CN107196832B - Rapid ring network protection method - Google Patents

Rapid ring network protection method Download PDF

Info

Publication number
CN107196832B
CN107196832B CN201710558113.7A CN201710558113A CN107196832B CN 107196832 B CN107196832 B CN 107196832B CN 201710558113 A CN201710558113 A CN 201710558113A CN 107196832 B CN107196832 B CN 107196832B
Authority
CN
China
Prior art keywords
election
port
authentication
ring
ring network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710558113.7A
Other languages
Chinese (zh)
Other versions
CN107196832A (en
Inventor
宋尧飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OB TELECOM ELECTRONICS CO Ltd
Original Assignee
OB TELECOM ELECTRONICS CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OB TELECOM ELECTRONICS CO Ltd filed Critical OB TELECOM ELECTRONICS CO Ltd
Priority to CN201710558113.7A priority Critical patent/CN107196832B/en
Publication of CN107196832A publication Critical patent/CN107196832A/en
Application granted granted Critical
Publication of CN107196832B publication Critical patent/CN107196832B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/423Loop networks with centralised control, e.g. polling

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a fast ring network protection method, which comprises connection authentication, master node election, link state reporting, fault recovery, fast ring formation and link polling; the invention provides a fast ring network protection method mainly for shortening the convergence time of a ring network and eliminating the influence of the size of the network.

Description

Rapid ring network protection method
Technical Field
The invention relates to the field of network transmission, in particular to a fast ring network protection method.
Background
In network planning and practical networking applications, ring networks are mostly adopted to improve reliability, and in order to avoid broadcast storm generated in the ring networks, a standard spanning tree protocol (STP/RSTP/MSTP) is generally adopted. However, in practical applications, the convergence time of the spanning tree protocol is affected by the network topology, and particularly when the network diameter is large, the convergence time is long, so that the usage scenario with high requirements on data transmission quality cannot be satisfied.
Disclosure of Invention
The invention overcomes the defects of the prior art, and provides a rapid ring network protection method in order to shorten the convergence time of the ring network and eliminate the influence of the network size. When the ring network is complete, the broadcast storm caused by the data loop can be prevented by blocking the redundant link; when a certain link or equipment in the ring network fails, the link can be quickly switched to the backup link, so that the service can be quickly recovered.
The technical scheme of the invention is as follows:
a link down state reporting method for ring network protection specifically comprises the following steps:
101) a connection authentication step: sending an authentication request to a port forming a ring network, carrying out authentication response on opposite-end equipment, recording neighbor information formed by the opposite-end equipment by the port forming the ring network after authentication is successful, and judging that the port forming the ring network is blocked after authentication is failed;
102) and selecting a master node: electing the new ring network successfully authenticated in the step 101), initiating an election message by a port of the new ring network, and adding an initial election number into the election message, wherein the election number is the unique identification number of the node equipment where the port of the new ring network is located; after receiving the election message at the port of the first node device directly connected to the node device where the port of the new ring network is located, comparing the source MAC address in the message with the MAC address of the first node device: if not, comparing the election number of the first node equipment with the election number in the received election report, updating the election number in the report after the smaller election number is elected, and determining whether to forward the election report to the next node equipment or return the election report according to the authentication condition of the other ring port of the first node equipment; if the ring port election number is equal to the ring port election number, the ring port election of the node equipment is completed, and the elected candidate election number is recorded; if the election of the two ring ports of the node equipment is completed and the two ring ports have election qualification but the election numbers of the two ring ports are not equal, the candidate election numbers of the two ring ports need to be further compared, so that a final election number is obtained; if the node equipment only has one ring port with election qualification, the candidate election number obtained by the port election is the final election number; the node equipment corresponding to the election number is the main node equipment finally;
103) a link state reporting step: in the ring network formed in step 101) or 102), once the node device detects the link down, that is, at least one port at two ends of the link is dropped, the node device will immediately REPORT the master node device and refresh the forwarding table, and at the same time add the notification content of the released port and the forwarding table to the REPORT message;
104) and a fault recovery step: on the fault link of step 103), once the fault is eliminated, the master node device sends an HELLO message from the master port and receives the HELLO message sent by the master node device from the slave port, the master node device changes the state to a complete state after receiving the HELLO message sent by the master node device, and sends an ISSUE message from the master port of the master node device to notify other node devices that the state is also changed to the complete state, and if the master node knows that the number of blocking ports on the ring is not equal to 2, the master node device immediately blocks the slave port and the opposite port of the slave port, and simultaneously refreshes a forwarding table, and the issued ISSUE message also additionally releases the ports and refreshes the forwarding table.
Further, the connection authentication of step 101) includes active authentication and passive authentication, where the active authentication is to send an authentication request to the peer device at regular time when the port of the ring network and the port of the peer device detect that the ring network and the peer device are in a forwarding state, and when receiving a peer device authentication response, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by the opposite terminal equipment, and the port of the ring network receiving the authentication request message is marked as authentication failure or the port of the ring network receiving the authentication request message is marked as authentication success, but the comparison shows that the neighbor information changes, and a new round of connection authentication is triggered.
Further, the election in step 102) includes active election and passive election, where the active election is triggered when both the port of the ring network and the port of the peer device are in a forwarding state and pass authentication, but no ring can be formed quickly, or when the ring network is in a complete state, but the master node device exits from the current ring network; the passive election is triggered from the active election message and the ring port that receives the active election message has been marked as completing the election.
A rapid ring forming method for looped network protection specifically comprises the following steps:
401) a connection authentication step: sending an authentication request to a port forming a ring network, carrying out authentication response on opposite-end equipment, recording neighbor information formed by the opposite-end equipment by the port forming the ring network after authentication is successful, and judging that the port forming the ring network is blocked after authentication is failed; the connection authentication comprises active authentication and passive authentication, wherein the active authentication is that when the port of the ring network and the port of the opposite terminal equipment detect that the ring network and the port of the opposite terminal equipment are in a forwarding state, an authentication request is sent to the opposite terminal equipment at regular time, and when an authentication response of the opposite terminal equipment is received, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by opposite-end equipment, the port of the looped network receiving the authentication request message is marked as authentication failure or the port of the looped network receiving the authentication request message is marked as authentication success, but the comparison shows that neighbor information changes, a new round of connection authentication can be triggered;
402) and selecting a master node: electing the new ring network successfully authenticated in the step 401), initiating an election message by a port of the new ring network, and adding an initial election number into the election message, wherein the election number is the unique identification number of the node equipment where the port of the new ring network is located; after receiving the election message at the port of the first node device directly connected to the node device where the port of the new ring network is located, comparing the source MAC address in the message with the MAC address of the first node device: if not, comparing the election number of the first node equipment with the election number in the received election report, updating the election number in the report after the smaller election number is elected, and determining whether to forward the election report to the next node equipment or return the election report according to the authentication condition of the other ring port of the first node equipment; if the ring port election number is equal to the ring port election number, the ring port election of the node equipment is completed, and the elected candidate election number is recorded; if the election of the two ring ports of the node equipment is completed and the two ring ports have election qualification but the election numbers of the two ring ports are not equal, the candidate election numbers of the two ring ports need to be further compared, so that a final election number is obtained; if the node equipment only has one ring port with election qualification, the candidate election number obtained by the port election is the final election number; the node equipment corresponding to the election number is the main node equipment finally;
403) a rapid ring forming step: in the ring network of step 401) or step 402), if there is a broken link and the whole link is in a stable state, after the link is authenticated and connected, the master node device can directly determine that the complete state is reached by only reporting a fast ring formation request.
Further, the connection authentication of step 401) includes active authentication and passive authentication, where the active authentication is to send an authentication request to the peer device at regular time when the port of the ring network and the port of the peer device detect that the ring network and the peer device are in a forwarding state, and when receiving a peer device authentication response, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by the opposite terminal equipment, and the port of the ring network receiving the authentication request message is marked as authentication failure or the port of the ring network receiving the authentication request message is marked as authentication success, but the comparison shows that the neighbor information changes, and a new round of connection authentication is triggered.
Further, the election in step 402) includes active election and passive election, where the active election is triggered when both the port of the ring network and the port of the peer device are in a forwarding state and pass authentication, but no ring can be formed quickly, or when the ring network is in a complete state, but the master node device exits from the current ring network; the passive election is triggered from the active election message and the ring port that receives the active election message has been marked as completing the election.
A link polling method for protecting a ring network specifically comprises the following steps:
701) a connection authentication step: sending an authentication request to a port forming a ring network, carrying out authentication response on opposite-end equipment, recording neighbor information formed by the opposite-end equipment by the port forming the ring network after authentication is successful, and judging that the port forming the ring network is blocked after authentication is failed; the connection authentication comprises active authentication and passive authentication, wherein the active authentication is that when the port of the ring network and the port of the opposite terminal equipment detect that the ring network and the port of the opposite terminal equipment are in a forwarding state, an authentication request is sent to the opposite terminal equipment at regular time, and when an authentication response of the opposite terminal equipment is received, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by opposite-end equipment, the port of the looped network receiving the authentication request message is marked as authentication failure or the port of the looped network receiving the authentication request message is marked as authentication success, but the comparison shows that neighbor information changes, a new round of connection authentication can be triggered;
702) and selecting a master node: electing the new ring network successfully authenticated in the step 701), initiating an election message by a port of the new ring network, and adding an initial election number into the election message, wherein the election number is the unique identification number of the node equipment where the port of the new ring network is located; after receiving the election message at the port of the first node device directly connected to the node device where the port of the new ring network is located, comparing the source MAC address in the message with the MAC address of the first node device: if not, comparing the election number of the first node equipment with the election number in the received election report, updating the election number in the report after the smaller election number is elected, and determining whether to forward the election report to the next node equipment or return the election report according to the authentication condition of the other ring port of the first node equipment; if the ring port election number is equal to the ring port election number, the ring port election of the node equipment is completed, and the elected candidate election number is recorded; if the election of the two ring ports of the node equipment is completed and the two ring ports have election qualification but the election numbers of the two ring ports are not equal, the candidate election numbers of the two ring ports need to be further compared, so that a final election number is obtained; if the node equipment only has one ring port with election qualification, the candidate election number obtained by the port election is the final election number; the node equipment corresponding to the election number is the main node equipment finally;
703) and a link polling step: in the ring network of step 701) or step 702), the master node device periodically sends a Hello message from its master port, and forwards the Hello message through other nodes on the ring network, if the ring network is complete, the master node device can receive the Hello message sent by itself from the slave port, if a link on the ring network fails to forward, the slave port of the master node device cannot receive the Hello message within a specified time, once the polling of the master node device is overtime, the master node device considers that the link fails, so that a port of the ring network which may be blocked is opened, and a forwarding table is refreshed, an ISSUE message, i.e. a problem message, is sent from two ports of the master node device, and the ISSUE message informs the other node devices that the ring network state changes to a failure state, and a notification of releasing the port and refreshing the forwarding table is added in the issued ISSUE message.
Further, the connection authentication of step 701) includes active authentication and passive authentication, where the active authentication is to send an authentication request to the peer device at regular time when the port of the ring network and the port of the peer device detect that the ring network and the peer device are in a forwarding state, and when receiving a peer device authentication response, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by the opposite terminal equipment, and the port of the ring network receiving the authentication request message is marked as authentication failure or the port of the ring network receiving the authentication request message is marked as authentication success, but the comparison shows that the neighbor information changes, and a new round of connection authentication is triggered.
Further, the election in step 702) includes active election and passive election, where the active election is triggered when both the port of the ring network and the port of the peer device are in a forwarding state and pass authentication, but no ring can be formed quickly, or when the ring network is in a complete state, but the master node device exits from the current ring network; the passive election is triggered from the active election message and the ring port that receives the active election message has been marked as completing the election.
Compared with the prior art, the invention has the advantages that:
1. the topology convergence time (also called self-healing time and open-loop time) of the invention is less than 50 ms.
2. The convergence time of the invention is irrelevant to the number of the node equipment on the ring network.
3. The closed loop time of the present invention is equal to 0 ms. When the failed link is repaired, the link switched by the failure is continuously used, and the transmission of the service is not influenced at all.
4. The master node equipment of the invention is automatically elected without manual setting, and the node role is automatically adjusted according to the topology change.
5. In the tangent ring topology, the change of one ring topology can not cause the topology oscillation of other rings, and the data transmission is more stable.
Drawings
FIG. 1 is an exemplary schematic of the present invention;
FIG. 2 is a diagram illustrating connection authentication according to the present invention;
FIG. 3 is a schematic diagram illustrating an election of a master node device according to the present invention;
FIG. 4 is a schematic diagram of the present invention showing rapid looping;
FIG. 5 is a diagram of a link down report according to the present invention;
FIG. 6 is a schematic diagram of link polling according to the present invention;
fig. 7 is a schematic diagram of the fault recovery of the present invention.
Detailed Description
The invention is further described with reference to the following figures and detailed description.
As shown in fig. 1, a fast ring network protection method specifically relates to a ring network, a master node device, a transmission node device, and the like.
The Ring networks correspond to an ethernet topology that is physically connected in a Ring for each Ring network, and are identified by an integer ID number, such as "Ring 1" in fig. 1. The ring network indicates whether a node or link failure exists on the ring network through two states, namely, a Complete State (Complete State) and a Failed State (Failed State).
The ring network, whether in a ring state or a single-chain state, has to have and only has one master node device, such as the "S1" node in fig. 1. The main node device is an active initiator for loop detection or link detection, and is also a decision maker for executing operation after the loop or link changes, that is, the main node device controls the state of the whole ring network, so that the state of the main node device corresponds to two states of the ring network: complete State Node and Failed State (Failed State enode). The Primary node device includes a Primary Port (Primary Port) and a Secondary Port (Secondary Port). The main port is, for example, a "P" port in fig. 1, and the main port is mainly responsible for sending hello messages. For example, the "S" port in fig. 1 is a secondary port and is mainly responsible for recovering hello packets. The primary port and the secondary port are only available to the primary node (i.e. the ports on the two rings of the transmission node are not primary or secondary).
All other nodes on the ring network except the master node device are transmission node devices (there may be multiple transmission nodes on one ring, or there may be no transmission node), such as nodes other than "S1" in the figure. The transmission node is mainly responsible for transmitting the HELLO message of the master node and monitoring the state of a ring network link directly connected with the transmission node. The transmission node can be divided into 3 node states according to the Link states of the two ring ports: the Link Up State (Link-Up State Node), i.e. both ports on both rings, is Up and both are in the forwarding State. The Link-Down State Node (Link-Down State Node) has at least one ring up port Down. Temporary blocking State (Pre-forwarding State Node) both on-ring ports are UP and at least one is in blocking State.
A fast ring network protection method specifically comprises a connection authentication part, a main node election part, a link state reporting part, a fault recovery part, a fast ring forming part and a link polling part. Based on connection authentication and election of a main node, a plurality of specific ring network protections are formed with a link state reporting part, a fault recovery part, a rapid ring formation part and a link polling part.
Example 1
A link down state reporting method for ring network protection specifically comprises the following steps:
101) a connection authentication step: the port forming the ring network sends out an authentication request, the opposite terminal equipment carries out authentication response, after the authentication is successful, the port forming the ring network records neighbor information formed by the opposite terminal equipment, and after the authentication is failed, the port forming the ring network is judged to be blocked. That is, as shown in fig. 2, each ring network PORT (PORT-A, PORT-B in the figure) acts as an independent authentication entity, and the purpose of authentication is to confirm whether the opposite device is allowed to be accessed, and in addition, the PORT with successful authentication records neighbor information and possibly triggers a fast ring mechanism method.
The connection authentication comprises active authentication and passive authentication, wherein the active authentication is that when the port of the ring network and the port of the opposite terminal equipment detect that the ring network and the port of the opposite terminal equipment are in a forwarding state, an authentication request is sent to the opposite terminal equipment at regular time, and when an authentication response of the opposite terminal equipment is received, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by the opposite terminal equipment, and the port of the ring network receiving the authentication request message is marked as authentication failure or the port of the ring network receiving the authentication request message is marked as authentication success, but the comparison shows that the neighbor information changes, and a new round of connection authentication is triggered.
102) And selecting a master node: electing the new ring network successfully authenticated in the step 101), initiating an election message by a port of the new ring network, and adding an initial election number into the election message, wherein the election number is the unique identification number of the node equipment where the port of the new ring network is located. When the port of the first node device directly connected with the node device where the port of the new ring network is located receives the election message, the source MAC address in the message is compared with the MAC address of the first node device. If the two are not equal, comparing the election number of the first node equipment with the election number in the received election report, updating the election number in the report after the smaller election number is elected, and determining whether to forward the election report to the next node equipment or return the election report according to the authentication condition of the other ring port of the first node equipment; if the ring port election number is equal to the ring port election number, the ring port election of the node equipment is completed, and the elected candidate election number is recorded; if the election of both ring ports of the node device is completed and both ring ports have election qualification but the election numbers of the two ring ports are not equal, the candidate election numbers of the two ring ports need to be further compared, so as to obtain the final election number. If the node equipment only has one ring port with election qualification, the candidate election number obtained by the port election is the final election number; and finally, the node equipment corresponding to the election number is the main node equipment.
The election comprises active election and passive election, wherein the active election is triggered when a port of a ring network and a port of opposite-end equipment are both in a forwarding state and pass authentication but cannot form a ring rapidly, or when the ring network is in a complete state, a main node equipment exits the current ring network; the passive election is triggered from the active election message and the ring port that receives the active election message has been marked as completing the election.
As shown in fig. 3 in particular, the left side of the vertical dotted line indicates a node device chain which is in a stable state at first, i.e. a ring network in a stable state (composed of two devices S1 and S2), which means that the P1 port (abbreviated as S1.P1, which is named with reference to the format later) and S2.P2 of the S1 node have been elected, and as for S1.P2 and S2.P1, since no device is connected, they are in a down state. When a new node device S3 on the right is accessed, S2.p1 and S3.p2 respectively complete authentication first, and then the following election process is roughly composed of 3 parts:
[1] (S2.P1) election process: and S2.P1 passing the authentication initiates active election, and S3.P2 updates the election number and the message type in the message after receiving the election message and then returns the message, and finally S2.P1 receives the returned message and S2.P1 ends the election.
[2] (S3.P2) election process: meanwhile, the authenticated S3.P2 also initiates active election, after receiving the election message, the S2.P1 updates the election number in the message, and then forwards the message to the next node S1, after receiving the election message, the S1.P1 updates the election and message type in the message, then returns the message, and after S2 forwarding, the S3.P2 finally receives the returned message, and the S3.P2 election is finished.
[3] (S1.P1) election process: the active election from S3.P2 also triggers the passive election of S1.P1, after S2.P2 receives the election message, the election number in the message is updated, and then the message is forwarded to the next node S3, after S3.P2 receives the election message, the election and the message type in the message are updated, the message is returned, and after S2 forwarding is performed, finally S1.P1 receives the returned message, and S1.P1 election is finished.
103) A link state reporting step: in the ring network formed in step 101) or 102), once the node device detects the link down, that is, at least one port at both ends of the link is dropped, the node device will immediately REPORT the master node device and refresh the forwarding table, and at the same time add the notification content of the released port and the forwarding table to the REPORT message. That is, as shown in fig. 5, the transmitting nodes S3 and S4 report to the master node as soon as they detect the link down. Because the failure link ports s3.p2 and s4.p1 are blocked, the forwarding table is refreshed, and a notification of releasing the ports and refreshing the forwarding table is added to the REPORT message.
104) And a fault recovery step: as shown in fig. 7, on the fault link in step 103), once the fault is eliminated, the master node device sends an HELLO packet from the master port and receives an HELLO packet sent by the master node device from the slave port, and after receiving the HELLO packet sent by the master node device, the master node device changes the state to a complete state, and sends an ISSUE packet from the master port of the master node device to notify other node devices that the state is also changed to the complete state. It should be noted that if the master node learns that the number of blocking ports on the ring is not equal to 2, the slave port and the port opposite to the slave port are immediately blocked, and the forwarding table is refreshed at the same time, and a notification of releasing the port and refreshing the forwarding table is also added to the issued ISSUE message.
Example 2
A rapid ring forming method for looped network protection specifically comprises the following steps: the first two steps of the connection authentication step and the master node election step are the same as those in embodiment 1 and are not described again.
403) A rapid ring forming step: in the ring network of the step of connecting authentication or the step of electing the main node, if a disconnected link exists and the whole link is in a stable state, after the link is authenticated and connected, the main node equipment can directly determine that the complete state is reached only by reporting a quick ring formation request. As shown in fig. 4, originally, the S2 and the S3 are disconnected, and the entire link is in a stable state, after S2 and S3 are connected, as long as each of S2.p1 and S3.p2 passes the authentication, the master node S1 may directly determine to transition to the Complete state only by reporting the fast looping request without election. The rapid ring forming method not only greatly shortens the fault recovery speed by avoiding unnecessary election, but also realizes the advantage that the closed-loop time is 0 because the link does not need to be switched.
Example 3
A link polling method for protecting a ring network specifically comprises the following steps: the first two steps of the connection authentication step and the master node election step are the same as those in embodiment 1 and are not described again.
703) And a link polling step: in the ring network of the connection authentication step or the master node election step, the master node device periodically sends a Hello message from a master port of the master node device, the Hello message is forwarded through other nodes on the ring network, if the ring network is complete, the master node device can receive the Hello message sent by the master node device from a secondary port, if a link on the ring network fails to forward, the secondary port of the master node device cannot receive the Hello message within a specified time, once the polling of the master node device is overtime, the master node device considers that the link fails, so that a port of the ring network which is possibly blocked is opened, a forwarding table is refreshed, an ISSUE message, namely a problem message, is issued from two ports of the master node device, the ISSUE message informs that the ring network states of other node devices are changed to the failure state, and a notice of releasing the port and refreshing the forwarding table is added in the issued IS. That is, as shown in fig. 6, the master node S1 periodically sends a Hello packet from its master port P, and forwards the Hello packet through the last transmission node of the ring network. If the loop is complete, S1 may receive the Hello message sent by itself from the secondary port S. If a link forwarding failure occurs at a certain point on the ring network, S1 cannot receive the Hello packet within a specified time.
In summary, a fast ring network protection method, based on connection authentication and election of a host node, may form a plurality of specific ring network protections in various combinations with link state reporting, failure recovery, fast ring formation and link polling, and is not limited to the above combinations.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and decorations can be made without departing from the spirit of the present invention, and these modifications and decorations should also be regarded as being within the scope of the present invention.

Claims (9)

1. A link down state reporting method for ring network protection is characterized by comprising the following steps:
101) a connection authentication step: sending an authentication request to a port forming a ring network, carrying out authentication response on opposite-end equipment, recording neighbor information formed by the opposite-end equipment by the port forming the ring network after authentication is successful, and judging that the port forming the ring network is blocked after authentication is failed;
102) and selecting a master node: electing the new ring network successfully authenticated in the step 101), initiating an election message by a port of the new ring network, and adding an initial election number into the election message, wherein the election number is the unique identification number of the node equipment where the port of the new ring network is located; after receiving the election message at the port of the first node device directly connected to the node device where the port of the new ring network is located, comparing the source MAC address in the message with the MAC address of the first node device: if not, comparing the election number of the first node equipment with the election number in the received election report, updating the election number in the report after the smaller election number is elected, and determining whether to forward the election report to the next node equipment or return the election report according to the authentication condition of the other ring port of the first node equipment; if the ring port election number is equal to the ring port election number, the ring port election of the node equipment is completed, and the elected candidate election number is recorded; if the election of the two ring ports of the node equipment is completed and the two ring ports have election qualification but the election numbers of the two ring ports are not equal, the candidate election numbers of the two ring ports need to be further compared, so that a final election number is obtained; if the node equipment only has one ring port with election qualification, the candidate election number obtained by the port election is the final election number; the node equipment corresponding to the election number is the main node equipment finally;
103) a link state reporting step: in the ring network formed in step 101) or 102), once the node device detects the link down, that is, at least one port at two ends of the link is dropped, the node device will immediately REPORT the master node device and refresh the forwarding table, and at the same time add the notification content of the released port and the forwarding table to the REPORT message;
104) and a fault recovery step: on the fault link of step 103), once the fault is eliminated, the master node device sends an HELLO message from the master port and receives the HELLO message sent by the master node device from the slave port, the master node device changes the state to a complete state after receiving the HELLO message sent by the master node device, and sends an ISSUE message from the master port of the master node device to notify other node devices that the state is also changed to the complete state, and if the master node knows that the number of blocking ports on the ring is not equal to 2, the master node device immediately blocks the slave port and the opposite port of the slave port, and simultaneously refreshes a forwarding table, and the issued ISSUE message also additionally releases the ports and refreshes the forwarding table.
2. The method for reporting link down status of ring network protection according to claim 1, wherein the connection authentication of step 101) includes active authentication and passive authentication, the active authentication is that when the port of the ring network and the port of the peer device detect that they are in a forwarding state, an authentication request is sent to the peer device at regular time, and when an authentication response of the peer device is received, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by the opposite terminal equipment, and the port of the ring network receiving the authentication request message is marked as authentication failure or the port of the ring network receiving the authentication request message is marked as authentication success, but the comparison shows that the neighbor information changes, and a new round of connection authentication is triggered.
3. The method according to claim 1, wherein the election in step 102) includes active election and passive election, and the active election is triggered when both the port of the ring network and the port of the peer device are in a forwarding state and are authenticated, but no ring can be formed quickly, or when the ring network is in a complete state, but the master node device exits from the current ring network; the passive election is triggered from the active election message and the ring port that receives the active election message has been marked as completing the election.
4. A rapid ring forming method for looped network protection is characterized by comprising the following steps:
401) a connection authentication step: sending an authentication request to a port forming a ring network, carrying out authentication response on opposite-end equipment, recording neighbor information formed by the opposite-end equipment by the port forming the ring network after authentication is successful, and judging that the port forming the ring network is blocked after authentication is failed;
402) and selecting a master node: electing the new ring network successfully authenticated in the step 401), initiating an election message by a port of the new ring network, and adding an initial election number into the election message, wherein the election number is the unique identification number of the node equipment where the port of the new ring network is located; after receiving the election message at the port of the first node device directly connected to the node device where the port of the new ring network is located, comparing the source MAC address in the message with the MAC address of the first node device: if not, comparing the election number of the first node equipment with the election number in the received election report, updating the election number in the report after the smaller election number is elected, and determining whether to forward the election report to the next node equipment or return the election report according to the authentication condition of the other ring port of the first node equipment; if the ring port election number is equal to the ring port election number, the ring port election of the node equipment is completed, and the elected candidate election number is recorded; if the election of the two ring ports of the node equipment is completed and the two ring ports have election qualification but the election numbers of the two ring ports are not equal, the candidate election numbers of the two ring ports need to be further compared, so that a final election number is obtained; if the node equipment only has one ring port with election qualification, the candidate election number obtained by the port election is the final election number; the node equipment corresponding to the election number is the main node equipment finally;
403) a rapid ring forming step: in the ring network of step 401) or step 402), if there is a broken link and the whole link is in a stable state, after the link is authenticated and connected, the master node device can directly determine that the complete state is reached by only reporting a fast ring formation request.
5. The method according to claim 4, wherein the connection authentication of step 401) includes active authentication and passive authentication, the active authentication is that when the port of the ring network and the port of the peer device detect that they are in a forwarding state, an authentication request is sent to the peer device at regular time, and when an authentication response of the peer device is received, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by the opposite terminal equipment, and the port of the ring network receiving the authentication request message is marked as authentication failure or the port of the ring network receiving the authentication request message is marked as authentication success, but the comparison shows that the neighbor information changes, and a new round of connection authentication is triggered.
6. The method according to claim 4, wherein the election in step 402) includes active election and passive election, and the active election is triggered when both the port of the ring network and the port of the peer device are in a forwarding state and are authenticated but cannot be looped quickly, or when the ring network is in a complete state but the master node device exits from the current ring network; the passive election is triggered from the active election message and the ring port that receives the active election message has been marked as completing the election.
7. A link polling method for ring network protection is characterized in that: the method specifically comprises the following steps:
701) a connection authentication step: sending an authentication request to a port forming a ring network, carrying out authentication response on opposite-end equipment, recording neighbor information formed by the opposite-end equipment by the port forming the ring network after authentication is successful, and judging that the port forming the ring network is blocked after authentication is failed;
702) and selecting a master node: electing the new ring network successfully authenticated in the step 701), initiating an election message by a port of the new ring network, and adding an initial election number into the election message, wherein the election number is the unique identification number of the node equipment where the port of the new ring network is located; after receiving the election message at the port of the first node device directly connected to the node device where the port of the new ring network is located, comparing the source MAC address in the message with the MAC address of the first node device: if not, comparing the election number of the first node equipment with the election number in the received election report, updating the election number in the report after the smaller election number is elected, and determining whether to forward the election report to the next node equipment or return the election report according to the authentication condition of the other ring port of the first node equipment; if the ring port election number is equal to the ring port election number, the ring port election of the node equipment is completed, and the elected candidate election number is recorded; if the election of the two ring ports of the node equipment is completed and the two ring ports have election qualification but the election numbers of the two ring ports are not equal, the candidate election numbers of the two ring ports need to be further compared, so that a final election number is obtained; if the node equipment only has one ring port with election qualification, the candidate election number obtained by the port election is the final election number; the node equipment corresponding to the election number is the main node equipment finally;
703) and a link polling step: in the ring network of step 701) or step 702), the master node device periodically sends a Hello message from its master port, and forwards the Hello message through other nodes on the ring network, if the ring network is complete, the master node device can receive the Hello message sent by itself from the slave port, if a link on the ring network fails to forward, the slave port of the master node device cannot receive the Hello message within a specified time, once the polling of the master node device is overtime, the master node device considers that the link fails, so that a port of the ring network which may be blocked is opened, and a forwarding table is refreshed, an ISSUE message, i.e. a problem message, is sent from two ports of the master node device, and the ISSUE message informs the other node devices that the ring network state changes to a failure state, and a notification of releasing the port and refreshing the forwarding table is added in the issued ISSUE message.
8. The method according to claim 7, wherein the connection authentication of step 701) includes active authentication and passive authentication, where the active authentication is that when the port of the ring network and the port of the peer device detect that they are in a forwarding state, an authentication request is periodically sent to the peer device, and when an authentication response is received from the peer device, the authentication is successful; otherwise, when the maximum response times are exceeded and the opposite terminal authentication response is not received, the authentication is failed; the passive authentication is an authentication request sent by the opposite terminal equipment, and the port of the ring network receiving the authentication request message is marked as authentication failure or the port of the ring network receiving the authentication request message is marked as authentication success, but the comparison shows that the neighbor information changes, and a new round of connection authentication is triggered.
9. The method according to claim 7, wherein the election in step 702) includes active election and passive election, and the active election is triggered when both the port of the ring network and the port of the peer device are in a forwarding state and are authenticated but cannot form a ring rapidly, or when the ring network is in a complete state but the master node device exits from the current ring network; the passive election is triggered from the active election message and the ring port that receives the active election message has been marked as completing the election.
CN201710558113.7A 2017-07-10 2017-07-10 Rapid ring network protection method Active CN107196832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710558113.7A CN107196832B (en) 2017-07-10 2017-07-10 Rapid ring network protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710558113.7A CN107196832B (en) 2017-07-10 2017-07-10 Rapid ring network protection method

Publications (2)

Publication Number Publication Date
CN107196832A CN107196832A (en) 2017-09-22
CN107196832B true CN107196832B (en) 2020-02-18

Family

ID=59882700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710558113.7A Active CN107196832B (en) 2017-07-10 2017-07-10 Rapid ring network protection method

Country Status (1)

Country Link
CN (1) CN107196832B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187646B (en) * 2020-09-25 2022-07-29 新华三信息安全技术有限公司 Message table item processing method and device
CN112995002B (en) * 2021-04-27 2021-08-03 融智通科技(北京)股份有限公司 Switch ring network design method, switch and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212366A (en) * 2007-12-21 2008-07-02 杭州华三通信技术有限公司 Failure detection method, system, and main node in Ethernet loop network
CN101873244A (en) * 2010-06-09 2010-10-27 神州数码网络(北京)有限公司 Automatic multi-loop protection method
CN102014001A (en) * 2010-12-08 2011-04-13 迈普通信技术股份有限公司 Method and exchange equipment for realizing fast Ethernet ring
CN102684926A (en) * 2012-05-30 2012-09-19 迈普通信技术股份有限公司 Implementation method and node device for rapid Ethernet ring

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8120935B2 (en) * 2011-03-29 2012-02-21 American Superconductor Corporation Power converter with dual ring network control

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212366A (en) * 2007-12-21 2008-07-02 杭州华三通信技术有限公司 Failure detection method, system, and main node in Ethernet loop network
CN101873244A (en) * 2010-06-09 2010-10-27 神州数码网络(北京)有限公司 Automatic multi-loop protection method
CN102014001A (en) * 2010-12-08 2011-04-13 迈普通信技术股份有限公司 Method and exchange equipment for realizing fast Ethernet ring
CN102684926A (en) * 2012-05-30 2012-09-19 迈普通信技术股份有限公司 Implementation method and node device for rapid Ethernet ring

Also Published As

Publication number Publication date
CN107196832A (en) 2017-09-22

Similar Documents

Publication Publication Date Title
EP2458797B1 (en) Method, device and system for updating ring network topology information
US7440397B2 (en) Protection that automatic and speedily restore of Ethernet ring network
US20140254347A1 (en) Ethernet Ring Protection Switching Method, Node, and System
US9407538B2 (en) Ring network failure switching method and apparatus
JP2011526086A (en) Network recovery system and method from multilink failure
US10721094B2 (en) Ethernet ring protection switching method and node
US20090147672A1 (en) Protection switching method and apparatus for use in ring network
TWI455525B (en) Recovery method for ring-based network
WO2009039697A1 (en) Ethernet ring network systerm, transmission node of ethernet ring network and initialization method thereof
CN103607293B (en) A kind of flow rate protecting method and equipment
CN110912815B (en) Network element ring formation preventing method, device, equipment and readable storage medium
CN101854283A (en) Communication method and equipment of RPR (Resilient Packet Ring) looped network
US9509523B2 (en) Method for protection switching in ethernet ring network
US7920464B2 (en) Method of redundancy of ring network
WO2010031295A1 (en) Control method for ethernet failure recovery
EP2533470B1 (en) Method and equipment for preventing repeated refreshing of ethernet ring node address table
CN100466583C (en) Fast ring network method against attack based on RRPP, apparatus and system
CN107196832B (en) Rapid ring network protection method
JP2003258822A (en) Packet ring network and inter-packet ring network connection method used in the same
CN102170384B (en) Method for processing faults of intersected Ethernet ring and nodes
JP5491623B2 (en) Address refresh method and system
US10489236B2 (en) Method and system for managing a communication network
CN112995002B (en) Switch ring network design method, switch and storage medium
CN109194592B (en) Method and system for solving island problem in multi-link network
WO2015032203A1 (en) Network element and method for ring network protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant