tunnel.
So far, complete the device structure shown in Fig. 4 to describe.
Present invention also provides the device hardware structure of device structure shown in corresponding diagram 4, as shown in Figure 5, this equipment can comprise:
Memory, for depositing the first receiving element, processing unit, retransmission unit, the second receiving element, recovery unit;
CPU, for depositing the program that in memory, unit runs.
Preferably, described CPU deposits and receives for the first receiving element the program needing to enter the protocol massages that BPDU BPDU tunnel Tunnel forwards, and
Deposit the program of for the treatment of unit, the protocol characteristic field of the protocol massages that described first receiving element receives and target MAC (Media Access Control) address field being carried out to Fuzzy Processing; Wherein, perform according to following principle when Fuzzy Processing being carried out to protocol characteristic field: the protocol characteristic field after Fuzzy Processing is not conflicted with existing any protocol characteristic field; And,
Deposit the program forwarded by BPDUTunnel by the protocol massages after described processing unit Fuzzy Processing for retransmission unit; And,
Deposit the program being received protocol massages for the second receiving element by BPDU Tunnel; And,
Deposit and adopt the method corresponding with described Fuzzy Processing to carry out Recovery processing to the protocol characteristic field of this protocol massages and target MAC (Media Access Control) address field for recovery unit, to recover the program of initial protocol massages; And,
Deposit the program that the protocol massages that recovered by described recovery unit for described retransmission unit sends to user network side.
Preferably, described processing unit comprises the program that the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field carry out Fuzzy Processing:
Partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange; Or,
Partial content in whole protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange.
Preferably, partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange by described processing unit, or the partial content in whole protocol characteristic field and target MAC (Media Access Control) address field being carried out isometric exchange is perform under the not identical prerequisite of content to be exchanged;
When the content of exchanging is identical, described processing unit comprises the program that the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field carry out Fuzzy Processing:
Carry out the first set algorithm process respectively to content to be exchanged in protocol characteristic field and target MAC (Media Access Control) address field, described first set algorithm is exchange the invalid algorithm set for preventing.
Preferably, described processing unit comprises the program that the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field carry out Fuzzy Processing:
Second set algorithm process is carried out to the protocol characteristic field of protocol massages;
Change the target MAC (Media Access Control) address field of described protocol massages into the preassigned multicast mac address for transmitting at BPDU Tunnel.
So far, complete the hardware configuration shown in Fig. 5 to describe.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within the scope of protection of the invention.

Claims (10)

1. a message forwarding method, is characterized in that, the method is applied to carrier network devices PE, comprising:
Receive the protocol massages needing to enter BPDU BPDU tunnel Tunnel and forward, Fuzzy Processing is carried out to the protocol characteristic field of described protocol massages and target MAC (Media Access Control) address field, the protocol massages after Fuzzy Processing is forwarded by BPDU Tunnel; Wherein, perform according to following principle when Fuzzy Processing being carried out to protocol characteristic field: the protocol characteristic field after Fuzzy Processing is not conflicted with existing any protocol characteristic field;
Protocol massages is received by BPDU Tunnel, the method corresponding with described Fuzzy Processing is adopted to carry out Recovery processing to the protocol characteristic field of this protocol massages and target MAC (Media Access Control) address field, to recover initial protocol massages, and the protocol massages recovered is sent to user network side.
2. method according to claim 1, is characterized in that, the described protocol characteristic field to protocol massages and target MAC (Media Access Control) address field are carried out Fuzzy Processing and comprised:
Partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange; Or,
Partial content in whole protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange.
3. method according to claim 2, is characterized in that, the size of described protocol characteristic field is 2 bytes, describedly partial content in whole protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange comprises:
The content being 2 bytes by size in whole protocol characteristic field and target MAC (Media Access Control) address field is exchanged.
4. method according to claim 3, is characterized in that, in described target MAC (Media Access Control) address field, size is that the content of 2 bytes comprises:
Content in described target MAC (Media Access Control) address field in second byte, the 3rd byte.
5. method according to claim 2, it is characterized in that, partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange, or the partial content in whole protocol characteristic field and target MAC (Media Access Control) address field being carried out isometric exchange is perform under the not identical prerequisite of content to be exchanged;
When the content of exchanging is identical, the described protocol characteristic field to protocol massages and target MAC (Media Access Control) address field are carried out Fuzzy Processing and are comprised:
Carry out the first set algorithm process respectively to content to be exchanged in protocol characteristic field and target MAC (Media Access Control) address field, described first set algorithm is exchange the invalid algorithm set for preventing.
6. method according to claim 2, is characterized in that, the described protocol characteristic field to protocol massages and target MAC (Media Access Control) address field are carried out Fuzzy Processing and comprised:
Second set algorithm process is carried out to the protocol characteristic field of protocol massages;
Change the target MAC (Media Access Control) address field of described protocol massages into the preassigned multicast mac address for transmitting at BPDU Tunnel.
7. a message forwarding equipment, is characterized in that, this equipment is applied to carrier network devices PE, comprising:
First receiving element, for receiving the protocol massages needing to enter BPDU BPDU tunnel Tunnel forwarding;
Processing unit, carries out Fuzzy Processing for the protocol characteristic field of protocol massages that receives described first receiving element and target MAC (Media Access Control) address field; Wherein, perform according to following principle when Fuzzy Processing being carried out to protocol characteristic field: the protocol characteristic field after Fuzzy Processing is not conflicted with existing any protocol characteristic field;
Retransmission unit, for forwarding the protocol massages after described processing unit Fuzzy Processing by BPDU Tunnel;
Second receiving element, for receiving protocol massages by BPDU Tunnel;
Recovery unit, for adopting the method corresponding with described Fuzzy Processing to carry out Recovery processing to the protocol characteristic field of this protocol massages and target MAC (Media Access Control) address field, to recover initial protocol massages;
The protocol massages of described retransmission unit also for being recovered by described recovery unit sends to user network side.
8. equipment according to claim 7, is characterized in that, described processing unit carries out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field and comprises:
Partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange; Or,
Partial content in whole protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange.
9. equipment according to claim 8, it is characterized in that, partial content in partial content in protocol characteristic field and target MAC (Media Access Control) address field is carried out isometric exchange by described processing unit, or the partial content in whole protocol characteristic field and target MAC (Media Access Control) address field being carried out isometric exchange is perform under the not identical prerequisite of content to be exchanged;
When the content of exchanging is identical, described processing unit carries out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field and comprises:
Carry out the first set algorithm process respectively to content to be exchanged in protocol characteristic field and target MAC (Media Access Control) address field, described first set algorithm is exchange the invalid algorithm set for preventing.
10. equipment according to claim 7, is characterized in that, described processing unit carries out Fuzzy Processing to the protocol characteristic field of protocol massages and target MAC (Media Access Control) address field and comprises:
Second set algorithm process is carried out to the protocol characteristic field of protocol massages;
Change the target MAC (Media Access Control) address field of described protocol massages into the preassigned multicast mac address for transmitting at BPDU Tunnel.
CN201410502465.7A 2014-09-26 2014-09-26 Message forwarding method and equipment Active CN104270297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410502465.7A CN104270297B (en) 2014-09-26 2014-09-26 Message forwarding method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410502465.7A CN104270297B (en) 2014-09-26 2014-09-26 Message forwarding method and equipment

Publications (2)

Publication Number Publication Date
CN104270297A true CN104270297A (en) 2015-01-07
CN104270297B CN104270297B (en) 2017-08-11

Family

ID=52161790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410502465.7A Active CN104270297B (en) 2014-09-26 2014-09-26 Message forwarding method and equipment

Country Status (1)

Country Link
CN (1) CN104270297B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108184231A (en) * 2017-12-07 2018-06-19 福州汇思博信息技术有限公司 A kind of method and system for identifying POS terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1473875A1 (en) * 2003-04-28 2004-11-03 Alcatel IP Networks, Inc. Injecting addresses to enable OAM functions
CN1863148A (en) * 2005-09-05 2006-11-15 华为技术有限公司 Method for implementing interaction BPDU message between VLAN apparatus through two layer tunnel network
US20080168529A1 (en) * 2007-01-04 2008-07-10 Kay Schwendimann Anderson System and method for security planning with soft security constraints
CN101222437A (en) * 2008-01-25 2008-07-16 杭州华三通信技术有限公司 Method and system for transparent transmission of BPDU packet in two-layer switching network
CN101552727A (en) * 2009-05-12 2009-10-07 杭州华三通信技术有限公司 Method of transmitting and receiving message and a provider edge router
CN103716245A (en) * 2012-09-29 2014-04-09 上海贝尔股份有限公司 Edge router based on virtual special-purpose local area network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1473875A1 (en) * 2003-04-28 2004-11-03 Alcatel IP Networks, Inc. Injecting addresses to enable OAM functions
CN1863148A (en) * 2005-09-05 2006-11-15 华为技术有限公司 Method for implementing interaction BPDU message between VLAN apparatus through two layer tunnel network
US20080168529A1 (en) * 2007-01-04 2008-07-10 Kay Schwendimann Anderson System and method for security planning with soft security constraints
CN101222437A (en) * 2008-01-25 2008-07-16 杭州华三通信技术有限公司 Method and system for transparent transmission of BPDU packet in two-layer switching network
CN101552727A (en) * 2009-05-12 2009-10-07 杭州华三通信技术有限公司 Method of transmitting and receiving message and a provider edge router
CN103716245A (en) * 2012-09-29 2014-04-09 上海贝尔股份有限公司 Edge router based on virtual special-purpose local area network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SHANKAR RAMAN: "《Label-based Provider-Provisioned Lawful Intercept for L2 VPNs draft-balaji-l2VPN-lawful-intercept-thru-label-dis-01》", 《IETF L2VPN WORKING GROUP》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108184231A (en) * 2017-12-07 2018-06-19 福州汇思博信息技术有限公司 A kind of method and system for identifying POS terminal

Also Published As

Publication number Publication date
CN104270297B (en) 2017-08-11

Similar Documents

Publication Publication Date Title
US9148290B2 (en) Flow-based load-balancing of layer 2 multicast over multi-protocol label switching label switched multicast
EP2996287B1 (en) Method for notifying information of pe device and pe device
US9769088B2 (en) Method and system for VTEP redundancy in a multichassis link aggregation domain
CN110266592A (en) The communication means and device of SRV6 network and IP MPLS network
CN103259726B (en) Method, device and system for storing and sending MAC address table entries
JP6633775B2 (en) Packet transmission
CN104320345B (en) The method and device of topology information collection in SDN
CN104394083B (en) Method, the method and its device and system of message forwarding of forwarding-table item processing
CN107026791A (en) VPN vpn service optimization method and equipment
US10291512B2 (en) Interest message path steering and multi-path traceroute in information-centric networking
CN104378299B (en) Flow table item processing method and device
US9467374B2 (en) Supporting multiple IEC-101/IEC-104 masters on an IEC-101/IEC-104 translation gateway
CN105471883A (en) Tor network tracing system and tracing method based on web injection
EP3113425B1 (en) Encapsulation method for service routing packet, service forwarding entity and control plane
CN105634923B (en) Ethernet based on SDN controllers broadcasts optimized treatment method
CN105323163A (en) Routing calculation method and device based on ISIS
CN109474507A (en) A kind of message forwarding method and device
CN104202322A (en) OpenFlow exchanger message security monitor and control method based on OpenFlow protocol
CN102238057A (en) Ethernet-tree realization method, system, device and network equipment
CN103795630A (en) Message transmitting method and device of label switching network
CN105227458A (en) The route computing method of TRILL ISIS and device
CN106209637A (en) From message forwarding method and the equipment of virtual expansible LAN to VLAN
CN105471742A (en) Message processing method and message processing equipment
CN105637806A (en) Method and apparatus for determining network topology, and centralized network state information storage device
CN104270297A (en) Message transmitting method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant after: Xinhua three Technology Co., Ltd.

Address before: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant before: Huasan Communication Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant