CN109347746B - MAC address learning method and device - Google Patents

MAC address learning method and device Download PDF

Info

Publication number
CN109347746B
CN109347746B CN201811202693.7A CN201811202693A CN109347746B CN 109347746 B CN109347746 B CN 109347746B CN 201811202693 A CN201811202693 A CN 201811202693A CN 109347746 B CN109347746 B CN 109347746B
Authority
CN
China
Prior art keywords
mac address
address table
table entry
network device
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811202693.7A
Other languages
Chinese (zh)
Other versions
CN109347746A (en
Inventor
龚青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN201811202693.7A priority Critical patent/CN109347746B/en
Publication of CN109347746A publication Critical patent/CN109347746A/en
Application granted granted Critical
Publication of CN109347746B publication Critical patent/CN109347746B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering

Abstract

The embodiment of the invention provides a method and a device for learning an MAC address. In the embodiment of the invention, if the first network equipment receives the MAC address synchronized with the second network equipment, whether a first MAC address table item matched with the MAC address exists locally is judged, and if the first MAC address table item exists, the first MAC address table item is deleted so as to avoid the occurrence of wrong MAC address table items in the first network equipment.

Description

MAC address learning method and device
Technical Field
The invention relates to the technical field of network communication, in particular to a method and a device for learning an MAC address.
Background
DRNI (Distributed Resilient Network Interconnect) is a cross-device link aggregation technology, where two physical devices are virtualized into one device on an aggregation layer to implement cross-device link aggregation, thereby providing device-level redundancy protection and traffic load sharing.
Fig. 1A is a schematic diagram of a DRNI network. Among them, the device 111 and the device 112 constitute a DR system. When the device 111 receives the message sent by the host 121, the MAC address table entry of the host 121 is locally generated, and an outgoing interface of the table entry is an interface of the device 111 connected to the host 121 (S11), and the MAC address of the host 121 is synchronized to the device 112.
If the host 121 migrates from the device 111 to the device 112 during the process of synchronizing the MAC address of the device 111 with the device 112, as shown in fig. 1B, the device 112 locally generates a MAC address entry of the host 121, an outgoing interface of the entry is an interface of the device 112 to which the host 121 is connected (S21), and synchronizes the MAC address of the host 121 with the device 111.
When the device 111 receives the MAC address of the host 121 synchronized by the device 112, the locally recorded outgoing interface of the MAC address entry of the host 121 is updated to be an IPP (Intra-Port) Port of the connection device 112 (S12). Similarly, when the device 112 receives the MAC address of the host 121 synchronized by the device 111, the locally recorded outgoing interface of the MAC address table entry of the host 121 is updated to be the IPP port connected to the device 111 (S22).
If a message addressed to the host 121 is received at this time, neither the MAC address table entry in the matching device 111 nor the MAC address table entry in the matching device 112 can be sent to the host 121.
Disclosure of Invention
The invention provides a method and a device for learning an MAC address, which are used for solving the problem of error learning of the existing MAC address and are used for ensuring the correctness of learning the MAC address.
In order to achieve the purpose, the invention provides the following technical scheme:
in a first aspect, the present invention provides a MAC address learning method, applied to a first network device in a distributed system, where the distributed system further includes a second network device, and the method includes:
if the synchronous MAC address of the second network equipment is received, judging whether a first MAC address table item matched with the MAC address exists locally;
and if the first MAC address table entry exists, deleting the first MAC address table entry.
Optionally, the method further includes:
and if the first MAC address table entry does not exist, generating a second MAC address table entry based on the MAC address.
Optionally, if the first MAC address table entry exists, deleting the first MAC address table entry includes:
and if the interface receiving the MAC address is inconsistent with the output interface in the first MAC address table entry, deleting the first MAC address table entry.
Optionally, after deleting the first MAC address table entry, the method further includes:
and if a message sent to the host corresponding to the MAC address is received, forwarding the message in a broadcasting mode.
Optionally, the network device is a distributed aggregation device.
In a second aspect, the present invention provides an apparatus for learning a MAC address, which is applied to a first network device in a distributed system, where the distributed system further includes a second network device, and the apparatus includes:
the judging unit is used for judging whether a first MAC address table item matched with the MAC address exists locally or not if the MAC address synchronized by the second network equipment is received;
and the deleting unit is used for deleting the first MAC address table item if the first MAC address table item exists.
Optionally, the apparatus further comprises:
and the generating unit is used for generating a second MAC address table item based on the MAC address if the first MAC address table item does not exist.
Optionally, the deleting unit is specifically configured to delete the first MAC address table entry if the interface that receives the MAC address is inconsistent with the outgoing interface in the first MAC address table entry.
Optionally, the apparatus further comprises:
and the forwarding unit is used for forwarding the message in a broadcasting mode if receiving the message sent to the host corresponding to the MAC address.
Optionally, the network device is a distributed aggregation device.
As can be seen from the above description, in the embodiment of the present invention, if the first network device receives the MAC address synchronized with the second network device and a MAC address table entry matching the MAC address exists locally, the matching MAC address table entry is deleted, so as to avoid an erroneous MAC address table entry occurring in the first network device.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1A is a schematic diagram of a DRNI network according to an embodiment of the present invention;
fig. 1B is a schematic diagram of the DRNI network after migration based on fig. 1A;
fig. 2 is a flowchart illustrating a MAC address learning method according to an embodiment of the present invention;
fig. 3A is a schematic diagram of another DRNI network according to an embodiment of the present invention;
fig. 3B is a schematic diagram of the DRNI network after migration in fig. 3A;
fig. 4A is a schematic diagram of another DRNI network according to an embodiment of the present invention;
fig. 4B is a schematic diagram of the DRNI network after migration based on fig. 4A;
fig. 5 is a schematic structural diagram of a MAC address learning apparatus according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a hardware structure of a network device according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present invention.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this application, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the negotiation information may also be referred to as second information, and similarly, the second information may also be referred to as negotiation information without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In the method, when a first network device receives an MAC address synchronized with a second network device and a MAC address table item matched with the MAC address exists locally, the first network device deletes the matched MAC address table item to avoid an error MAC address table item in the first network device.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the following detailed description of the embodiments of the present invention is performed with reference to the accompanying drawings and specific embodiments:
referring to fig. 2, a flowchart of a MAC address learning method according to an embodiment of the present invention is shown. The flow is applied to a first network device in a distributed system, and the distributed system also comprises a second network device. Here, the first network device and the second network device are only named for convenience of description and are not intended to be limiting.
As shown in fig. 1A, the first network device and the second network device may be distributed aggregation devices (e.g., devices 111, 112) in a DR system. The first network device and the second network device may also be single boards in a distributed device.
As shown in fig. 2, the process may include the following steps:
in step 201, if a synchronous MAC address of the second network device is received, the first network device determines whether a first MAC address table entry matching the MAC address exists locally.
The first MAC address table entry comprises the MAC address synchronized by the second network equipment.
Here, the first MAC address table entry is named for convenience of description only and is not intended to be limiting.
Step 202, if the first MAC address table entry exists, the first network device deletes the first MAC address table entry.
In the embodiment of the present invention, if the first network device determines that the first MAC address table entry locally exists, it indicates that the first network device has learned the MAC address. If the learning is performed based on the same MAC address synchronized by the second network device, it cannot be determined which learned MAC address entry is correct, and therefore, the first network device deletes the local first MAC address entry, and at the same time, prohibits the learning of the synchronized MAC address. This may avoid possible erroneous MAC address entries in the first network device.
Thus, the flow shown in fig. 2 is completed.
As can be seen from the flow shown in fig. 2, in the embodiment of the present invention, when the first network device receives the MAC address synchronized with the second network device, the locally matched MAC address table entry is deleted, so that an erroneous MAC address table entry in the first network device is avoided.
Optionally, as an embodiment, after the first MAC address table entry is deleted in step 202, if the host corresponding to the MAC address in the first MAC address table entry sends the packet again, the first network device and the second network device may be triggered to learn the MAC address again. At this time, if the first network device receives the MAC address synchronized by the second network device, or the first network device locally learns the MAC address, a second MAC address table entry is generated based on the MAC address.
I.e., when the first MAC address table entry does not exist locally, a second MAC address table entry is generated based on the MAC address. To ensure the correctness of MAC address learning.
Here, the second MAC address table entry is named for convenience of description only and is not intended to be limiting.
Optionally, as an embodiment, if the first MAC address table entry exists in step 202, the deleting, by the first network device, the first MAC address table entry includes:
and if the interface receiving the synchronous MAC address is inconsistent with the output interface in the first MAC address table entry, the first network equipment deletes the first MAC address table entry. That is, when the synchronized MAC address does result in the existing first MAC address table entry being updated, i.e., the results of the two learning are different, the first MAC address table entry is deleted.
Otherwise, if the interface receiving the synchronous MAC address is consistent with the output interface in the first MAC address table entry, the first MAC address table entry is not deleted.
Optionally, as an embodiment, after deleting the first MAC address table entry in step 202, if a message sent to the host corresponding to the MAC address in the first MAC address table entry is received, the first network device forwards the message in a broadcast manner, so as to avoid traffic interruption.
The method provided by the embodiment of the invention is described by the following specific embodiment:
the first embodiment is as follows:
the DRNI network shown in fig. 1A and 1B is still taken as an example. The MAC address of the host 121 is the MAC 121.
In fig. 1A, the device 111 learns the MAC address of the host 121 through the interface S11, as shown in table 1.
Figure BDA0001830388390000061
TABLE 1
Device 111 synchronizes the MAC address of host 121 to device 112 through interface S12(IPP port).
If the host 121 migrates from the device 111 to the device 112 during the synchronization process, as shown in fig. 1B, the device 112 learns the MAC address of the host 121 through the interface S21, as shown in table 2.
Figure BDA0001830388390000071
TABLE 2
Device 112 synchronizes the MAC address of host 121 to device 111 through interface S22(IPP port).
After receiving the MAC address (MAC121) synchronized by the device 111, the device 112 queries table 2, and if a MAC address table entry matching the MAC121 exists locally, deletes the matching MAC address table entry in table 2, and prohibits generation of the MAC address table entry based on the synchronized MAC 121.
Similarly, after receiving the MAC address (MAC121) synchronized by the device 112, the device 111 queries table 1, and if a MAC address table entry matching the MAC121 exists locally, deletes the matching MAC address table entry in table 1, and prohibits generation of the MAC address table entry based on the synchronized MAC 121.
Through the above processing, there is no MAC address entry matching MAC121 in both device 111 and device 112. If there is traffic addressed to the host 121 in the network at this time, the traffic is forwarded in a broadcast manner, thereby avoiding traffic interruption.
In addition, when the host 121 after the migration (in fig. 1B) retransmits the packet, the device 112 is triggered to regenerate the MAC address table entry shown in table 2; at the same time, device 112 will synchronize the MAC address of host 121 to device 111 through interface S22. Device 111 queries that no MAC address entry matching MAC121 exists locally, and generates a MAC address entry based on MAC121 as shown in table 3.
Figure BDA0001830388390000072
TABLE 3
Subsequent traffic destined for host 121 will be forwarded based on the MAC address table entries in tables 2 and 3.
This completes the description of the first embodiment.
The second embodiment is as follows:
take the DRNI network shown in fig. 3A and 3B as an example. The MAC address of the host 121 is the MAC 121. The interface S13 on the device 111 and the interface S23 on the device 112 belong to the same DR group (denoted as DR 1); the interface S14 on the device 111 and the interface S24 on the device 112 belong to the same DR group (denoted as DR 2).
In fig. 3A, the device 111 learns the MAC address of the host 121 through the interface S13, as shown in table 4.
Figure BDA0001830388390000081
TABLE 4
Device 111 synchronizes the MAC address of host 121 to device 112 through interface S12(IPP port).
If the host 121 migrates from the device 113 to the device 114 during the synchronization process, as shown in fig. 3B, the device 112 learns the MAC address of the host 121 through the interface S24, as shown in table 5.
Figure BDA0001830388390000082
TABLE 5
Device 112 synchronizes the MAC address of host 121 to device 111 through interface S22(IPP port).
After receiving the MAC address (MAC121) synchronized by the device 111, the device 112 queries the table 5, and if a MAC address table entry matching the MAC121 exists locally, deletes the matching MAC address table entry in the table 5, and prohibits generation of the MAC address table entry based on the synchronized MAC 121.
Similarly, after receiving the MAC address (MAC121) synchronized by the device 112, the device 111 queries the table 4, and if a MAC address table entry matching the MAC121 exists locally, deletes the matching MAC address table entry in the table 4, and prohibits generation of the MAC address table entry based on the synchronized MAC 121.
Through the above processing, there is no MAC address entry matching MAC121 in both device 111 and device 112. If there is traffic addressed to the host 121 in the network at this time, the traffic is forwarded in a broadcast manner, thereby avoiding traffic interruption. In addition, when the host 121 after the migration (in fig. 3B) retransmits the packet, the device 112 is triggered to regenerate the MAC address table entry shown in table 5; at the same time, device 112 will synchronize the MAC address of host 121 to device 111 through interface S22. Device 111 queries that no MAC address entry matching MAC121 exists locally, and generates a MAC address entry based on MAC121 as shown in table 6.
Figure BDA0001830388390000091
TABLE 6
Wherein S14 is a DR port belonging to the same DR group as S24.
Subsequent traffic destined for host 121 may be forwarded based on the MAC address table entries in table 5 or table 6.
The description of the second embodiment is completed.
The third concrete embodiment:
take the DRNI network shown in fig. 4A and 4B as an example. The MAC address of the host 121 is the MAC 121.
In fig. 4A, the device 112 learns the MAC address of the host 121 through the interface S23, as shown in table 7.
Figure BDA0001830388390000092
TABLE 7
Device 112 synchronizes the MAC address of host 121 to device 111 through interface S22(IPP port).
If the host 121 migrates from the device 113 to the device 111 during the synchronization process, as shown in fig. 4B, the device 111 learns the MAC address of the host 121 through the interface S11, as shown in table 8.
Figure BDA0001830388390000093
TABLE 8
Device 111 synchronizes the MAC address of host 121 to device 112 through interface S12(IPP port).
After receiving the MAC address (MAC121) synchronized by the device 112, the device 111 searches the table 8, and if a MAC address table entry matching the MAC121 exists locally, deletes the matching MAC address table entry in the table 8, and prohibits generation of the MAC address table entry based on the synchronized MAC 121.
Similarly, after receiving the MAC address (MAC121) synchronized by the device 111, the device 112 queries the table 7, and if a MAC address table entry matching the MAC121 exists locally, deletes the matching MAC address table entry in the table 7, and prohibits generation of the MAC address table entry based on the synchronized MAC 121.
Through the above processing, there is no MAC address entry matching MAC121 in both device 111 and device 112. If there is traffic addressed to the host 121 in the network at this time, the traffic is forwarded in a broadcast manner, thereby avoiding traffic interruption. In addition, when the host 121 after the migration (in fig. 4B) retransmits the packet, the device 111 is triggered to regenerate the MAC address table entry shown in table 8; at the same time, device 111 will synchronize the MAC address of host 121 to device 112 via interface S12. Device 112 queries that there is no MAC address entry locally matching MAC121 and generates a MAC address entry based on MAC121 as shown in table 9.
Figure BDA0001830388390000101
TABLE 9
Subsequent traffic destined for host 121 may be forwarded based on the MAC address table entries in tables 8 and 9.
The description of the third embodiment is completed.
The method provided by the embodiment of the invention is described above, and the device provided by the embodiment of the invention is described below:
fig. 5 is a schematic structural diagram of an apparatus according to an embodiment of the present invention. The device is applied to a first network device in a distributed system, the distributed system also comprises a second network device, and the device comprises: a judging unit 501 and a deleting unit 502, wherein:
a determining unit 501, configured to determine whether a first MAC address table entry matching the MAC address exists locally if the synchronous MAC address of the second network device is received;
a deleting unit 502, configured to delete the first MAC address table entry if the first MAC address table entry exists.
As an embodiment, the apparatus further comprises:
and the generating unit is used for generating a second MAC address table item based on the MAC address if the first MAC address table item does not exist.
As an embodiment, the deleting unit 502 is specifically configured to delete the first MAC address table entry if the interface that receives the MAC address is inconsistent with the outgoing interface in the first MAC address table entry.
As an embodiment, the apparatus further comprises:
and the forwarding unit is used for forwarding the message in a broadcasting mode if receiving the message sent to the host corresponding to the MAC address.
As an embodiment, the network device is a distributed aggregation device.
The description of the apparatus shown in fig. 5 is thus completed. In the embodiment of the present invention, if the first network device receives the MAC address synchronized with the second network device and a MAC address table entry matching the MAC address exists locally, the matching MAC address table entry is deleted, so as to avoid an erroneous MAC address table entry occurring in the first network device. Subsequently, when the MAC address corresponds to a host sending a message, the first network device is triggered to learn the MAC address again, so as to ensure the correctness of MAC address learning. In addition, when the first network device does not have a matched MAC address table entry, the packet is forwarded in a broadcast manner, so that a traffic interruption situation does not occur.
The following describes a network device provided in an embodiment of the present invention:
fig. 6 is a schematic diagram of a hardware structure of a network device according to an embodiment of the present invention. The network device may include a processor 601, a machine-readable storage medium 602 having stored thereon machine-executable instructions. The processor 601 and the machine-readable storage medium 602 may communicate via a system bus 603. Also, by reading and executing machine-executable instructions in the machine-readable storage medium 602 corresponding to the MAC address learning logic, the processor 601 may perform the MAC address learning method described above.
The machine-readable storage medium 602 referred to herein may be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like. For example, the machine-readable storage medium 602 may include at least one of the following storage media: volatile memory, non-volatile memory, other types of storage media. The volatile Memory may be a Random Access Memory (RAM), and the nonvolatile Memory may be a flash Memory, a storage drive (e.g., a hard disk drive), a solid state disk, and a storage disk (e.g., a compact disk, a DVD).
Embodiments of the present invention also provide a machine-readable storage medium, such as machine-readable storage medium 602 in fig. 6, including machine-executable instructions that are executable by processor 601 in a network device to implement the MAC address learning method described above.
So far, the description of the apparatus shown in fig. 6 is completed.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the embodiments of the present invention should be included in the scope of the present invention.

Claims (8)

1. A Media Access Control (MAC) address learning method is applied to a first network device in a distributed system, the distributed system further comprises a second network device, and the method comprises the following steps:
if the synchronous MAC address of the second network equipment is received, judging whether a first MAC address table item matched with the MAC address exists locally;
if the first MAC address table item exists, deleting the first MAC address table item, and forbidding learning of the synchronous MAC address;
and if the first MAC address table entry does not exist, generating a second MAC address table entry based on the MAC address.
2. The method of claim 1, wherein the deleting the first MAC address table entry if the first MAC address table entry exists comprises:
and if the interface receiving the MAC address is inconsistent with the output interface in the first MAC address table entry, deleting the first MAC address table entry.
3. The method of claim 1, wherein after said deleting said first MAC address table entry, further comprising:
and if a message sent to the host corresponding to the MAC address is received, forwarding the message in a broadcasting mode.
4. The method of claim 1, wherein the network device is a distributed aggregation device.
5. A Medium Access Control (MAC) address learning device applied to a first network device in a distributed system, wherein the distributed system further comprises a second network device, and the device comprises:
the judging unit is used for judging whether a first MAC address table item matched with the MAC address exists locally or not if the MAC address synchronized by the second network equipment is received;
a deleting unit, configured to delete the first MAC address table entry and prohibit learning of a synchronous MAC address if the first MAC address table entry exists;
and the generating unit is used for generating a second MAC address table item based on the MAC address if the first MAC address table item does not exist.
6. The apparatus of claim 5, wherein:
the deleting unit is specifically configured to delete the first MAC address table entry if the interface that receives the MAC address is inconsistent with the outgoing interface in the first MAC address table entry.
7. The apparatus of claim 5, wherein the apparatus further comprises:
and the forwarding unit is used for forwarding the message in a broadcasting mode if receiving the message sent to the host corresponding to the MAC address.
8. The apparatus of claim 5, wherein the network device is a distributed aggregation device.
CN201811202693.7A 2018-10-16 2018-10-16 MAC address learning method and device Active CN109347746B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811202693.7A CN109347746B (en) 2018-10-16 2018-10-16 MAC address learning method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811202693.7A CN109347746B (en) 2018-10-16 2018-10-16 MAC address learning method and device

Publications (2)

Publication Number Publication Date
CN109347746A CN109347746A (en) 2019-02-15
CN109347746B true CN109347746B (en) 2021-11-23

Family

ID=65309490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811202693.7A Active CN109347746B (en) 2018-10-16 2018-10-16 MAC address learning method and device

Country Status (1)

Country Link
CN (1) CN109347746B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110049149B (en) * 2019-04-25 2021-08-24 新华三技术有限公司 MAC address learning method and device and distributed equipment
CN110266599B (en) * 2019-06-28 2021-08-03 烽火通信科技股份有限公司 MAC address learning method and system based on distributed equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729314A (en) * 2009-11-26 2010-06-09 福建星网锐捷网络有限公司 Method and device for recovering dynamic table entries and dynamic host configuration protocol snoopingsnooping equipment
CN103501250A (en) * 2013-09-30 2014-01-08 杭州华三通信技术有限公司 Data flow processing method and device in distribution type link aggregation network
CN103731285A (en) * 2012-10-11 2014-04-16 中兴通讯股份有限公司 DRNI switchover processing method and device
CN106878164A (en) * 2016-12-13 2017-06-20 新华三技术有限公司 A kind of message transmitting method and device
CN108418759A (en) * 2018-05-31 2018-08-17 新华三技术有限公司 A kind of MAC Address list item processing method and processing device
CN108540386A (en) * 2018-04-19 2018-09-14 新华三技术有限公司 One kind preventing Business Stream interrupt method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4918862B2 (en) * 2007-01-05 2012-04-18 富士通株式会社 Link trace frame transfer program, link trace frame transfer apparatus, and link trace frame transfer method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729314A (en) * 2009-11-26 2010-06-09 福建星网锐捷网络有限公司 Method and device for recovering dynamic table entries and dynamic host configuration protocol snoopingsnooping equipment
CN103731285A (en) * 2012-10-11 2014-04-16 中兴通讯股份有限公司 DRNI switchover processing method and device
CN103501250A (en) * 2013-09-30 2014-01-08 杭州华三通信技术有限公司 Data flow processing method and device in distribution type link aggregation network
CN106878164A (en) * 2016-12-13 2017-06-20 新华三技术有限公司 A kind of message transmitting method and device
CN108540386A (en) * 2018-04-19 2018-09-14 新华三技术有限公司 One kind preventing Business Stream interrupt method and device
CN108418759A (en) * 2018-05-31 2018-08-17 新华三技术有限公司 A kind of MAC Address list item processing method and processing device

Also Published As

Publication number Publication date
CN109347746A (en) 2019-02-15

Similar Documents

Publication Publication Date Title
CN108199967B (en) Route processing method and device
US9778998B2 (en) Data restoration method and system
CN106776130B (en) Log recovery method, storage device and storage node
EP3018593B1 (en) Data storage method and device for distributed database
CN106059791B (en) Link switching method of service in storage system and storage device
CN108173691B (en) Cross-device aggregation method and device
EP3451592A1 (en) Packet transmission
CN108600069B (en) Link switching method and device
WO2019201209A1 (en) Message forwarding
CN109347746B (en) MAC address learning method and device
US20190349293A1 (en) Managing Data Frames in Switched Networks
CN112367254A (en) Cross-device link aggregation method and device and electronic device
CN109167700B (en) Detection method and device for Segment Routing (SR) tunnel
CN112367257B (en) Route notification method and device
JP2008172292A (en) Link trace frame transfer program, link trace frame transfer device and link trace frame transfer method
CN112052230B (en) Multi-machine room data synchronization method, computing device and storage medium
CN106873902B (en) File storage system, data scheduling method and data node
CN109728972B (en) Network connection detection method and device
CN109525633B (en) Block chain network, message sending method and message receiving method based on block chain network
JP2006048122A (en) Communication system
CN108234358B (en) Multicast message transmission method, device and machine readable storage medium
US20220360519A1 (en) Method and device for packet forwarding
CN108494691B (en) Multicast forwarding method and device and tunnel endpoint equipment
CN108632125B (en) Multicast table item management method, device, equipment and machine readable storage medium
CN110049149B (en) MAC address learning method and device and distributed equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant