CN115460160B - Network communication method, system, storage medium and switch based on Full-Mesh networking - Google Patents
Network communication method, system, storage medium and switch based on Full-Mesh networking Download PDFInfo
- Publication number
- CN115460160B CN115460160B CN202210994067.6A CN202210994067A CN115460160B CN 115460160 B CN115460160 B CN 115460160B CN 202210994067 A CN202210994067 A CN 202210994067A CN 115460160 B CN115460160 B CN 115460160B
- Authority
- CN
- China
- Prior art keywords
- switch
- binding table
- information
- access
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 75
- 230000006855 networking Effects 0.000 title claims abstract description 65
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000001360 synchronised effect Effects 0.000 claims abstract description 97
- 230000002776 aggregation Effects 0.000 claims abstract description 57
- 238000004220 aggregation Methods 0.000 claims abstract description 57
- 230000004044 response Effects 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 239000010410 layer Substances 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000003672 processing method Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 239000012792 core layer Substances 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/15—Interconnection of switching modules
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application discloses a network communication method based on Full-Mesh networking, which comprises the steps that when a client side applies for an IP address for the Full-Mesh networking, network communication is conducted on a target access switch connected with the client side in a plurality of access switches, the target access switch builds a DHCP Snooping binding table of the client side, synchronous information is built according to the DHCP Snooping binding table and is sent to an aggregation switch, the aggregation switch conducts synchronous operation according to the synchronous information, the synchronous information is forwarded to switches except the target access switch in the plurality of access switches, and when the client side is connected to a second access switch from the target access switch, network communication is conducted on the basis of the synchronous information stored in the second access switch. The application synchronizes the DHCP Snooping binding tables of each client in the Full-Mesh networking, and when a user roams another switch from the current switch, network communication can be performed based on the pre-synchronized DHCP Snooping binding tables, so that the communication is not interrupted, and the communication efficiency is improved.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a network communication method, system, storage medium, and switch based on Full-Mesh networking.
Background
The large area network generally adopts an access, convergence and core three-layer network architecture, at least one core switch, two convergence switches and a plurality of access switches form a Full-Mesh network in the network, and the network has the functional characteristics of IP address security of the terminal user and roaming of the terminal user.
In order to realize the functional characteristics in the large park network, the DHCPSnooping technology is used for realizing IP address security, namely a DHCP Snooping binding table is generated on an access switch, and a DHCP Snooping binding table synchronization method is used for realizing roaming of end users in the network.
Wherein DHCPSnooping means DHCP (dynamic host configuration protocol) snooping, and the use condition of the user IP address is monitored by snooping the DHCP interactive message between the DHCP client side and the DHCP server.
The traditional three-layer network architecture does not consider the situation that the wireless terminal can roam, namely, the DHCP Snooping binding table only exists on an access switch generating the binding table. When an end user U is online in an access switch A, a DHCP Snooping binding table of the user U is generated in the access switch A, and at the moment, when the user U is in real-time communication and roams to a new access switch B, the user U is considered as a new user in the network because the switch B does not have the DHCP Snooping binding table of the user U, the switch B reassigns an IP address to the user U and generates the new DHCP Snooping binding table, and because the user U is assigned with a new IP, the problems of communication interruption, packet loss, time delay and the like can occur, thereby reducing the communication efficiency.
Disclosure of Invention
The embodiment of the application provides a network communication method, a system, a storage medium and a switch based on Full-Mesh networking. The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview and is intended to neither identify key/critical elements nor delineate the scope of such embodiments. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
In a first aspect, an embodiment of the present application provides a network communication method based on a Full-Mesh networking, where the Full-Mesh networking includes a DHCP server, a plurality of access switches, and at least one aggregation switch, where the DHCP server and the plurality of access switches are communicatively connected through the at least one aggregation switch, and the method includes:
When the client applies for an IP address for Full-Mesh networking successfully, the client determines a target access switch connected with the client from a plurality of access switches to perform network communication;
the target access switch builds a DHCP Snooping binding table of the client, builds synchronous information according to the DHCP Snooping binding table, and sends the synchronous information to the aggregation switch;
The aggregation switch performs synchronous operation according to the synchronous information and forwards the synchronous information to the switches except the target access switch in the plurality of access switches;
when the client connects from the target access switch to the second access switch, network communication is performed based on synchronization information stored in the second access switch, wherein,
The second access switch is any one of the plurality of access switches other than the target access switch.
Optionally, building a DHCP Snooping binding table of the client includes:
acquiring a response message of the DHCP server for the response of the client when the IP address application is successful;
extracting VLAN information, MAC address, IP address, lease data and interface from the response message;
And generating a DHCP Snooping binding table of the client according to the VLAN information, the MAC address, the IP address, the lease data and the interface and combining a data protocol.
Optionally, constructing synchronization information according to the DHCP Snooping binding table includes:
Obtaining binding table operation information, wherein the binding table operation information comprises adding a binding table strategy and deleting the binding table strategy;
And adding the binding table operation information to the DHCP Snooping binding table to generate synchronous information.
Optionally, the target access switch includes a generating module, a synchronizing module, and a storing module;
constructing a DHCP Snooping binding table of the client, constructing synchronous information according to the DHCP Snooping binding table, and sending the synchronous information to a convergence switch, wherein the method comprises the following steps:
the generation module acquires a response message of the DHCP server for the response of the client when the IP address application is successful, and constructs a DHCP Snooping binding table according to the response message;
The generation module constructs synchronous information according to the DHCP Snooping binding table and sends the synchronous information to the synchronous module;
the synchronization module determines binding table operation information according to the received synchronization information;
the storage module processes according to the binding table operation information, and sends the synchronous information to the aggregation switch after the processing is finished.
Optionally, the processing by the storage module according to the binding table operation information includes:
when the binding table operation information is the binding table adding strategy, extracting a DHCP Snooping binding table from the synchronous information, and storing the DHCP Snooping binding table by a storage module;
Or alternatively
When the binding table operation information is the binding table deleting strategy, the storage module deletes the DHCP Snooping binding table in the local database according to the synchronous information.
Optionally, sending the synchronization information to the aggregation switch includes:
When a plurality of aggregation switches exist in the Full-Mesh networking, counting the number of access switches connected on each aggregation switch to obtain the connection quantity of each aggregation switch;
determining a convergence switch with the maximum connection quantity according to the connection quantity of each convergence switch;
And sending the synchronous information to the aggregation switch with the maximum connection quantity.
Optionally, the method further comprises:
When any one first access switch in a plurality of access switches in a Full-Mesh networking is restarted or a newly added first access switch exists, the first access switch generates binding table Full synchronization information;
the first access switch determines a convergence switch with the maximum connection quantity in the Full-Mesh networking;
the first access switch sends the total synchronous information of the binding table to the convergence switch with the maximum connection amount to carry out synchronous request;
The aggregation switch with the maximum connection quantity packs and sends all local DHCP Snooping binding tables to a first access switch;
The first access switch extracts all received DHCP Snooping binding tables one by one.
In a second aspect, an embodiment of the present application provides a network communication system based on Full-Mesh networking, where the system includes Full-Mesh networking, the Full-Mesh networking includes a DHCP server, a plurality of access switches, and at least one aggregation switch, where the DHCP server is communicatively connected with the plurality of access switches through the at least one aggregation switch, and the system includes:
When the client applies for an IP address for Full-Mesh networking successfully, the client determines a target access switch connected with the client from a plurality of access switches to perform network communication;
the target access switch builds a DHCP Snooping binding table of the client, builds synchronous information according to the DHCP Snooping binding table, and sends the synchronous information to the aggregation switch;
The aggregation switch performs synchronous operation according to the synchronous information and forwards the synchronous information to the switches except the target access switch in the plurality of access switches;
when the client connects from the target access switch to the second access switch, network communication is performed based on synchronization information stored in the second access switch, wherein,
The second access switch is any one of the plurality of access switches other than the target access switch.
In a third aspect, embodiments of the present application provide a computer storage medium having stored thereon a plurality of instructions adapted to be loaded by a processor and to perform the above-described method steps.
In a fourth aspect, an embodiment of the present application provides a switch, which may include a processor and a memory, wherein the memory stores a computer program adapted to be loaded by the processor and to perform the above-described method steps.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
in the embodiment of the application, firstly, when a client applies for an IP address for Full-Mesh networking, a target access switch connected with the client is determined in a plurality of access switches to carry out network communication, then the target access switch constructs a DHCP Snooping binding table of the client, synchronous information is constructed according to the DHCP Snooping binding table and is sent to an aggregation switch, secondly, the aggregation switch carries out synchronous operation according to the synchronous information, the synchronous information is forwarded to switches except the target access switch in the plurality of access switches, and finally, when the client is connected to a second access switch from the target access switch, network communication is carried out based on the synchronous information stored in the second access switch. Because the DHCP Snooping binding tables of each client are synchronized in the Full-Mesh networking, when a user roams another switch from the current switch, network communication can be performed based on the pre-synchronized DHCP Snooping binding tables, so that the communication is not interrupted, and the communication efficiency is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a method flow diagram of a network communication method based on Full-Mesh networking according to an embodiment of the present application;
Fig. 2 is a schematic structural diagram of a network communication system based on Full-Mesh networking according to an embodiment of the present application;
fig. 3 is a schematic diagram of a switch structure according to an embodiment of the present application;
fig. 4 is a schematic diagram of a program product according to an embodiment of the present application.
Detailed Description
The following description and the drawings sufficiently illustrate specific embodiments of the invention to enable those skilled in the art to practice them.
It should be understood that the described embodiments are merely some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention as detailed in the accompanying claims.
In the description of the present invention, it should be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art. Furthermore, in the description of the present invention, unless otherwise indicated, "a plurality" means two or more. "and/or" describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate that there are three cases of a alone, a and B together, and B alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
The application provides a network communication method, a system, a storage medium and a DHCP server based on Full-Mesh networking, which are used for solving the problems existing in the related technical problems. Because the application synchronizes the DHCP Snooping binding tables of each client in the Full-Mesh networking, when a user roams another switch from the current switch, network communication can be performed based on the pre-synchronized DHCP Snooping binding tables, so that the communication is not interrupted, the communication efficiency is improved, and the application adopts an exemplary embodiment for detailed description.
The following will describe in detail a network communication method based on Full-Mesh networking according to an embodiment of the present application with reference to fig. 1 to fig. 2. The method may be implemented in dependence on a computer program, and may be run on a Full-Mesh networking based network communication device based on von neumann system. The computer program may be integrated in the application or may run as a stand-alone tool class application.
Referring to fig. 1, a flow chart of a network communication method based on Full-Mesh networking is provided in an embodiment of the present application. As shown in fig. 1, the method according to the embodiment of the present application may include the following steps:
S101, when a client applies for an IP address for Full-Mesh networking successfully, the client determines a target access switch connected with the client from a plurality of access switches to perform network communication;
the Full-Mesh networking comprises a DHCP server, a plurality of access switches and at least one aggregation switch, wherein the DHCP server and the access switches are in communication connection through the aggregation switch.
For example, as shown in fig. 2, fig. 2 is a Full-Mesh networking deployed in a large campus or a fixed area, where the networking includes a core layer, a convergence layer, and an access layer. The core layer includes a DHCP server (DHCP SERVER), the convergence layer includes a plurality of convergence switches (Spine), the access layer includes a plurality of access switches (Leaf), and the user terminal or client accesses DHCP SERVER on each Leaf for network communication and then the user logs on.
For example, access switches are deployed in different cells in a large campus or a fixed area, and in the prior art, when a user client leaves from one small area, the client is disconnected from the access switch in the area, and normal communication cannot be restored until the client finishes the connection on the access switch in another area. Because the access switch in another area needs the user to execute a process of acquiring the IP address by the DHCP once, communication interruption occurs, and communication efficiency is reduced.
In the embodiment of the application, when the client applies for the IP address aiming at the Full-Mesh networking, a typical process of acquiring the IP address by the client is as follows:
1. the Client sends a DHCPDISCOVER broadcast message to DHCPSERVER, and if the Client does not receive the response of the server within a certain time, the DHCPDISCOVER message is retransmitted.
2. After receiving the DHCPDISCOVER message, the DHCP server distributes an IP address to clients according to a certain strategy, and then sends out a DHCPOFFER message.
3. After receiving the DHCPOFFER message, the client sends a DHCPREQUEST request to lease the IP address in the address pool of the DHCP server, and notifies other servers that the IP address allocated by the DHCP server has been accepted.
4. The DHCP server receives the DHCPREQUEST message, verifies whether the resource can be allocated, if so, sends a DHCPACK message, and if not, sends a DHCPNAK message. The client receives the DHCPACK message and starts to use the IP address allocated by the DHCP server. If the DHCPNAK is received, the DHCPDISCOVER message is retransmitted.
In one possible implementation manner, when the client applies for the IP address for Full-Mesh networking successfully, the client determines that the target access switch connected to the client performs network communication in multiple access switches, and the client can successfully surf the internet.
S102, a target access switch builds a DHCP Snooping binding table of a client, builds synchronous information according to the DHCP Snooping binding table, and sends the synchronous information to a convergence switch;
In the embodiment of the application, when the target access switch constructs a DHCP Snooping binding table of the client, the target access switch firstly acquires a response message responded by the DHCP server to the client when the IP address application is successful, then extracts VLAN information, a MAC address, an IP address, lease data and an interface from the response message, finally generates the DHCP Snooping binding table of the client according to the VLAN information, the MAC address, the IP address, the lease data and the interface and combines a data protocol.
In the embodiment of the application, when synchronous information is constructed according to a DHCP Snooping binding table, binding table operation information is firstly obtained, wherein the binding table operation information comprises adding a binding table strategy and deleting the binding table strategy, and then the binding table operation information is added to the DHCP Snooping binding table to generate synchronous information.
In one possible implementation, the target access switch comprises a generating module, a synchronizing module and a storage module, wherein the generating module firstly acquires a response message responded by the DHCP server for the client when the IP address application is successful, constructs a DHCP Snooping binding table according to the response message, then constructs synchronizing information according to the DHCP Snooping binding table, sends the synchronizing information to the synchronizing module, and then determines binding table operation information according to the received synchronizing information, and finally the storage module processes according to the binding table operation information and sends the synchronizing information to the convergence switch after the processing is finished.
Specifically, when the storage module processes according to the binding table operation information, when the binding table operation information is the binding table adding strategy, a DHCP Snooping binding table is extracted from the synchronous information, and the storage module stores the DHCP Snooping binding table, or when the binding table operation information is the binding table deleting strategy, the storage module deletes the DHCP Snooping binding table in the local database according to the synchronous information.
Specifically, when synchronous information is sent to a convergence switch, when a plurality of convergence switches exist in a Full-Mesh networking, firstly counting the number of access switches connected to each convergence switch to obtain the connection quantity of each convergence switch, then determining the convergence switch with the maximum connection quantity according to the connection quantity of each convergence switch, and finally sending the synchronous information to the convergence switch with the maximum connection quantity.
For example, after the client applies for IP successfully, the generating module in the access switch extracts information from the response message from the DHCP server, forms a DHCP Snooping binding table based on the information, and stores the DHCP Snooping binding table locally by the storage module, generates additional binding table information to generate synchronous information and then sends the synchronous information to the synchronous module, the synchronous module of the 2 access switch receives the synchronous information of the DHCP Snooping binding table, if judging that the synchronous information is the additional binding table information, extracts the DHCP Snooping binding table and stores the DHCP Snooping binding table locally by the storage module, and if judging that the synchronous information is the deletion binding table information, the storage module deletes the local binding table. And sending the information to the aggregation switch with the largest connection number according to the cached connection number information of the aggregation switch.
S103, the aggregation switch performs synchronous operation according to the synchronous information and forwards the synchronous information to a switch except a target access switch in the plurality of access switches;
In one possible implementation manner, after receiving the synchronization information of the DHCP Snooping binding table, the synchronization module of the aggregation switch extracts the DHCP Snooping binding table from the synchronization information and stores the DHCP Snooping binding table in the storage module to the local if the synchronization information is judged to be added binding table information, and deletes the local binding table from the storage module if the synchronization information is judged to be deleted binding table information. And forwarding the synchronous information of the DHCP Snooping binding table to other access switches and aggregation switches in the Full-Mesh networking. The other access exchanger or the aggregation exchanger synchronous module receives the synchronous information of the DHCP Snooping binding table from the aggregation exchanger, if the synchronous information is judged to be the added binding table information, the DHCP Snooping binding table is extracted from the synchronous information and is stored to the local by the storage module, and if the synchronous information is judged to be the deleted binding table information, the local binding table is deleted by the storage module.
In another possible implementation manner, when any one of the plurality of access switches in the Full-Mesh networking is restarted or a newly added first access switch exists, the first access switch generates total synchronization information of a binding table, firstly the first access switch determines a convergence switch with the largest connection amount in the Full-Mesh networking, then the first access switch sends the total synchronization information of the binding table to the convergence switch with the largest connection amount for synchronous request, secondly the convergence switch with the largest connection amount packages all the local DHCP Snooping binding tables to the first access switch, and finally the first access switch extracts all the received DHCP Snooping binding tables one by one.
It should be noted that, in the Full-Mesh networking, any access switch is connected with at least one aggregation switch, a DHCP Snooping function is started on the access switch, when any access switch sniffs that the down-hanging terminal device has DHCP interaction and distributes an effective IP address, a DHCP Snooping binding table is generated and stored locally, and the DHCP Snooping binding table is synchronized to all aggregation switches and access switches in the whole networking through steps S101-S103.
Further, in the Full-Mesh networking, configuration needs to be performed in advance through a configuration module, 1) the role of the switch is configured to be accessed or converged. 2) Configuring the switch network information. Peers, either access switches or aggregation switches, are peers to each other. The neighbors are the neighbors between the access switch and the aggregation switch. The access switch needs to configure the directly connected aggregation switch as a neighbor, and the aggregation switch needs to configure the directly connected access switch as a neighbor, and other aggregation switches in the networking are configured as peers.
S104, when the client is connected to the second access switch from the target access switch, network communication is performed based on the synchronization information stored in the second access switch;
wherein the second access switch is any one of the plurality of access switches except the target access switch.
In the embodiment of the application, after the DHCP Snooping binding table is synchronized to all aggregation switches and access switches of the whole network, when the client is connected to a second access switch from a target access switch, the DHCP Snooping binding table of the client is pre-stored on the second access switch, so that network communication can be rapidly performed according to the information of the binding table.
By adopting the technical method provided by the embodiment of the invention, the synchronization function of all DHCP Snooping binding tables in the whole Full-Mesh networking can be realized, the terminal equipment is ensured not to apply for an IP address again when roaming in a park, the continuity and the safety of communication are ensured, and the backup function of a plurality of aggregation switches is utilized, so that the reliability of DHCP Snooping synchronization is improved. And considering that the performance of the access switch is often not high, the method transfers the synchronous pressure to the convergence switch with higher performance so as to balance the performance and improve the efficiency and the stability of the method.
In the embodiment of the application, firstly, when a client applies for an IP address for Full-Mesh networking, a target access switch connected with the client is determined in a plurality of access switches to carry out network communication, then the target access switch constructs a DHCP Snooping binding table of the client, synchronous information is constructed according to the DHCP Snooping binding table and is sent to an aggregation switch, secondly, the aggregation switch carries out synchronous operation according to the synchronous information, the synchronous information is forwarded to switches except the target access switch in the plurality of access switches, and finally, when the client is connected to a second access switch from the target access switch, network communication is carried out based on the synchronous information stored in the second access switch. Because the DHCP Snooping binding tables of each client are synchronized in the Full-Mesh networking, when a user roams another switch from the current switch, network communication can be performed based on the pre-synchronized DHCP Snooping binding tables, so that the communication is not interrupted, and the communication efficiency is improved.
For example, as shown in fig. 2, the embodiment of the application provides a network communication system based on Full-Mesh networking. The system of the embodiment of the application comprises a Full-Mesh networking, a Dynamic Host Configuration Protocol (DHCP) server, a plurality of access switches and at least one aggregation switch, wherein the Full-Mesh networking comprises the DHCP server, the plurality of access switches and the at least one aggregation switch;
When the client applies for an IP address for Full-Mesh networking successfully, the client determines a target access switch connected with the client from a plurality of access switches to perform network communication;
the target access switch builds a DHCP Snooping binding table of the client, builds synchronous information according to the DHCP Snooping binding table, and sends the synchronous information to the aggregation switch;
The aggregation switch performs synchronous operation according to the synchronous information and forwards the synchronous information to the switches except the target access switch in the plurality of access switches;
when the client connects from the target access switch to the second access switch, network communication is performed based on synchronization information stored in the second access switch, wherein,
The second access switch is any one of the plurality of access switches other than the target access switch.
In the embodiment of the application, firstly, when a client applies for an IP address for Full-Mesh networking, a target access switch connected with the client is determined in a plurality of access switches to carry out network communication, then the target access switch constructs a DHCP Snooping binding table of the client, synchronous information is constructed according to the DHCP Snooping binding table and is sent to an aggregation switch, secondly, the aggregation switch carries out synchronous operation according to the synchronous information, the synchronous information is forwarded to switches except the target access switch in the plurality of access switches, and finally, when the client is connected to a second access switch from the target access switch, network communication is carried out based on the synchronous information stored in the second access switch. Because the DHCP Snooping binding tables of each client are synchronized in the Full-Mesh networking, when a user roams another switch from the current switch, network communication can be performed based on the pre-synchronized DHCP Snooping binding tables, so that the communication is not interrupted, and the communication efficiency is improved.
The invention also provides a computer readable medium, on which program instructions are stored, which when executed by a processor, implement the network communication method based on Full-Mesh networking provided by the above method embodiments.
The invention also provides a computer program product containing instructions which, when run on a computer, cause the computer to perform the network communication method based on Full-Mesh networking of the above method embodiments.
Referring to fig. 3, a schematic diagram of a switch according to some embodiments of the present application is shown. As shown in fig. 3, the switch 2 includes a processor 200, a memory 201, a bus 202 and a communication interface 203, where the processor 200, the communication interface 203 and the memory 201 are connected through the bus 202, and a computer program that can be run on the processor 200 is stored in the memory 201, and when the processor 200 runs the computer program, the network communication processing method based on the Full-Mesh networking provided by any one of the foregoing embodiments of the present application is executed.
The memory 201 may include a high-speed random access memory (RAM: random Access Memory), and may further include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is implemented via at least one communication interface 203 (which may be wired or wireless), the internet, a wide area network, a local network, a metropolitan area network, etc. may be used.
Bus 202 may be an ISA bus, a PCI bus, an EISA bus, or the like. The buses may be divided into address buses, data buses, control buses, etc. The memory 201 is configured to store a program, and the processor 200 executes the program after receiving an execution instruction, and the network communication processing method based on the Full-Mesh networking disclosed in any of the foregoing embodiments of the present application may be applied to the processor 200 or implemented by the processor 200.
The processor 200 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in the processor 200 or by instructions in the form of software. The processor 200 may be a general-purpose processor including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc., or may be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in the memory 201, and the processor 200 reads the information in the memory 201, and in combination with its hardware, performs the steps of the above method.
The network communication processing method based on the Full-Mesh networking provided by the embodiment of the application has the same beneficial effects as the method adopted, operated or realized by the same inventive concept as the network communication processing method based on the Full-Mesh networking provided by the embodiment of the application.
The embodiment of the present application further provides a computer readable storage medium corresponding to the network communication method based on the Full-Mesh networking provided in the foregoing embodiment, referring to fig. 4, the computer readable storage medium is shown as an optical disc 30, on which a computer program (i.e. a program product) is stored, where the computer program, when executed by a processor, performs the network communication method based on the Full-Mesh networking provided in any of the foregoing embodiments.
It should be noted that examples of the computer readable storage medium may also include, but are not limited to, a phase change memory (PRAM), a Static Random Access Memory (SRAM), a Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a flash memory, or other optical or magnetic storage medium, which will not be described in detail herein.
The computer readable storage medium provided by the above embodiment of the present application has the same beneficial effects as the method adopted, operated or implemented by the application program stored in the computer readable storage medium, because the same inventive concept is adopted by the network communication method based on Full-Mesh networking provided by the embodiment of the present application.
The present application is not limited to the above-mentioned embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present application are intended to be included in the scope of the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in the embodiments may be accomplished by a computer program to instruct related hardware, and the program for network communication based on Full-Mesh networking may be stored in a computer readable storage medium, where the program may include the flow of the embodiments of the above-described methods when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory, a random access memory, or the like.
The foregoing disclosure is illustrative of the present application and is not to be construed as limiting the scope of the application, which is defined by the appended claims.
Claims (7)
1. A network communication method based on Full-Mesh networking is characterized in that the Full-Mesh networking comprises a DHCP server, a plurality of access switches and at least one aggregation switch, the DHCP server and the access switches are in communication connection through the aggregation switch, and the method comprises the following steps:
When the client applies for an IP address for the Full-Mesh networking successfully, the client determines a target access switch connected with the client from the plurality of access switches to perform network communication;
the target access switch builds a DHCP Snooping binding table of the client, builds synchronization information according to the DHCP Snooping binding table, and sends the synchronization information to the aggregation switch,
The target access switch comprises a generation module, a synchronization module and a storage module;
The step of constructing a DHCP Snooping binding table of the client, constructing synchronous information according to the DHCP Snooping binding table, and sending the synchronous information to the aggregation switch, comprising the following steps:
The generation module acquires a response message responded by the DHCP server aiming at the client when the IP address application is successful, and constructs a DHCP Snooping binding table according to the response message;
the generation module constructs synchronous information according to the DHCP Snooping binding table and sends the synchronous information to a synchronous module;
The synchronization module determines binding table operation information according to the received synchronization information;
the storage module processes according to the binding table operation information, and sends the synchronous information to the aggregation switch after the processing is finished,
The sending the synchronization information to the aggregation switch includes:
when a plurality of aggregation switches exist in the Full-Mesh networking, counting the number of access switches connected on each aggregation switch to obtain the connection quantity of each aggregation switch;
determining a convergence switch with the maximum connection quantity according to the connection quantity of each convergence switch;
transmitting the synchronization information to a convergence switch with the maximum connection quantity;
The aggregation switch performs synchronous operation according to the synchronous information and forwards the synchronous information to the switches except the target access switch in the plurality of access switches;
When the client connects to a second access switch from the target access switch, network communication is performed based on synchronization information stored in the second access switch, wherein,
The second access switch is any one of the plurality of access switches other than the target access switch.
2. The method of claim 1, wherein said constructing a DHCP Snooping binding table for the client comprises:
Acquiring a response message of the DHCP server for the response of the client when the IP address application is successful;
extracting VLAN information, MAC address, IP address, lease data and interface from the response message;
And generating a DHCP Snooping binding table of the client according to the VLAN information, the MAC address, the IP address, the lease data and the interface and combining a data protocol.
3. The method according to claim 1, wherein said constructing synchronization information from said DHCP Snooping binding table comprises:
obtaining binding table operation information, wherein the binding table operation information comprises adding a binding table strategy and deleting the binding table strategy;
And adding the binding table operation information to the DHCP Snooping binding table to generate synchronous information.
4. The method of claim 1, wherein the memory module processes according to the binding table operation information, comprising:
When the binding table operation information is a binding table adding strategy, extracting a DHCP Snooping binding table from the synchronous information, and storing the DHCP Snooping binding table by the storage module;
Or alternatively
When the binding table operation information is a binding table deleting strategy, the storage module deletes the DHCP Snooping binding table in the local database according to the synchronous information.
5. The method according to claim 1, wherein the method further comprises:
when any one first access switch in a plurality of access switches in the Full-Mesh networking is restarted or a newly added first access switch exists, the first access switch generates binding table Full synchronization information;
the first access switch determines a convergence switch with the maximum connection quantity in the Full-Mesh networking;
the first access switch sends the total synchronous information of the binding table to the aggregation switch with the maximum connection amount to carry out synchronous request;
the aggregation switch with the maximum connection quantity packages all local DHCP Snooping binding tables and sends the packaged DHCP Snooping binding tables to the first access switch;
and the first access switch extracts all received DHCP Snooping binding tables one by one.
6. A computer storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the method of any one of claims 1-5.
7. A switch comprising a processor and a memory, wherein the memory stores a computer program adapted to be loaded by the processor and to perform the method according to any of claims 1-5.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210994067.6A CN115460160B (en) | 2022-08-18 | 2022-08-18 | Network communication method, system, storage medium and switch based on Full-Mesh networking |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210994067.6A CN115460160B (en) | 2022-08-18 | 2022-08-18 | Network communication method, system, storage medium and switch based on Full-Mesh networking |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN115460160A CN115460160A (en) | 2022-12-09 |
| CN115460160B true CN115460160B (en) | 2024-12-06 |
Family
ID=84298323
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210994067.6A Active CN115460160B (en) | 2022-08-18 | 2022-08-18 | Network communication method, system, storage medium and switch based on Full-Mesh networking |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115460160B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116367159A (en) * | 2023-05-31 | 2023-06-30 | 深圳市华曦达科技股份有限公司 | Method and device for synchronizing information of WiFi anti-scratch network of master-slave equipment |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107786521A (en) * | 2016-08-30 | 2018-03-09 | 中兴通讯股份有限公司 | The method, apparatus and interchanger of defending distributed reflection denial service attack |
| CN112383646A (en) * | 2020-11-13 | 2021-02-19 | 新华三大数据技术有限公司 | Security entry configuration method and device, SDN controller and medium |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7707298B2 (en) * | 2007-05-10 | 2010-04-27 | Microsoft Corporation | Secure sharing of LOB bound information in client applications |
| US8285875B2 (en) * | 2009-01-28 | 2012-10-09 | Juniper Networks, Inc. | Synchronizing resource bindings within computer network |
-
2022
- 2022-08-18 CN CN202210994067.6A patent/CN115460160B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107786521A (en) * | 2016-08-30 | 2018-03-09 | 中兴通讯股份有限公司 | The method, apparatus and interchanger of defending distributed reflection denial service attack |
| CN112383646A (en) * | 2020-11-13 | 2021-02-19 | 新华三大数据技术有限公司 | Security entry configuration method and device, SDN controller and medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN115460160A (en) | 2022-12-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2654268B1 (en) | Address allocation processing method and apparatus | |
| CN101510902B (en) | Method, system and equipment for preventing wireless client terminal from disconnection during internet process | |
| JP5255035B2 (en) | Failover system, storage processing apparatus, and failover control method | |
| CN103124240B (en) | Gateway configuration method, gateway device and network system | |
| CN103580980A (en) | Automatic searching and automatic configuration method and device of VN | |
| CN103001868A (en) | Method and device used for synchronous ARP (Address Resolution Protocol) list item of virtual router redundancy protocol backup set | |
| CN112654049B (en) | Method, system, node and medium for configuring a wireless communication coverage extension system | |
| EP2615788A1 (en) | Method for dual stack user management and broadband access server | |
| CN102624937B (en) | IP address configuration method, Apparatus and system | |
| CN115460160B (en) | Network communication method, system, storage medium and switch based on Full-Mesh networking | |
| CN112887229A (en) | Session information synchronization method and device | |
| CN101577723B (en) | Method for preventing neighbor discovery protocol message attack and device | |
| US9992159B2 (en) | Communication information detecting device and communication information detecting method | |
| CN115941493B (en) | Multi-activity distribution method and device for cloud scene NAT gateway cluster based on multicast | |
| US9497067B2 (en) | Address determination apparatus, communication system, address determination method, and program | |
| CN109561004B (en) | Message forwarding method and device and switch | |
| EP3267656B1 (en) | Methods and apparatuses for message processing during pppoe authentication | |
| CN105827420A (en) | Method and device for identifying illegal servers | |
| WO2016177185A1 (en) | Method and apparatus for processing media access control (mac) address | |
| CN106612307B (en) | Method and device for realizing always-on service | |
| US20130086259A1 (en) | Method for acquiring an ip address and network access device | |
| CN114363902B (en) | 5G private network service security assurance method, device, equipment and storage medium | |
| CN115250289B (en) | Service routing method and device | |
| CN111064819B (en) | Address backup method and device | |
| CN107172229A (en) | The collocation method and device of router |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |