CN108989155B - Loop detection method and system based on tolerance mechanism - Google Patents
Loop detection method and system based on tolerance mechanism Download PDFInfo
- Publication number
- CN108989155B CN108989155B CN201811119325.6A CN201811119325A CN108989155B CN 108989155 B CN108989155 B CN 108989155B CN 201811119325 A CN201811119325 A CN 201811119325A CN 108989155 B CN108989155 B CN 108989155B
- Authority
- CN
- China
- Prior art keywords
- loop
- value
- counter
- timer
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/18—Loop-free operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Computer And Data Communications (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention provides a loop detection method and a system based on a tolerance mechanism, wherein the loop detection method comprises the following steps: sending out a detection message according to the period t, and detecting whether a loop exists in the network; if the detection message is received, judging that a loop exists, counting the received detection message, and timing the tolerant time; and when the loop duration is longer than the preset tolerance time, taking a loop destructive measure, and when the loop duration is shorter than or equal to the preset tolerance time, not taking the loop destructive measure. According to the invention, by introducing a loop tolerance mechanism, a destructive measure is taken for a long-time loop, so that the network environment is protected; for the short loop, no destructive measure is taken to prevent the interruption of the service and maintain the smoothness of the service.
Description
Technical Field
The present invention relates to the field of network communication technologies, and in particular, to a loop detection method and system based on a tolerance mechanism.
Background
Loop detection is a technique for detecting whether a link layer loop exists in a network and taking a special action after finding the loop.
The existing loop detection scheme is as follows: the switch port which starts loop detection periodically sends loop detection messages (broadcast or multicast messages) to the outside, if the loop exists under the port, or the port is on a loop, the switch receives the detection message sent by itself, thereby judging that the loop exists, the bandwidth is wasted by the loop, the network resource is wasted, and the network is even broken down. Typically, after a loop is detected, the switch takes action to break the loop, such as closing a port, blocking a port, etc.
The sensitivity of loop detection in the prior art is very high, and once the loop is detected to exist, destructive measures are taken immediately. In some practical scenarios, there may be intermittent, short-duration loops that may have little impact on the actual traffic. Under the existing loop detection mechanism, a port is frequently closed to break the loop after the loop is detected, which may cause frequent service interruption and has a large influence.
Therefore, in view of the above technical problems, it is desirable to provide a loop detection method and system based on a tolerant mechanism.
Disclosure of Invention
In view of the above, the present invention provides a loop detection method and system based on a tolerance mechanism.
In order to achieve the above object, an embodiment of the present invention provides the following technical solutions:
a loop detection method based on a tolerance mechanism, the loop detection method comprising:
sending out a detection message according to the period t, and detecting whether a loop exists in the network;
if the detection message is received, judging that a loop exists, counting the received detection message, and timing the tolerant time;
and when the loop duration is longer than the preset tolerance time, taking a loop destructive measure, and when the loop duration is shorter than or equal to the preset tolerance time, not taking the loop destructive measure.
As a further improvement of the invention, the detection message is counted by a counter, and the tolerance time is timed by a timer.
As a further improvement of the present invention, counting the received detection packets specifically includes:
the value of the counter is initialized to 0;
adding 1 to the value of the counter every time a detection message is received;
and reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0.
As a further improvement of the present invention, the timing of the tolerant time specifically comprises:
initializing the value of the timer to a preset value;
the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value;
and when a damage measure is taken, resetting the timer to a preset value immediately.
As a further improvement of the invention, the determination mode that the loop duration is greater than the preset tolerance time is as follows:
and if the value of the counter of the next period is greater than the value of the counter of the current period after the value of the timer is counted down to 0, judging that the loop duration is greater than the preset tolerance time.
As a further improvement of the invention, the preset tolerance time is nT, and n is not less than 0 and is an integer.
As a further improvement of the present invention, after the value of the counter is initialized to 0, the counter stops counting.
As a further improvement of the invention, after the value of the timer is reset to the preset value, the timer stops timing.
The technical scheme provided by one embodiment of the invention is as follows:
a loop detection system based on a tolerance mechanism, the loop detection system comprising:
the message sending module is used for sending detection messages to the outside according to the period t and detecting whether a loop exists in the network;
the counting module is used for counting the received detection messages after judging that the loop exists;
the timing module is used for timing the tolerant time after judging that the loop exists;
and the loop processing module is used for taking loop damage measures when the loop duration is longer than the preset tolerance time, and not taking the loop damage measures when the loop duration is shorter than or equal to the preset tolerance time.
As a further improvement of the present invention,
the counting module comprises a counter, wherein the value of the counter is initialized to 0; adding 1 to the value of the counter every time a detection message is received; reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0;
the timing module comprises a timer, wherein the value of the timer is initialized to a preset value; the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value; and when a damage measure is taken, resetting the timer to a preset value immediately.
The invention has the following beneficial effects:
according to the invention, by introducing a loop tolerance mechanism, a destructive measure is taken for a long-time loop, so that the network environment is protected; for the short loop, no destructive measure is taken to prevent the interruption of the service and maintain the smoothness of the service.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of a loop detection method based on a tolerance mechanism according to the present invention;
FIG. 2 is a flow chart of a detection packet in the presence of a loop;
FIG. 3 is a flow chart of a detection packet when no loop exists;
FIG. 4 is a timing diagram of loop detection in accordance with an embodiment of the present invention;
FIG. 5a is a time line diagram of loop detection when the loop duration is less than a predetermined tolerance time;
FIG. 5b is a time line diagram of loop detection when the loop duration is greater than a predetermined tolerance time;
FIG. 5c is a time line graph of loop detection when the loop duration is less than the counter read period;
FIG. 6 is a block diagram of a loop detection system based on a tolerance mechanism according to the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the invention discloses a loop detection method based on a tolerance mechanism, which comprises the following steps:
sending out a detection message according to the period t, and detecting whether a loop exists in the network;
if the detection message is received, judging that a loop exists, counting the received detection message, and timing the tolerant time;
and when the loop duration is longer than the preset tolerance time, taking a loop destructive measure, and when the loop duration is shorter than or equal to the preset tolerance time, not taking the loop destructive measure.
Referring to fig. 2, which is a flow chart of a detection message when a loop exists, it can be seen that a switch sends out a detection message (broadcast or multicast message) according to a period t, and if a loop exists in a network under a switch port or the switch port is on a loop, the switch can receive the detection message. Referring to fig. 3, which is a flow chart of a detection message when no loop exists, it can be seen that, when no loop exists in the switch network, the switch cannot receive the detection message after the detection message is sent out.
In the invention, for the loop with the loop duration time less than the preset tolerant time (delay-time), the switch does not take measures and keeps the original state; for the loop with the loop duration time larger than the preset tolerance time (de lay-time), a destructive measure is taken after the preset tolerance time is exceeded.
In the invention, a counter and a timer are introduced, the detection message is counted by the counter, and the loop detection time is timed by the timer.
The counting of the received detection messages by the counter is specifically as follows:
the value of the counter is initialized to 0;
adding 1 to the value of the counter every time a detection message is received;
reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0;
after the value of the counter is initialized to 0, the counter stops counting.
The specific timing of the time tolerating by the timer is as follows:
initializing the value of the timer to a preset value;
the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value;
when a damage measure is taken, resetting the timer to a preset value immediately;
and after the value of the timer is reset to a preset value, the timer stops timing.
The preset tolerant time (delay-time) is preset, and if the value of the timer is counted down to 0 and the value of the counter in the next period is greater than the value of the counter in the current period, the loop duration time is judged to be greater than the preset tolerant time.
Preferably, the preset tolerant time (delay-time) is an integer multiple of the counter reading period T, i.e., nT, n ≧ 0 and an integer.
The present invention will be described in detail with reference to specific examples.
A loop detection mechanism:
the switch port periodically (with a period of t) sends out a detection message (broadcast message), and if the message can be received, it indicates that a loop exists. The packet-interval represents a period for the port to send the detection message to the outside. When a loop exists, the port can continuously receive the detection message sent by the port.
The counter counting mechanism:
a counter exists, after a loop is detected, the counter is started and initialized to 0, and the value of the counter is added with 1 every time the equipment receives a detection message;
after starting the counter, the device periodically (for example, 1 second) reads the value of the counter, if the result of this reading is equal to the result of the last reading and is not 0, the counter is initialized to 0, the preset tolerant time delay-time is reset to the initial value, and the counter and the delay-time timer are turned off (the counter is not increased any more and is not read any more, and the delay-time timer is not timed any more).
Tolerance mechanism of the loop:
the preset tolerance time delay-time represents the time for taking measures to delay and is used for measuring the tolerance degree of the transient loop.
After the loop is detected, a delay-time timer is started (decreased from a preset value to 0), and before the delay-time timer is over, the device does not take destructive measures. After the delay-time is overtime, if a loop is still detected, taking a ring-breaking measure and resetting the delay-time; otherwise, the device takes no action.
The recovery mechanism of the port:
the recovery-time represents the waiting time for the port to recover to a normal state if a loop disappears after the port takes a ring-breaking measure.
After a damage measure is taken, firstly resetting delay-time as a preset value; if the value of the counter in the subsequent period is equal to the value of the counter in the previous period and is not 0, resetting the counter to be 0, starting recovery-time, and resetting the recovery-time to be a preset value and timing again if a loop is detected.
Referring to fig. 4, in an embodiment of the present invention, the time axis is divided according to the time point of the reading counter, assuming that: the interval of the counter is 1s, the preset tolerance time delay-time is 3s, the packet-interval is 5s, and the gray part is the time period of the loop.
During the time interval between two transmissions of the detection message, the device is unaware of the presence or absence of the loop, and no action is taken regardless of the presence or absence of the loop, so it is meaningless to discuss how long the loop has been maintained before the loop is detected, and the invention focuses on the actions after the device detects the loop.
On the premise that a loop can be detected:
if the detection message is sent out in the 7 th second, and the existence of the loop is detected, starting a counter and a delay-time timer at the moment;
when the loop is detected in the 7 th second, because the delay-time timer is not overtime, no damage measure is taken temporarily; opening a counter, wherein the counter is 0;
at the 8 th second, the counter is increased because of the loop within 7-8 seconds, and the counter is assumed to be a (a > 0);
at the 9 th second, the counter is increased because a loop exists in 8-9 seconds, and the counter is assumed to be b (b > a > 0);
at the 10 th second, the counter is increased because of the loop within 9-10 seconds, and the counter is assumed to be c (c > b > a > 0);
when the delay-time timer (3s) is over, the loop is not protected any more, and the device judges whether the loop still exists according to the counter read next time.
Referring to fig. 5a, if the loop duration is less than the preset tolerance time delay-time:
in the 11 th second, because no loop exists in 10-11 seconds, the loop detection message in the network disappears, the counter should not change, and the counter is equal to c; since the 10 th and 11 th second counter counters are equal and not 0, it is judged that the loop does not exist, no action is taken, and the counter is initialized to 0, then turned off, and the delay-time timer is reset to 3 seconds.
Referring to fig. 5b, if the loop duration is greater than the preset tolerance time delay-time:
and in 11 th second, because a loop exists from 10 th second to 11 th second, the counter is increased, and then the loop is judged to exist, and the equipment takes measures to break the loop.
Referring to fig. 5c, if the loop duration is very short, even less than the counter read period (1 s):
sending a loop detection message in the 7 th second, and starting a counter and a delay-time timer when detecting that a loop exists;
when the loop is detected in the 7 th second, because the delay-time timer is not overtime, no damage measure is taken temporarily; the counter is turned on, and the counter is 0
At the 8 th second, the counter is incremented because of the loop within 7 to 8 seconds, and the counter is assumed to be a (a >0)
And in the 9 th second, because no loop exists in 8-9 seconds, the counter is unchanged, the counter is equal to a, the loop is judged to be eliminated, no measures are taken, the counter is initialized to 0, the delay-time timer is reset to 3 seconds, and the counter and the delay-time timer are closed.
In the above embodiment, the packet-interval is greater than the delay-time, that is, the port does not send the over-detection packet to the outside in the loop duration. In fact, during the loop duration, the counter is always increased whether or not the detection message is sent, and thus the relative sizes of delay-time and packet-interval have no influence on the present invention.
Resetting the delay-time timer after taking loop-breaking measures; if the value of the subsequent counter is equal to the value of the counter in the previous period and is not 0, resetting the counter to be 0, judging that the loop is eliminated, and starting a port state recovery mechanism. The port state recovery mechanism is not the focus of the discussion of the present invention, and is not further described herein on the premise of being compatible with the conventional recovery mechanism.
In the above embodiment, the counter reading period 1s and the timer preset tolerance time delay-time3s are taken as examples for explanation, in other embodiments, the reading period of the counter and the preset tolerance time of the timer may be set as required, the thresholds of the short loop and the long loop may be customized by a user, and the delay-time is defined as 0, that is, no loop is tolerated, which explains that the present invention is compatible with conventional implementations.
Referring to fig. 6, the present invention also discloses a loop detection system based on a tolerance mechanism, which includes:
the message sending module 10 is configured to send a detection message to the outside according to the period t, and detect whether a loop exists in the network;
a counting module 20, configured to count the received detection packet after determining that the loop exists;
the timing module 30 is used for timing the tolerant time after judging that the loop exists;
and the loop processing module 40 is configured to take a loop destructive measure when the loop duration is greater than the preset tolerance time, and not take the loop destructive measure when the loop duration is less than or equal to the preset tolerance time.
The counting module includes a counter, the timing module includes a timer, and the specific counter, timer and loop tolerance mechanism are completely the same as those in the above embodiments, and are not described herein again.
According to the technical scheme, the invention has the following advantages:
according to the invention, by introducing a loop tolerance mechanism, a destructive measure is taken for a long-time loop, so that the network environment is protected; for the short loop, no destructive measure is taken to prevent the interruption of the service and maintain the smoothness of the service.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, the functionality of the modules may be implemented in the same one or more software and/or hardware implementations in implementing one or more embodiments of the present description.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.
Claims (5)
1. A loop detection method based on a tolerance mechanism is characterized by comprising the following steps:
sending out a detection message according to the period t, and detecting whether a loop exists in the network;
if the detection message is received, judging that a loop exists, counting the received detection message, and timing the tolerant time;
when the loop duration is longer than the preset tolerance time, taking a loop destruction measure, and when the loop duration is shorter than or equal to the preset tolerance time, not taking the loop destruction measure;
counting the detection messages through a counter, and timing the tolerance time through a timer;
the counting of the received detection messages specifically comprises:
the value of the counter is initialized to 0;
adding 1 to the value of the counter every time a detection message is received;
reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0;
the timing of the tolerance time is specifically as follows:
initializing the value of the timer to a preset value;
the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value;
when a damage measure is taken, resetting the timer to a preset value immediately;
the judgment mode that the loop duration is greater than the preset tolerance time is as follows:
and if the value of the counter of the next period is greater than the value of the counter of the current period after the value of the timer is counted down to 0, judging that the loop duration is greater than the preset tolerance time.
2. The loop detection method according to claim 1, wherein the predetermined tolerance time is nT, n is greater than or equal to 0 and is an integer.
3. The loop detection method according to claim 1, wherein the counter stops counting after the value of the counter is initialized to 0.
4. The loop detection method according to claim 1, wherein the timer stops counting after the value of the timer is reset to a predetermined value.
5. A loop detection system based on a tolerance mechanism, the loop detection system comprising:
the message sending module is used for sending detection messages to the outside according to the period t and detecting whether a loop exists in the network;
the counting module is used for counting the received detection messages after judging that the loop exists;
the timing module is used for timing the tolerant time after judging that the loop exists;
the loop processing module is used for taking loop damage measures when the loop duration is longer than the preset tolerance time, and not taking the loop damage measures when the loop duration is shorter than or equal to the preset tolerance time;
the counting module comprises a counter, wherein the value of the counter is initialized to 0; adding 1 to the value of the counter every time a detection message is received; reading the value of the counter according to the period T, and if the value of the current counter is equal to the value of the counter in the previous period and is not 0, initializing the value of the counter to be 0;
the timing module comprises a timer, wherein the value of the timer is initialized to a preset value; the timer counts down, if the value of the current counter is equal to the value of the counter in the previous period and is not 0, the value of the timer is reset to a preset value; when a damage measure is taken, resetting the timer to a preset value immediately;
the loop processing module is further configured to:
and if the value of the counter of the next period is greater than the value of the counter of the current period after the value of the timer is counted down to 0, judging that the loop duration is greater than the preset tolerance time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811119325.6A CN108989155B (en) | 2018-09-25 | 2018-09-25 | Loop detection method and system based on tolerance mechanism |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811119325.6A CN108989155B (en) | 2018-09-25 | 2018-09-25 | Loop detection method and system based on tolerance mechanism |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108989155A CN108989155A (en) | 2018-12-11 |
CN108989155B true CN108989155B (en) | 2022-03-04 |
Family
ID=64543951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811119325.6A Active CN108989155B (en) | 2018-09-25 | 2018-09-25 | Loop detection method and system based on tolerance mechanism |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108989155B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743234B (en) * | 2019-03-01 | 2022-04-22 | 苏州盛科通信股份有限公司 | Loop detection method and system based on tolerance mechanism |
CN112769667B (en) * | 2021-01-14 | 2022-07-19 | 北京星网锐捷网络技术有限公司 | Loop protection control method and device for multi-device cascade communication network |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252473A (en) * | 2008-03-31 | 2008-08-27 | 中兴通讯股份有限公司 | Loop circuit processing method and apparatus |
CN102130793A (en) * | 2010-11-29 | 2011-07-20 | 华为技术有限公司 | Method, device and system for processing loop circuit in access network |
CN103378998A (en) * | 2012-04-27 | 2013-10-30 | 中兴通讯股份有限公司 | Method and device for Ethernet port loopback detection |
CN104158706A (en) * | 2014-08-26 | 2014-11-19 | 杭州华三通信技术有限公司 | Method and device of loopback detection |
US9762340B1 (en) * | 2012-02-01 | 2017-09-12 | Ciena Corporation | Synchronization timing loop detection systems and methods |
CN107872370A (en) * | 2017-12-27 | 2018-04-03 | 广州芯德通信科技股份有限公司 | A kind of Ethernet interface loop quick determination method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140050099A1 (en) * | 2012-08-20 | 2014-02-20 | Chi-Feng Lin | Network Device and Method for Loop Detection |
-
2018
- 2018-09-25 CN CN201811119325.6A patent/CN108989155B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252473A (en) * | 2008-03-31 | 2008-08-27 | 中兴通讯股份有限公司 | Loop circuit processing method and apparatus |
CN102130793A (en) * | 2010-11-29 | 2011-07-20 | 华为技术有限公司 | Method, device and system for processing loop circuit in access network |
US9762340B1 (en) * | 2012-02-01 | 2017-09-12 | Ciena Corporation | Synchronization timing loop detection systems and methods |
CN103378998A (en) * | 2012-04-27 | 2013-10-30 | 中兴通讯股份有限公司 | Method and device for Ethernet port loopback detection |
CN104158706A (en) * | 2014-08-26 | 2014-11-19 | 杭州华三通信技术有限公司 | Method and device of loopback detection |
CN107872370A (en) * | 2017-12-27 | 2018-04-03 | 广州芯德通信科技股份有限公司 | A kind of Ethernet interface loop quick determination method |
Also Published As
Publication number | Publication date |
---|---|
CN108989155A (en) | 2018-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5636345A (en) | Method and apparatus for detecting and preventing broadcast storms on an emulated local area network | |
CA2557461C (en) | Dual use counters for routing loops and spam detection | |
CN108989155B (en) | Loop detection method and system based on tolerance mechanism | |
US7821937B1 (en) | Network protocol with damage loss resilient congestion control algorithm | |
CN111078453B (en) | Method, device, computer equipment and storage medium for automatically fusing and recovering micro-service | |
CN110784415B (en) | ECN quick response method and device | |
CN106899488B (en) | Application message pushing method and device | |
US10614006B2 (en) | Low latency interrupt with existence of interrupt moderation | |
KR20070093961A (en) | High-resolution timer-efficient sliding window | |
CN106973003B (en) | Group message notification method, client, electronic device and server | |
CN109617905B (en) | Multicast attack processing method, device and implementation device | |
CN107017958A (en) | A kind of method for synchronizing time and corresponding system based on NTP | |
CN105527564A (en) | Self-diagnosis method and system for internal functions of FPGA (Field Programmable Gate Array) | |
US20050010817A1 (en) | Technique of detecting denial of service attacks | |
CN105278931B (en) | A kind of method and terminal that Android system forbids application program backstage to open certainly | |
CN105474584B (en) | CAN FD frame end detector and detection method, CAN bit stream processor and operating method | |
CN114760152A (en) | Cloud data center virtualization node network security early warning method | |
CN110798382A (en) | Port storm threshold control method and device | |
CN109743234B (en) | Loop detection method and system based on tolerance mechanism | |
CN115002819B (en) | Network quality assessment method and device | |
CN112351049B (en) | Data transmission method, device, equipment and storage medium | |
KR100644582B1 (en) | Collision protection protocol using backoff algorithm in consideration of the communication priority | |
CN106506279B (en) | Network deadlock state detection method and device | |
CN110430118B (en) | Bill mail managing method, apparatus, computer device and computer readable storage medium | |
US20210250995A1 (en) | Performance-guaranteed channel access control for security alarm and image sensors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 215000 unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, Jiangsu Province Applicant after: Suzhou Shengke Communication Co.,Ltd. Address before: 215000 unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, Jiangsu Province Applicant before: CENTEC NETWORKS (SU ZHOU) Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |