CN101815029A - Address refreshing method of sub-loop virtual channel - Google Patents

Address refreshing method of sub-loop virtual channel Download PDF

Info

Publication number
CN101815029A
CN101815029A CN200910105538A CN200910105538A CN101815029A CN 101815029 A CN101815029 A CN 101815029A CN 200910105538 A CN200910105538 A CN 200910105538A CN 200910105538 A CN200910105538 A CN 200910105538A CN 101815029 A CN101815029 A CN 101815029A
Authority
CN
China
Prior art keywords
address
subring
message
node
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910105538A
Other languages
Chinese (zh)
Other versions
CN101815029B (en
Inventor
王斌
吴少勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN200910105538.8A priority Critical patent/CN101815029B/en
Publication of CN101815029A publication Critical patent/CN101815029A/en
Application granted granted Critical
Publication of CN101815029B publication Critical patent/CN101815029B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an address refreshing method for a sub-loop virtual channel, which comprises the following steps of: when a sub-loop interconnection node collects an SF message carrying address refreshing information from a control VLAN of a sub-loop of the sub-loop interconnection node, refreshing a local address forwarding list according to the SF message and constructing an FLUSH message, searching the corresponding exit port in the local address forwarding list and forwarding the FLUSH message to the virtual channel of the sub-loop from the corresponding exit port; when other interconnection nodes on the virtual channel receive the FLUSH message, searching the corresponding exit port, forwarding the FLUSH message from the corresponding exit port and then updating the local address forwarding list according to the LFUSH message; and when non-interconnection nodes of the virtual channel of the sub-loop receive the FLUSH message, forwarding the FLUSH message in a multicast VLAN mode and updating the local address forwarding list according to the FLUSH message. When the method is used, the diffusion of the LFUSH message on the virtual channel can be greatly reduced and the addresses of all the nodes on the virtual channel avoid being refreshed.

Description

A kind of address flush method of subring tunnel
Technical field
The present invention relates to data communication field, relate more specifically to a kind of address flush method of subring tunnel.
Background technology
In the practical application of Ethernet, extensively adopted various resist technologies, realize the redundancy backup between primary path and the backup path.When primary path and backup path when all being intact, block the protected data forwarding capability of backup path, the protected data between the network is transmitted on primary path; When primary path goes wrong; open the protected data forwarding capability of backup path; protected data between the network switches on the backup path to be transmitted; realize preventing under the network normal condition that protected data is repeated to receive and form broadcast storm; when breaking down, enables the primary path of network backup path transmission protected data; improve the fault-resistant ability of Ethernet, and satisfy convergence time when switching less than the high real-time requirement of 50ms.
Many ring protections of Ethernet technology for example, as shown in Figure 1, node S1 to S6 is an Ethernet switch, and network B is connected with node S2, and network A is connected with node S5.Communicate between network A and the network B.Four physical pathways are arranged between network A and the network B, that is: network A<-node S5<-node S3<-node S2<-network B, network A<-node S5<-node S3<-node S4<-node S1<-node S2<-network B, network A<-node S5<-node S6<-node S4<-node S3<-node S2<-network B, network A<-node S5<-node S6<-node S4<-node S1<-node S2<-network B.
Resist technology for the many rings of Ethernet; the standard of formulating in the world (as ITU G.8032) is thought should comprise ring and subring in the protecting network of too many ring; promptly; ring (Ring) is a complete ether ring; subring (Sub-Ring) is a kind of ether ring that links to each other with other ring or network by interconnecting nodes (Interconnection Node), and interconnecting nodes (Interconnection Node) is the common node that belongs to two or more ether rings simultaneously.Shown in Fig. 2 a, comprise a ring and a subring among the figure, Ring1 is a ring, Ring2 is subring.The node that Ring1 comprises has S1, S2, S3 and S4, and the link that comprises has:<S1, S2 〉,<S2, S3 〉,<S3, S4〉and<S4, S1 〉; The node that Ring 2 comprises has S3, S5, S6 and S4, and the link that comprises has:<S3, S5 〉,<S5, S6〉and<S6, S4 〉.Need benly to be<S3 S4 link belongs to Ring1 and do not belong to Ring2.In looped network; under the trouble-free situation of looped network; in the ring; need one section link the data message forwarding is in blocked state to prevent into ring; this section link is commonly referred to as the ring protection link and (or often blocks link; Deng), the switching in primary path and protection path in participating in encircling by this section ring protection link.The node that has the ring protection link is called ring protection controlling links node here.Shown in Fig. 2 a, in Ring1, node S1 is a ring protection controlling links node, with the 11 direct port connection links of node S1 be the ring protection link of Ring1.In Ring2, node S6 is a ring protection controlling links node, with the 62 direct port connection links of node S6 be the ring protection link of Ring2.Under normal circumstances, the ring protection controlling links node of Ring1 and Ring2 blocks their link to each other with ring protection link forwardings of data message (the professional data message of civilian middle finger protection) of port, prevents that protected data is repeated to transmit and the formation broadcast storm.
When the link in the ether multi-ring network when all being intact, the ring protection controlling links node of ring and subring obstruction is from the protected data forwarding capability of port.Shown in Fig. 2 a, node S1 has blocked the protected data forwarding capability of port one 1, and node S6 has blocked the protected data forwarding capability of port 62, and the communication path of network B and A is: network B<-node S2<-S3<-S5<-network A.
When the link of ether multi-ring network breaks down; if faulty link is not the ring protection link; then ring protection controlling links node is opened the protected data forwarding capability of ring protection link adjacent port, and each node also wants refresh address to transmit, and communication is according to new path transmission between the network.Shown in Fig. 2 b; fault has taken place in node S2 on the ring Ring1 and the link between the S3; after node S2 detects link failure; the data forwarding function of port blocked 22; notify other node links that fault has taken place; after node S1 receives signalling trouble; open the protected data forwarding capability of port one 1; each node on the Ring1 also wants refresh address to transmit in addition, and the communication path that network B and A are new is: network B<-node S2<-node S1<-node S4<-node S3<-node S5<-network A.
When the link-recovery in the ether multi-ring network, recover to switch, the transmission path when Network Transmission returns to normal condition, because path changing, node also needs to carry out refreshing of addresses forwarding table.
When the ether multi-ring network being safeguarded and protect switching; need to propagate a large amount of control messages; these control messages are to propagate in the protection control channel automatically; automatically the protection control channel has two classes; one class is corresponding to ring; the control channel that is called ring, another kind of is corresponding to subring, is called the control channel of subring.The control channel of ring is configured in the ring.The control channel of subring comprises part and the tunnel (Virtual Channel) that is configured in the subring.Tunnel is to be configured in other network between the interconnection point or other ring provide (comprising other subring) subring of transmission channel for the subring protocol massages control channel.As shown in Figure 3, the control channel of subring Ring2 not only is configured on the subring Ring2, but also is configured on the ring Ring1, is configured in the part of ring on the Ring1 and is the tunnel that the protocol massages for subring Ring2 provides.Because the existence of tunnel, the protocol massages of subring can arrive any one node in the subring.
The address flush problem of subring in the ether multi-ring network will be discussed below:
For example in Fig. 4, when ether multi-ring network fault-free, the communication path of network B and A is: network B<-node S2<-S3<-S5<-network A.When the link occurs fault of subring Ring2; as shown in Figure 4; link<S3 of Ring2; S5〉fault appearred; after node S5 detected port 51 respective links and breaks down, refresh address was transmitted, the protected data forwarding capability of port blocked 51; open the protected data forwarding capability of port 52, and outwards send the malfunction frame.After node S6 received the malfunction frame, refresh address was transmitted, and formed new transmission path between network A and the network B.After node S5 and node S6 refresh address were transmitted, network A was issued the broadcasting of the protected data of network B by node S5 and node S6, finally can arrive network B, simultaneously each node address of learning network A.But, before network A is issued the network B data, if network B sends data to network A, a large amount of packet loss phenomenons will take place so.This is because node S2 does not also have refresh address to transmit; clauses and subclauses before still switch in the path in the addresses forwarding table; i.e. Cuo Wu address entry; network B is sent to the protected data of network A and still transmits according to the addresses forwarding table of mistake; promptly the outbound port 22 from node S2 sends; these data are in fact because link failure and port block can not arrive network A; after having only the switches learn of wait to arrive the address outbound port of correct network A; just can reach network B; therefore the flow that whether has network A to be sent to network B is depended in the network B path that is sent to network A switching time, and this time sometimes even surpass 50ms.When the protection switching that Ethernet Circle recovers, also there is similar problem in the communication between network A and the B.
From top analysis as can be seen, when the link occurs fault of subring, subring need send protocol massages by interconnecting nodes other network beyond this subring and notify the node refresh address of other network to transmit.
G.8032v2, existing ITU-T to the solution of this problem is: when the subring topology changes, after and if only if interconnecting nodes is received the protocol massages that has address flush information and is refreshed self addresses forwarding table from subring, this interconnecting nodes is just constructed new address flush protocol massages, and continuous 3 times be forwarded to this protocol massages on the tunnel between the interconnecting nodes, after node in other ring or the subring is received this protocol frame, refresh addresses forwarding table separately.
Though existing subring address flush scheme can guarantee that the node on the subring tunnel obtains address flush, but diffusion has but taken place in the address flush message of subring interconnecting nodes structure on tunnel, this will cause that all the node refresh addresses on the tunnel transmit, cause the broadcast storm that moment takes place in ring that the ether multi-ring network is all and the subring, influenced the overall performance of ether multi-ring network greatly.Shown in Fig. 5 a, Ring1, Ring2, Ring3 and Ring4 constitute the ether multi-ring network.Ring2 is a complete closed loop, and the node that comprises has S2, S6, S7 and S3, and the link that comprises has:<S2, S6 〉,<S6, S7 〉,<S7, S3〉and<S3, S2 〉, Control Node (or claiming ring protection link owner) is the S3 node, what link to each other with 32 ports is the ring protection link; Ring1 is subring, and the node that comprises has S2, S1, S5 and S6, and the link that comprises has:<S2, S1 〉,<S1, S5〉and<S5, S6 〉, Control Node is the S5 node, what link to each other with 51 ports is the ring protection link; Ring3 is subring, and the node that comprises has S3, S4, S8 and S7, and the link that comprises has:<S3, S4 〉,<S4, S8〉and<S8, S7 〉, Control Node is the S4 node, what link to each other with 42 ports is the ring protection link; Ring4 is subring, and the node that comprises has S5, S9, S10, S11 and S8, and the link that comprises has:<S5, S9 〉,<S9, S10 〉,<S10, S11〉and<S11, S8 〉, Control Node is the S10 node, what link to each other with 102 ports is the ring protection link; In Fig. 5 a, link<the S10 of subring, S11〉fault taken place, node S10 blocks the data message forwarding function of 101 ports, and periodically outwards send SF message (signalling trouble message) by 102 ports, node S11 blocks the data message forwarding function of 112 ports, and periodically outwards sends SF message (signalling trouble message) by 111 ports.After interconnecting nodes S5 and S8 receive the SF message that has address flush information that node S10 and S11 send respectively first, refresh addresses forwarding table separately, construct the FLUSH message then respectively, send continuously 3 times to tunnel (tunnel of subring Ring4 is configured on Ring1, Ring2 and the Ring3).These FLUSH messages spread on tunnel, have refreshed all addresss of node on the tunnel and have transmitted, and this will cause the moment broadcast storm on the tunnel.
In fact the address of node in other ring of all between the refresh all interconnecting nodes or the subring is transmitted fully and be there is no need.For example, in Fig. 5 b, there is not fault on the subring Ring4, the forwarding capability of the 102 port block data messages of Control Node S10.Communication path between network A and the networking B is: networking B<-S4<-S3<-S2<-S6<-S7<-S8<-S11<-S10<-networking A.In Fig. 5 c, link<S10 of subring Ring4, S11〉fault has taken place, node S10 blocks the data message forwarding function of 101 ports, opens the data message forwarding function of 102 ports.Node S11 blocks the data message forwarding function of 112 ports.Communication path between network A and the networking B is changed into: networking B<-S4<-S3<-S2<-S1<-S5<-S9<-S10<-networking A.Comparing cell A and networking B two forward-paths in Fig. 5 b and Fig. 5 c, can find that two paths have common path: S4<-S3<-S2, in other words at subring link<S10, S11〉when breaking down, node S3 and S4 needn't transmit by refresh address, only refresh unobstructed path between the interconnecting nodes (S5<-S1<-S2<-S6<-S7<-address of node on S8) is transmitted and just can be guaranteed that data can not transmit along the path of mistake.
Therefore, propose a kind of the transmission path of interconnecting nodes to the FLUSH message that tunnel sends to be limited on the unobstructed path between the interconnection contact, to reducing the moment broadcast storm and to improve network performance be very significant on the tunnel.
Summary of the invention
Technical problem to be solved by this invention provides a kind of address flush method of subring tunnel, avoids the interconnecting nodes refresh all addresses forwarding table on the tunnel, improves network performance.
For solving the problems of the technologies described above, the present invention has adopted following solution:
A kind of address flush method of subring tunnel comprises:
When the subring interconnecting nodes when the control VLAN of its subring receives the signalling trouble message that carries address flush information, refresh local addresses forwarding table in view of the above and construct the FLUSH message, target MAC (Media Access Control) address and VLAN ID according to the address update searches corresponding outbound port in the addresses forwarding table of this locality then, is forwarded to the address flush message on the tunnel of subring from corresponding outbound port;
In the transmission course of described address flush message, when other interconnecting nodes on the tunnel of described subring receives the address flush message, in the addresses forwarding table of this locality, search corresponding outbound port according to its target MAC (Media Access Control) address and VLAN ID, the address flush message is transmitted from corresponding outbound port, upgraded local addresses forwarding table according to the address update afterwards; When the non-interconnecting nodes on the tunnel of described subring receives described address flush message, it is transmitted in the M-VLAN mode, and upgrade local addresses forwarding table in view of the above.
In the said method, the source MAC of described address flush message and the target MAC (Media Access Control) address all target MAC (Media Access Control) address with the described signalling trouble message that carries address flush information are identical, and the VLAN ID of described address flush message is identical with the ID of the control VLAN of described subring.
Said method also comprises: in the transmission course of described address flush message, when described subring interconnecting nodes receives all identical with the target MAC (Media Access Control) address of the described signalling trouble message protocol massages of source MAC and target MAC (Media Access Control) address, abandon this protocol massages.
Said method also comprises: described subring interconnecting nodes periodically sends multicast message on the tunnel of described subring, and the source MAC of described multicast message all the target MAC (Media Access Control) address with described signalling trouble message is identical with target MAC (Media Access Control) address.
In the said method, the transmission cycle of described multicast message is less than the digestion period of MAC Address.
In the said method, the mode that described subring interconnecting nodes sends the address flush message is: continuous 3 tunnels to subring send.
The present invention has following beneficial effect:
Adopt the present invention, can make interconnecting nodes only refresh node on the unobstructed path on the tunnel to the address flush message (FLUSH message) that tunnel sends, significantly reduce the diffusion of FLUSH message on tunnel, avoid all nodes on the tunnel to be refreshed the address, improved network performance.
Description of drawings
Fig. 1 is the topological diagram of ether multi-ring network;
Fig. 2 a is the communication path topology figure when link is intact in the ether multi-ring network;
Fig. 2 b is the communication path topology figure during link failure in the ether multi-ring network;
Fig. 3 is the schematic diagram of subring control VLAN;
Fig. 4 breaks down for subring need be to the instance graph of tunnel refresh address;
Fig. 5 a is the propagation path of FLUSH message in tunnel in the traditional scheme;
Fig. 5 b is the network A under the non-failure conditions and the communication path of network B;
Fig. 5 c is break down the network A under the situation and the communication path of network B of subring;
Fig. 6 is the address flush method flow chart of subring tunnel of the present invention;
Fig. 7 be in the embodiments of the invention FLUSH message at the propagation path of tunnel.
Embodiment
Core concept of the present invention is: when the topology of subring changes and interconnecting nodes need be when tunnel sends address flush message (FLUSH message), described address flush message only refreshes between the subring interconnecting nodes on the unobstructed path address of node and transmits.The specific implementation method is:
1) when the subring interconnecting nodes when the control VLAN of its subring receives the SF message that carries address flush information, refresh local addresses forwarding table (except the VLANID corresponding address forwarding entry in the FLUSH message) in view of the above and construct the FLUSH message, target MAC (Media Access Control) address and VLAN ID according to the FLUSH message searches local addresses forwarding table then, if find, then the FLUSH message is forwarded on the tunnel of subring from corresponding outbound port, otherwise it is sent in the M-VLAN mode;
2) in the transmission course of FLUSH message, when other interconnecting nodes on the tunnel of subring is received the FLUSH message, target MAC (Media Access Control) address and VLAN ID according to the FLUSH message search local addresses forwarding table, if find, then the FLUSH message is forwarded on the tunnel of subring from corresponding outbound port, otherwise it is sent in the M-VLAN mode; Upgrade local addresses forwarding table (except the VLAN ID corresponding address forwarding entry in the FLUSH message) according to the FLUSH message afterwards.When the non-interconnecting nodes on the tunnel of described subring receives the FLUSH message, it is transmitted in the M-VLAN mode, and upgrade local addresses forwarding table (except the VLAN ID corresponding address forwarding entry in the FLUSH message) in view of the above.The subring interconnecting nodes is received when the MAC Address of protocol massages that source MAC is identical with target MAC (Media Access Control) address and these MAC Address and SF message is identical, is abandoned this protocol massages.
In order to make other interconnecting nodes on the subring tunnel can find the corresponding outbound port of FLUSH message at the addresses forwarding table of this locality, two subring interconnecting nodes also periodically send multicast message (target MAC (Media Access Control) address of these messages is identical with the multicast mac address of described SF message with source MAC) on the tunnel of the control channel of subring, these messages are propagated on the control VLAN of described subring, so that other interconnecting nodes on the subring tunnel can carry out MAC address learning.
In order to describe the solution of the present invention in detail, be further described below (as shown in Figure 6):
Step 601 is divided into two classes with the node on the ether multi-ring network, and a class is the interconnecting nodes of ring or subring, and this category node constitutes set 1, and another kind of is non-interconnecting nodes, and this category node constitutes set 2.
Step 602, for any two interconnecting nodes in the set 1, if they are interconnecting nodes that certain subring inserts other ring or subring, described two interconnecting nodes periodically send multicast message (target MAC (Media Access Control) address of these messages is identical with the multicast mac address of the protocol massages of described subring with source MAC) to described subring on the tunnel of the control channel of described subring, purpose is to make interconnecting nodes on the tunnel learn the MAC Address of described subring protocol massages before MAC address aging.The transmission cycle of these messages is less than the digestion period of MAC Address.
Step 603, when node is received the ring or the protocol massages of subring (promptly, the target MAC (Media Access Control) address of message drops on [01-19-A7-00-00-01,01-19-A7-00-00-EF] in the interval, MAC Address in this interval is the multicast mac address of ITU-T protocol massages G.8032) time, handle in two kinds of situation: situation 1, the node of receiving this protocol massages is non-interconnecting nodes, changes step 604 over to.Situation 2, the node of receiving this protocol massages is an interconnecting nodes, changes step 606 over to.
Step 604, when non-interconnecting nodes is received ring or subring protocol massages, adopt the retransmission method of common VLAN multicast packet, promptly, this node other all of the port beyond (in the control VLAN of described ring or subring) inbound port is transmitted the described protocol massages that receives, and a this protocol massages of copy is handled for described non-interconnecting nodes simultaneously.
Step 505, if this protocol massages is the FLUSH message, this node refresh address is transmitted (except the VLAN ID corresponding address forwarding entry in the FLUSH message).
Step 606, when interconnecting nodes is received described protocol massages, this interconnecting nodes is analyzed last byte of this message target MAC (Media Access Control) address, obtain the ring number of ring under this protocol massages or subring, read the VLAN ID in the protocol massages simultaneously, divide 3 kinds of situations to handle then: situation 1, this interconnecting nodes is furnished with 2 ring upper port in ring that has described ring number or subring, change step 607 over to.Situation 2, this interconnecting nodes does not have configured port in ring that has described ring number or subring, change step 609 over to.Situation 3, this interconnecting nodes only are furnished with 1 ring upper port in the subring that has described ring number, change step 611 over to.
Step 607, when described interconnecting nodes is having when being furnished with 2 ring upper port in the ring of described ring number or the subring, this interconnecting nodes adopts the retransmission method of common VLAN multicast packet, promptly, this interconnecting nodes other all of the port beyond (in the VLAN that the VLAN ID of described protocol massages determines) inbound port is transmitted the described protocol massages that receives, a this protocol massages of copy is handled for described interconnecting nodes simultaneously, changes step 608 over to.
Step 608, if the copy of this protocol massages is the FLUSH message, this node refresh address is transmitted (except the VLAN ID corresponding address forwarding entry in the FLUSH message).
Step 609, when described interconnecting nodes is having when not having configured port in the ring of described ring number or the subring, this interconnecting nodes copy is a to this node analysis, table look-up (removing inbound port corresponding address clauses and subclauses) according to target MAC (Media Access Control) address in this protocol massages and VLAN ID simultaneously,, just this protocol massages is sent from corresponding ports if find, otherwise, send in the M-VLAN mode, that is: transmit from removing inbound port (in the VLAN) other port in addition, change step 610 over to.
Step 610, if the copy of this protocol massages is the FLUSH message, this node refresh address is transmitted (except the VLAN ID corresponding address forwarding entry in the FLUSH message).
Step 611, when on this interconnecting nodes is having the subring of described ring number, only being furnished with 1 ring upper port, handle in two kinds of situation: situation 1, this interconnecting nodes are that the port from the subring that has described ring number receives described protocol massages, change step 612 over to.Situation 2, this interconnecting nodes are that other port from the ring upper port of removing the subring that has described ring number receives described protocol massages, change step 614 over to.
Step 612, a this protocol massages of this interconnecting nodes copy is given this node analysis, simultaneously according to target MAC (Media Access Control) address in this protocol massages and VLAN ID table look-up (removing inbound port corresponding address clauses and subclauses), if find, just this protocol massages is sent from corresponding ports, otherwise, send in the M-VLAN mode.Change step 613 over to.
Step 613, if the copy of this protocol massages carries address flush information (this protocol massages is not the follow-up protocol massages that carries address flush information), this interconnecting nodes refresh address is transmitted (except the VLAN ID corresponding address forwarding entry of this protocol massages), construct FLUSH message (the FLUSH message can only transmit in tunnel) simultaneously, the target MAC (Media Access Control) address of FLUSH message is the same with the target MAC (Media Access Control) address of the described protocol massages of receiving with source MAC.The mode that the FLUSH message sends is to send 3 times continuously to tunnel.
Whether step 614, the target MAC (Media Access Control) address of judging protocol massages and the source MAC MAC Address with the protocol massages of the subring that has described ring number be identical, if identically just abandon, otherwise this protocol massages transmitted to the port of the subring that has described ring number.
Embodiment one, the address flush process of ether multi-ring network neutron loop protocol message in tunnel:
Fig. 7 is the transmission schematic diagram of ether multi-ring network subring protocol massages in the subring control channel, and the control channel of the subring among the figure is realized by VLAN, realizes but be not limited to VLAN, makes a concrete analysis of as follows:
As shown in Figure 7, Ring1, Ring2, Ring3 and Ring4 constitute the ether multi-ring network.Ring2 is a complete closed loop, and the node that comprises has S2, S6, S7 and S3, and the link that comprises has:<S2, S6 〉,<S6, S7 〉,<S7, S3〉and<S3, S2 〉, Control Node (or claiming ring protection link owner) is the S3 node; Ring1 is subring, and the node that comprises has S2, S1, S5 and S6, and the link that comprises has:<S2, S1 〉,<S1, S5〉and<S5, S6 〉, Control Node is the S5 node; Ring 3 is subrings, and the node that comprises has S3, S4, S8 and S7, and the link that comprises has:<S3, S4 〉,<S4, S8〉and<S8, S7 〉, Control Node is the S4 node; Ring4 is subring, and the node that comprises has S5, S9, S10, S11 and S8, and the link that comprises has:<S5, S9 〉,<S9, S10 〉,<S10, S11〉and<S11, S8 〉, Control Node is the S10 node.
The control channel of subring Ring4 is divided into two parts, tunnel (tunnel of subring Ring4 is configured on Ring1, Ring2 and the Ring3) and subring part.Control Node S3 on the tunnel, Control Node S5 and Control Node S4 have blocking action to the protocol massages of subring Ring4.
S5 and S8 node are the interconnecting nodes that subring Ring4 inserts other ring or subring, and node S5 periodically sends protocol massages (the purpose MAC of these messages is the same with the target MAC (Media Access Control) address of the protocol massages of subring Ring4 with source MAC) to subring Ring4 with S8 on the tunnel of subring control VLAN.
Link<the S10 of subring Ring4 among the figure, S11〉fault has taken place, Control Node S10 opens the data forwarding function of 102 ports, blocks the data forwarding function of 101 ports, and outwards periodically sends SF message (fault warning message) along 102 ports.Node S11 blocks the data forwarding function of 112 ports, and outwards periodically sends the SF message along 111 ports.
When interconnecting nodes S5 receives the SF message that has address flush information (and this message is not follow-up SF message) that Control Node S10 sends, interconnecting nodes S5 checks the MAC Address of this message, discovery is that the multicast protocol message address (drops on [01-19-A7-00-00-01,01-19-A7-00-00-EF] interval interior), then from the last 1 byte read loop of this MAC Address number, discovery is the protocol massages that subring Ring4 sends under the node S5, and this interconnecting nodes refresh address is transmitted (except the VLAN ID corresponding address forwarding entry in the protocol massages).Simultaneously, interconnecting nodes S5 structure FLUSH message, this message (the source and destination MAC Address of this FLUSH message is the same with the target MAC (Media Access Control) address of the protocol massages of subring Ring4).Then, interconnecting nodes S5 is according to the target MAC (Media Access Control) address and the VLAN ID of FLUSH message table look-up (except the port corresponding address clauses and subclauses of subring Ring4), if find outbound port is 52 ports, just the FLUSH message with structure forwards from 52 ports, otherwise just other all of the port beyond (in the VLAN that the VLAN ID in the SF protocol massages that receives determines) 51 inbound ports sends the FLUSH message.The mode that the FLUSH message sends is that interconnecting nodes sends to tunnel for continuous 3 times.
After interconnecting nodes S2, S6 on the tunnel and S7 receive the FLUSH message that interconnecting nodes S5 sends, check the MAC Address of this message, discovery is the multicast protocol message address, then from the last 1 byte read loop of this MAC Address number, find it is not the protocol massages that affiliated ring of this node or subring are sent, the copy portion is given node analysis.Simultaneously, described interconnecting nodes is with target MAC (Media Access Control) address in this protocol massages and VLAN ID table look-up (except the protocol massages inbound port corresponding address clauses and subclauses), if find outbound port, just with described protocol massages from then on port forward, otherwise just transmit this protocol massages to (the VLAN ID of described protocol massages determine VLAN in) inbound port other all of the port in addition.This node is checked the type of this message in addition, and discovery is the FLUSH message, and refresh address is transmitted (except the VLAN ID corresponding address forwarding entry in the FLUSH message) then.
After interconnecting nodes S8 receives this protocol massages from 82 ports, check the MAC Address of this message, discovery is the multicast protocol message address, then from the last 1 byte read loop of this MAC Address number, discovery is the protocol massages of the subring Ring4 under this node and this protocol massages non-subring Ring4 upper port from it.If the target MAC (Media Access Control) address of this message is identical with source MAC, the S8 node abandons this protocol massages, otherwise the S8 node is forwarded to the port of this message from Ring4 in the subring.
After non-interlink node S1 receives this protocol massages, check the MAC Address of this message, discovery is the multicast protocol message address, this node other all of the port beyond (in the VLAN that the VLAN ID of described protocol massages determines) inbound port is transmitted this protocol massages, and a this protocol massages of copy is handled for interconnecting nodes S1 simultaneously.Interconnecting nodes S1 analyzes the type of this protocol massages, and discovery is the FLUSH message, and refresh address is transmitted (except the VLAN ID corresponding address forwarding entry in the FLUSH message) then.
For the FLUSH message that enters tunnel from interconnecting nodes S8, it is the same that node S5, S2, S6, S5 and S8 handle with the FLUSH message that is entered tunnel by interconnecting nodes S5 its forwarding.
By top analysis, as can be seen the unobstructed path S5 of the FLUSH message of subring Ring4 in the tunnel<-S1<-S2<-S6<-S7<-S8 refreshes, node S3 and S4 on the tunnel do not have refresh address to transmit, and have significantly reduced the quantity of the node that the refresh address in the tunnel of subring Ring4 transmits.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described, only with reference to preferred embodiment the present invention is had been described in detail.Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and scope of technical solution of the present invention, all should be encompassed in the middle of the claim scope of the present invention.

Claims (6)

1. the address flush method of a subring tunnel is characterized in that, this method comprises:
When the subring interconnecting nodes when the control VLAN of its subring receives the signalling trouble message that carries address flush information, refresh local addresses forwarding table in view of the above and construct the address flush message, target MAC (Media Access Control) address and VLAN ID according to the address update searches corresponding outbound port in the addresses forwarding table of this locality then, is forwarded to the address flush message on the tunnel of subring from corresponding outbound port;
In the transmission course of described address flush message, when other interconnecting nodes on the tunnel of described subring receives the address flush message, in the addresses forwarding table of this locality, search corresponding outbound port according to its target MAC (Media Access Control) address and VLANID, the address flush message is transmitted from corresponding outbound port, upgraded local addresses forwarding table according to the address update afterwards; When the non-interconnecting nodes on the tunnel of described subring receives described address flush message, it is transmitted in the M-VLAN mode, and upgrade local addresses forwarding table in view of the above.
2. the address flush method of subring tunnel as claimed in claim 1, it is characterized in that, in the described method, the source MAC of described address flush message and the target MAC (Media Access Control) address all target MAC (Media Access Control) address with the described signalling trouble message that carries address flush information are identical, and the VLAN ID of described address flush message is identical with the ID of the control VLAN of described subring.
3. the address flush method of subring tunnel as claimed in claim 2, it is characterized in that, described method also comprises: in the transmission course of described address flush message, when described subring interconnecting nodes receives all identical with the target MAC (Media Access Control) address of the described signalling trouble message protocol massages of source MAC and target MAC (Media Access Control) address, abandon this protocol massages.
4. as the address flush method of the arbitrary described subring tunnel of claim 1 to 3, it is characterized in that, described method also comprises: described subring interconnecting nodes periodically sends multicast message on the tunnel of described subring, and the source MAC of described multicast message all the target MAC (Media Access Control) address with described signalling trouble message is identical with target MAC (Media Access Control) address.
5. the address flush method of subring tunnel as claimed in claim 4 is characterized in that, the transmission cycle of described multicast message is less than the digestion period of MAC Address.
6. the address flush method of subring tunnel as claimed in claim 1 is characterized in that, the mode that described subring interconnecting nodes sends the address flush message is: continuous 3 tunnels to subring send.
CN200910105538.8A 2009-02-19 2009-02-19 Address refreshing method of sub-loop virtual channel Active CN101815029B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910105538.8A CN101815029B (en) 2009-02-19 2009-02-19 Address refreshing method of sub-loop virtual channel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910105538.8A CN101815029B (en) 2009-02-19 2009-02-19 Address refreshing method of sub-loop virtual channel

Publications (2)

Publication Number Publication Date
CN101815029A true CN101815029A (en) 2010-08-25
CN101815029B CN101815029B (en) 2014-09-10

Family

ID=42622151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910105538.8A Active CN101815029B (en) 2009-02-19 2009-02-19 Address refreshing method of sub-loop virtual channel

Country Status (1)

Country Link
CN (1) CN101815029B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101977135A (en) * 2010-09-27 2011-02-16 南京邮电大学 Address updating method of subring without visual channel
CN103272349A (en) * 2013-05-03 2013-09-04 国家电网公司 Automatic fire extinguisher for automobile spontaneous combustion
CN105591919A (en) * 2015-08-31 2016-05-18 杭州华三通信技术有限公司 FLUSH message processing method and equipment
CN107181693A (en) * 2017-07-15 2017-09-19 深圳市华琥技术有限公司 A kind of method and system for preventing from repeatedly refreshing forward table
CN108600097A (en) * 2018-04-20 2018-09-28 闫晓峰 Can multi-path transmission data communication apparatus, data communication network system and data communication method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6801496B1 (en) * 1999-01-15 2004-10-05 Cisco Technology, Inc. Network addressing scheme for reducing protocol overhead in an optical network
CN1645834A (en) * 2005-02-02 2005-07-27 周旭扬 Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network
CN101094190A (en) * 2007-08-20 2007-12-26 中兴通讯股份有限公司 Method for transmitting protective controlled message in Ethernet ring net

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6801496B1 (en) * 1999-01-15 2004-10-05 Cisco Technology, Inc. Network addressing scheme for reducing protocol overhead in an optical network
CN1645834A (en) * 2005-02-02 2005-07-27 周旭扬 Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network
CN101094190A (en) * 2007-08-20 2007-12-26 中兴通讯股份有限公司 Method for transmitting protective controlled message in Ethernet ring net

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101977135A (en) * 2010-09-27 2011-02-16 南京邮电大学 Address updating method of subring without visual channel
CN101977135B (en) * 2010-09-27 2012-08-15 南京邮电大学 Address updating method of subring without virtual channel
CN103272349A (en) * 2013-05-03 2013-09-04 国家电网公司 Automatic fire extinguisher for automobile spontaneous combustion
CN105591919A (en) * 2015-08-31 2016-05-18 杭州华三通信技术有限公司 FLUSH message processing method and equipment
CN105591919B (en) * 2015-08-31 2018-11-27 新华三技术有限公司 A kind of processing method and equipment of FLUSH message
CN107181693A (en) * 2017-07-15 2017-09-19 深圳市华琥技术有限公司 A kind of method and system for preventing from repeatedly refreshing forward table
CN108600097A (en) * 2018-04-20 2018-09-28 闫晓峰 Can multi-path transmission data communication apparatus, data communication network system and data communication method
CN108600097B (en) * 2018-04-20 2020-09-22 闫晓峰 Communication equipment capable of transmitting data in multiple paths, data communication network system and data communication method

Also Published As

Publication number Publication date
CN101815029B (en) 2014-09-10

Similar Documents

Publication Publication Date Title
CN101677267B (en) Method for retransmitting protocol frames in transannular way and sharing nodes in multiple rings of Ethernet
CN101072237B (en) Eth-loop intelligent protection method
JP4526423B2 (en) Ring connection method and apparatus
EP2392105B1 (en) Port table flushing in ethernet networks
CN101127674B (en) Initialization method for transmission nodes of Ethernet loop network system
CN101815029B (en) Address refreshing method of sub-loop virtual channel
CN101714939A (en) Fault treatment method for Ethernet ring network host node and corresponding Ethernet ring network
CN102158384A (en) Novel MRing Ethernet ring network protection technology
CN101834774A (en) Address refreshing method of switching node port in Ethernet ring network and switching node
CN103873333A (en) Ring network three-layer convergence method and device
CN101442465A (en) Address update method for Ethernet looped network failure switching
CN101834770B (en) Ethernet multiple-ring network address refreshing method and device
US8681604B2 (en) Address refresh method and system
CN100550812C (en) Improve method, system and the node device of dependability of fast looped network
KR101302815B1 (en) Method and system for blocking protocol messages at a sub-ring control channel without virtual channel
CN101815023B (en) Method for transmitting sub-loop protocol message in virtual channel
CN101827008A (en) Method for controlling refreshing frequency of Ethernet address table
CN101888322B (en) Method for preventing repeated refresh of sub-ring outer domain address
EP2400697A1 (en) Implementation method for protocol channel in ethernet protection
CN101677281B (en) Ether multiple ring control channel allocation and message transmission method thereof
CN101834830B (en) Regional address refreshing method of Ethernet ring network
CN102055661B (en) Ethernet multi-ring network protection method under multipoint fault condition and interconnected nodes
CN101741672B (en) Switching method and device for automatic protection channel
CN102088493B (en) Selective address refreshing method and system of Ethernet multi-ring network
CN101883000B (en) Network protection method and network protection architecture

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant