WO2022083266A1 - 数据表同步方法及其装置、数据交换设备、存储介质 - Google Patents

数据表同步方法及其装置、数据交换设备、存储介质 Download PDF

Info

Publication number
WO2022083266A1
WO2022083266A1 PCT/CN2021/114105 CN2021114105W WO2022083266A1 WO 2022083266 A1 WO2022083266 A1 WO 2022083266A1 CN 2021114105 W CN2021114105 W CN 2021114105W WO 2022083266 A1 WO2022083266 A1 WO 2022083266A1
Authority
WO
WIPO (PCT)
Prior art keywords
data table
data
entry
entries
synchronization
Prior art date
Application number
PCT/CN2021/114105
Other languages
English (en)
French (fr)
Inventor
田国凤
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2022083266A1 publication Critical patent/WO2022083266A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/021Ensuring consistency of routing table updates, e.g. by using epoch numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/742Route cache; Operation thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a data table synchronization method and device thereof, a data exchange device, and a computer-readable storage medium.
  • each device will maintain a related data table, which is stored in the memory hardware of the device.
  • another data table is often used in the corresponding software platform. Data tables with the same data table items are available for users to view and perform related operations.
  • the data sheet saved in the device hardware is called hardware data sheet, or hardware sheet for short; and the data sheet saved in the software platform is called software data sheet, or software sheet for short.
  • a media access control (Media Access Control, MAC) address table is stored in the switch. Since the MAC address table (ie hardware table) stored in the switch will continue to automatically learn and age, it is necessary to The MAC address table (ie, the software table) in the software platform is updated to ensure that the hardware table and the software table are consistent. However, in the process of processing data table entries by the switch, when packet loss or drift occurs in information transmission, and the information sending and receiving ports are inconsistent, the hardware table in the switch and the software table in the software platform will be inconsistent, which will cause the switch to be inconsistent. The hardware table in the switch is not synchronized with the software table in the software platform, which will cause confusion in the management of the switch.
  • Media Access Control Media Access Control
  • Embodiments of the present application provide a method for synchronizing a data table, a device thereof, a data exchange device, and a computer-readable storage medium.
  • an embodiment of the present application provides a method for synchronizing a data table, including: acquiring a first data table item from a first data table, where the first data table is stored in a database, and the first data table item includes The first key information; according to the first key information, perform matching in the second data table to obtain a matching result, wherein the second data table is stored in the memory, and the first data table is based on the second data table. and obtain; perform a corresponding synchronization operation on the first data table and the third data table according to the matching result, wherein the third data table is consistent with the first data table, and the third data table is consistent with the first data table. stored in the software platform.
  • an embodiment of the present application further provides a data table synchronization device, including: a memory, a processor, and a computer program stored in the memory and executable on the processor, when the processor executes the computer program Implement the data table synchronization method described in the first aspect above.
  • an embodiment of the present application further provides a data exchange device, including the apparatus for synchronizing a data table as described in the second aspect above.
  • an embodiment of the present application further provides a computer-readable storage medium storing computer-executable instructions, where the computer-executable instructions are used to execute the data table synchronization method described in the first aspect above.
  • FIG. 1 is a schematic diagram of a system architecture for executing a data table synchronization method provided by an embodiment of the present application
  • FIG. 2 is a flowchart of a data table synchronization method provided by an embodiment of the present application
  • FIG. 3 is a flowchart of specific steps for obtaining a first data table entry in a data table synchronization method provided by another embodiment of the present application;
  • FIG. 4 is a flowchart of a specific step of periodically acquiring a first data table entry in a data table synchronization method provided by another embodiment of the present application;
  • FIG. 5 is a flowchart of specific steps for synchronizing a first data table and a third data table in a data table synchronization method provided by another embodiment of the present application;
  • FIG. 6 is a flowchart of specific steps for synchronizing a first data table and a third data table in a data table synchronization method provided by another embodiment of the present application;
  • FIG. 7 is a flowchart of specific steps of performing a first processing operation on a first data table and a third data table in a data table synchronization method provided by another embodiment of the present application;
  • FIG. 8 is a flowchart of specific steps of performing a first processing operation on a first data table and a third data table in a data table synchronization method provided by another embodiment of the present application;
  • FIG. 9 is a flowchart of limiting the number of table entries in a data table synchronization method provided by another embodiment of the present application.
  • FIG. 10 is a flowchart of specific steps of performing a second processing operation on a data table in a data table synchronization method provided by another embodiment of the present application;
  • FIG. 11 is a flowchart of specific steps of performing a second processing operation on a data table in a data table synchronization method provided by another embodiment of the present application;
  • FIG. 12 is a flowchart of periodic detection and operation of MAC address table data table synchronization provided by a specific example of the present application.
  • FIG. 13 is a flow chart of limiting the maximum number of entries in the MAC address table data table provided by another specific example of the present application.
  • FIG. 14 is a flowchart of the MAC address table data traffic-triggered learning provided by another specific example of the present application.
  • the present application provides a data table synchronization method and device, data exchange device, and computer-readable storage medium.
  • a first data table entry is obtained from a first data table in a database, wherein the first data table entry includes the first data table entry.
  • One key information since the first data table is a data table made according to the second data table, when the first data table item is obtained, matching and comparison can be performed in the second data table in the memory for the first key information, Thereby, a matching result is obtained, and according to the different matching results, corresponding synchronization operations are performed on the first data table and the third data table, wherein the third data table is stored in the software platform, and the third data table is the same as the first data table. Consistent.
  • the second data table and the third data table are synchronized through the first data table, which can The synchronization success rate of the hardware table in the switch and the software table in the software platform is improved, thereby reducing the probability of management confusion in the switch.
  • FIG. 1 is a schematic diagram of a system architecture for executing a data table synchronization method provided by an embodiment of the present application.
  • the system architecture 100 includes an entry acquisition module 110 , an information detection module 120 , an entry processing module 130 and a timing module 140 .
  • the system architecture 100 can be applied to electronic devices such as switches, computers, servers, etc. These electronic devices can cooperate with each other through the entry acquisition module 110 , the information detection module 120 , the entry processing module 130 and the timing module 140 in the system architecture 100 , to implement the data table synchronization method.
  • the entry obtaining module 110 is configured to obtain the data entry in the data table, for example, if the data table is stored in a database, memory or software platform, the entry obtaining module 110 can obtain the corresponding data table from the database, memory or software platform
  • the key information in the data table item can be obtained.
  • the information detection module 120 is configured to match and compare each data entry in the data table. Matching and comparison is performed, and a data table item containing the same key information as the key information is searched in the data table stored in the memory.
  • the entry processing module 130 is configured to perform operation processing on each data entry in the data table. For example, the entry processing module 130 can delete each data entry in the data table obtained by the entry acquisition module, and can also Each data table entry in the data table is written.
  • the timing module 140 is configured to calculate the running time and the set time interval. For example, the timing module 140 can calculate the system running time. When the calculated system running time reaches the set time, the timing module 140 sends a trigger signal to trigger the entry acquisition module. 110 Obtain the data table item in the corresponding data table from the database.
  • FIG. 1 does not constitute a limitation on the embodiments of the present application, and may include more or less components than those shown in the figure, or combine certain components, or Different component arrangements.
  • FIG. 2 is a flowchart of a data table synchronization method provided by an embodiment of the present application.
  • the data table synchronization method can be applied to a data exchange device, and the data table synchronization method includes but is not limited to step S100. , step S200 and step S300.
  • Step S100 Obtain a first data table item from a first data table, the first data table is stored in a database, and the first data table item includes first key information.
  • the first data table is stored in a database
  • the database is a software-level technology
  • obtaining the first data table from the database can have a better processing speed; in addition, due to the operation of the database (For example, operations such as creating a new data table or backing up a data table) are more flexible, so the efficiency and success rate of using the first data table for data table synchronization in subsequent steps can be improved.
  • the first data table may be a student achievement registration table, a staff management table, or a MAC address table, which is not specifically limited in this embodiment.
  • acquiring the first data table entry from the first data table may specifically be acquiring the first MAC address table entry in the MAC address table from the database, where the first MAC address
  • the table entry may contain MAC information or virtual local area network (Virtual Local Area Network, VLAN) information, or include virtual forwarding instance (Virtual Switching Instance, VSI) information, or include MAC information and VLAN information.
  • VLAN virtual Local Area Network
  • VSI Virtual Switching Instance
  • the first key information may include one or more than two keywords, which is not specifically limited in this embodiment.
  • the first key information in the first data entry may be a worker's name, a job number, or may also include a worker's name and job number; for another example, the first key information in the first data entry may be MAC information , which can be VLAN information or include MAC information and VLAN information.
  • acquiring the first data entry from the first data table may be acquired periodically or triggered by a signal, which is not specifically limited in this embodiment. For example, set the time interval for obtaining the first data table item, and every time the system running time reaches the set time interval, obtain the first data table item of the first data table from the database once; A trigger signal of a data table item, and in response to the trigger signal, the first data table item of the first data table is acquired once.
  • Step S200 according to the first key information, perform matching on the second data table to obtain a matching result, wherein the second data table is stored in the memory, and the first data table is obtained according to the second data table.
  • the first key information carried by the first data table entry is used as an index to scan the second data table stored in the memory, and in the second data table
  • the first key information is matched, and a data table item containing the same key information as the first key information is searched in the second data table, and a matching result is obtained accordingly.
  • the matching result is failure; when the second data table is found to contain the same key information as the first key information If there are data table items with the same key information, the matching result is successful.
  • the first data table is a mapping data table of the second data table, that is, the first data table is based on the second data table.
  • Step S300 perform a corresponding synchronization operation on the first data table and the third data table according to the matching result, wherein the third data table is consistent with the first data table, and the third data table is stored in the software platform.
  • the processing operation corresponding to the matching result is performed on the first data table and the third data table.
  • the matching result is successful, that is, In the second data table, a data table item with the same key information as the first key information can be found. Since the third data table is consistent with the first data table, for the current data table item, it can be considered that the first data table , the second data table and the third data table have been synchronized, so the content of the current data table entry of the first data table and the content of the current data table entry of the third data table can be maintained.
  • the matching result is unsuccessful, that is, the data entry with the same key information as the first key information cannot be found in the second data table.
  • the current data entry of the first data table can be compared
  • the content is updated and synchronized. Since the third data table is consistent with the first data table, when the content of the current data table entry of the first data table is updated and synchronized according to the second data table, the third data table will also be updated and synchronized. The content of the current data table entry of the table is updated and synchronized.
  • the first data table item containing the first key information is obtained from the first data table of the database.
  • the data table is a data table made according to the second data table, so for the first key information in the first data table item, matching and comparison is performed in the second data table of the memory, so as to obtain a matching result, and according to the matching result,
  • the corresponding synchronous processing operation is performed on the first data table and the third data table stored in the software platform, because the third data table is consistent with the first data table, and the first data table stored in the database is compared with that stored in the memory.
  • the second data table has better flexibility, so the second data table and the third data table stored in the software platform can be synchronized through the first data table, which can improve the hardware table in the switch and the software in the software platform.
  • the synchronization success rate of the table can reduce the probability of management confusion of the switch.
  • obtaining the first data table entry from the first data table in step S100 may include, but is not limited to, the following steps:
  • Step S110 periodically acquiring the first data table entry from the first data table.
  • the acquisition of the first data table item for the first data table may be periodic acquisition, and the time interval for acquiring the first data table item may be set, and whenever the system running time reaches a preset time interval , obtain the first data table item in the first data table once, so as to realize the periodic acquisition of the first data table item of the first data table, so that the second data table and the third data table can be periodically obtained in subsequent steps.
  • Table synchronization may be used to determine the acquisition of the first data table item for the first data table.
  • periodically acquiring the first data table entry from the first data table in step S110 may include, but is not limited to, the following steps:
  • step S410 the utilization rate of the processor is determined every preset time interval, and the first data table entry from the first data table is acquired according to the utilization rate.
  • the first data table entry from the first data table may be obtained according to the utilization of the processor. For example, a preset time can be set, and the utilization rate of the processor can be determined every preset time interval. At the current time interval, if the current utilization rate of the processor is less than the utilization threshold, it means that the processor is currently in an idle state , therefore, the first data entry from the first data table can be acquired and subsequent synchronization processing can be performed by using the first data entry without affecting other processes. In addition, if the current utilization of the processor reaches or exceeds the utilization threshold, it means that the processor is currently in a busy state. Subsequent synchronization processing may affect the normal operation of other program services, so the acquisition operation of the first data table entry is not performed.
  • step S300 performing a corresponding synchronization operation on the first data table and the third data table according to the matching result may include but not be limited to the following steps:
  • Step S510 when the matching result is failure, delete the first data entry in the first data table and the first data entry in the third data table.
  • the matching result is a failure, that is, the data table item containing the same key information as the first key information cannot be found in the second data table, and because the first data table and the third data table are The data table made according to the second data table, that is, the first data table and the third data table are based on the second data table, therefore, the current data table items of the first data table can be compared according to the second data table update and synchronize the content of the At the same time, the first data table entry in the third data table is also deleted.
  • step S300 performing a corresponding synchronization operation on the first data table and the third data table according to the matching result, may also include but is not limited to the following steps:
  • Step S610 when the matching result is successful, perform a first processing operation on the first data table and the third data table.
  • step S610 in this embodiment and step S510 in the above-mentioned embodiment shown in FIG. 5 are mutually parallel technical solutions.
  • the matching result when the matching result is successful, that is, a data table item containing the same key information as the first key information is found in the second data table, and since the first data table and the third data table are based on The data table made from the second data table, that is, the first data table and the third data table are based on the second data table, therefore, the current data table item of the first data table can be adjusted according to the second data table.
  • the content is updated and synchronized, that is, the first processing operation is performed on the first data table. Since the third data table is consistent with the first data table, when the first processing operation is performed on the first data table, the The first processing operation is performed in the third data table.
  • the first processing operation is to improve the synchronization success rate of the hardware table in the switch and the software table in the software platform, and perform an update synchronization operation on the data table
  • the first processing operation may include a variety of methods, This embodiment does not specifically limit this.
  • the first processing operation may be to maintain the data table item of the data table, or it may be to delete the data table item of the data table; for another example, the first processing operation may be to perform matching and comparison in the data table according to key information, and obtain a comparison results, and update and synchronize the data table according to the comparison results.
  • the first processing operation on the first data table and the third data table in step S610 may include but not limited to the following steps:
  • Step S710 when the port information corresponding to the first data entry in the first data table is inconsistent with the port information corresponding to the first data entry in the second data table, delete the first data entry and the first data entry in the first data table.
  • the first data table, the second data table and the third data table are all MAC address tables, and the first data table entry contains port information, when the matching result is successful, that is, in the second data table In the case of finding a data table item that contains the same key information as the first key information, compare the port information corresponding to the first data table item in the first data table and the first data table item in the second data table. port information.
  • the port information corresponding to the first data table entry in the two data tables is inconsistent, therefore, for the current data table entry, it can be considered that the first data table and the second data table are not synchronized, and the first data table needs to be updated and synchronized, That is, delete the first data table item in the first data table, because the third data table is consistent with the first data table, so when the first data table item of the first data table is deleted, the first data table item in the first data table is also deleted. The first data table entry of the third data table is deleted.
  • the first processing operation on the first data table and the third data table in step S610 may include but not limited to the following steps:
  • Step S810 when the port information corresponding to the first data entry in the first data table is consistent with the port information corresponding to the first data entry in the second data table, the first data table and the third data table are maintained.
  • step S810 in this embodiment and step S710 in the above-mentioned embodiment shown in FIG. 7 are mutually parallel technical solutions.
  • the first data table, the second data table and the third data table are all MAC address tables, and the first data table entry contains port information, when the matching result is successful, that is, in the second data table In the case of finding a data table item that contains the same key information as the first key information, compare the port information corresponding to the first data table item in the first data table and the first data table item in the second data table. port information.
  • the third data table is consistent with the first data table, for the current data table entry, it can be considered that the first data table and the second data table.
  • the table and the third data table have been synchronized, and the content of the current data table entry of the first data table and the content of the current data table entry of the third data table can be maintained.
  • the data table synchronization method may further include, but is not limited to, step S910 , step S920 and step S930 .
  • Step S910 obtaining a restricted recording threshold.
  • the limit record threshold for limiting the number of data table entries is obtained, wherein the limit record threshold for limiting the number of data table entries recorded by the switch can be obtained from multiple aspects.
  • the limit record threshold can be obtained after being issued by the platform, or it can be obtained from the preset data table capacity data of the machine equipment.
  • Limiting the record threshold can be the number of all entries in the data table in the memory, or the number of corresponding entries in the memory.
  • the data table is a staff management table
  • the data table entry includes the following key information: Department and gender
  • the limit record threshold can be used to limit the number of all entries in the staff management table, or it can be used to limit the number of entries in the staff management table that contain the key information that gender is male.
  • Step S920 acquiring the number of entries recorded in the first data table.
  • the first data table item in the process of limiting the number of data table items, when a data table item containing the same key information as the first key information is found in the second data table, and the first data table item is in the second data table.
  • the corresponding port information in a data table is consistent with the port information corresponding to the first data table entry in the second data table, then it is considered that the software table in the switch is synchronized with the hardware table, and the first data table stored in the software database Since the second data table stored in the memory has better flexibility, by processing the first data table, the limited number processing can be performed quickly.
  • the limit record threshold the first data table is obtained from the database, and the number of corresponding entries recorded in the first data table is calculated.
  • the information of the data table entry in the first data table will also be judged to determine whether the static flag bit in the data table entry is 0, and when the first data table contains a static flag of 1 Bit data table entry, that is, the first data table contains a static MAC address, then the first data table is not operated; when the first data table does not contain a data table entry with a static flag bit of 1, that is, when the A data table only contains dynamic MAC addresses, which limits the number of MAC addresses learned and recorded by the switch.
  • the number of data table entries may be limited based on ports, VLANs, or based on devices, and the number of entries in the data table may be counted.
  • the MAC address is restricted based on the port, that is, the MAC address in a port is restricted, and the number of data entries containing the port information in the data table is calculated; when the MAC address is restricted based on the VLAN, the MAC address in a virtual local area network is restricted. , calculate the number of data table entries containing the VLAN information in the data table; when the MAC address is restricted based on the device, that is, the number of MAC addresses stored in the entire device is limited, and the number of MAC addresses in the current device is calculated.
  • Step S930 Perform a second processing operation on the first data table, the second data table and the third data table according to the number of entries and the limit record threshold.
  • the restricted record threshold and the number of entries recorded in the first data table are compared to obtain different comparison results. According to the different obtained results, corresponding second processing operations are performed on the first data table stored in the database, the second data table stored in the memory, and the third data table stored in the software platform.
  • the second processing operation performed on the first data table, the second data table and the third data table according to the number of entries and the limit record threshold in step S930 may include but not limited to There are the following steps:
  • Step S101 When the number of entries is less than or equal to the limit record threshold, maintain the first data table, the second data table and the third data table.
  • the number of entries is compared with the restricted record threshold, and a comparison result is obtained.
  • the number of entries is less than or equal to the restricted record threshold, it means that the number of data entries in the first data table does not exceed the restricted record threshold, and can Continue to record and save in the first data table.
  • the first data table is a data table made according to the second data table
  • the third data table is consistent with the first data table. Therefore, the first data table and the third data table It is based on the second data table, so it can be considered that the number of corresponding data table items in the first data table, the second data table and the third data table does not exceed the limit record threshold, and the record preservation can continue, and the first data table can be maintained.
  • a second processing operation is performed on the first data table, the second data table and the third data table, and the second processing operation may also be maintaining the first data table.
  • the second data table and the third data table and limit the maximum number of entries of the first data table, the maximum number of entries of the second data table and the maximum number of entries of the third data table as the limit record threshold, which can limit
  • the maximum number of entries in the first data table, the second data table and the third data table can improve the synchronization success rate of the hardware table in the switch and the software table in the software platform, thereby reducing the probability of management confusion in the switch.
  • the second processing operation performed on the first data table, the second data table and the third data table according to the number of entries and the limit record threshold in step S930 may include but not limited to There are the following steps:
  • Step S111 when the number of entries is greater than the limit record threshold, delete the entries in the first data table, the entries in the second data table, and the entries in the third data table, and set the maximum of the first data table.
  • the number of entries, the maximum number of entries in the second data table, and the maximum number of entries in the third data table are limited to limit record thresholds.
  • step S111 in this embodiment is a technical solution in parallel with step S101 in the above-mentioned embodiment as shown in FIG. 10 .
  • the number of entries is compared with the restricted record threshold, and a comparison result is obtained.
  • the number of entries is greater than the restricted record threshold, it means that the number of entries in the first data table exceeds the restricted record threshold, and the data table needs to be checked.
  • the limit operation is performed so that the number of entries in the first data table is limited within a range not exceeding the limit record threshold. Since the first data table is made according to the second data table, and the third data table is consistent with the first data table, the first data table and the third data table are based on the second data table, so , the number of entries in the first data table exceeds the restricted record threshold, that is, the number of entries in the second data table and the number of entries in the third data table both exceed the restricted record threshold.
  • the entry of the data table and the entry of the third data table are deleted, and the maximum number of entries of the first data table, the maximum number of entries of the second data table and the maximum number of entries of the third data table are limited to the limit record threshold, so that in the process of record saving the first data table, the second data table and the third data table, the number of table items in the first data table, the number of table items in the second data table and the table in the third data table The number of items will not exceed the limit record threshold, which can improve the synchronization success rate of the hardware table in the switch and the software table in the software platform, thereby reducing the probability of management confusion in the switch.
  • the data table is a MAC address table
  • the number of entries is the number of MAC addresses
  • the limit record threshold is the maximum number of learning
  • the limit record threshold is used to limit the number of MAC addresses of a port or the number of MAC addresses of a VLAN or a switch. For the number of MAC addresses stored in the device, calculate the number of MAC addresses of the corresponding port in the MAC address table of the database or the number of MAC addresses of the corresponding VLAN or the number of MAC addresses in the current switch device, and compare the maximum learned number.
  • the limit record threshold that is, the number of MAC addresses exceeds the maximum learning number
  • all current MAC address entries in the switch device are deleted, and the maximum number of entries in the first data table and the maximum number of entries in the second data table are deleted
  • the number of entries and the maximum number of entries in the third data table are limited to the limit recording threshold, that is, the maximum value of the underlying MAC address learning register in the modified switch is the limit recording threshold.
  • the software MAC address table of the switch and the hardware MAC address table are synchronized.
  • the MAC address table stored in the software platform performs entry restriction operation, which can achieve rapid convergence in the process of limiting the number of MAC addresses stored in the switch device, and improve the synchronization success rate between the hardware table in the switch and the software table in the software platform. Therefore, the probability of management confusion of the switch can be reduced.
  • the data traffic triggers the learning of the MAC address entries, and the learned MAC address entries are saved in the MAC address table of the hardware memory, and report to the platform.
  • save the MAC address entry in the software MAC address cache table Before reporting to the platform, save the MAC address entry in the software MAC address cache table, and get a feedback after reporting to the platform. When the feedback is reported successfully, delete the MAC address entry in the software MAC address cache table, and delete the MAC address entry in the software MAC address cache table.
  • the address table is saved to the MAC address table of the database and the MAC address table of the software platform; when the reporting and feedback fails, the MAC address and VSI of the MAC address entry in the software MAC address cache table are used as indexes, and the MAC address table of the hardware memory is used as an index.
  • the MAC address entry is deleted. Therefore, the synchronization success rate of the hardware table in the switch and the software table in the software platform is improved.
  • the number of MAC address entries exceeds the maximum learning number again, the bottom layer learning of MAC addresses is turned off, and the maximum learning number of the platform is used to feed back to the software MAC address cache table, so that the platform fails to record the new MAC address, and the MAC address of the hardware memory is changed.
  • the deletion of the corresponding MAC address in the table cannot trigger the learning of the MAC address, thereby improving the synchronization success rate of the hardware table in the switch and the software table in the software platform, and reducing the probability of management confusion in the switch.
  • FIG. 12 is a flow chart of periodic detection and operation of MAC address table data table synchronization provided by a specific example of the present application.
  • the flow can be executed by a switch, and the flow is specifically:
  • Step S201 the running time exceeds a preset time interval
  • Step S202 determining the current utilization rate of the processor
  • Judging C201 whether the current utilization of the processor does not exceed the set threshold? If yes, go to step S203; if not, go to step S206;
  • Step S203 obtaining the first data entry from the first data table, and the first data entry includes MAC information and virtual local area network VLAN information;
  • Step S204 take the MAC information and the virtual local area network VLAN information as indexes, scan the MAC address entry corresponding to the second data table in the hardware;
  • Judgment C203 is the port information of the MAC address entry in the first data table and the second data table consistent? If yes, go to step S206; if not, go to step S205;
  • Step 205 delete the corresponding MAC address entries in the first data table and the third data table
  • Step 206 this synchronization process ends.
  • FIG. 13 is a flow chart of limiting the maximum number of entries in the MAC address table data table provided by a specific example of the present application.
  • the flow can be executed by a switch, and the flow is specifically:
  • Step S301 obtaining a limit recording threshold
  • Step S302 obtaining the first data table in the database
  • Judgment C301 Are all static flag bits in the MAC address entry of the first data table 0? If yes, go to step S303; if no, go to step S307;
  • Step S303 calculating the number of entries in the first data table
  • Judgment C302 does the number of entries exceed the limit record threshold? If yes, go to step S304; if no, go to step S306;
  • Step S304 delete the entry in the first data table, the entry in the second data table and the entry in the third data table;
  • Step S305 limit the maximum number of entries of the first data table, the maximum number of entries of the second data table and the maximum number of entries of the third data table to the limit record threshold, and execute step S307;
  • Step S306 maintaining the first data table, the second data table and the third data table
  • Step S307 this synchronization process ends.
  • FIG. 14 is a flowchart of the MAC address table data traffic-triggered learning provided by a specific example of the present application. This process can be executed by a switch, and the process is specifically:
  • Step S401 the MAC address table entry learned by the data flow is added to the second hardware data table
  • Step S402 adding the MAC address entry to the software cache table and reporting it to the platform;
  • Step S403 adding the MAC address entry received by the platform to the third data table of the software
  • Judging C401 is the MAC address entry successfully added to the third software data table? If yes, go to step S404; if no, go to step S405;
  • Step S404 add the MAC address entry to the first data table of the database, delete the MAC address entry in the software cache table, and perform step S406;
  • Step S405 using the MAC address entry in the cache table to delete the MAC address entry in the hardware second data table, and delete the MAC address entry in the software cache table;
  • Step S406 this synchronization process ends.
  • an embodiment of the present application also provides a data table synchronization apparatus, the data table synchronization apparatus includes: a memory, a processor, and a computer program stored in the memory and executable on the processor.
  • the processor and memory may be connected by a bus or otherwise.
  • the memory can be used to store non-transitory software programs and non-transitory computer-executable programs.
  • the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device.
  • the memory may include memory located remotely from the processor, which may be connected to the processor through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • the data table synchronization apparatus in this embodiment may include the system architecture in the embodiment shown in FIG. 1 , the data table synchronization apparatus in this embodiment and the system architecture in the embodiment shown in FIG. 1 . Since they belong to the same inventive concept, these embodiments have the same realization principle and technical effect, and will not be described in detail here.
  • the non-transitory software programs and instructions required to implement the data table synchronization method of the above-mentioned embodiment are stored in the memory, and when executed by the processor, the data table synchronization method in the above-mentioned embodiment is executed, for example, the above-described FIG. 2 is executed.
  • Method step S810 in FIG. 9 method steps S910 to S930 in FIG. 9 , method step S101 in FIG. 10 , and method step S111 in FIG. 11 .
  • an embodiment of the present application further provides a data exchange device, where the data exchange device includes the data table synchronization apparatus of the foregoing embodiment.
  • the data exchange device in this embodiment has the data table synchronization device in the above-mentioned embodiment
  • the data exchange device in this example has the hardware structure of the data table synchronization device in the above-mentioned embodiment, and can make the data table synchronization device in the data table synchronization device
  • the processor calls the program of the data table synchronization method stored in the memory to realize the data table synchronization method for the data exchange device.
  • the specific implementation of the data exchange device in this embodiment can refer to the above-mentioned embodiments. To avoid redundancy, here No longer.
  • an embodiment of the present application also provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are executed by a processor or controller, for example, by the above-mentioned Executed by a processor in the embodiment of the data table synchronization apparatus, the above-mentioned processor can execute the network slice connection method in the above-mentioned embodiment, for example, the above-described method steps S100 to S300 in FIG. 2 and the method in FIG. 3 are executed Step S110, method step S410 in FIG. 4, method step S510 in FIG. 5, method step S610 in FIG. 6, method step S710 in FIG. 7, method step S810 in FIG. 8, method step S910 in FIG. 9 to S930 , method step S101 in FIG. 10 , and method step S111 in FIG. 11 .
  • the embodiment of the present application includes: acquiring a first data table item from a first data table, the first data table is stored in a database, and the first data table item includes first key information; Matching to obtain a matching result, wherein the second data table is stored in the memory, and the first data table is obtained according to the second data table; according to the matching result, a corresponding synchronization operation is performed on the first data table and the third data table, wherein the first data table and the third data table are synchronized.
  • the third data table is consistent with the first data table, and the third data table is stored in the software platform.
  • the first data table is a data table made according to the second data table
  • the first data table item containing the first key information is obtained in the first data table stored in the database.
  • matching can be performed in the second data table stored in the memory according to the first key information in the first data table item, and according to the matching result, the first data table and the third data table stored in the software platform can be matched.
  • the corresponding synchronous processing operation Since the first data table stored in the database has better flexibility than the second data table stored in the memory, the first data table enables the second data table and the third data table stored in the software platform to communicate with each other.
  • the synchronization processing can improve the synchronization success rate of the hardware table in the switch and the software table in the software platform, thereby reducing the probability of management confusion in the switch.
  • Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices, or may Any other medium used to store desired information and which can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and can include any information delivery media, as is well known to those of ordinary skill in the art .

Abstract

一种数据表同步方法及其装置、数据交换设备、存储介质。其中,数据表同步方法应用于电子设备,该方法包括:获取来自第一数据表的第一数据表项,第一数据表存储于数据库,第一数据表项包括第一关键信息(S100);根据第一关键信息,在第二数据表进行匹配,得到匹配结果,其中,第二数据表存储于存储器,第一数据表根据第二数据表而得到(S200);根据匹配结果对第一数据表和第三数据表进行对应的同步操作,其中,第三数据表与第一数据表相一致,第三数据表存储于软件平台(S300)。

Description

数据表同步方法及其装置、数据交换设备、存储介质
相关申请的交叉引用
本申请基于申请号为202011118162.7、申请日为2020年10月19日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及通信技术领域,尤其涉及一种数据表同步方法及其装置、数据交换设备、计算机可读存储介质。
背景技术
为了便于对设备的管理,每个设备都会维护有相关的数据表,该数据表保存在设备的存储器硬件中,为了方便用户对设备的管理,往往还会在对应的软件平台中采用另一张含有相同数据表项的数据表供用户查看和进行相关操作。保存在设备硬件中的数据表被称为硬件数据表,简称硬件表;而保存在软件平台中的数据表则被称为软件数据表,简称为软件表。
例如,交换机中会保存有媒体访问控制(Media Access Control,MAC)地址表,由于保存在交换机中的MAC地址表(即硬件表)是会不断自动学习和老化的,因此,需要对保存在对应的软件平台中的MAC地址表(即软件表)进行更新处理,以保证硬件表和软件表一致。但交换机在对数据表项进行处理过程中,当发生信息传输出现丢包或漂移、信息收发端口不一致等情况时,会导致交换机中的硬件表和软件平台中的软件表不一致,从而会导致交换机中的硬件表与软件平台中的软件表不同步,因而会造成交换机的管理混乱。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本申请实施例提供了一种数据表同步方法及其装置、数据交换设备、计算机可读存储介质。
第一方面,本申请实施例提供了一种数据表同步方法,包括:获取来自第一数据表的第一数据表项,所述第一数据表存储于数据库,所述第一数据表项包括第一关键信息;根据所述第一关键信息,在第二数据表进行匹配,得到匹配结果,其中,所述第二数据表存储于存储器,所述第一数据表根据所述第二数据表而得到;根据所述匹配结果对所述第一数据表和第三数据表进行对应的同步操作,其中,所述第三数据表与所述第一数据表相一致,所述第三数据表存储于软件平台。
第二方面,本申请实施例还提供了一种数据表同步装置,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如上第一方面所述的数据表同步方法。
第三方面,本申请实施例还提供了一种数据交换设备,包括如上第二方面所述的数据表同步装置。
第四方面,本申请实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行如上第一方面所述的数据表同步方法。
本申请的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本申请而了解。本申请的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。
附图说明
附图用来提供对本申请技术方案的进一步理解,并且构成说明书的一部分,与本申请 的实施例一起用于解释本申请的技术方案,并不构成对本申请技术方案的限制。
图1是本申请一个实施例提供的用于执行数据表同步方法的系统架构的示意图;
图2是本申请一个实施例提供的数据表同步方法的流程图;
图3是本申请另一实施例提供的数据表同步方法中获取第一数据表项的具体步骤的流程图;
图4是本申请另一实施例提供的数据表同步方法中周期性获取第一数据表项的具体步骤的流程图;
图5是本申请另一实施例提供的数据表同步方法中对第一数据表和第三数据表进行同步操作的具体步骤的流程图;
图6是本申请另一实施例提供的数据表同步方法中对第一数据表和第三数据表进行同步操作的具体步骤的流程图;
图7是本申请另一实施例提供的数据表同步方法中对第一数据表和第三数据表进行第一处理操作的具体步骤的流程图;
图8是本申请另一实施例提供的数据表同步方法中对第一数据表和第三数据表进行第一处理操作的具体步骤的流程图;
图9是本申请另一实施例提供的数据表同步方法中限制表项数目的流程图;
图10是本申请另一实施例提供的数据表同步方法中对数据表进行第二处理操作的具体步骤的流程图;
图11是本申请另一实施例提供的数据表同步方法中对数据表进行第二处理操作的具体步骤的流程图;
图12是本申请一具体示例所提供的周期性进行MAC地址表数据表同步检测及操作的流程图;
图13是本申请另一具体示例所提供的限制MAC地址表数据表最大表项数的流程图;
图14是本申请另一具体示例所提供的MAC地址表数据流量触发学习的流程图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。
需要说明的是,虽然在装置示意图中进行了功能模块划分,在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于装置中的模块划分,或流程图中的顺序执行所示出或描述的步骤。说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
本申请提供了一种数据表同步方法及其装置、数据交换设备、计算机可读存储介质,从数据库的第一数据表中获取第一数据表项,其中,第一数据表项中包含有第一关键信息,由于第一数据表是根据第二数据表制作的数据表,因此当获取得到第一数据表项,可以针对第一关键信息,在存储器中的第二数据表中进行匹配对比,从而得出匹配结果,并根据匹配结果不同,对第一数据表和第三数据表进行相应的同步操作,其中,第三数据表存储在软件平台中,第三数据表与第一数据表相一致。由于存储在数据库中的第一数据表较之于存储在存储器中的第二数据表具有更好的灵活性,因而通过第一数据表使得第二数据表和第三数据表进行同步处理,能够提高交换机中的硬件表与软件平台中的软件表的同步成功率,从而能够降低交换机出现管理混乱的概率。
下面结合附图,对本申请实施例作进一步阐述。
如图1所示,图1是本申请一个实施例提供的用于执行数据表同步方法的系统架构的示意图。在图1的示例中,该系统架构100包括表项获取模块110、信息检测模块120、表项处理模块130和定时模块140。
该系统架构100可以应用于交换机、计算机、服务器等电子设备,这些电子设备可以通过该系统架构100中的表项获取模块110、信息检测模块120、表项处理模块130和定时模块140的相互配合,以实现数据表同步方法。
表项获取模块110被设置成获取数据表中的数据表项,例如,如果数据表存储于数据库、存储器或者软件平台中,那么表项获取模块110可以从数据库、存储器或者软件平台获取相应数据表中的数据表项,从而可以获取该数据表项中的关键信息。信息检测模块120被设置成对数据表中各个数据表项进行匹配比较,例如,信息检测模块120可以根据存储于数据库的数据表中相关数据表项的关键信息,在存储于存储器中的数据表进行匹配对比,在存储于存储器的数据表中查找含有与该关键信息相同的关键信息的数据表项。表项处理模块130被设置成对数据表中各个数据表项进行操作处理,例如,表项处理模块130可以对表项获取模块获取得到的数据表中各个数据表项进行删除操作,还可以对数据表中各个数据表项进行写入操作。定时模块140被设置成计算运行时间及设定时间间隔,例如,定时模块140可以计算系统运行时间,当计算的系统运行时间达到设定时间,定时模块140发出触发信号,以触发表项获取模块110从数据库中获取相应数据表中的数据表项。
本申请实施例描述的系统架构以及应用场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域技术人员可知,随着系统架构的演变和新应用场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本领域技术人员可以理解的是,图1中示出的系统架构100的结构并不构成对本申请实施例的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
基于上述系统架构的结构,提出本申请的数据表同步方法的各个实施例。
如图2所示,图2是本申请一个实施例提供的数据表同步方法的流程图,例如,该数据表同步方法可以应用于数据交换设备,该数据表同步方法包括但不限于有步骤S100、步骤S200和步骤S300。
步骤S100,获取来自第一数据表的第一数据表项,第一数据表存储于数据库,第一数据表项包括第一关键信息。
在一实施例中,由于第一数据表存储于数据库中,而数据库是属于软件层面的技术,因此,从数据库中获取第一数据表能够具有更优的处理速度;另外,由于对数据库的操作(例如新建数据表或备份数据表等操作)更具有灵活性,因此可以提高在后续步骤中利用第一数据表进行数据表同步的效率与成功率。
在一实施例中,第一数据表可以是学生成绩登记表,也可以是工作人员管理表,还可以是MAC地址表,本实施例对此并不作具体限定。例如,当第一数据表是MAC地址表,获取来自第一数据表的第一数据表项,具体可以为获取来自数据库的MAC地址表中的第一MAC地址表项,其中,第一MAC地址表项可以包含有MAC信息或者虚拟局域网(Virtual Local Area Network,VLAN)信息,或者包括虚拟转发实例(Virtual Switching Instance,VSI)信息,又或者包括MAC信息与VLAN信息。
在一实施例中,第一关键信息可以包含一个或两个以上的关键字,本实施例对此并不作具体限定。例如,第一数据表项中的第一关键信息可以是工人名字,可以是工号,还可以包括工人名字和工号;又如,第一数据表项中的第一关键信息可以是MAC信息,可以是VLAN信息,也可以包括MAC信息和VLAN信息。
在一实施例中,获取来自第一数据表的第一数据表项,可以是周期性获取,也可以是根据信号触发获取,本实施例对此并不作具体限定。例如,设定获取第一数据表项的时间间隔,每当系统运行时间达到设定的时间间隔,从数据库中获取一次第一数据表的第一数据表项;又如,当接收到获取第一数据表项的触发信号,响应于该触发信号,获取一次第 一数据表的第一数据表项。
步骤S200,根据第一关键信息,在第二数据表进行匹配,得到匹配结果,其中,第二数据表存储于存储器,第一数据表根据第二数据表而得到。
在一实施例中,在获取得到第一数据表项后,以第一数据表项所携带的第一关键信息为索引,扫描存储于存储器中的第二数据表,在第二数据表中针对第一关键信息进行匹配,在第二数据表中查找包含有与第一关键信息相同的关键信息的数据表项,并据此得到匹配结果。例如,当在第二数据表中查找不到包含有与第一关键信息相同的关键信息的数据表项,则匹配结果为失败;当在第二数据表中查找到包含有与第一关键信息相同的关键信息的数据表项,则匹配结果为成功。
值得注意的是,第一数据表是第二数据表的映射数据表,即,第一数据表以第二数据表为基础。
步骤S300,根据匹配结果对第一数据表和第三数据表进行对应的同步操作,其中,第三数据表与第一数据表相一致,第三数据表存储于软件平台。
在一实施例中,根据在第二数据表针对第一关键信息进行匹配得到的匹配结果,对第一数据表和第三数据表进行与匹配结果对应的处理操作,当匹配结果为成功,即在第二数据表中能够查找到与第一关键信息相同的关键信息的数据表项,由于第三数据表与第一数据表相一致,因此,对于当前数据表项,可以认为第一数据表、第二数据表和第三数据表已经同步,因此可以维持第一数据表的当前数据表项的内容和维持第三数据表的当前数据表项的内容。当匹配结果为不成功,即在第二数据表中查找不到与第一关键信息相同的关键信息的数据表项,因此,可以根据第二数据表对第一数据表的当前数据表项的内容进行更新同步,由于第三数据表与第一数据表相一致,所以,在根据第二数据表对第一数据表的当前数据表项的内容进行更新同步的同时,也会对第三数据表的当前数据表项的内容进行更新同步。
在一实施例中,通过采用包括有上述步骤S100、步骤S200和步骤S300的数据表同步方法,从数据库的第一数据表中获取包含有第一关键信息的第一数据表项,由于第一数据表是根据第二数据表制作的数据表,因此针对第一数据表项中的第一关键信息,在存储器的第二数据表中进行匹配对比,从而得出匹配结果,并根据匹配结果,对第一数据表和存储于软件平台的第三数据表进行对应的同步处理操作,由于第三数据表与第一数据表相一致,且存储在数据库的第一数据表较之于存储在存储器的第二数据表具有更好的灵活性,因而通过第一数据表使得第二数据表和存储在软件平台的第三数据表进行同步处理,能够提高交换机中的硬件表与软件平台中的软件表的同步成功率,从而能够降低交换机出现管理混乱的概率。
另外,在一实施例中,参照图3,步骤S100中的获取来自第一数据表的第一数据表项,可以包括但不限于有以下步骤:
步骤S110,周期性获取来自第一数据表的第一数据表项。
在一实施例中,针对第一数据表的第一数据表项的获取可以是周期性的获取,可以通过设定获取第一数据表项的时间间隔,每当系统运行时间达到预设时间间隔,获取一次第一数据表中的第一数据表项,从而实现周期性获取第一数据表的第一数据表项,从而能够在后续步骤中可以周期性地进行第二数据表与第三数据表同步。
另外,在一实施例中,参照图4,步骤S110中的周期性获取来自第一数据表的第一数据表项,可以包括但不限于有以下步骤:
步骤S410,每间隔预设时间确定处理器的利用率,并根据利用率获取来自第一数据表的第一数据表项。
在一实施例中,可以根据处理器的利用率而获取来自第一数据表的第一数据表项。例如,可以设定一个预设时间,每间隔预设时间确定一次处理器的利用率,在当前时间间隔 下,如果处理器的当前利用率小于该利用率阈值,即说明处理器当前处于空闲状态,因此,能够在不影响其他进程的情况下,获取来自第一数据表的第一数据表项并利用该第一数据表项进行后续的同步处理。另外,如果处理器的当前利用率达到或者超过该利用率阈值,即说明处理器当前处于繁忙状态,如果此时获取来自第一数据表的第一数据表项并利用该第一数据表项进行后续的同步处理,则可能会影响其他程序业务的正常运行,因此不执行第一数据表项的获取操作。
另外,在一实施例中,参照图5,步骤S300中的根据匹配结果对第一数据表和第三数据表进行对应的同步操作,可以包括但不限于有以下步骤:
步骤S510,当匹配结果为失败,删除第一数据表中的第一数据表项和第三数据表中的第一数据表项。
在一实施例中,当匹配结果为失败,即在第二数据表中查找不到包含有与第一关键信息相同的关键信息的数据表项,而由于第一数据表和第三数据表是根据第二数据表而制作的数据表,即,第一数据表和第三数据表是以第二数据表为基础的,因此,可以根据第二数据表对第一数据表的当前数据表项的内容进行更新同步,即,删除第一数据表中的第一数据表项,而由于第三数据表与第一数据表相一致,所以,在删除第一数据表中的第一数据表项的同时,也会对第三数据表中的第一数据表项进行删除。
另外,在一实施例中,参照图6,步骤S300中的根据匹配结果对第一数据表和第三数据表进行对应的同步操作,还可以包括但不限于有以下步骤:
步骤S610,当匹配结果为成功,对第一数据表和第三数据表进行第一处理操作。
值得注意的是,本实施例中的步骤S610,与上述如图5所示实施例中的步骤S510互为并列的技术方案。
在一实施例中,当匹配结果为成功,即在第二数据表中查找到包含有与第一关键信息相同的关键信息的数据表项,而由于第一数据表和第三数据表是根据第二数据表而制作的数据表,即,第一数据表和第三数据表是以第二数据表为基础的,因此,可以根据第二数据表对第一数据表的当前数据表项的内容进行更新同步,即对第一数据表进行第一处理操作,而由于第三数据表与第一数据表相一致,所以,在对第一数据表进行第一处理操作的同时,也会对第三数据表中进行第一处理操作。
在一实施例中,第一处理操作是为了能够提高交换机中的硬件表与软件平台中的软件表的同步成功率,而对数据表进行更新同步操作,第一处理操作可以包含多种方式,本实施例对此并不作具体限定。例如,第一处理操作可以是维持数据表的数据表项,也可以是删除数据表的数据表项;又如,第一处理操作可以是根据关键信息在数据表中进行匹配对比,得出对比结果,并根据对比结果对数据表进行更新同步操作。
另外,在一实施例中,参照图7,步骤S610中的对第一数据表和第三数据表进行第一处理操作,可以包括但不限于有以下步骤:
步骤S710,当第一数据表项在第一数据表中对应的端口信息和第一数据表项在第二数据表中对应的端口信息不一致,删除第一数据表中的第一数据表项和第三数据表中的第一数据表项。
在一实施例中,第一数据表、第二数据表和第三数据表都是MAC地址表,并且第一数据表项包含有端口信息,当匹配结果为成功,即在第二数据表中查找到包含有与第一关键信息相同的关键信息的数据表项的情况下,比较第一数据表项在第一数据表中对应的端口信息和第一数据表项在第二数据表中对应的端口信息。当第一数据表项在两个数据表中对应的端口信息不一致,因此,对于当前数据表项,可以认为第一数据表与第二数据表不同步,需要对第一数据表进行更新同步,即,删除第一数据表中的第一数据表项,由于第三数据表与第一数据表相一致,所以,在对第一数据表的第一数据表项进行删除的同时,也会对第三数据表的第一数据表项进行删除。
另外,在一实施例中,参照图8,步骤S610中的对第一数据表和第三数据表进行第一处理操作,可以包括但不限于有以下步骤:
步骤S810,当第一数据表项在第一数据表中对应的端口信息和第一数据表项在第二数据表中对应的端口信息相一致,维持第一数据表和第三数据表。
值得注意的是,本实施例中的步骤S810,与上述如图7所示实施例中的步骤S710互为并列的技术方案。
在一实施例中,第一数据表、第二数据表和第三数据表都是MAC地址表,并且第一数据表项包含有端口信息,当匹配结果为成功,即在第二数据表中查找到包含有与第一关键信息相同的关键信息的数据表项的情况下,比较第一数据表项在第一数据表中对应的端口信息和第一数据表项在第二数据表中对应的端口信息。当第一数据表项在两个数据表中对应的端口信息一致,由于,第三数据表与第一数据表相一致,因此,对于当前数据表项,可以认为第一数据表、第二数据表和第三数据表已经同步,可以维持第一数据表的当前数据表项的内容和维持第三数据表的当前数据表项的内容。
另外,在一实施例中,参照图9,该数据表同步方法还可以包括但不限于有步骤S910、步骤S920和步骤S930。
步骤S910,获取限制记录阈值。
在一实施例中,获取用于限制数据表表项数目的限制记录阈值,其中,限制交换机记录数据表表项数目的限制记录阈值,可以从多个方面进行获取。例如,限制记录阈值可以通过平台下发后进行获取,也可以从机器设备预设的数据表容量数据进行获取。限制记录阈值可以是限定数据表在存储器中的全部表项数目,也可以限定相应表项在存储器中的数目,例如,当数据表为工作人员管理表,数据表项包括有以下关键信息:部门和性别,限制记录阈值可以是用于限制工作人员管理表中的所有表项数目,也可以是限制数据表项中含有性别为男性这一关键信息在工作人员管理表中的表项数目。通过限制数据表的数据表项记录阈值,能够提高交换机中的硬件表与软件平台中的软件表的同步成功率,从而能够降低交换机出现管理混乱的概率。
步骤S920,获取第一数据表所记录的表项数目。
在一实施例中,在进行数据表项数目限制的过程中,当在第二数据表中查找到包含有与第一关键信息相同的关键信息的数据表项,且第一数据表项在第一数据表中对应的端口信息和第一数据表项在第二数据表中对应的端口信息相一致,则认为交换机中的软件表与硬件表同步,存储在软件数据库中的第一数据表比起存储在存储器中的第二数据表具有更好的灵活性,因此,通过对第一数据表进行处理,能够快速进行限制数目处理。根据限制记录阈值,从数据库中获取第一数据表,计算第一数据表中所记录的对应表项数目。其中,当数据表为MAC地址表,还会对第一数据表中的数据表项信息进行判断,判断数据表项中静态标志位是否为0,当第一数据表中含有为1的静态标志位的数据表项,即第一数据表中含有静态MAC地址,则不对该第一数据表进行操作;当第一数据表中不含有为1的静态标志位的数据表项,即,当第一数据表中仅含有动态MAC地址,对交换机学习记录MAC地址数目进行限制。
在一实施例中,当数据表为MAC地址表,可以基于端口、VLAN或者基于设备进行数据表表项数目限制,对数据表的表项数目进行统计。当基于端口对MAC地址进行限制,即限制一个端口中的MAC地址,计算数据表中含有该端口信息的数据表项数目;当基于VLAN对MAC地址进行限制,即限制一个虚拟局域网中的MAC地址,计算数据表中含有该VLAN信息的数据表项数目;当基于设备对MAC地址进行限制,即限制整个设备中存储的MAC地址数目,计算当前设备中MAC地址数目。
步骤S930,根据表项数目和限制记录阈值对第一数据表、第二数据表和第三数据表进行第二处理操作。
在一实施例中,获取限制记录阈值及第一数据表所记录的表项数目后,将限制记录阈值与表项数目进行比较,得到不同的比较结果。根据得到的不同结果,对存储于数据库的第一数据表、存储于存储器的第二数据表和存储于软件平台的第三数据表进行相应的第二处理操作。当在第二数据表中查找到包含有与第一关键信息相同的关键信息的数据表项,且第一数据表项在第一数据表中对应的端口信息和第一数据表项在第二数据表中对应的端口信息相一致,则认为交换机的软件数据表和硬件数据表同步,存储在软件数据库中的第一数据表比起存储在存储器中的第二数据表具有更好的灵活性,因此,通过对第一数据表使得第二数据表和第三数据表进行表项限制处理,能够快速限制交换机设备存储的表项数目,能够提高交换机中的硬件表与软件平台中的软件表的同步成功率,从而能够降低交换机出现管理混乱的概率。
另外,在一实施例中,参照图10,步骤S930中的根据表项数目和限制记录阈值对第一数据表、第二数据表和第三数据表进行第二处理操作,可以包括但不限于有以下步骤:
步骤S101:当表项数目小于或等于限制记录阈值,维持第一数据表、第二数据表和第三数据表。
在一实施例中,对表项数目与限制记录阈值进行比较,得出比较结果,当表项数目小于或等于限制记录阈值,说明第一数据表的数据表项数目没有超过限制记录阈值,能够继续在第一数据表中进行记录保存,由于第一数据表是根据第二数据表制作的数据表,第三数据表与第一数据表相一致,因此,第一数据表和第三数据表是以第二数据表为基础的,所以,可以认为第一数据表、第二数据表和第三数据表中对应的数据表项数目没有超过限制记录阈值,能够继续进行记录保存,可以维持第一数据表、第二数据表和第三数据表。
在一实施例中,当表项数目小于或等于限制记录阈值,对第一数据表、第二数据表和第三数据表进行第二处理操作,第二处理操作还可以是维持第一数据表、第二数据表和第三数据表,并对第一数据表的最大表项数、第二数据表的最大表项数和第三数据表的最大表项数限制为限制记录阈值,能够限制第一数据表、第二数据表和第三数据表各自的表项最大数目,提高交换机中的硬件表与软件平台中的软件表的同步成功率,从而能够降低交换机出现管理混乱的概率。
另外,在一实施例中,参照图11,步骤S930中的根据表项数目和限制记录阈值对第一数据表、第二数据表和第三数据表进行第二处理操作,可以包括但不限于有以下步骤:
步骤S111:当表项数目大于限制记录阈值,对第一数据表中的表项、第二数据表中的表项和第三数据表中的表项进行删除,并把第一数据表的最大表项数、第二数据表的最大表项数和第三数据表的最大表项数限制为限制记录阈值。
值得注意的是,本实施例中的步骤S111,与上述如图10所示实施例中的步骤S101互为并列的技术方案。
在一实施例中,对表项数目与限制记录阈值进行比较,得出比较结果,当表项数目大于限制记录阈值,说明第一数据表的表项数目超过限制记录阈值,需要对数据表进行限制操作,以使第一数据表的表项数目限制在不超过限制记录阈值的范围内。由于第一数据表是根据第二数据表制作的数据表,第三数据表与第一数据表相一致,因此,第一数据表和第三数据表是以第二数据表为基础的,所以,第一数据表的表项数目超出限制记录阈值,即第二数据表的表项数目、第三数据表的表项数目均超出限制记录阈值,需要对第一数据表的表项、第二数据表的表项和第三数据表的表项进行删除,并且将第一数据表的最大表项数、第二数据表的最大表项数和第三数据表的最大表项数限制为限制记录阈值,使得第一数据表、第二数据表和第三数据表在进行记录保存的过程中,第一数据表的表项数目、第二数据表的表项数目和第三数据表的表项数目不会超过限制记录阈值,能够提高交换机中的硬件表与软件平台中的软件表的同步成功率,从而能够降低交换机出现管理混乱的概率。
在一实施例中,数据表为MAC地址表,表项数目为MAC地址数目,限制记录阈值为最大学习数目,限制记录阈值用于限制一个端口的MAC地址数目或者一个VLAN的MAC地址数目或者交换机设备存储的MAC地址数目,计算数据库的MAC地址表中对应端口的MAC地址数目或者对应的VLAN的MAC地址数目或者当前交换机设备中的MAC地址数目,对最大学习数目进行比较。当表项数目大于限制记录阈值,即,MAC地址数目超过最大学习数目,将交换机设备中当前的MAC地址表项全部删除,并把第一数据表的最大表项数、第二数据表的最大表项数和第三数据表的最大表项数限制为限制记录阈值,即,修改交换机中底层MAC地址学习寄存器的最大值为限制记录阈值。因此,当存储于存储器的MAC地址表中查找到包含有与第一关键信息相同的关键信息的数据表项,且MAC地址表项在存储于数据库的MAC地址表中对应的端口信息和MAC地址表项在存储于存储器的MAC地址表中对应的端口信息相一致,则认为交换机的软件MAC地址表和硬件MAC地址表同步,通过软件数据库中的MAC地址表使得存储于存储器的MAC地址表和存储于软件平台中的MAC地址表进行表项限制操作,能够在限制交换机设备存储的MAC地址数目的过程中实现快速收敛,提高交换机中的硬件表与软件平台中的软件表的同步成功率,从而能够降低交换机出现管理混乱的概率。
在一些实施例中,当将交换机设备中当前的MAC地址表项全部删除后,会进行数据流量触发学习MAC地址表项,将学习到的MAC地址表项保存到硬件存储器的MAC地址表中,并上报平台。在上报平台之前将该MAC地址表项保存至软件MAC地址缓存表中,上报平台后得到一个反馈,当上报反馈成功,将软件MAC地址缓存表中的该MAC地址表项删除,并将该MAC地址表保存至数据库的MAC地址表及软件平台的MAC地址表;当上报反馈失败,利用软件MAC地址缓存表中该MAC地址表项的MAC地址及VSI作为索引,将硬件存储器的MAC地址表中该MAC地址表项删除。因此,提高交换机中的硬件表与软件平台中的软件表的同步成功率。当MAC地址表项数目再次超过最大学习数目,关闭MAC地址底层学习,利用平台的最大学习数目,反馈到软件MAC地址缓存表,使得平台中记录新的MAC地址失败,并将硬件存储器的MAC地址表中对应的MAC地址删除,无法触发该MAC地址的学习,从而提高交换机中的硬件表与软件平台中的软件表的同步成功率,能够降低交换机出现管理混乱的概率。
为了更加清楚的说明上述各个实施例中网络切片连接方法的具体步骤流程,下面以具体的示例进行说明。
示例一:
如图12所示,图12是本申请一个具体示例所提供的周期性进行MAC地址表数据表同步检测及操作的流程图,该流程可以由交换机执行,该流程具体为:
步骤S201,运行时间超过预设时间间隔;
步骤S202,确定处理器当前利用率;
判断C201,处理器当前利用率是否不超过设定阈值?若是,执行步骤S203;若否,执行步骤S206;
步骤S203,获取来自第一数据表的第一数据表项,第一数据表项中包含MAC信息和虚拟局域网VLAN信息;
步骤S204,以MAC信息和虚拟局域网VLAN信息为索引,扫描硬件中的第二数据表对应的MAC地址表项;
判断C202,是否扫描到对应的MAC地址表项?若是,执行判断C203;若否,执行步骤S205;
判断C203,该MAC地址表项在第一数据表与第二数据表中的端口信息是否一致?若是,执行步骤S206;若否,执行步骤S205;
步骤205,删除第一数据表与第三数据表中对应的MAC地址表项;
步骤206,本次同步流程结束。
示例二:
如图13所示,图13是本申请一个具体示例所提供的限制MAC地址表数据表最大表项数的流程图,该流程可以由交换机执行,该流程具体为:
步骤S301,获取限制记录阈值;
步骤S302,获取数据库中的第一数据表;
判断C301,第一数据表的MAC地址表项中所有静态标志位是否为0?若是,执行步骤S303;若否执行步骤S307;
步骤S303,计算第一数据表中的表项数目;
判断C302,表项数目是否超过限制记录阈值?若是,执行步骤S304;若否,执行步骤S306;
步骤S304,对第一数据表中的表项、第二数据表中的表项和第三数据表中的表项进行删除;
步骤S305,把第一数据表的最大表项数、第二数据表的最大表项数和第三数据表的最大表项数限制为限制记录阈值,执行步骤S307;
步骤S306,维持第一数据表、第二数据表和第三数据表;
步骤S307,本次同步流程结束。
示例三:
如图14所示,图14是本申请一个具体示例所提供的MAC地址表数据流量触发学习的流程图,该流程可以由交换机执行,该流程具体为:
步骤S401,数据流量学习到的MAC地址表项加入硬件第二数据表;
步骤S402,将该MAC地址表项加入到软件缓存表中并上报平台;
步骤S403,将平台接收到的MAC地址表项加入到软件第三数据表;
判断C401,该MAC地址表项是否成功加入软件第三数据表?若是,执行步骤S404;若否,执行步骤S405;
步骤S404,将该MAC地址表项加入数据库第一数据表,并删除软件缓存表中该MAC地址表项,执行步骤S406;
步骤S405,利用缓存表中该MAC地址表项将硬件第二数据表中该MAC地址表项删除,删除软件缓存表中该MAC地址表项;
步骤S406,本次同步流程结束。
另外,本申请的一个实施例还提供了一种数据表同步装置,该数据表同步装置包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序。
处理器和存储器可以通过总线或者其他方式连接。
存储器作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序以及非暂态性计算机可执行程序。此外,存储器可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施方式中,存储器可包括相对于处理器远程设置的存储器,这些远程存储器可以通过网络连接至该处理器。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
需要说明的是,本实施例中的数据表同步装置,可以包括有如图1所示实施例中的系统架构,本实施例中的数据表同步装置和如图1所示实施例中的系统架构属于相同的发明构思,因此这些实施例具有相同的实现原理以及技术效果,此处不再详述。
实现上述实施例的数据表同步方法所需的非暂态软件程序以及指令存储在存储器中,当被处理器执行时,执行上述实施例中的数据表同步方法,例如,执行以上描述的图2中的方法步骤S100至S300、图3中的方法步骤S110、图4中的方法步骤S410、图5中的方 法步骤S510、图6中的方法步骤S610、图7中的方法步骤S710、图8中的方法步骤S810、图9中的方法步骤S910至S930、图10中的方法步骤S101、图11中的方法步骤S111。
另外,本申请的一个实施例还提供了一种数据交换设备,该数据交换设备包括上述实施例的数据表同步装置。
由于本实施中的数据交换设备具有如上述实施例中的数据表同步装置,因此本实例中的数据交换设备具有上述实施例中数据表同步装置的硬件结构,并且能够使数据表同步装置中的处理器调用存储器中存储的数据表同步方法的程序,以实现对数据交换设备的数据表同步方法,本实施例的数据交换设备的具体实施方式可参照上述实施例,为避免冗余,在此不再赘述。
以上所描述的装置实施例仅仅是示意性的,其中作为分离部件说明的单元可以是或者也可以不是物理上分开的,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
此外,本申请的一个实施例还提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机可执行指令,该计算机可执行指令被一个处理器或控制器执行,例如,被上述数据表同步装置实施例中的一个处理器执行,可使得上述处理器执行上述实施例中的网络切片连接方法,例如,执行以上描述的图2中的方法步骤S100至S300、图3中的方法步骤S110、图4中的方法步骤S410、图5中的方法步骤S510、图6中的方法步骤S610、图7中的方法步骤S710、图8中的方法步骤S810、图9中的方法步骤S910至S930、图10中的方法步骤S101、图11中的方法步骤S111。
本申请实施例包括:获取来自第一数据表的第一数据表项,第一数据表存储于数据库,第一数据表项包括第一关键信息;根据第一关键信息,在第二数据表进行匹配,得到匹配结果,其中,第二数据表存储于存储器,第一数据表根据第二数据表而得到;根据匹配结果对第一数据表和第三数据表进行对应的同步操作,其中,第三数据表与第一数据表相一致,第三数据表存储于软件平台。根据本申请实施例提供的方案,由于第一数据表是根据第二数据表而制作的数据表,因此在获取到存储于数据库的第一数据表中包含第一关键信息的第一数据表项后,可以根据第一数据表项中的第一关键信息,在存储于存储器的第二数据表中进行匹配,并根据匹配结果,对第一数据表和存储于软件平台的第三数据表进行对应的同步处理操作。由于存储于数据库的第一数据表较之于存储于存储器的第二数据表具有更好的灵活性,因此,通过第一数据表使得第二数据表和存储于软件平台的第三数据表进行同步处理,能够提高交换机中的硬件表与软件平台中的软件表的同步成功率,从而能够降低交换机出现管理混乱的概率。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统可以被实施为软件、固件、硬件及其适当的组合。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。
以上是对本申请的一些实施进行了具体说明,但本申请并不局限于上述实施方式,熟 悉本领域的技术人员在不违背本申请范围的前提下还可作出种种的等同变形或替换,这些等同的变形或替换均包含在本申请权利要求所限定的范围内。

Claims (12)

  1. 一种数据表同步方法,应用于电子设备,包括:
    获取来自第一数据表的第一数据表项,所述第一数据表存储于数据库,所述第一数据表项包括第一关键信息;
    根据所述第一关键信息,在第二数据表进行匹配,得到匹配结果,其中,所述第二数据表存储于存储器,所述第一数据表根据所述第二数据表而得到;
    根据所述匹配结果对所述第一数据表和第三数据表进行对应的同步操作,其中,所述第三数据表与所述第一数据表相一致,所述第三数据表存储于软件平台。
  2. 根据权利要求1所述的数据表同步方法,其中,所述获取来自第一数据表的第一数据表项,包括:
    每间隔预设时间确定处理器的利用率,并根据所述利用率获取来自第一数据表的第一数据表项。
  3. 根据权利要求1所述的数据表同步方法,其中,所述根据所述匹配结果对所述第一数据表和第三数据表进行对应的同步操作,包括:
    当所述匹配结果为失败,删除所述第一数据表中的所述第一数据表项和所述第三数据表中的所述第一数据表项。
  4. 根据权利要求1所述的数据表同步方法,其中,所述根据所述匹配结果对所述第一数据表和第三数据表进行对应的同步操作,包括:
    当所述匹配结果为成功,对所述第一数据表和所述第三数据表进行第一处理操作。
  5. 根据权利要求4所述的数据表同步方法,其中,所述第一数据表、所述第二数据表和所述第三数据表均为媒体访问控制MAC地址表,所述第一数据表、所述第二数据表和所述第三数据表还包括端口信息;
    所述对所述第一数据表和所述第三数据表进行第一处理操作,包括:
    当所述第一数据表项在所述第一数据表中对应的端口信息和所述第一数据表项在所述第二数据表中对应的端口信息不一致,删除所述第一数据表中的所述第一数据表项和所述第三数据表中的所述第一数据表项。
  6. 根据权利要求5所述的数据表同步方法,其中,所述对所述第一数据表和所述第三数据表进行第一处理操作,还包括:
    当所述第一数据表项在所述第一数据表中对应的端口信息和所述第一数据表项在所述第二数据表中对应的端口信息相一致,维持所述第一数据表和所述第三数据表。
  7. 根据权利要求5或6所述的数据表同步方法,其中,所述第一关键信息包括MAC信息和虚拟局域网VLAN信息。
  8. 根据权利要求1所述的数据表同步方法,还包括:
    获取限制记录阈值;
    获取所述第一数据表所记录的表项数目;
    根据所述表项数目和所述限制记录阈值对所述第一数据表、所述第二数据表和所述第三数据表进行第二处理操作。
  9. 根据权利要求8所述的数据表同步方法,其中,所述根据所述表项数目和所述限制记录阈值对所述第一数据表、所述第二数据表和所述第三数据表进行第二处理操作,包括:
    当所述表项数目小于或等于所述限制记录阈值,维持所述第一数据表、所述第二数据表和所述第三数据表;
    或者,
    当所述表项数目大于所述限制记录阈值,对所述第一数据表中的表项、所述第二数据表中的表项和所述第三数据表中的表项进行删除,并把所述第一数据表的最大表项数、所述第二数据表的最大表项数和所述第三数据表的最大表项数限制为所述限制记录阈值。
  10. 一种数据表同步装置,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如权利要求1至9中任意一项所述的数据表同步方法。
  11. 一种数据交换设备,包括如权利要求10所述的数据表同步装置。
  12. 一种计算机可读存储介质,存储有计算机可执行指令,其中,所述计算机可执行指令用于使计算机执行如权利要求1至9任意一项所述的数据表同步方法。
PCT/CN2021/114105 2020-10-19 2021-08-23 数据表同步方法及其装置、数据交换设备、存储介质 WO2022083266A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011118162.7 2020-10-19
CN202011118162.7A CN114448869A (zh) 2020-10-19 2020-10-19 数据表同步方法及其装置、数据交换设备、存储介质

Publications (1)

Publication Number Publication Date
WO2022083266A1 true WO2022083266A1 (zh) 2022-04-28

Family

ID=81291545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/114105 WO2022083266A1 (zh) 2020-10-19 2021-08-23 数据表同步方法及其装置、数据交换设备、存储介质

Country Status (2)

Country Link
CN (1) CN114448869A (zh)
WO (1) WO2022083266A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115952172A (zh) * 2023-03-08 2023-04-11 畅捷通信息技术股份有限公司 一种基于数据库临时表的数据匹配方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729410A (zh) * 2009-11-10 2010-06-09 中兴通讯股份有限公司 一种媒体访问控制地址表的同步方法及装置
CN101923566A (zh) * 2010-06-24 2010-12-22 浙江协同数据系统有限公司 一种基于触发器的数据增量抽取方法
US20130142205A1 (en) * 2010-05-18 2013-06-06 Lsi Corporation Hierarchical Self-Organizing Classification Processing in a Network Switch
CN109634846A (zh) * 2018-11-16 2019-04-16 武汉达梦数据库有限公司 一种etl软件测试方法和装置
CN109739936A (zh) * 2019-01-23 2019-05-10 杭州数梦工场科技有限公司 数据同步方法、系统、服务器及计算机可读存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729410A (zh) * 2009-11-10 2010-06-09 中兴通讯股份有限公司 一种媒体访问控制地址表的同步方法及装置
US20130142205A1 (en) * 2010-05-18 2013-06-06 Lsi Corporation Hierarchical Self-Organizing Classification Processing in a Network Switch
CN101923566A (zh) * 2010-06-24 2010-12-22 浙江协同数据系统有限公司 一种基于触发器的数据增量抽取方法
CN109634846A (zh) * 2018-11-16 2019-04-16 武汉达梦数据库有限公司 一种etl软件测试方法和装置
CN109739936A (zh) * 2019-01-23 2019-05-10 杭州数梦工场科技有限公司 数据同步方法、系统、服务器及计算机可读存储介质

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115952172A (zh) * 2023-03-08 2023-04-11 畅捷通信息技术股份有限公司 一种基于数据库临时表的数据匹配方法及装置

Also Published As

Publication number Publication date
CN114448869A (zh) 2022-05-06

Similar Documents

Publication Publication Date Title
US8391289B1 (en) Managing a forwarding table in a switch
US7924833B2 (en) Packet transfer unit
US8542686B2 (en) Ethernet forwarding database method
US8312066B2 (en) Hash collision resolution with key compression in a MAC forwarding data structure
CN107547243B (zh) 一种报文转发方法及装置
CN109981493B (zh) 一种用于配置虚拟机网络的方法和装置
US20190036845A1 (en) Packet forwarding
US20150326526A1 (en) Keeping a terminal access location record alive
WO2016082528A1 (zh) 数据中心网关间虚拟机位置信息同步的方法、网关及系统
US11500851B2 (en) System and method for state object data store
US20200328914A1 (en) Packet transmission
US20180039505A1 (en) Preventing flow interruption caused by migration of vm
CN108234422B (zh) 资源调度方法及装置
WO2022083266A1 (zh) 数据表同步方法及其装置、数据交换设备、存储介质
CN106789859B (zh) 报文匹配方法及装置
CN106888282A (zh) 一种地址解析协议arp表更新方法、板卡及分布式设备
US20220417145A1 (en) Supporting overlay networks for multiple autonomous systems and underlays
CN109218458B (zh) Mac地址的写入方法、设备及计算机可读存储介质
US9130938B2 (en) Method, switch, and system for processing a message
CN108243102B (zh) 一种快速重路由的实现方法和pe设备
US20220360519A1 (en) Method and device for packet forwarding
CN108632125B (zh) 一种组播表项管理方法、装置、设备及机器可读存储介质
CN109274781B (zh) Arp表项刷新方法和装置
CN112804276A (zh) 虚拟化宽带远程接入服务器及其控制方法、通信系统
CN110049149B (zh) Mac地址学习方法、装置及分布式设备

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 05.09.2023)