CN117880135A - Routing loop detection method, device, equipment and storage medium - Google Patents

Routing loop detection method, device, equipment and storage medium Download PDF

Info

Publication number
CN117880135A
CN117880135A CN202311863973.3A CN202311863973A CN117880135A CN 117880135 A CN117880135 A CN 117880135A CN 202311863973 A CN202311863973 A CN 202311863973A CN 117880135 A CN117880135 A CN 117880135A
Authority
CN
China
Prior art keywords
message
routing
network
address
loop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311863973.3A
Other languages
Chinese (zh)
Inventor
魏豆豆
杨国鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Mach Valley Technology Co ltd
Original Assignee
Beijing Mach Valley Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Mach Valley Technology Co ltd filed Critical Beijing Mach Valley Technology Co ltd
Priority to CN202311863973.3A priority Critical patent/CN117880135A/en
Publication of CN117880135A publication Critical patent/CN117880135A/en
Pending legal-status Critical Current

Links

Abstract

The application relates to a routing loop detection method and device, equipment and storage medium, wherein the routing loop detection method comprises the following steps: acquiring a timeout message in a protocol message, and analyzing the timeout message to acquire a destination IP address of the timeout message; any terminal equipment in the network is controlled, and network detection is carried out for the terminal equipment corresponding to the destination IP address of the overtime message for more than two times; two routing devices where a routing loop occurs are determined based on the results of each network detection. And network management personnel can find the two routing devices in time to perform fault processing. Compared with the traditional method of reporting according to users, the method and the device for monitoring the occurrence of the routing loop is more timely by acquiring the overtime message in the protocol message, and compared with the traditional method of checking all the related routing devices, the method and the device for determining the two routing devices of the occurrence of the routing loop are more rapid and efficient.

Description

Routing loop detection method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of network communications technologies, and in particular, to a method and apparatus for detecting a routing loop, a device, and a storage medium.
Background
Routing loops in computer networks are caused by route configuration errors, and although current dynamic routing protocols (e.g., OSPF, IS-IS, etc.) can avoid loop configuration, in actual networks, routing loops are very common, and they exist in networks of many enterprises and institutions, and may be caused by configuration of incorrect static routes, slow dynamic route convergence, dynamic route oscillation, etc. When a routing loop occurs, an IP packet is in its initial TTL (Time To Live) range, and will be forwarded back and forth between the 2 routing devices that occur in the loop, decreasing hop by hop until the TTL decreases To 0, and the router will discard the IP packet and send an ICMP (Internet Control Message Protocol internet control message protocol) timeout message To the source host. Thus, the method is applicable to a variety of applications. When the routing loop occurs, the data packet cannot reach the destination node, and network resources are occupied because the data packet is always transmitted in the loop, so that network load is increased.
At present, when a routing loop occurs, most of the routing loop relies on the problem of user reporting of a network, and network management staff can search all routing devices related to the destination IP in the network according to information such as the destination IP provided by the user, so that fault processing can be performed on two routing devices occurring in the routing loop. The investigation mode is complicated and has low efficiency.
Disclosure of Invention
In view of this, the present application proposes a routing loop detection method and apparatus, a device and a storage medium.
According to an aspect of the present application, there is provided a routing loop detection method, including:
acquiring an overtime message in a protocol message, and analyzing the overtime message to acquire a destination IP address of the overtime message;
controlling any terminal equipment in the network, and executing network detection for the terminal equipment corresponding to the target IP address of the overtime message for more than two times;
two routing devices where a routing loop occurs are determined based on the results of each of the network detections.
In one possible implementation manner, when the timeout message in the protocol message is acquired, a judgment is made based on at least one of a type and a code of the protocol message, and whether the protocol message is the timeout message is judged.
In one possible implementation manner, when determining the protocol packet, the method includes:
analyzing the protocol message to obtain the type and code of the protocol message;
and when the type of the protocol message is network unreachable and the code is that the time-to-live counter is overtime, judging that the protocol message is the overtime message.
In one possible implementation manner, when the network detection is performed on the terminal device corresponding to the destination IP address of the timeout message for more than two times, the controlled terminal device is any terminal device in the network except for the terminal device corresponding to the destination IP address of the timeout message.
In one possible implementation manner, when the network detection is performed on the terminal device corresponding to the destination IP address of the timeout message twice or more, the method includes:
sending test data for more than two times to terminal equipment corresponding to the target IP address of the overtime message;
and analyzing the return information of each test data, and determining two routing devices on which a routing loop occurs.
In one possible implementation manner, when the test data is sent To the terminal device corresponding To the destination IP address of the timeout message twice or more, TTL (Time To Live value) of each test data is not equal.
In one possible implementation manner, after determining that two routing devices of a routing loop occur, reporting a loop alarm;
the loop alarm includes at least one of an IP address of the two routing devices that have a routing loop, a route that has a routing loop, and a destination IP address of the timeout message.
According to another aspect of the present application, there is provided a routing loop detection apparatus including: the device comprises an input module, a detection module and a query module;
the input module is configured to acquire a timeout message in a protocol message, and analyze the timeout message to acquire a destination IP address of the timeout message;
the detection module is configured to control any one of the terminal devices in the network, and perform network detection on the terminal device corresponding to the destination IP address of the overtime message for more than two times;
the query module is configured to determine two routing devices where a routing loop occurs based on the results of each of the network detections.
According to another aspect of the present application, there is provided a routing loop detection apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement any of the methods described above when executing the executable instructions.
According to another aspect of the present application there is provided a non-transitory computer readable storage medium having stored thereon computer program instructions, characterized in that the computer program instructions when executed by a processor implement the method of any of the above.
The present application is applicable to detecting routing loops occurring in a computer network. Obtaining overtime messages in protocol messages, wherein the protocol messages are various network protocol messages, the messages are different from user data messages, namely IP data packets, when a route loop occurs in a network segment where a destination terminal device corresponding To a destination IP of the IP data packets is located, the IP data packets are forwarded back and forth between two routers where the route loop occurs, the IP data packets are reduced one by one until TTL (Time To Live) of the IP data packets is reduced To 0, and finally, a routing device processing the IP data packets discards the IP data packets and sends the overtime messages To source terminal devices of the IP data packets. Analyzing the overtime message to obtain the destination IP address of the overtime message, namely the IP address of the destination terminal equipment corresponding to the destination IP of the discarded IP data packet, wherein the destination terminal equipment is used as a loop host; any one of the terminal devices in the network is controlled, network detection is carried out on the loop host for more than two times, so that the communication condition of each routing device between the terminal device and the loop host is detected, two routing devices with routing loops are determined based on the detection result of each network, and network management staff can find the two routing devices in time to perform fault processing. Compared with the traditional method of reporting according to users, the method and the device for monitoring the occurrence of the routing loop is more timely by acquiring the overtime message in the protocol message, and compared with the traditional method of checking all the related routing devices, the method and the device for determining the two routing devices of the occurrence of the routing loop are more rapid and efficient.
Other features and aspects of the present application will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features and aspects of the present application and together with the description, serve to explain the principles of the present application.
FIG. 1 shows a flow chart of a routing loop detection method of an embodiment of the present application;
fig. 2 shows a deployment schematic diagram of a routing loop detection method according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating a timeout message parsing result according to an embodiment of the present application;
fig. 4 shows a schematic diagram of a returned information analysis result of test data according to an embodiment of the present application;
FIG. 5 illustrates a schematic diagram of route loops occurring based on routing table acquisition in an embodiment of the present application;
fig. 6 shows a main body structure diagram of a routing loop detection apparatus according to an embodiment of the present application;
fig. 7 shows a main body structure diagram of a routing loop detection apparatus of an embodiment of the present application.
Detailed Description
Various exemplary embodiments, features and aspects of the present application will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
In addition, numerous specific details are set forth in the following detailed description in order to provide a better understanding of the present application. It will be understood by those skilled in the art that the present application may be practiced without some of these specific details. In some instances, methods, means, elements, and circuits have not been described in detail as not to unnecessarily obscure the present application.
Fig. 1 shows a flowchart of a routing loop detection method according to an embodiment of the present application. As shown in fig. 1, the routing loop detection method includes: step S100: acquiring a timeout message in a protocol message, and analyzing the timeout message to acquire a destination IP address of the timeout message; step S200: any terminal equipment in the network is controlled, and network detection is carried out for the terminal equipment corresponding to the destination IP address of the overtime message for more than two times; step S300: two routing devices where a routing loop occurs are determined based on the results of each network detection.
The present application is applicable to detecting routing loops occurring in a computer network. Obtaining overtime messages in protocol messages, wherein the protocol messages are various network protocol messages, the messages are different from user data messages, namely IP data packets, when a route loop occurs in a network segment where a destination terminal device corresponding To a destination IP of the IP data packets is located, the IP data packets are forwarded back and forth between two routers where the route loop occurs, the IP data packets are reduced one by one until TTL (Time To Live) of the IP data packets is reduced To 0, and finally, a routing device processing the IP data packets discards the IP data packets and sends the overtime messages To source terminal devices of the IP data packets. Analyzing the overtime message to obtain the destination IP address of the overtime message, namely the IP address of the destination terminal equipment corresponding to the destination IP of the discarded IP data packet, wherein the destination terminal equipment is used as a loop host; any one of the terminal devices in the network is controlled, network detection is carried out on the loop host for more than two times, so that the communication condition of each routing device between the terminal device and the loop host is detected, two routing devices with routing loops are determined based on the detection result of each network, and network management staff can find the two routing devices in time to perform fault processing. Compared with the traditional method of reporting according to users, the method and the device for monitoring the occurrence of the routing loop is more timely by acquiring the overtime message in the protocol message, and compared with the traditional method of checking all the related routing devices, the method and the device for determining the two routing devices of the occurrence of the routing loop are more rapid and efficient.
It should be noted here that the acquired protocol packets are performed by using a network traffic analysis device deployed by a computer network bypass. The network flow analysis device is a universal network operation and maintenance device which is deployed in a network in a bypass mode, and the network flow is mirrored by means of devices such as a switch, and the network flow analysis device captures, analyzes and stores the flow for the purposes of network performance monitoring, flow analysis, safety tracing and the like. With the general network traffic analysis device, no additional hardware investment is added to the user. The network traffic analysis device, such as network traffic security audit device, network performance management device (NPM), network full traffic tracing device, etc., is not limited herein, and only the protocol message transmitted in each network device or network transmission line needs to be obtained, and there are various methods for obtaining the protocol message in the network traffic: the optical splitter can be directly obtained from a network line, or can be obtained from network equipment in a mirror image mode.
As shown in fig. 2, a network traffic analysis device is deployed in a network, and the routing loop detection method of the embodiment of the application is operated on the network traffic analysis device; the switch mirrors the network traffic to the network traffic analysis device; assume that a routing loop exists between routing device R1 and routing device R2 in the network with respect to network segment B; the IP address of the terminal equipment 1 is positioned in the network segment A, and the IP address of the terminal equipment 2 is positioned in the network segment B; because there is a routing loop between the routing device R1 and the routing device R2 about the network segment B, the IP packet sent by the terminal device 1 to the terminal device 2 will be forwarded back and forth between the routing device R1 and the routing device R2 until the TTL of the IP packet is reduced to 0; when the TTL of the IP data packet is reduced to 0, the routing device R1 or the routing device R2 sends a timeout message to the terminal device 1, and the timeout message is mirrored by the switch to the network flow analysis device; analyzing the overtime message to obtain the IP address of the terminal equipment 2, and taking the terminal equipment 2 as a loop host; any terminal equipment in the network is controlled, network detection is carried out on the loop host for more than two times, so that the communication condition of each routing equipment between the terminal equipment and the loop host is detected, and the routing equipment R1 and the routing equipment R2 which generate routing loops are determined based on the detection result of each network.
When the overtime message is mirrored to the network flow analysis equipment by the switch, each protocol message is mirrored at the same time, so that each protocol message needs to be judged to acquire the overtime message therein.
Further, when the timeout message in the protocol message is acquired, the judgment is performed based on at least one of the type and the code of the protocol message, and whether the protocol message is the timeout message is judged.
When judging the protocol message, the method comprises the following steps: analyzing the protocol message to obtain the type and code of the protocol message; when the type of the protocol message is network unreachable and the code is that the time-to-live counter is overtime, judging that the protocol message is overtime message, and acquiring the destination IP address of the protocol message for subsequent processing; when the type of the protocol message is not network unreachable or the code is not time-out of the time-to-live counter, judging that the protocol message is not time-out message and does not carry out subsequent processing, wherein the network unreachable message refers to: the router addresses in error and the next hop router may fail.
Specifically, referring to fig. 3, the protocol message is parsed, that is, the ICMP message is parsed, and whether the ICPM message satisfies: type=11 and code=0, if not satisfied, the ICPM message is not processed; as shown in fig. 3, after the ICMP packet is parsed, the ICMP packet type=11 and code=0, that is, the ICMP packet is characterized in that the Type of the ICMP packet is network unreachable and the Code is that the lifetime counter is overtime, and the ICMP packet is regarded as the timeout packet. Further, the destination IP address of the IP header in the ICMP message payload after parsing is obtained, that is, the ring host IP address where the routing ring occurs, as shown in "Destination Address:10.192.18.126" in fig. 3.
By using any one of the above methods, after determining a loop host in which a routing loop occurs, that is, a terminal device corresponding to a destination IP address of a timeout message, network detection is performed on the terminal device for more than two times, so as to obtain a result corresponding to each network detection, and two routing devices in which the routing loop occurs are determined based on the result of each network detection and based on the result of each network detection.
When the network detection is performed twice or more on the terminal device corresponding to the destination IP address of the timeout message, any terminal device in the network is controlled, and the network detection is performed twice or more on the terminal device corresponding to the destination IP address of the timeout message, where the controlled terminal device is any terminal device except the terminal device corresponding to the destination IP address of the timeout message in the network.
When any one of the terminal devices in the control network performs network detection twice or more, the operation system of the bypass device (the operation system of the bypass device is generally accessible to the user network) or the remote control device controls any one of the terminal devices in the network, and performs network detection twice or more on the loop master.
Further, when the network detection is performed twice or more on the terminal device corresponding to the destination IP address of the timeout message, the method includes: sending test data for more than two times to terminal equipment corresponding to a target IP address of the overtime message; and analyzing the return information of each test data to determine two routing devices generating a routing loop.
When test data corresponding to a destination IP address of the overtime message, namely, the loop host sends the test data for more than two times, because the routing loop exists in the routing device corresponding to the network segment where the loop host is located, the test data sent to the loop host can be forwarded back and forth between two routing devices where the routing loop occurs until the TTL of the test data is reduced to 0, when the TTL of the test data is reduced to 0, the routing device where the test data is located sends the overtime message, namely, return information, to the source terminal device where the test data is entered, wherein the return information contains the routing device information where the TTL of the corresponding test data is reduced to 0.
That is, when the network detection is performed twice or more on the terminal device corresponding to the destination IP address of the timeout message, the method includes: sending test data for more than two times to terminal equipment corresponding to a target IP address of the overtime message; and analyzing the return information of each test data to determine two routing devices generating a routing loop.
Further, when the test data is sent to the terminal device corresponding to the destination IP address of the timeout message for more than two times, TTLs of the test data are not equal. To avoid the occurrence of test data at the same routing device when its TTL is reduced to 0.
In one possible implementation manner, the TTL of each test data is greater than or equal to the recommended value of the TTL of the data packet, and the TTL of each test data is less than or equal to the maximum value of the TTL of the data packet, that is, the TTL of the test data is greater than or equal to 64 and less than or equal to 255.
Preferably, the ring host is instructed by PING (Packet Internet Groper internet packet explorer) to perform network detection twice, the difference in TTL of the test data sent by the network detection twice being 1.
For example, referring to fig. 4, after determining the IP address of the loop host based on the timeout message, the operating system of the bypass device or the terminal device in any network is used to remotely control the terminal device, execute PING commands twice on the IP address of the loop host, and the TTL of the test data of the PING commands twice is set to 100 and 99, respectively, and the bypass device or the terminal device for executing the PING commands receives the return information of the test data when the TTL of the test data is reduced to 0. As shown in fig. 4, fig. 4 shows the result of analysis of the returned information of the PING command twice, that is, when the test data with TTL of 100 is sent to the ring host (IP address 10.192.18.126), the TTL of the test data is reduced to 0 in one of the routing devices (IP address 10.192.17.1); when test data having TTL of 99 is sent to the pair ring host (IP address 10.192.18.126), the TTL of the test data is reduced to 0 in the other routing device (IP address 10.192.17.30). And thus two routing devices where the routing loop occurs.
Further, based on two routing devices and a loop host which generate routing loops, the routing of the generated routing loops is queried by utilizing the corresponding routing tables.
Wherein the routing table is a spreadsheet (file) or class database stored in the routing device or in the networked terminal device. The routing table stores paths pointing to specific network addresses, i.e. routes between each routing device and each end device. Therefore, the routing table stored in one of the two routing devices generating the routing loop is utilized, and the routing corresponding to the two routing devices generating the routing loop and the loop host, namely the routing generating the routing loop, is searched in the routing table based on the IP address of the other routing device and the IP address of the loop host; or the routing table stored by the loop host is utilized, and the routing table is used for inquiring the routes corresponding to the two routing devices generating the routing loop and the loop host, namely the routes generating the routing loop, based on the IP addresses of the two routing devices generating the routing loop.
For example, referring to fig. 5, using a routing table stored in one of the two routing devices (IP address 10.192.17.1) that generate the routing loop, the routing table is searched for a route 10.192.18.0/25 corresponding to the two routing devices that generate the routing loop and the loop host, that is, the route that generates the routing loop, based on the IP address (10.192.17.30) of the other routing device and the IP address (10.192.18.126) of the loop host.
In one possible implementation manner, after determining two routing devices where a routing loop occurs, using any of the methods described above, reporting a loop alarm; the loop alarm includes at least one of an IP address of two routing devices that occur the routing loop, a destination IP address of a routing and timeout message that occurs the routing loop.
Further, after obtaining the route of the routing loop, reporting a loop alarm; the loop alarm includes the IP addresses of the two routing devices where the routing loop occurs, the destination IP address where the routing loop occurs and the timeout message.
Specifically, based on a Syslog server in the network, reporting a loop alarm, where the loop alarm is represented by json (lightweight data exchange format) as follows:
{
"Loop host IP": "10.192.18.126",
"Loop routing": "10.192.18.0/25",
"routing device a": "10.192.17.1",
"routing device B": "10.192.17.30",
}
therefore, the loop alarm is sent to the terminal equipment of the network manager or the terminal equipment used for the management server, so that the network manager can determine the specific position of the routing loop in the network according to the loop alarm until the specific position is determined, and the fault processing is facilitated.
Still further, referring to fig. 6, according to another aspect of the present application, there is also provided a routing loop detection apparatus 100, including: an input module 110, a detection module 120, and a query module 130; an input module 110, configured to obtain a timeout message in the protocol message, and parse the timeout message to obtain a destination IP address of the timeout message; the detection module 120 is configured to control any one of the terminal devices in the network, and perform network detection on the terminal device corresponding to the destination IP address of the timeout message for more than two times; a query module 130 configured to determine two routing devices where a routing loop occurs based on the results of each network detection.
Still further, according to another aspect of the present application, there is also provided a routing loop detection apparatus 200. Referring to fig. 7, the routing loop detection apparatus 200 of the present embodiment includes a processor 210 and a memory 220 for storing instructions executable by the processor 210. Wherein the processor 210 is configured to implement any of the routing loop detection methods described above when executing the executable instructions.
Here, it should be noted that the number of processors 210 may be one or more. Meanwhile, in the external reference calibration apparatus 200 for an image according to the embodiment of the present application, an input device 230 and an output device 240 may be further included. The processor 210, the memory 220, the input device 230, and the output device 240 may be connected by a bus, or may be connected by other means, which is not specifically limited herein.
The memory 220 is a computer-readable storage medium that can be used to store software programs, computer-executable programs, and various modules, such as: the routing loop detection method in the embodiment of the application corresponds to a program or a module. The processor 210 executes various functional applications and data processing of the routing loop detection apparatus 200 by running software programs or modules stored in the memory 220.
The input device 230 may be used to receive an input digital or signal. Wherein the signal may be a key signal generated in connection with user settings of the device/terminal/server and function control. The output means 240 may comprise a display device such as a display screen.
According to another aspect of the present application, there is also provided a non-transitory computer readable storage medium having stored thereon computer program instructions which, when executed by the processor 210, implement any of the routing loop detection methods described in the foregoing.
The embodiments of the present application have been described above, the foregoing description is exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvements in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

1. A method for routing loop detection, comprising:
acquiring an overtime message in a protocol message, and analyzing the overtime message to acquire a destination IP address of the overtime message;
controlling any terminal equipment in the network, and executing network detection for the terminal equipment corresponding to the target IP address of the overtime message for more than two times;
two routing devices where a routing loop occurs are determined based on the results of each of the network detections.
2. The method of claim 1, wherein when the timeout message in the protocol message is acquired, determining whether the protocol message is a timeout message is performed based on at least one of a type and a code of the protocol message.
3. The method according to claim 2, wherein when determining the protocol message, comprising:
analyzing the protocol message to obtain the type and code of the protocol message;
and when the type of the protocol message is network unreachable and the code is that the time-to-live counter is overtime, judging that the protocol message is the overtime message.
4. The method of claim 1, wherein the controlled terminal device is any terminal device in the network other than the terminal device corresponding to the destination IP address of the timeout message when the network detection is performed more than twice on the terminal device corresponding to the destination IP address of the timeout message.
5. The method according to claim 4, wherein when the network detection is performed twice or more on the terminal device corresponding to the destination IP address of the timeout message, the method comprises:
sending test data for more than two times to terminal equipment corresponding to the target IP address of the overtime message;
and analyzing the return information of each test data, and determining two routing devices on which a routing loop occurs.
6. The method according To claim 5, wherein when the test data is transmitted To the terminal device corresponding To the destination IP address of the timeout message twice or more, TTL (Time To Live value) of each of the test data is not equal.
7. The method according to claim 1, wherein after determining that two of said routing devices of a routing loop occur, a loop alarm is reported;
the loop alarm includes at least one of an IP address of the two routing devices that have a routing loop, a route that has a routing loop, and a destination IP address of the timeout message.
8. A routing loop detection apparatus, comprising: the device comprises an input module, a detection module and a query module;
the input module is configured to acquire a timeout message in a protocol message, and analyze the timeout message to acquire a destination IP address of the timeout message;
the detection module is configured to control any one of the terminal devices in the network, and perform network detection on the terminal device corresponding to the destination IP address of the overtime message for more than two times;
the query module is configured to determine two routing devices where a routing loop occurs based on the results of each of the network detections.
9. A routing loop detection apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method of any one of claims 1 to 7 when executing the executable instructions.
10. A non-transitory computer readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the method of any of claims 1 to 7.
CN202311863973.3A 2023-12-29 2023-12-29 Routing loop detection method, device, equipment and storage medium Pending CN117880135A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311863973.3A CN117880135A (en) 2023-12-29 2023-12-29 Routing loop detection method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311863973.3A CN117880135A (en) 2023-12-29 2023-12-29 Routing loop detection method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117880135A true CN117880135A (en) 2024-04-12

Family

ID=90596279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311863973.3A Pending CN117880135A (en) 2023-12-29 2023-12-29 Routing loop detection method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117880135A (en)

Similar Documents

Publication Publication Date Title
US8117301B2 (en) Determining connectivity status for unnumbered interfaces of a target network device
Sherwood et al. Discarte: a disjunctive internet cartographer
CA2706581C (en) System, method and program for determining failed routers in a network
CN112311580B (en) Message transmission path determining method, device and system and computer storage medium
US9014013B2 (en) Packet tracing through control and data plane operations using SNMP trap commands
WO2016045098A1 (en) Switch, controller, system and link quality detection method
US20060133287A1 (en) Frame forwarding device and method for staying loop of frame
WO2021093465A1 (en) Method, device, and system for transmitting packet and receiving packet for performing oam
JP4510751B2 (en) Network failure detection device
CN108737206B (en) Routing method and device of network channel and computer equipment thereof
CN106302021B (en) Network flow forwarding abnormity detection method
CN112260922B (en) Method and system for quickly positioning network loop problem
CN110380966B (en) Method for discovering forwarding path and related equipment thereof
WO2021027420A1 (en) Method and device used for transmitting data
WO2011124178A2 (en) Fault detection method, route node and system
CN117880135A (en) Routing loop detection method, device, equipment and storage medium
US8467301B2 (en) Router misconfiguration diagnosis
CN115766252A (en) Flow abnormity detection method and device, electronic equipment and storage medium
Cisco Interface Configuration Commands
Cisco Interface Configuration Commands
Cisco Interface Configuration Commands
Cisco Interface Configuration Commands
Cisco Interface Configuration Commands
Cisco Interface Configuration Commands
Cisco Interface Configuration Commands

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination