Hi,
I did not take a look at the code yet, but it sounds like you are
using a good approach. We have to do something about pt. 5
at some moment, maybe extend UB(skb) (there is space), because
core code should not know anything about sk_buff's. But otherwise
it sounds ok.
Have a nice weekend /jon
Ling, Xiaofeng wrote:
>Hi, Jon
> Guo Min and I have finished some initial code for tipc reliable
>multicast.
>this files are:
>bcast.h
>bcast.c
>sendbcast.c
>recvbcast.c
>These file include routings used by reliable multicast.
>The patch to some part has not checked in yet, so currently these codes
>will affect others.
>
>some explaining for the implementation.
>
>1. We define a struct of bcastlink, it is derived from struct link. Each
>bearer will has one corresponding
> bcastlink, it will be created in the link config process.
>2. We define another struct of bcastlinkset, it is a set of bcastlink,
>and one bcastlinkset will cover all
>the nodes in the cluster.
>3.A global array of bcastlinkset is used for blink_select, each
>broadcast packet will be deliverd at one of the
>bcastlinkset.
>4.The policy of bcastlinkset array creation is: one bcastlink will only
>in one bcastlinkset and one bcastlinkset will
>try to include less bcastlink.
>5. A bcast outqueue is defined as "struct sk_buff_head bcast_outqueue",
>it uses the "next and prev point" inside the struct sk_buff
>to link the queue instead of UB(skb). That is because the UB(skb) point
>is used in the queue of bcastlink for bearer congestion.
>
>
This communication is confidential and intended solely for the addressee(s). Any unauthorized review, use, disclosure or distribution is prohibited. If you believe this message has been sent to you in error, please notify the sender by replying to this transmission and delete the message without disclosing it. Thank you.
E-mail including attachments is susceptible to data corruption, interruption, unauthorized amendment, tampering and viruses, and we only send and receive e-mails on the basis that we are not liable for any such corruption, interception, amendment, tampering or viruses or any consequences thereof.
|