CN108989155B - Loop detection method and system based on tolerance mechanism - Google Patents

Loop detection method and system based on tolerance mechanism Download PDF

Info

Publication number
CN108989155B
CN108989155B CN201811119325.6A CN201811119325A CN108989155B CN 108989155 B CN108989155 B CN 108989155B CN 201811119325 A CN201811119325 A CN 201811119325A CN 108989155 B CN108989155 B CN 108989155B
Authority
CN
China
Prior art keywords
loop
value
counter
timer
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811119325.6A
Other languages
Chinese (zh)
Other versions
CN108989155A (en
Inventor
蒋子杰
董将
方胜龙
李方韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Centec Communications Co Ltd
Original Assignee
Suzhou Centec Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Centec Communications Co Ltd filed Critical Suzhou Centec Communications Co Ltd
Priority to CN201811119325.6A priority Critical patent/CN108989155B/en
Publication of CN108989155A publication Critical patent/CN108989155A/en
Application granted granted Critical
Publication of CN108989155B publication Critical patent/CN108989155B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a loop detection method and a system based on a tolerance mechanism, wherein the loop detection method comprises the following steps: sending out a detection message according to the period t, and detecting whether a loop exists in the network; if the detection message is received, judging that a loop exists, counting the received detection message, and timing the tolerant time; and when the loop duration is longer than the preset tolerance time, taking a loop destructive measure, and when the loop duration is shorter than or equal to the preset tolerance time, not taking the loop destructive measure. According to the invention, by introducing a loop tolerance mechanism, a destructive measure is taken for a long-time loop, so that the network environment is protected; for the short loop, no destructive measure is taken to prevent the interruption of the service and maintain the smoothness of the service.

Description

Loop detection method and system based on tolerance mechanism
Technical Field
The present invention relates to the field of network communication technologies, and in particular, to a loop detection method and system based on a tolerance mechanism.
Background
Loop detection is a technique for detecting whether a link layer loop exists in a network and taking a special action after finding the loop.
The existing loop detection scheme is as follows: the switch port which starts loop detection periodically sends loop detection messages (broadcast or multicast messages) to the outside, if the loop exists under the port, or the port is on a loop, the switch receives the detection message sent by itself, thereby judging that the loop exists, the bandwidth is wasted by the loop, the network resource is wasted, and the network is even broken down. Typically, after a loop is detected, the switch takes action to break the loop, such as closing a port, blocking a port, etc.
The sensitivity of loop detection in the prior art is very high, and once the loop is detected to exist, destructive measures are taken immediately. In some practical scenarios, there may be intermittent, short-duration loops that may have little impact on the actual traffic. Under the existing loop detection mechanism, a port is frequently closed to break the loop after the loop is detected, which may cause frequent service interruption and has a large influence.
Therefore, in view of the above technical problems, it is desirable to provide a loop detection method and system based on a tolerant mechanism.
Disclosure of Invention
In view of the above, the present invention provides a loop detection method and system based on a tolerance mechanism.
In order to achieve the above object, an embodiment of the present invention provides the following technical solutions:
a loop detection method based on a tolerance mechanism, the loop detection method comprising:
sending out a detection message according to the period t, and detecting whether a loop exists in the network;
if the detection message is received, judging that a loop exists, counting the received detection message, and timing the tolerant time;
and when the loop duration is longer than the preset tolerance time, taking a loop destructive measure, and when the loop duration is shorter than or equal to the preset tolerance time, not taking the loop destructive measure.
As a further improvement of the invention, the detection message is counted by a counter, and the tolerance time is timed by a timer.
As a further improvement of the present invention, counting the received detection packets specifically includes:
the value of the counter is initialized to 0;
adding 1 to the value of the counter every time a detection message is received;
and reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0.
As a further improvement of the present invention, the timing of the tolerant time specifically comprises:
initializing the value of the timer to a preset value;
the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value;
and when a damage measure is taken, resetting the timer to a preset value immediately.
As a further improvement of the invention, the determination mode that the loop duration is greater than the preset tolerance time is as follows:
and if the value of the counter of the next period is greater than the value of the counter of the current period after the value of the timer is counted down to 0, judging that the loop duration is greater than the preset tolerance time.
As a further improvement of the invention, the preset tolerance time is nT, and n is not less than 0 and is an integer.
As a further improvement of the present invention, after the value of the counter is initialized to 0, the counter stops counting.
As a further improvement of the invention, after the value of the timer is reset to the preset value, the timer stops timing.
The technical scheme provided by one embodiment of the invention is as follows:
a loop detection system based on a tolerance mechanism, the loop detection system comprising:
the message sending module is used for sending detection messages to the outside according to the period t and detecting whether a loop exists in the network;
the counting module is used for counting the received detection messages after judging that the loop exists;
the timing module is used for timing the tolerant time after judging that the loop exists;
and the loop processing module is used for taking loop damage measures when the loop duration is longer than the preset tolerance time, and not taking the loop damage measures when the loop duration is shorter than or equal to the preset tolerance time.
As a further improvement of the present invention,
the counting module comprises a counter, wherein the value of the counter is initialized to 0; adding 1 to the value of the counter every time a detection message is received; reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0;
the timing module comprises a timer, wherein the value of the timer is initialized to a preset value; the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value; and when a damage measure is taken, resetting the timer to a preset value immediately.
The invention has the following beneficial effects:
according to the invention, by introducing a loop tolerance mechanism, a destructive measure is taken for a long-time loop, so that the network environment is protected; for the short loop, no destructive measure is taken to prevent the interruption of the service and maintain the smoothness of the service.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of a loop detection method based on a tolerance mechanism according to the present invention;
FIG. 2 is a flow chart of a detection packet in the presence of a loop;
FIG. 3 is a flow chart of a detection packet when no loop exists;
FIG. 4 is a timing diagram of loop detection in accordance with an embodiment of the present invention;
FIG. 5a is a time line diagram of loop detection when the loop duration is less than a predetermined tolerance time;
FIG. 5b is a time line diagram of loop detection when the loop duration is greater than a predetermined tolerance time;
FIG. 5c is a time line graph of loop detection when the loop duration is less than the counter read period;
FIG. 6 is a block diagram of a loop detection system based on a tolerance mechanism according to the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the invention discloses a loop detection method based on a tolerance mechanism, which comprises the following steps:
sending out a detection message according to the period t, and detecting whether a loop exists in the network;
if the detection message is received, judging that a loop exists, counting the received detection message, and timing the tolerant time;
and when the loop duration is longer than the preset tolerance time, taking a loop destructive measure, and when the loop duration is shorter than or equal to the preset tolerance time, not taking the loop destructive measure.
Referring to fig. 2, which is a flow chart of a detection message when a loop exists, it can be seen that a switch sends out a detection message (broadcast or multicast message) according to a period t, and if a loop exists in a network under a switch port or the switch port is on a loop, the switch can receive the detection message. Referring to fig. 3, which is a flow chart of a detection message when no loop exists, it can be seen that, when no loop exists in the switch network, the switch cannot receive the detection message after the detection message is sent out.
In the invention, for the loop with the loop duration time less than the preset tolerant time (delay-time), the switch does not take measures and keeps the original state; for the loop with the loop duration time larger than the preset tolerance time (de lay-time), a destructive measure is taken after the preset tolerance time is exceeded.
In the invention, a counter and a timer are introduced, the detection message is counted by the counter, and the loop detection time is timed by the timer.
The counting of the received detection messages by the counter is specifically as follows:
the value of the counter is initialized to 0;
adding 1 to the value of the counter every time a detection message is received;
reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0;
after the value of the counter is initialized to 0, the counter stops counting.
The specific timing of the time tolerating by the timer is as follows:
initializing the value of the timer to a preset value;
the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value;
when a damage measure is taken, resetting the timer to a preset value immediately;
and after the value of the timer is reset to a preset value, the timer stops timing.
The preset tolerant time (delay-time) is preset, and if the value of the timer is counted down to 0 and the value of the counter in the next period is greater than the value of the counter in the current period, the loop duration time is judged to be greater than the preset tolerant time.
Preferably, the preset tolerant time (delay-time) is an integer multiple of the counter reading period T, i.e., nT, n ≧ 0 and an integer.
The present invention will be described in detail with reference to specific examples.
A loop detection mechanism:
the switch port periodically (with a period of t) sends out a detection message (broadcast message), and if the message can be received, it indicates that a loop exists. The packet-interval represents a period for the port to send the detection message to the outside. When a loop exists, the port can continuously receive the detection message sent by the port.
The counter counting mechanism:
a counter exists, after a loop is detected, the counter is started and initialized to 0, and the value of the counter is added with 1 every time the equipment receives a detection message;
after starting the counter, the device periodically (for example, 1 second) reads the value of the counter, if the result of this reading is equal to the result of the last reading and is not 0, the counter is initialized to 0, the preset tolerant time delay-time is reset to the initial value, and the counter and the delay-time timer are turned off (the counter is not increased any more and is not read any more, and the delay-time timer is not timed any more).
Tolerance mechanism of the loop:
the preset tolerance time delay-time represents the time for taking measures to delay and is used for measuring the tolerance degree of the transient loop.
After the loop is detected, a delay-time timer is started (decreased from a preset value to 0), and before the delay-time timer is over, the device does not take destructive measures. After the delay-time is overtime, if a loop is still detected, taking a ring-breaking measure and resetting the delay-time; otherwise, the device takes no action.
The recovery mechanism of the port:
the recovery-time represents the waiting time for the port to recover to a normal state if a loop disappears after the port takes a ring-breaking measure.
After a damage measure is taken, firstly resetting delay-time as a preset value; if the value of the counter in the subsequent period is equal to the value of the counter in the previous period and is not 0, resetting the counter to be 0, starting recovery-time, and resetting the recovery-time to be a preset value and timing again if a loop is detected.
Referring to fig. 4, in an embodiment of the present invention, the time axis is divided according to the time point of the reading counter, assuming that: the interval of the counter is 1s, the preset tolerance time delay-time is 3s, the packet-interval is 5s, and the gray part is the time period of the loop.
During the time interval between two transmissions of the detection message, the device is unaware of the presence or absence of the loop, and no action is taken regardless of the presence or absence of the loop, so it is meaningless to discuss how long the loop has been maintained before the loop is detected, and the invention focuses on the actions after the device detects the loop.
On the premise that a loop can be detected:
if the detection message is sent out in the 7 th second, and the existence of the loop is detected, starting a counter and a delay-time timer at the moment;
when the loop is detected in the 7 th second, because the delay-time timer is not overtime, no damage measure is taken temporarily; opening a counter, wherein the counter is 0;
at the 8 th second, the counter is increased because of the loop within 7-8 seconds, and the counter is assumed to be a (a > 0);
at the 9 th second, the counter is increased because a loop exists in 8-9 seconds, and the counter is assumed to be b (b > a > 0);
at the 10 th second, the counter is increased because of the loop within 9-10 seconds, and the counter is assumed to be c (c > b > a > 0);
when the delay-time timer (3s) is over, the loop is not protected any more, and the device judges whether the loop still exists according to the counter read next time.
Referring to fig. 5a, if the loop duration is less than the preset tolerance time delay-time:
in the 11 th second, because no loop exists in 10-11 seconds, the loop detection message in the network disappears, the counter should not change, and the counter is equal to c; since the 10 th and 11 th second counter counters are equal and not 0, it is judged that the loop does not exist, no action is taken, and the counter is initialized to 0, then turned off, and the delay-time timer is reset to 3 seconds.
Referring to fig. 5b, if the loop duration is greater than the preset tolerance time delay-time:
and in 11 th second, because a loop exists from 10 th second to 11 th second, the counter is increased, and then the loop is judged to exist, and the equipment takes measures to break the loop.
Referring to fig. 5c, if the loop duration is very short, even less than the counter read period (1 s):
sending a loop detection message in the 7 th second, and starting a counter and a delay-time timer when detecting that a loop exists;
when the loop is detected in the 7 th second, because the delay-time timer is not overtime, no damage measure is taken temporarily; the counter is turned on, and the counter is 0
At the 8 th second, the counter is incremented because of the loop within 7 to 8 seconds, and the counter is assumed to be a (a >0)
And in the 9 th second, because no loop exists in 8-9 seconds, the counter is unchanged, the counter is equal to a, the loop is judged to be eliminated, no measures are taken, the counter is initialized to 0, the delay-time timer is reset to 3 seconds, and the counter and the delay-time timer are closed.
In the above embodiment, the packet-interval is greater than the delay-time, that is, the port does not send the over-detection packet to the outside in the loop duration. In fact, during the loop duration, the counter is always increased whether or not the detection message is sent, and thus the relative sizes of delay-time and packet-interval have no influence on the present invention.
Resetting the delay-time timer after taking loop-breaking measures; if the value of the subsequent counter is equal to the value of the counter in the previous period and is not 0, resetting the counter to be 0, judging that the loop is eliminated, and starting a port state recovery mechanism. The port state recovery mechanism is not the focus of the discussion of the present invention, and is not further described herein on the premise of being compatible with the conventional recovery mechanism.
In the above embodiment, the counter reading period 1s and the timer preset tolerance time delay-time3s are taken as examples for explanation, in other embodiments, the reading period of the counter and the preset tolerance time of the timer may be set as required, the thresholds of the short loop and the long loop may be customized by a user, and the delay-time is defined as 0, that is, no loop is tolerated, which explains that the present invention is compatible with conventional implementations.
Referring to fig. 6, the present invention also discloses a loop detection system based on a tolerance mechanism, which includes:
the message sending module 10 is configured to send a detection message to the outside according to the period t, and detect whether a loop exists in the network;
a counting module 20, configured to count the received detection packet after determining that the loop exists;
the timing module 30 is used for timing the tolerant time after judging that the loop exists;
and the loop processing module 40 is configured to take a loop destructive measure when the loop duration is greater than the preset tolerance time, and not take the loop destructive measure when the loop duration is less than or equal to the preset tolerance time.
The counting module includes a counter, the timing module includes a timer, and the specific counter, timer and loop tolerance mechanism are completely the same as those in the above embodiments, and are not described herein again.
According to the technical scheme, the invention has the following advantages:
according to the invention, by introducing a loop tolerance mechanism, a destructive measure is taken for a long-time loop, so that the network environment is protected; for the short loop, no destructive measure is taken to prevent the interruption of the service and maintain the smoothness of the service.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, the functionality of the modules may be implemented in the same one or more software and/or hardware implementations in implementing one or more embodiments of the present description.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (5)

1. A loop detection method based on a tolerance mechanism is characterized by comprising the following steps:
sending out a detection message according to the period t, and detecting whether a loop exists in the network;
if the detection message is received, judging that a loop exists, counting the received detection message, and timing the tolerant time;
when the loop duration is longer than the preset tolerance time, taking a loop destruction measure, and when the loop duration is shorter than or equal to the preset tolerance time, not taking the loop destruction measure;
counting the detection messages through a counter, and timing the tolerance time through a timer;
the counting of the received detection messages specifically comprises:
the value of the counter is initialized to 0;
adding 1 to the value of the counter every time a detection message is received;
reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0;
the timing of the tolerance time is specifically as follows:
initializing the value of the timer to a preset value;
the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value;
when a damage measure is taken, resetting the timer to a preset value immediately;
the judgment mode that the loop duration is greater than the preset tolerance time is as follows:
and if the value of the counter of the next period is greater than the value of the counter of the current period after the value of the timer is counted down to 0, judging that the loop duration is greater than the preset tolerance time.
2. The loop detection method according to claim 1, wherein the predetermined tolerance time is nT, n is greater than or equal to 0 and is an integer.
3. The loop detection method according to claim 1, wherein the counter stops counting after the value of the counter is initialized to 0.
4. The loop detection method according to claim 1, wherein the timer stops counting after the value of the timer is reset to a predetermined value.
5. A loop detection system based on a tolerance mechanism, the loop detection system comprising:
the message sending module is used for sending detection messages to the outside according to the period t and detecting whether a loop exists in the network;
the counting module is used for counting the received detection messages after judging that the loop exists;
the timing module is used for timing the tolerant time after judging that the loop exists;
the loop processing module is used for taking loop damage measures when the loop duration is longer than the preset tolerance time, and not taking the loop damage measures when the loop duration is shorter than or equal to the preset tolerance time;
the counting module comprises a counter, wherein the value of the counter is initialized to 0; adding 1 to the value of the counter every time a detection message is received; reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0;
the timing module comprises a timer, wherein the value of the timer is initialized to a preset value; the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value; when a damage measure is taken, resetting the timer to a preset value immediately;
the loop processing module is further configured to:
and if the value of the counter of the next period is greater than the value of the counter of the current period after the value of the timer is counted down to 0, judging that the loop duration is greater than the preset tolerance time.
CN201811119325.6A 2018-09-25 2018-09-25 Loop detection method and system based on tolerance mechanism Active CN108989155B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811119325.6A CN108989155B (en) 2018-09-25 2018-09-25 Loop detection method and system based on tolerance mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811119325.6A CN108989155B (en) 2018-09-25 2018-09-25 Loop detection method and system based on tolerance mechanism

Publications (2)

Publication Number Publication Date
CN108989155A CN108989155A (en) 2018-12-11
CN108989155B true CN108989155B (en) 2022-03-04

Family

ID=64543951

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811119325.6A Active CN108989155B (en) 2018-09-25 2018-09-25 Loop detection method and system based on tolerance mechanism

Country Status (1)

Country Link
CN (1) CN108989155B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743234B (en) * 2019-03-01 2022-04-22 苏州盛科通信股份有限公司 Loop detection method and system based on tolerance mechanism
CN112769667B (en) * 2021-01-14 2022-07-19 北京星网锐捷网络技术有限公司 Loop protection control method and device for multi-device cascade communication network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252473A (en) * 2008-03-31 2008-08-27 中兴通讯股份有限公司 Loop circuit processing method and apparatus
CN102130793A (en) * 2010-11-29 2011-07-20 华为技术有限公司 Method, device and system for processing loop circuit in access network
CN103378998A (en) * 2012-04-27 2013-10-30 中兴通讯股份有限公司 Method and device for Ethernet port loopback detection
CN104158706A (en) * 2014-08-26 2014-11-19 杭州华三通信技术有限公司 Method and device of loopback detection
US9762340B1 (en) * 2012-02-01 2017-09-12 Ciena Corporation Synchronization timing loop detection systems and methods
CN107872370A (en) * 2017-12-27 2018-04-03 广州芯德通信科技股份有限公司 A kind of Ethernet interface loop quick determination method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140050099A1 (en) * 2012-08-20 2014-02-20 Chi-Feng Lin Network Device and Method for Loop Detection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252473A (en) * 2008-03-31 2008-08-27 中兴通讯股份有限公司 Loop circuit processing method and apparatus
CN102130793A (en) * 2010-11-29 2011-07-20 华为技术有限公司 Method, device and system for processing loop circuit in access network
US9762340B1 (en) * 2012-02-01 2017-09-12 Ciena Corporation Synchronization timing loop detection systems and methods
CN103378998A (en) * 2012-04-27 2013-10-30 中兴通讯股份有限公司 Method and device for Ethernet port loopback detection
CN104158706A (en) * 2014-08-26 2014-11-19 杭州华三通信技术有限公司 Method and device of loopback detection
CN107872370A (en) * 2017-12-27 2018-04-03 广州芯德通信科技股份有限公司 A kind of Ethernet interface loop quick determination method

Also Published As

Publication number Publication date
CN108989155A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
US5636345A (en) Method and apparatus for detecting and preventing broadcast storms on an emulated local area network
CA2557461C (en) Dual use counters for routing loops and spam detection
CN108989155B (en) Loop detection method and system based on tolerance mechanism
US7821937B1 (en) Network protocol with damage loss resilient congestion control algorithm
CN111078453B (en) Method, device, computer equipment and storage medium for automatically fusing and recovering micro-service
CN110784415B (en) ECN quick response method and device
CN106899488B (en) Application message pushing method and device
US10614006B2 (en) Low latency interrupt with existence of interrupt moderation
KR20070093961A (en) High-resolution timer-efficient sliding window
CN106973003B (en) Group message notification method, client, electronic device and server
CN109617905B (en) Multicast attack processing method, device and implementation device
CN107017958A (en) A kind of method for synchronizing time and corresponding system based on NTP
CN105527564A (en) Self-diagnosis method and system for internal functions of FPGA (Field Programmable Gate Array)
US20050010817A1 (en) Technique of detecting denial of service attacks
CN105278931B (en) A kind of method and terminal that Android system forbids application program backstage to open certainly
CN105474584B (en) CAN FD frame end detector and detection method, CAN bit stream processor and operating method
CN114760152A (en) Cloud data center virtualization node network security early warning method
CN110798382A (en) Port storm threshold control method and device
CN109743234B (en) Loop detection method and system based on tolerance mechanism
CN115002819B (en) Network quality assessment method and device
CN112351049B (en) Data transmission method, device, equipment and storage medium
KR100644582B1 (en) Collision protection protocol using backoff algorithm in consideration of the communication priority
CN106506279B (en) Network deadlock state detection method and device
CN110430118B (en) Bill mail managing method, apparatus, computer device and computer readable storage medium
US20210250995A1 (en) Performance-guaranteed channel access control for security alarm and image sensors

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 215000 unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, Jiangsu Province

Applicant after: Suzhou Shengke Communication Co.,Ltd.

Address before: 215000 unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, Jiangsu Province

Applicant before: CENTEC NETWORKS (SU ZHOU) Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant