WO2021004536A1 - 报文解析方法和装置 - Google Patents

报文解析方法和装置 Download PDF

Info

Publication number
WO2021004536A1
WO2021004536A1 PCT/CN2020/101411 CN2020101411W WO2021004536A1 WO 2021004536 A1 WO2021004536 A1 WO 2021004536A1 CN 2020101411 W CN2020101411 W CN 2020101411W WO 2021004536 A1 WO2021004536 A1 WO 2021004536A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
parsing
strategy
key value
matching
Prior art date
Application number
PCT/CN2020/101411
Other languages
English (en)
French (fr)
Inventor
李飞
Original Assignee
深圳市中兴微电子技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市中兴微电子技术有限公司 filed Critical 深圳市中兴微电子技术有限公司
Publication of WO2021004536A1 publication Critical patent/WO2021004536A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/42Syntactic analysis
    • G06F8/427Parsing

Definitions

  • This application relates to the field of information processing, for example, to a message parsing method and device.
  • MAC Media Access Control
  • IP Internet Protocol Address
  • MPLS Multi-Protocol Label Switching
  • Hard parsing refers to identifying the protocol type of the message according to the level, giving the offset of each level, and extracting the message content according to the fixed offset of each level for forwarding processing of the message.
  • the above functions are implemented by hardware fixed logic, which has the advantages of simple implementation and small logic resources.
  • the supported message types are limited and the expansion of new services is not supported.
  • Programmable analysis refers to the use of microcode control to extract the key value from the message and match it with the configured template. After the match is hit, the message is operated; the key value generally includes the protocol type and other users interested Field. If there is a new message type that needs to be parsed, you only need to configure this new service type to the matching template, extract the key value of the new service to match, and you can complete the support for the new service. It has strong extension functions and flexible analysis. Advantages, but there are also disadvantages that microcode takes up more resources and costs more.
  • the embodiments of the present application provide a method and device for parsing a message, which provide a solution basis for achieving a compromise between the occupation of microcode resources and the scalability.
  • the embodiment of the present application provides a message parsing method, including:
  • a message parsing device includes a processor and a memory, the memory stores a computer program, and the processor invokes the computer program in the memory to implement any of the above methods.
  • Fig. 1 is a flowchart of a message parsing method provided by an embodiment of the application
  • Fig. 2 is a flowchart of another message parsing method provided by an embodiment of the application.
  • FIG. 3 is a schematic diagram of the flow of each level of matching module using the key value to perform the matching operation provided by the embodiment of the application.
  • Fig. 1 is a flowchart of a message parsing method provided by an embodiment of the application. The method shown in Figure 1 includes:
  • Step 110 Identify the receiving port of the obtained message.
  • the source of the receiving port of the message is the mapping of the physical port to the logical port, and the mapping relationship between the physical port and the logical port may be one-to-one or many-to-one.
  • Step 120 Determine a parsing strategy corresponding to the message from the two types of parsing strategies stored in advance according to the receiving port of the message;
  • one of the two types of analysis strategies is in compliance with a preset microcode resource occupation strategy, and the other is in compliance with a preset service scalability strategy.
  • the microcode resource occupation complies with the preset microcode resource occupation strategy to limit the size of the microcode resource consumed in the message parsing operation to avoid excessive consumption.
  • the microcode resource occupation strategy can be determined by Whether the consumed microcode resources exceeds a preset threshold is judged; the service scalability strategy is used to determine whether the analysis strategy can support new services, and it can be determined whether the analysis strategy meets the service scalability by enumerating new messages.
  • the receiving port of the message is used as the judgment condition, and the analysis method suitable for the message is selected for the message.
  • Step 130 Use the determined parsing strategy to perform parsing operations on the message.
  • the required data is extracted from the message according to the analysis strategy.
  • the method provided by the embodiment of the present application identifies the receiving port of the obtained message, and determines the parsing strategy corresponding to the message from the two pre-stored parsing strategies according to the receiving port of the message, Then, the determined parsing strategy is adopted to perform parsing operations on the message to realize the coexistence of the two types of parsing strategies based on the receiving port, which provides a solution basis for realizing the compromise between the occupation of microcode resources and the scalability.
  • the parsing strategy that meets the preset microcode resource occupation strategy is a hard parsing strategy;
  • the parsing strategy that meets the preset service scalability strategy is a programmable parsing strategy; wherein:
  • the hard parsing strategy includes: determining the offset position of the message when the data extraction operation is performed according to preset offset positions of different messages; performing the data extraction according to the offset position Operation;
  • the programmable parsing strategy includes: obtaining a key key value from the message; performing a matching operation on the key value with a pre-stored template; performing a data extraction operation in the case that the result of the matching operation is a hit.
  • the analysis strategies of the two categories are divided based on the function implementation mode. While using the hard analysis strategy to save code source resources, it also takes advantage of the good scalability of the programmable analysis strategy to achieve The coexistence of the two technical advantages achieves a compromise between the occupation of microcode resources and scalability.
  • the determining the parsing strategy corresponding to the message from the two types of parsing strategies stored in advance according to the receiving port of the message includes: determining the reception of the message Whether the port is a preset dedicated port, the dedicated port is a hardware or service communication port; if the receiving port of the message is a dedicated port, it is determined to use the preset microcode resource for the message The parsing strategy of the occupation strategy; if the receiving port of the message is not a dedicated port, it is determined to use the parsing strategy that complies with the preset service scalability strategy for the message.
  • the dedicated port is a specific port specified by the communication protocol, and may be a loopback port, a central processing unit (CPU) port, or an operation and maintenance management (Operation Administration Maintenance, OAM) engine port.
  • the above-mentioned dedicated port has a limited number of message types, and the message format is fixed, which is suitable for the analysis strategy that conforms to the preset microcode resource occupancy strategy; for receiving ports other than the dedicated port, it is convenient for business expansion Analytical strategy that conforms to the preset business scalability strategy can be adopted. Use the receiving port information to determine the type of analysis strategy, give full play to the advantages of different analysis strategies, and improve analysis efficiency.
  • the adopting the determined parsing strategy to perform the parsing operation on the message includes: after performing a matching operation using the key value corresponding to the message, if the result of the matching operation is a hit, then Acquire a management command for the content in the message; process the content in the message according to the content of the management command.
  • the management command is read and the content is managed according to the management command, so as to realize the collection of important content in the message.
  • the management instruction includes an operation command for at least one of moving, assigning and shifting the content in the message.
  • the management command may be a move, or an immediate value assignment (set), or an operation instruction such as shift; the management command can simultaneously move, assign, and move multiple message fields.
  • Bit operation, instruction parallel operation can process multiple parsed message fields.
  • the processing the content in the message according to the content of the management command includes: when the number of the management command is at least two, responding to the message in a parallel manner The management commands.
  • the number of management commands may be multiple, for example, multiple management commands are at least two operations of different types; or, they are computing operations of the same type and at least two commands for different contents;
  • the method further includes: storing the processing result of the preset content, and recording the processing The location information of the result and the corresponding relationship between the fields included in the content; and the forwarding operation is performed on the message according to the corresponding relationship.
  • the content of the parsed message can be placed in the descriptor, and the content (field) can be marked in the position of the descriptor, and the result can be called by the position mark when the subsequent table lookup is forwarded. Avoid extracting from the message again, reducing the complexity of forwarding microcode.
  • the key value is obtained in the following manner, including: obtaining a configuration request of the data extraction location of the message, the configuration request including location indication information; according to the configuration request And the pre-acquired key value offset to obtain the key value of the message.
  • the matching operation using the key value corresponding to the message includes: after obtaining the key value corresponding to the message, using the key value to perform the parsing rule corresponding to the i-th level Matching operation, when the key value of the message is a hit in the matching operation result of the i-th level, the newly generated key value is obtained, and the newly generated key value is used to perform the parsing rule corresponding to the i+1 level Matching operation; in the case that the key value of the message is a miss in the matching operation result corresponding to the i-th level, the key value of the message is used to perform the matching operation of the parsing rule corresponding to the i+1 level until Until all parsing rules in the pre-stored template are executed, i is less than or equal to a natural number of N, where N represents the total number of levels of parsing rules, and N is a natural number.
  • multiple levels of matching analysis can be performed on the message; if the first level of matching cannot complete the analysis, at most N levels of matching analysis will be performed.
  • the match is hit, the newly generated key value in the management information is used for lower-level matching; if the match is missed, the original key value offset is used to continue the next-level matching until the end of the analysis.
  • the information carried in the message can be obtained more comprehensively, and the efficiency of information extraction can be improved.
  • the first embodiment of the present application provides a hard parsing and programmable message parsing method.
  • the hard parsing method is adopted for the messages of some receiving ports, and the messages of the remaining receiving ports Use programmable analysis and optimize the programmable analysis.
  • Fig. 2 is a flowchart of another message parsing method provided by an embodiment of the application. The method shown in Figure 2 includes the following steps:
  • Step 210 Perform a matching operation on the receiving port of the obtained message.
  • the receiving port of the message is a dedicated port
  • the hard parsing is used to realize the parsing of the message entering from the dedicated port, and step 220 to step 230 are executed.
  • step 240 to step 250 are executed.
  • Step 220 Identify the offset corresponding to the protocol type according to the multiple levels of the pre-stored message, and determine the offset of the corresponding level of the message.
  • Step 230 Extract the message content according to the offset, and use it for message forwarding processing.
  • step 220 and step 230 Compared with programmable analysis, the implementation is simpler and the microcode resources are saved.
  • Step 240 Use the key value to perform multi-level matching on the content of the message.
  • a preset matching module ie, a pre-stored template
  • Use the key value to perform matching operations in a preset matching module ie, a pre-stored template
  • use the key value to perform the parsing rule corresponding to the i-th level If the key value of the message is a hit in the matching operation at level i, the newly generated key value is obtained, and the newly generated key value is used to perform the matching operation of the parsing rule corresponding to level i+1 ; If the matching operation result corresponding to the i-th level is a miss, use the key value of the message to perform the matching operation of the parsing rule corresponding to the i+1 level, and so on, until all parsing rules are executed, i is a natural number less than or equal to N, N represents the total number of levels of the analysis rule, and N is a natural number.
  • multiple levels of matching analysis can be performed on the message; if the first level of matching cannot complete the analysis, at most N levels of matching analysis will be performed.
  • the match is hit, the newly generated key value in the management information is used for lower level matching; if the match is not hit, the original key value is used for the next level of matching until the end of the analysis.
  • the value of N is 6.
  • the key value is key0
  • the new key value key1 is acquired, and key1 is used Perform the matching operation of the parsing rule corresponding to the second level; on the contrary, if the corresponding matching operation result of the first level is a miss, then use key0 to perform the matching operation of the parsing rule corresponding to the second level; and so on, until the execution is complete
  • the matching operation of the 6-level parsing rules is key0, if the matching result of the corresponding parsing rule at level 1 is a hit, the new key value key1 is acquired, and key1 is used Perform the matching operation of the parsing rule corresponding to the second level; on the contrary, if the corresponding matching operation result of the first level is a miss, then use key0 to perform the matching operation of the parsing rule corresponding to the second level; and so on, until the execution is complete The matching operation of the 6-level parsing rules.
  • the information carried in the message can be obtained more comprehensively, and the efficiency of information extraction can be improved.
  • Step 250 Obtain a matching result.
  • FIG. 3 is a schematic diagram of the flow of each level of matching module using the key value to perform the matching operation provided by the embodiment of the application. As shown in Figure 3, the matching operation of each level includes the following steps:
  • Step 310 Determine the initial key value offset (key_offset) of the message according to the preset port attribute table.
  • Step 320 According to the initial key value offset, extract multiple pieces of message content that the user is interested in from the message, and use the extracted message content as the key value.
  • the initial offset can be flexibly configured.
  • Step 330 Use the key value to perform a matching operation in the preset matching module, and output the matching result.
  • step 340 is executed; if the matching result is a miss, the process ends.
  • Step 340 Obtain the management command in the matching result.
  • the management commands can be operation instructions such as move, set immediate data, or shift. These instructions can move, assign, and shift the contents of multiple segments at the same time.
  • Step 350 Execute the management command to obtain required information.
  • Step 360 Manage the required information.
  • step 310 When parsing the matching state value, it is judged whether the message parsing is completed. If not, the new key_offset is used to extract the key value for the next level of matching. The process repeats step 310 to step 360 until the parsing is completed.
  • each level of the matching module can perform step 310 to step 360; or, some matching modules in the multi-level matching module perform step 310 to step 360, and the rest adopt other matching procedures.
  • the method provided in the embodiment of the present application makes full use of the advantages of the two analysis methods, and realizes the analysis of the message through a combination of hard analysis and programmable analysis.
  • the programmable parsing process it supports extracting content from multiple locations in the message to form a key value, entering the matching module for matching, and logically introducing move, set immediate numbers, addition and subtraction operations, and shifts after the matching is completed.
  • Operation instructions operate on the content of multiple segments of messages. These instructions are executed in parallel. Compared with serial execution, the efficiency of instruction execution is improved.
  • the operation result is written back to a specific descriptor, and subsequent message lookup processing The corresponding content can be taken out directly from the descriptor as the look-up table index, without having to go to the message and extract it again.
  • MAC Media Access Control Address
  • the programmable analysis method includes the following steps:
  • Step 410 Obtain the key value of the message, including:
  • the matching module is pre-configured with tag (TAG) types such as 0x8100 or 0x9100, and the value is taken from the MAC address according to the initial key_offset configuration, and the key value is extracted and sent to the matching module for matching.
  • TAG tag
  • TAG types such as 0x8100 or 0x9100 in the matching module
  • Ethernet (Type, ETYPE) type is 0x0800, and other field content, and extract the corresponding fields from the message through key_offset to enter the matching Module to match.
  • the matching module is pre-configured with TAG types such as 0x8100 or 0x9100, ETYPE type is 0x8847, and other field contents, and the corresponding fields are extracted from the packet through the initial key_offset and sent to the matching module for matching.
  • TAG types such as 0x8100 or 0x9100
  • ETYPE type is 0x8847
  • other field contents and the corresponding fields are extracted from the packet through the initial key_offset and sent to the matching module for matching.
  • Step 420 Use the message key value to perform a query to obtain a matching result, and use the matching result to perform information maintenance, including:
  • VLAN_ID Virtual Local Area Network-Identity Document
  • the layer number and the value of the message type are filled in the descriptor, and the corresponding position is recorded, and then the L2 forwarding table is checked.
  • the MAC address can be taken out from the specific position in the descriptor to check the table to avoid subsequent extraction from the message again. MAC address.
  • the corresponding move and other logical instructions are parsed from the matching result, and the MAC address, VLAN_ID, and IP address are moved to the descriptor, and the VLAN layer number and message type The value is filled in the descriptor, and the corresponding position is recorded, and the L3 forwarding table is subsequently performed.
  • the IP address can be retrieved from a specific position in the descriptor to check the routing table to avoid extracting the IP address from the message again.
  • the corresponding move and other logical instructions are parsed from the matching result, and the MAC address, VLAN_ID, and tag value are moved to the descriptor, and the VLAN layer number and message type
  • the value is filled in the descriptor, and the corresponding position is recorded, and then the label forwarding lookup table is performed.
  • the label value can be retrieved from a specific position in the descriptor to look up the table, so as to avoid extracting the label value from the message again.
  • Step 430 If the message composition is complex, such as Virtual eXtensible Local Area Network (VxLAN), multi-label services, after matching once, the parsing is not completed, you can enter the lower-level matching module to perform matching again, and repeat steps 410 and Step 420, until the analysis ends.
  • VxLAN Virtual eXtensible Local Area Network
  • the method provided in the second embodiment of the present application can be analyzed through a combination of hard parsing and programmable parsing for different types of messages. Compared with related technologies, it has better scalability and to a certain extent. Reduce the complexity of logic resources and microcode implementation; optimization of programmable parsing improves parsing efficiency and reduces the cost of subsequent forwarding and table lookup.
  • An embodiment of the present application provides a message parsing device, including a processor and a memory, wherein the memory stores a computer program, and the processor invokes the computer program in the memory to implement any of the methods described above.
  • the device embodiment provided in the embodiment of the present application identifies the receiving port of the message that has been obtained, and according to the receiving port of the message, determines the parsing strategy corresponding to the message from the two pre-stored parsing strategies , And then adopt the determined analysis strategy to analyze the message, realize the coexistence of the two types of analysis strategies based on the receiving port, and provide a solution basis for realizing the compromise between microcode resource occupation and scalability.
  • Such software may be distributed on a computer-readable medium, and the computer-readable medium may include a computer storage medium (or non-transitory medium) and a communication medium (or transitory medium).
  • the term computer storage medium includes volatile and non-volatile memory implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data). Flexible, removable and non-removable media.
  • Computer storage media include, but are not limited to, Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), and flash memory Or other memory technologies, portable compact disk read-only memory (Compact Disc Read-Only Memory, CD-ROM), digital versatile disk (Digital Video Disc, DVD) or other optical disk storage, magnetic cassettes, magnetic tapes, disk storage or other magnetic A storage device, or any other medium that can be used to store desired information and can be accessed by a computer.
  • communication media usually contain computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as carrier waves or other transmission mechanisms, and may include any information delivery media .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请实施例公开了一种报文解析方法和装置。所述方法包括:识别已获取到报文的接收端口;根据所述报文的接收端口,从预先存储的两个类别的解析策略中,确定所述报文对应的解析策略;采用确定的解析策略,对所述报文进行解析操作。

Description

报文解析方法和装置
本申请要求在2019年7月10日提交中国专利局、申请号为201910620953.0的中国专利申请的优先权,该申请的全部内容通过引用结合在本申请中。
技术领域
本申请涉及信息处理领域,例如涉及一种报文解析方法和装置。
背景技术
在通信网络中,需要对多种报文进行识别和分析,解析到相应报文头信息,例如媒体访问控制(Media Access Control,MAC)地址、网际协议地址(Internet Protocol Address,IP)、多协议标签交换(Multi-Protocol Label Switching,MPLS)标签值,供报文转发和处理。
在相关技术中,报文解析方法主要包括两种:硬解析和可编程解析:
硬解析是指对报文按层次识别协议类型,给出每个层次的偏移量,根据每个层次偏移量固定偏移提取报文内容,用于报文转发处理。上述功能采用硬件固定逻辑实现,具有实现简单,逻辑资源小等优点,但是,也存在支持的报文类型有限,不支持新业务的扩展的缺点。
可编程解析是指通过微码控制,从报文里提取关键(key)值,与已配置的模板进行匹配,匹配命中后,对报文进行操作;key值一般包括协议类型以及其他用户感兴趣的字段。如果有新增的报文类型需要解析,只需把这种新业务类型配置到匹配模板,提取新业务的key值去匹配,就可完成对新业务的支持,具有扩展功能强,解析灵活的优势,但是也存在微码占用资源较大,代价较高的劣势。
因此,如何提供一个既节省微码资源又有很好的扩展性的报文解析方案是亟待解决的问题。
发明内容
本申请实施例提供了一种报文解析方法和装置,为实现微码资源的占用与扩展性的折中的提供方案基础。
本申请实施例提供了一种报文解析方法,包括:
识别已获取到的报文的接收端口;
根据所述报文的接收端口,从预先存储的两个类别的解析策略中,确定所述报文对应的解析策略;
采用确定的解析策略,对所述报文进行解析操作。一种报文解析装置,包括处理器和存储器,所述存储器存储有计算机程序,所述处理器调用所述存储器中的计算机程序以实现上文任一所述的方法。
附图说明
附图用来提供对本申请技术方案的理解,并且构成说明书的一部分,与本申请的实施例一起用于解释本申请的技术方案,并不构成对本申请技术方案的限制。
图1为本申请实施例提供的报文解析方法的流程图;
图2为本申请实施例提供的另一报文解析方法的流程图;
图3为本申请实施例提供的每级匹配模块利用key值执行匹配操作的流程示意图。
具体实施方式
下文中将结合附图对本申请的实施例进行说明。
在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在一些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
图1为本申请实施例提供的报文解析方法的流程图。图1所示方法包括:
步骤110、识别已获取到的报文的接收端口。
在一个示例性实施例中,报文的接收端口来源是物理端口向逻辑端口的映射,物理端口与逻辑端口的映射关系可以为一对一或多对一。
步骤120、根据所述报文的接收端口,从预先存储的两个类别的解析策略中,确定所述报文对应的解析策略;
在一个示例性实施例中,所述两个类别的解析策略中一个为符合预设的微码资源占用策略,另一个为符合预设的业务扩展性策略。
在本示例性实施例中,微码资源占用符合预设的微码资源占用策略用于限制在报文解析操作所消耗的微码资源大小,以免消耗过高,微码资源占用策略可以通过判断消耗的微码资源是否超过预设的阈值来判断;业务扩展性策略用于对判断解析策略是否能够支持新的业务,可以通过列举新的报文来确定该解析策略是否符合业务扩展性。
以接收端口为判断条件,在实现节省码源资源的同时,又保留业务扩展性好的优势,实现了两个技术优势的共存。与相关技术中仅采用一种解析策略相比,增加了解析策略的灵活性。将报文的接收端口作为判断条件,为报文选择适合该报文的解析方式。
步骤130、采用确定的解析策略,对所述报文进行解析操作。
在一个示例性实施例中,按照所述解析策略,从报文中提取所需的数据。
本申请实施例提供的方法,识别已获取到的报文的接收端口,根据所述报文的接收端口,从预先存储的两个类别的解析策略中,确定所述报文对应的解析策略,再采用确定的解析策略,对所述报文进行解析操作,实现基于接收端口,选择两个类别的解析策略共存,为实现微码资源的占用与扩展性的折中提供方案基础。
下面对本申请实施例提供的方法作说明:
在一个示例性实施例中,所述符合预设的微码资源占用策略的解析策略为硬解析策略;所述符合预设的业务扩展性策略的解析策略为可编程解析策略;其中:所述硬解析策略包括:按照预设的不同报文的偏移量位置,确定所述报文在执行数据提取操作的情况下的偏移量位置;按照所述偏移量位置,执行所述数据提取操作;所述可编程解析策略包括:从所述报文获取关键key值;将所述key值与预先存储的模板进行匹配操作;在匹配操作的结果为命中的情况下,执行数据提取操作。
在本示例性实施例中,两个类别的解析策略是基于功能实现方式来划分的,在利用硬解析策略的节省码源资源的同时,又利用可编程解析策略扩展性好的优势,实现了两个技术优势的共存,实现微码资源的占用与扩展性的折中。
相关技术中对上述方式的改进或优化均适用于本申请实施例提供的方法,此处不再赘述。
在一个示例性实施例中,所述根据所述报文的接收端口,从预先存储的两个类别的解析策略中,确定所述报文对应的解析策略,包括:判断所述报文的接收端口是否为预设的专用端口,所述专用端口为硬件或服务的通信端口;如果所述报文的接收端口为专用端口,则确定对所述报文使用所述符合预设的微码资源占用策略的解析策略;如果所述报文的接收端口不是专用端口,确定对所述报文使用符合预设的业务扩展性策略的解析策略。
在本示例性实施例中,专用端口为通信协议规定的特定端口,可以为环回端口、中央处理器(Central Processing Unit,CPU)端口或者操作维护管理(Operation Administration Maintenance,OAM)引擎端口。上述专用端口的报文类型的数量有限,且报文格式固定,适用于所述符合预设的微码资源占用策略的解析策略;对于除专用端口之外的其他接收端口,为方便业务的扩展性,可以采用符合预设的业务扩展性策略的解析策略。利用接收端口信息确定解析策略的种类,充分发挥不同解析策略的优势,提高解析效率。
在一个示例性实施例中,所述采用确定的解析策略,对所述报文进行解析操作,包括:在利用所述报文对应的key值进行匹配操作后,如果匹配操作结果为命中,则获取对所述报文中内容的管理命令;根据所述管理命令的内容,对所述报文中的内容进行处理。
在本示例性实施例中,在匹配结果为命中时,通过读取管理命令,根据该管理指令,对内容进行管理,实现对报文中重要内容的收集。
在一个示例性实施例中,所述管理指令包括用于对报文中的内容进行搬移、赋值和移位中至少一个种类的运算命令。
在本示例性实施例中,管理命令可以为搬移(move),或赋值(set)立即数,或移位等运算指令;所述管理命令能够同时对多个报文字段进行搬移,赋值,移位运算,指令并行操作能够对解析到的多个报文字段进行处理。
在一个示例性实施例中,所述根据所述管理命令的内容,对所述报文中的内容进行处理,包括:在所述管理命令的数量为至少两个时,采用并行的方式响应所述管理命令。
在本示例性实施例中,管理命令的数量可以为多个,例如多个管理命令为不同种类的至少两个操作;或者,为同一种类的运算操作,对不同的内容的至少两个命令;通过并行执行管理命令,缩短指令执行的时间,与串行执行相比,提高了指令执行效率。
在一个示例性实施例中,所述根据所述管理命令的内容,对所述报文中的内容进行处理之后,所述方法还包括:存储对预设内容的处理结果,并记录所述处理结果的位置信息以及所述内容中所包括的字段的对应关系;根据所述对应关系,对所述报文进行转发操作。
在本示例性实施例中,可以把解析到的报文内容放到描述符里,并标记该内容(字段)在描述符的位置,后级查表转发时可以通过位置标记对结果进行调用,避免再次从报文里进行提取,降低转发微码的复杂度。
在一个示例性实施例中,所述key值是通过如下方式得到的,包括:获取所述报文的数据提取位置的配置请求,所述配置请求包括位置的指示信息;根据所述述配置请求中的位置的指示信息以及预先获取的key值偏移量,得到所述报文的key值。
在本示例性实施例中,通过获取配置请求中位置的指示信息,可以支持用户对提取位置的设置,满足用户的个性化管理需要,满足对解析操作的管理多样性的需求。
在一个示例性实施例中,所述利用所述报文对应的key值进行匹配操作,包括:在获取到报文对应的key值后,利用所述key值进行第i级对应的解析规则的匹配操作,在所述报文的key值在第i级对应的匹配操作结果为命中的情况下,获取新生成的key值,利用新生成的key值进行第i+1级对应的解析规则的匹配操作;在所述报文的key值在第i级对应的匹配操作结果为未命中的情况下,利用所述报文的key值进行第i+1级对应的解析规则的匹配操作,直到执行完预先存储的模板中全部的解析规则为止,其中i小于或等于N的自然数,其中N表示解析规则的等级的总数,N为自然数。
在本示例性实施例中,可以对报文执行多级的匹配解析;如果第一级匹配完成不了解析,会进行最多N级的匹配解析。匹配命中时用管理信息中的新生成的key值进行下级匹配;匹配未命中则继续用原来的key值偏移量进行下一级 匹配,直至解析结束。
通过对key值的多级解析,可以更加全面的获取报文携带的信息,提高信息提取的效率。
下面对本申请示例性实施例提供的方法进行说明:
实施例一
为了克服相关技术中的报文解析技术的缺点,本申请实施例一提供一种硬解析加可编程的报文解析方法,针对部分接收端口的报文采用硬解析方法,其余接收端口的报文采用可编程解析,并对可编程解析进行优化。
图2为本申请实施例提供的另一报文解析方法的流程图。图2所示方法包括如下步骤:
步骤210、对已获取的报文的接收端口进行匹配操作。
如果报文的接收端口为专用端口,则对从专用端口进入的报文采用硬解析实现解析,执行步骤220至步骤230。
如果报文的接收端口不是专用接口,则对从除专用端口之外的端口进入的报文进行可编程解析,执行步骤240至步骤250。
在执行报文的接收端口的匹配操作之前,对所有从接收端口进来的报文进行非法报文检测;对非法报文进行标记,由后级模块决定是否丢弃。
步骤220、按照预先存储的报文的多个层次识别协议类型对应的偏移量,确定所述报文对应层次的偏移量。
步骤230、按照所述偏移量,提取报文内容,用于报文转发处理。
采用步骤220和步骤230的硬解析方式,与可编程解析相比,实现简单,节省了微码资源。
步骤240、利用key值对报文的内容进行多级匹配。
利用key值在预先设置的匹配模块(即预先存储的模板)中进行匹配操作,并输出匹配结果;在获取到报文对应的key值后,利用所述key值进行第i级对应的解析规则的匹配,如果所述报文的key值在第i级对应的匹配操作结果为命中,则获取新生成的key值,利用新生成的key值进行第i+1级对应的解析规则 的匹配操作;如果第i级对应的匹配操作结果为未命中,则利用所述报文的key值进行第i+1级对应的解析规则的匹配操作,以此类推,直到执行完全部的解析规则为止,i小于或等于N的自然数,N表示解析规则的等级的总数,N为自然数。
在一个示例性实施例中,可以对报文执行多级的匹配解析;如果第一级匹配完成不了解析,会进行最多N级的匹配解析。匹配命中时用管理信息中的新生成的key值进行下级匹配;匹配未命中则继续用原来的key值进行下一级匹配,直至解析结束。
在图2所示实施例中,N的取值为6,在获取到key值为key0时,如果第1级的对应的解析规则的匹配结果为命中,则获取新的key值key1,利用key1进行第2级对应的解析规则的匹配操作;相反,如果第1级的对应的匹配操作结果为未命中,则利用key0进行第2级对应的解析规则的匹配操作;以此类推,直到执行完6级的解析规则的匹配操作。
通过对key值的多级解析,可以更加全面的获取报文携带的信息,提高信息提取的效率。
步骤250、获取匹配结果。
图3为本申请实施例提供的每级匹配模块利用key值执行匹配操作的流程示意图。如图3所示,每一级的匹配操作均包括如下步骤:
步骤310、根据预先设置的端口属性表,确定报文的初始key值偏移量(key_offset)。
步骤320、根据所述初始key值偏移量,从报文里提取多段用户感兴趣的报文内容,将提取到的报文内容作为key值。
初始偏移量可以灵活配置。
步骤330、利用key值在预先设置的匹配模块中进行匹配操作,并输出匹配结果。
如果匹配结果为命中,则执行步骤340;如果匹配结果为未命中,流程结束。
步骤340、获取匹配结果中的管理命令。
所述管理命令可以为move、set立即数或移位等运算指令,这些指令能够同 时对多段报文内容进行搬移,赋值,移位运算。
步骤350、执行所述管理命令,得到所需信息。
在执行指令时,采用并行操作,能够提高指令执行效率。
步骤360、管理所述所需信息。
把解析到的报文内容放到描述符里,并标记该字段在描述符的位置,后级查表转发时可以通过位置标记对结果进行调用,避免再次从报文里进行提取,降低转发微码的复杂度;同时,从匹配结果中还可以获得新的key_offset和匹配状态值,进行下一级匹配。
在对匹配状态值进行解析时,判断报文解析是否结束,如果未结束,采用新的key_offset提取key值进行下一级匹配,过程重复步骤310至步骤360,直到解析结束。
对于步骤240中多级匹配模块中,每级匹配模块均可以执行步骤310至步骤360;或者,多级匹配模块中一部分匹配模块执行步骤310至步骤360,剩下的采用其他匹配流程。
本申请实施例提供的方法,充分利用两种解析方法的优势,通过硬解析和可编程解析相结合的方式实现对报文的解析。另外,在可编程解析过程中,支持从报文中多个位置提取内容组成key值,进入到匹配模块进行匹配,匹配完成后在逻辑上引入move、set立即数、加减运算以及移位等操作指令对多段报文内容进行操作,这些指令是并行执行的,与串行执行相比,提高了指令执行效率,最后把操作结果回写到特定的描述符里,后续报文查表处理时可以直接从描述符里取出相应的内容作为查表索引,不必去报文里面再次提取。
实施例二
本申请实施例二提供的方法包括如下步骤:
来自标准以太网口的报文,首先比较媒体存取控制位址(Media Access Control Address,MAC),进行非法报文检测,如果是非法报文则进行丢弃。如果是来自指定端口,如环回端口、CPU端口、OAM引擎端口的报文则直接进行固定偏移的硬解析。对于其他常规报文,查端口属性表,获得初始的key_offset,进行可编程解析。
可编程解析方法包括如下步骤:
步骤410、获取报文的key值,包括:
对于基本的L2报文解析,在匹配模块预先配置像0x8100或0x9100等标签(TAG)类型,根据初始的key_offset配置从MAC地址后面取值,提取到key值送到匹配模块进行匹配。
对于基本的L3报文解析,在匹配模块预先配置像0x8100或0x9100等TAG类型,以太网(Ethernet Type,ETYPE)类型为0x0800,以及其他字段内容,通过key_offset从报文里提取相应字段进到匹配模块去匹配。
对于基本的MPLS报文解析,在匹配模块预先配置像0x8100或0x9100等TAG类型,ETYPE类型为0x8847,以及其他字段内容,通过初始的key_offset从报文里提取相应字段进到匹配模块去匹配。
步骤420、利用报文key值进行查询,得到匹配结果,并利用匹配结果进行信息维护,包括:
对于基本的L2报文解析,匹配命中后,从匹配结果中解析到move等逻辑指令,同时把MAC地址,虚拟局域网标识(Virtual Local Area Network-Identity Document,VLAN_ID)搬移到描述符中,把VLAN层数,报文类型的值填到描述符中,并记录相应的位置,后续进行L2转发查表,可以从描述符中的特定位置取出MAC地址去查表,避免后续再次从报文里提取MAC地址。
对于基本的L3报文解析,匹配命中后,从匹配结果中解析到对应的move等逻辑指令,同时把MAC地址,VLAN_ID,以及IP地址搬移到描述符中,把VLAN层数,报文类型的值填到描述符中,并记录相应的位置,后续进行L3转发查表,可以从描述符中特定位置取出IP地址去查路由表,避免再次从报文里提取IP地址。
对于基本的MPLS报文解析,匹配命中后,从匹配结果中解析到对应的move等逻辑指令,同时把MAC地址,VLAN_ID,以及标签值搬移到描述符中,把VLAN层数,报文类型的值填到描述符中,并记录相应的位置,后续进行标签转发查表,可以从描述符中特定位置取出标签值去查表,避免再次从报文里提取标签值。
步骤430、如果报文组成复杂,像网络虚拟化技术(Virtual eXtensible Local  Area Network,VxLAN),多标签业务,匹配一次之后,还没有完成解析,可以进入下级匹配模块再次进行匹配,重复步骤410和步骤420,直到解析结束。
本申请实施例二提供的方法,对于不同类型的报文,可以通过硬解析和可编程解析相结合的方法解析,与相关技术相比,具有比较好的扩展性的同时,又在一定程度上降低逻辑资源和微码实现的复杂度;对可编程解析方面的优化,提高了解析效率,降低了后续转发查表的代价。
本申请实施例提供一种报文解析装置,包括处理器和存储器,其中所述存储器存储有计算机程序,所述处理器调用所述存储器中的计算机程序以实现上文任一所述的方法。
本申请实施例提供的装置实施例,识别已获取到报文的接收端口,根据所述报文的接收端口,从预先存储的两个类别的解析策略中,确定所述报文对应的解析策略,再采用确定的解析策略,对所述报文进行解析操作,实现基于接收端口,选择两个类别的解析策略共存,为实现微码资源的占用与扩展性的折中提供方案基础。
本领域普通技术人员可以理解,上文中所公开方法中的全部或一些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由多个物理组件合作执行。一些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于随机访问存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、带电可擦可编程只读存储器(Electrically Erasable Programmable read only memory,EEPROM)、闪存或其他存储器技术、便携式紧凑磁盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、数字多功能盘(Digital Video Disc,DVD)或其他光盘存储、磁盒、磁带、磁盘 存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。

Claims (10)

  1. 一种报文解析方法,包括:
    识别已获取到的报文的接收端口;
    根据所述报文的接收端口,从预先存储的两个类别的解析策略中,确定所述报文对应的解析策略;
    采用确定的解析策略,对所述报文进行解析操作。
  2. 根据权利要求1所述的方法,其中,在所述两个类别的解析策略中,一个解析策略符合预设的微码资源占用策略,另一个解析策略符合预设的业务扩展性策略。
  3. 根据权利要求2所述的方法,其中:
    所述符合预设的微码资源占用策略的解析策略为硬解析策略;
    所述符合预设的业务扩展性策略的解析策略为可编程解析策略;其中:
    所述硬解析策略包括:按照预设的不同报文的偏移量位置,确定所述报文在执行数据提取操作的情况下的偏移量位置;按照所述偏移量位置,执行所述数据提取操作;
    所述可编程解析策略包括:从所述报文获取关键key值;将所述key值与预先存储的模板进行匹配操作;在匹配操作的结果为命中的情况下,执行数据提取操作。
  4. 根据权利要求2或3所述的方法,其中,所述根据所述报文的接收端口,从预先存储的两个类别的解析策略中,确定所述报文对应的解析策略,包括:
    判断所述报文的接收端口是否为预设的专用端口,所述专用端口为硬件的通信端口或服务的通信端口;
    响应于所述报文的接收端口为专用端口的判断结果,确定对所述报文使用所述符合预设的微码资源占用策略的解析策略;响应于所述报文的接收端口不是专用端口的判断结果,确定对所述报文使用符合预设的业务扩展性策略的解析策略。
  5. 根据权利要求2或3所述的方法,其中,所述采用确定的解析策略,对所述报文进行解析操作,包括:
    在利用所述报文对应的key值与预先存储的模板进行匹配操作后,在匹配 结果为命中的情况下,获取对所述报文中内容的管理命令;
    根据所述管理命令,对所述报文中的内容进行处理。
  6. 根据权利要求5所述的方法,其中,所述管理指令包括用于对报文中的内容进行搬移、赋值和移位中至少一个种类的运算命令。
  7. 根据权利要求5或6所述的方法,其中,所述根据所述管理命令,对所述报文中的内容进行处理,包括:
    在所述管理命令的数量为至少两个的情况下,采用并行的方式响应所述管理命令。
  8. 根据权利要求5所述的方法,所述根据所述管理命令,对所述报文中的内容进行处理之后,还包括:
    存储对所述报文中的预设内容的处理结果,并记录所述处理结果的位置信息与所述预设内容中所包括的字段的对应关系;
    根据所述位置信息和所述字段的对应关系,对所述报文进行转发操作。
  9. 根据权利要求5所述的方法,其中,所述利用所述报文对应的key值与预先存储的模板进行匹配操作,包括:
    在获取到所述报文对应的key值后,利用所述key值进行所述预先存储的模板中第i级对应的解析规则的匹配操作:在第i级对应的匹配操作的结果为命中的情况下,获取新生成的key值,利用新生成的key值进行所述预先存储的模板中第i+1级对应的解析规则的匹配操作;在第i级对应的匹配操作的结果为未命中的情况下,利用所述报文的key值进行所述预先存储的模板中第i+1级对应的解析规则的匹配操作,直到执行完所述预先存储的模板中全部的解析规则为止,其中i小于或等于N的自然数,其中N表示解析规则的等级的总数,N为自然数。
  10. 一种报文解析装置,包括处理器和存储器,所述存储器存储有计算机程序,所述处理器调用所述存储器中的计算机程序以实现如权利要求1至9任一项所述的方法。
PCT/CN2020/101411 2019-07-10 2020-07-10 报文解析方法和装置 WO2021004536A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910620953.0A CN112217765B (zh) 2019-07-10 2019-07-10 报文解析方法和装置
CN201910620953.0 2019-07-10

Publications (1)

Publication Number Publication Date
WO2021004536A1 true WO2021004536A1 (zh) 2021-01-14

Family

ID=74047419

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/101411 WO2021004536A1 (zh) 2019-07-10 2020-07-10 报文解析方法和装置

Country Status (2)

Country Link
CN (1) CN112217765B (zh)
WO (1) WO2021004536A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995188A (zh) * 2021-03-10 2021-06-18 中国民航信息网络股份有限公司 报文转换方法及中间适配装置、存储介质及电子设备
CN113568925A (zh) * 2021-08-03 2021-10-29 中电金信软件有限公司 一种报文数据的转换方法、装置、电子设备及存储介质
CN114244626A (zh) * 2021-12-31 2022-03-25 苏州盛科通信股份有限公司 一种基于MACSec网络的报文处理方法和装置
CN115002243A (zh) * 2022-08-02 2022-09-02 上海秉匠信息科技有限公司 一种数据处理方法及装置
CN116132558A (zh) * 2023-02-03 2023-05-16 重庆赛力斯新能源汽车设计院有限公司 一种数据解析方法、装置、电子设备和存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113612773B (zh) * 2021-08-03 2023-06-16 厦门至恒融兴信息技术股份有限公司 人工智能实现的智能报文识别和解析系统与方法
CN117240947B (zh) * 2023-11-15 2024-02-02 无锡沐创集成电路设计有限公司 一种报文处理方法、装置及介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1886964A (zh) * 2003-12-04 2006-12-27 英特尔公司 可重配置的帧解析器
CN102143074A (zh) * 2011-03-25 2011-08-03 中兴通讯股份有限公司 网络负荷的分担方法、系统及网络处理器
CN103200084A (zh) * 2013-03-18 2013-07-10 中兴通讯股份有限公司 基于网络处理器的报文预处理方法、装置及网络处理器
WO2014125636A1 (ja) * 2013-02-18 2014-08-21 日本電信電話株式会社 通信装置またはパケット転送方法
CN105553851A (zh) * 2015-12-10 2016-05-04 中国电子科技集团公司第三十二研究所 基于sdn的网络处理器微码和流表实现装置及方法
CN106533943A (zh) * 2016-12-06 2017-03-22 中国电子科技集团公司第三十二研究所 基于网络交换芯片的微码和流表的实现方法
CN109842629A (zh) * 2019-03-03 2019-06-04 北京立思辰安科技术有限公司 基于协议解析框架的自定义协议的实现方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143148B (zh) * 2010-11-29 2014-04-02 华为技术有限公司 用于通用协议解析的参数获取和通用协议解析方法及装置
CN103095609A (zh) * 2013-01-09 2013-05-08 大唐软件技术股份有限公司 一种基于物联网终端的接入适配方法和装置
CN103491145B (zh) * 2013-09-09 2015-05-20 中国科学院计算机网络信息中心 一种物联网异构标识解析方法与系统
CN113259309A (zh) * 2017-07-24 2021-08-13 华为技术有限公司 一种通信方法、设备及存储介质
CN108040040A (zh) * 2017-11-30 2018-05-15 北京锐安科技有限公司 一种应用协议报文的自动化解析方法和装置
CN108134779B (zh) * 2017-12-06 2020-09-18 交控科技股份有限公司 Cbtc通信系统协议解析方法、协议库管理方法
CN108429738B (zh) * 2018-02-11 2021-02-02 中车青岛四方机车车辆股份有限公司 一种数据解析方法及解析平台
CN109495509A (zh) * 2018-12-27 2019-03-19 北京奇安信科技有限公司 网闸的数据传输方法、设备、系统和介质

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1886964A (zh) * 2003-12-04 2006-12-27 英特尔公司 可重配置的帧解析器
CN102143074A (zh) * 2011-03-25 2011-08-03 中兴通讯股份有限公司 网络负荷的分担方法、系统及网络处理器
WO2014125636A1 (ja) * 2013-02-18 2014-08-21 日本電信電話株式会社 通信装置またはパケット転送方法
CN103200084A (zh) * 2013-03-18 2013-07-10 中兴通讯股份有限公司 基于网络处理器的报文预处理方法、装置及网络处理器
CN105553851A (zh) * 2015-12-10 2016-05-04 中国电子科技集团公司第三十二研究所 基于sdn的网络处理器微码和流表实现装置及方法
CN106533943A (zh) * 2016-12-06 2017-03-22 中国电子科技集团公司第三十二研究所 基于网络交换芯片的微码和流表的实现方法
CN109842629A (zh) * 2019-03-03 2019-06-04 北京立思辰安科技术有限公司 基于协议解析框架的自定义协议的实现方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995188A (zh) * 2021-03-10 2021-06-18 中国民航信息网络股份有限公司 报文转换方法及中间适配装置、存储介质及电子设备
CN113568925A (zh) * 2021-08-03 2021-10-29 中电金信软件有限公司 一种报文数据的转换方法、装置、电子设备及存储介质
CN114244626A (zh) * 2021-12-31 2022-03-25 苏州盛科通信股份有限公司 一种基于MACSec网络的报文处理方法和装置
CN114244626B (zh) * 2021-12-31 2024-03-15 苏州盛科通信股份有限公司 一种基于MACSec网络的报文处理方法和装置
CN115002243A (zh) * 2022-08-02 2022-09-02 上海秉匠信息科技有限公司 一种数据处理方法及装置
CN115002243B (zh) * 2022-08-02 2022-11-01 上海秉匠信息科技有限公司 一种数据处理方法及装置
CN116132558A (zh) * 2023-02-03 2023-05-16 重庆赛力斯新能源汽车设计院有限公司 一种数据解析方法、装置、电子设备和存储介质

Also Published As

Publication number Publication date
CN112217765A (zh) 2021-01-12
CN112217765B (zh) 2023-06-30

Similar Documents

Publication Publication Date Title
WO2021004536A1 (zh) 报文解析方法和装置
CN111095901B (zh) 服务操作链接方法、设备、系统、以及可读存储介质
US10063470B2 (en) Data center network system based on software-defined network and packet forwarding method, address resolution method, routing controller thereof
US9602398B2 (en) Dynamically generating flows with wildcard fields
US9882808B2 (en) Packet processing method and apparatus
EP2192725B1 (en) Packet switch being partitioned into virtual LANs (VLANs)
US7876713B2 (en) Label switched routing in SAS expanders
US20150304212A1 (en) Method and apparatus for matching flow table, and switch
EP3451592B1 (en) Packet transmission between vxlan domains
CN112422393A (zh) 可扩展虚拟局域网报文发送方法、计算机设备和可读介质
US10348603B1 (en) Adaptive forwarding tables
WO2020073685A1 (zh) 转发路径确定方法、装置、系统、计算机设备及存储介质
RU2540820C2 (ru) Способ и коммутатор для отправки пакета
WO2015014187A1 (zh) 一种支持多租户的数据转发方法和装置
CN102333039B (zh) 一种转发报文的方法、生成表项的方法及装置
WO2015074397A1 (zh) 一种网络报文的传送方法和设备
CN112887229B (zh) 一种会话信息同步方法及装置
US9847937B2 (en) Hardware acceleration for routing programs
EP2466796B1 (en) User access method, system and access server, access device
WO2021088629A1 (zh) DetNet数据包处理方法及装置
CN108900420B (zh) 流限速方法、装置和服务器
WO2016138845A1 (zh) 一种实现协议报文上送cpu的方法和装置
CN108462683B (zh) 认证方法和装置
US9166819B2 (en) Method and device for realizing flexible QinQ
CN111107008A (zh) 一种反向路径检查方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20837672

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20837672

Country of ref document: EP

Kind code of ref document: A1