CN115134271B - Fault detection method and device for IP transparent transmission ad hoc network and computer equipment - Google Patents

Fault detection method and device for IP transparent transmission ad hoc network and computer equipment Download PDF

Info

Publication number
CN115134271B
CN115134271B CN202110303855.1A CN202110303855A CN115134271B CN 115134271 B CN115134271 B CN 115134271B CN 202110303855 A CN202110303855 A CN 202110303855A CN 115134271 B CN115134271 B CN 115134271B
Authority
CN
China
Prior art keywords
message
mac address
node
field
source node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110303855.1A
Other languages
Chinese (zh)
Other versions
CN115134271A (en
Inventor
邓昭彰
李卫军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Leading Wisdom Telecommunication and Technology Co Ltd
Original Assignee
Hunan Leading Wisdom Telecommunication and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Leading Wisdom Telecommunication and Technology Co Ltd filed Critical Hunan Leading Wisdom Telecommunication and Technology Co Ltd
Priority to CN202110303855.1A priority Critical patent/CN115134271B/en
Publication of CN115134271A publication Critical patent/CN115134271A/en
Application granted granted Critical
Publication of CN115134271B publication Critical patent/CN115134271B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Small-Scale Networks (AREA)

Abstract

The application relates to a fault detection method, device and computer equipment of an IP transparent transmission ad hoc network. The method comprises the following steps: constructing a MAC control message protocol, the MAC control message protocol comprising: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count, thereby carrying out link fault detection by utilizing MAC control message protocol on the link layer. The method can detect the link failure without using IP information.

Description

Fault detection method and device for IP transparent transmission ad hoc network and computer equipment
Technical Field
The present invention relates to the field of network technologies, and in particular, to a method, an apparatus, and a computer device for detecting a fault of an IP transparent ad hoc network.
Background
The existing ad hoc networks can be divided into IP routing ad hoc networks and IP transparent transmission ad hoc networks according to the service transmission mode. The IP routing ad hoc network forwards the service message based on the IP address, so that complex IP address configuration is often required, and the network flexibility and the user experience are poor. The IP transparent ad hoc network does not depend on IP address configuration between the upper computers and the ad hoc network equipment, only the IP addresses among the upper computers are required to be kept in the same network segment, and network flexibility and user experience are effectively improved. Currently, in an ad hoc network supporting IP transparent transmission, a network manager generally adopts an ICMP protocol (Internet control message protocol) to diagnose a network and remove network faults.
ICMP protocol (Internet control message protocol) belongs to the network layer of TCP/IP protocol stack, and must work together with IP protocol, in the ad hoc network each ad hoc network equipment is configured with IP address, when the ad hoc network system is interconnected with other networks, the network may be failed due to IP address conflict. In the IP transparent ad hoc network, the ad hoc network device itself does not need to configure an IP address, and when the IP address is not configured, the ICMP protocol of the original TCP/IP protocol stack is no longer applicable.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a fault detection method, apparatus and computer device for an IP transparent ad hoc network, which can solve the problem of fault detection in the IP transparent ad hoc network.
A fault detection method for an IP transparent ad hoc network, the method comprising:
constructing a MAC control message protocol; the MAC control message protocol includes: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count;
determining a link to be detected, and taking two endpoints of the link to be detected as a source node and a destination node respectively;
according to the MAC address and the maximum hop count of the destination node which are acquired in advance, a network diagnosis instruction is sent to a source node;
the source node generates a request message according to the diagnosis instruction; the MAC address and the maximum hop count of the destination node in the request message are respectively filled in the MAC address field and the maximum hop count field of the destination node, the MAC address of the source node is filled in the MAC address field of the source node, the message sequence number field is filled in the sequence number of the source node, and the message type field is filled in the request message;
inquiring a local routing table to determine whether a routing table entry corresponding to a destination node MAC address field exists according to the request message, and if not, returning a message with a unreachable path;
if yes, the request message is sent to the next hop of the routing table item, and after the next hop receives the request message, whether the node is a destination node MAC address field is judged;
when the node is not the destination node MAC address field, judging whether the maximum hop count field is larger than 1, if not, feeding back a message exceeding the maximum hop count to the source node; if yes, inquiring a local routing table to determine whether a routing table item corresponding to a destination node MAC address field exists, if not, feeding back a path unreachable message to a source node, and if yes, continuously forwarding the request message to the next hop;
if the node is the destination node MAC address field, feeding back a response message to the source node;
and judging whether the link fails or not and judging the failure type according to the message type fed back to the source node.
In one embodiment, the method further comprises: if the message exceeding the maximum hop count is returned, determining that the hop count of message forwarding exceeds the allowed maximum hop count;
if the return path is not reachable, determining that the route from the source node or the intermediate node to the destination node does not exist, wherein the path is not reachable;
if the response message is returned, the link communication from the source node to the destination node is determined to be normal.
In one embodiment, the method further comprises: if the next hop node is the destination node MAC address field, the message type field is filled with a response message, the source node MAC address field is filled with the MAC address of the current node, the destination node MAC address field is filled with the source node MAC address field of the request message, ttl is filled with the maximum number of hops allowed to pass by the response message, and the message sequence number field is filled with the sequence number in the response message.
A fault detection device for an IP transparent ad hoc network, the device comprising:
the protocol construction module is used for constructing a MAC control message protocol; the MAC control message protocol includes: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count;
the detection module is used for determining a link to be detected, and taking two endpoints of the link to be detected as a source node and a destination node respectively; according to the MAC address and the maximum hop count of the destination node which are acquired in advance, a network diagnosis instruction is sent to a source node; the source node generates a request message according to the diagnosis instruction; the MAC address and the maximum hop count of the destination node in the request message are respectively filled in the MAC address field and the maximum hop count field of the destination node, the MAC address of the source node is filled in the MAC address field of the source node, the message sequence number field is filled in the sequence number of the source node, and the message type field is filled in the request message; inquiring a local routing table to determine whether a routing table entry corresponding to a destination node MAC address field exists according to the request message, and if not, returning a message with a unreachable path; if yes, the request message is sent to the next hop of the routing table item, and after the next hop node receives the request message, whether the node is a destination node MAC address field is judged; when the node is not the destination node MAC address field, judging whether the maximum hop count field is larger than 1, if not, feeding back a message exceeding the maximum hop count to the source node; if yes, inquiring a local routing table to determine whether a routing table item corresponding to a destination node MAC address field exists, if not, feeding back a path unreachable message to a source node, and if yes, continuously forwarding the request message to the next hop; if the node is the destination node MAC address field, feeding back a response message to the source node;
and the detection output module is used for judging whether the link fails or not and judging the failure type according to the message type fed back by the Xiang Yuan node.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
constructing a MAC control message protocol; the MAC control message protocol includes: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count;
determining a link to be detected, and taking two endpoints of the link to be detected as a source node and a destination node respectively;
according to the MAC address and the maximum hop count of the destination node which are acquired in advance, a network diagnosis instruction is sent to a source node;
the source node generates a request message according to the diagnosis instruction; the MAC address and the maximum hop count of the destination node in the request message are respectively filled in the MAC address field and the maximum hop count field of the destination node, the MAC address of the source node is filled in the MAC address field of the source node, the message sequence number field is filled in the sequence number of the source node, and the message type field is filled in the request message;
inquiring a local routing table to determine whether a routing table entry corresponding to a destination node MAC address field exists according to the request message, and if not, returning a message with a unreachable path;
if yes, the request message is sent to the next hop of the routing table item, and after the next hop node receives the request message, whether the node is a destination node MAC address field is judged;
when the node is not the destination node MAC address field, judging whether the maximum hop count field is larger than 1, if not, feeding back a message exceeding the maximum hop count to the source node; if yes, inquiring a local routing table to determine whether a routing table item corresponding to a destination node MAC address field exists, if not, feeding back a path unreachable message to a source node, and if yes, continuously forwarding the request message to the next hop;
if the node is the destination node MAC address field, feeding back a response message to the source node;
and judging whether the link fails or not and judging the failure type according to the message type fed back to the source node.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
constructing a MAC control message protocol; the MAC control message protocol includes: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count;
determining a link to be detected, and taking two endpoints of the link to be detected as a source node and a destination node respectively;
according to the MAC address and the maximum hop count of the destination node which are acquired in advance, a network diagnosis instruction is sent to a source node;
the source node generates a request message according to the diagnosis instruction; the MAC address and the maximum hop count of the destination node in the request message are respectively filled in the MAC address field and the maximum hop count field of the destination node, the MAC address of the source node is filled in the MAC address field of the source node, the message sequence number field is filled in the sequence number of the source node, and the message type field is filled in the request message;
inquiring a local routing table to determine whether a routing table entry corresponding to a destination node MAC address field exists according to the request message, and if not, returning a message with a unreachable path;
if yes, the request message is sent to the next hop of the routing table item, and after the next hop receives the request message, whether the node is a destination node MAC address field is judged;
when the node point is not the MAC address field of the destination node, judging whether the maximum hop count field is larger than 1, if not, feeding back a message exceeding the maximum hop count to the source node; if yes, inquiring a local routing table to determine whether a routing table item corresponding to a destination node MAC address field exists, if not, feeding back a path unreachable message to a source node, and if yes, continuously forwarding the request message to the next hop;
if the node is the destination node MAC address field, feeding back a response message to the source node;
and judging whether the link fails or not and judging the failure type according to the message type fed back to the source node.
According to the fault detection method, the fault detection device, the computer equipment and the storage medium of the IP transparent transmission ad hoc network, network fault detection and network fault elimination are performed on the link layer by designing a new transmission control message protocol based on the data link layer and a message protocol format.
Drawings
Fig. 1 is a flow chart of a fault detection method of an IP transparent ad hoc network in an embodiment;
FIG. 2 is a diagram of a message passing through a maximum allowed hop count in one embodiment;
FIG. 3 is a schematic diagram of an embodiment in which there is no route to a destination node;
FIG. 4 is a schematic diagram of a destination node reply in one embodiment;
FIG. 5 is a block diagram of a failure detection apparatus for IP transparent ad hoc network in one embodiment;
fig. 6 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, a fault detection method of an IP transparent ad hoc network is provided, which includes the following steps:
step 102, constructing a MAC control message protocol.
The MAC control message protocol includes: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count.
Step 104, determining a link to be detected, and taking two endpoints of the link to be detected as a source node and a destination node respectively.
And step 106, sending a network diagnosis instruction to the source node according to the pre-acquired MAC address and the maximum hop count of the destination node.
And step 108, the source node generates a request message according to the diagnosis instruction.
The MAC address and the maximum hop count of the destination node in the request message are respectively filled in the MAC address field and the maximum hop count field of the destination node, the MAC address of the source node is filled in the MAC address field of the source node, the message sequence number field is filled in the sequence number of the source node, and the message type field is filled in the request message
Step 110, according to the request message, inquiring the local routing table to determine whether the routing table entry corresponding to the destination node MAC address field exists, if not, returning the message of which the path is not reachable.
And step 112, if yes, the request message is sent to the next hop of the routing table entry, and after the next hop receives the request message, whether the node is a destination node MAC address field is judged.
Step 114, when the node is not the destination node MAC address field, judging whether the maximum hop count field is greater than 1, if not, feeding back the message exceeding the maximum hop count to the source node; if yes, the local routing table is queried to determine whether a routing table item corresponding to the MAC address field of the destination node exists, if not, a path unreachable message is fed back to the source node, and if yes, the request message is forwarded to the next hop.
And step 116, if the node is the destination node MAC address field, feeding back a response message to the source node.
Step 118, according to the message type fed back to the source node, judging whether the link is faulty or not and judging the fault type.
In the fault detection method of the IP transparent transmission ad hoc network, network fault detection and network fault removal are carried out on the link layer by designing a new transmission control message protocol based on the data link layer and a message protocol format.
In one embodiment, if a message exceeding the maximum hop count is returned, determining that the hop count of message forwarding exceeds the allowed maximum hop count; if the return path is not reachable, determining that the route from the source node or the intermediate node to the destination node does not exist, wherein the path is not reachable; if the response message is returned, the link communication from the source node to the destination node is determined to be normal.
In one embodiment, if the node is the destination node MAC address field, the message type field is filled with a response message, the source node MAC address field is filled with the MAC address of the current node, the destination node MAC address field is filled with the source node MAC address field of the request message, ttl is filled with the maximum number of hops allowed to pass by the response message, and the message sequence number field is filled with the sequence number in the response message.
Specifically, to implement an MCMP (MAC Control Message Protocol ) protocol applicable to IP transparent ad hoc networks, an MCMP protocol message format based on a data link layer is designed, as shown in table 1.
Table 1 MAC control message protocol format
type orig_mac dest_mac ttl seqno
Wherein the orig_mac field represents a source node MAC address field of the MCMP message, dest_mac represents a destination node MAC address field of the MCMP message, ttl represents a maximum allowed hop count field of the MCMP message, seqno represents a sequence number field of the MCMP message, type field represents a message type field of the MCMP message, and four MCMP protocol types are defined in combination with network characteristics of an ad hoc network, as shown in table 2:
mac_echo_request: the request message requests the destination node to reply the MCMP response message and is used for diagnosing whether the link between the source node and the destination node can normally communicate.
Mac_echo_reply: and responding to the message, and after receiving the MAC_ECHO_REQUEST message of the source node, the destination node replies the message.
Mac_dest_unreachable: the path is not reachable, and when there is no route to the destination node, the message is replied.
Machop_extracted: and when the maximum hop count is exceeded, returning the message when the hop count of the MCMP message exceeds the allowable maximum hop count.
Table 2 MCMP message type table
MCMP message type Representative value
MAC_ECHO_REQUEST 0
MAC_ECHO_REPLY 1
MAC_DEST_UNREACHABLE 2
MAC_HOPS_EXCEED 3
The fault detection process is fully described below.
1. When a network manager needs to judge whether link communication between two nodes in an ad hoc network is normal, one node is taken as a source node, the other node is taken as a destination node, the MAC address of the destination node and the allowed maximum hop count are taken as parameters, an instruction is sent to an MCMP protocol module of the source node to diagnose the network, after the MCMP protocol module of the source node receives the instruction, a MAC_ECHO_REQUEST message is generated, wherein a type field is filled with the MAC_ECHO_REQUEST, an orig_mac is filled with the MAC address of the node, a dest_mac is filled with the MAC address of the destination node, a ttl is filled with the allowed maximum hop count of the message, and a seqno is filled with the current MCMP serial number of the node.
2. The source node sends the generated MAC_ECHO_REQUEST message to the self-organizing network routing protocol module, after the self-organizing network routing protocol module receives the MAC_ECHO_REQUEST message, the self-organizing network routing protocol module searches whether a routing table item of a local routing table reaching the destination node dest_mac exists, if not, the destination node is not reachable, the MAC_ECHO_REQUEST message is discarded, and the MAC_ECHO_REQUEST message is directly returned to the MAC_DEST_UNREACHABLE message, if so, the MAC_ECHO_REQUEST message is sent to the next hop of the routing table item. Wherein the ad hoc network routing table is shown in table 3.
Table 3 ad hoc network routing table
Destination node mac Next hop node mac Transmission quality
dest_mac1 nexthop_mac TQ
dest_mac2 nexthop_mac TQ
…… …… ……
dest_macN nexthop_mac TQ
3. After receiving the mac_echo_request message, the next-hop node first determines whether the dest_mac address of the mac_echo_request is the node:
(1) If the node is not the destination node of the mac_echo_request, determining whether the ttl field in the message is greater than 1:
if not, indicating that the message has passed the maximum allowed hop count, discarding the mac_echo_request message, and replying the mac_hop_extracted message to the source node of the message, as shown in fig. 2.
If yes, continue to inquire whether there is a route reaching the destination node dest_mac of the destination node routing table, if not, indicate that the destination node is not reachable, discard the mac_echo_request message, and reply the source node of the message with a mac_dest_unreachable message, as shown in fig. 3, if yes, continue to forward the mac_echo_request message to the next hop.
It should be noted that, when the routing table is queried and forwarded, the hop count of forwarding is recorded, for example: when the maximum hop count is set to 10, forwarding to the 10 th node, that is, at the current node, the value of the ttl field is 1, so that a judgment condition of whether the ttl field is greater than 1 is set.
(2) If the node is the destination node of the mac_echo_request, the source node replies a mac_echo_reply message to the message, where the type field is filled with mac_echo_reply, orig_mac is filled with the MAC address of the node, dest_mac is filled with the orig_mac address of the mac_echo_request message, ttl is filled with the maximum number of hops allowed to pass through by the message, and seqno is filled with the seqno field in the mac_echo_request message, as shown in fig. 4.
After receiving the returned MCMP message, the source node judges the current network condition information according to the type of the returned MCMP message and feeds back the current network condition information to a network manager:
if a mac_hops_exposed message is returned: indicating that the number of hops for message forwarding exceeds the maximum allowed number of hops.
If a MAC_DEST_UNREACHABLED message is returned: indicating that the route for the node or the intermediate node to reach the destination node does not exist, and the route is not reachable.
If a mac_echo_reply message is returned: indicating that the link communication from the source node to the destination node is normal, and other service transmission can be performed.
In summary, the beneficial effects of the invention are as follows:
1) The invention makes the self-networking not depend on the IP protocol and ICMP protocol of the original TCP/IP protocol stack, and can diagnose the network under the condition that the self-networking equipment is not configured with IP address.
2) Meanwhile, as the MCMP message is created and sent from the data link layer, the MCMP message does not need to be filled with an IP header, and compared with the ICMP protocol of the original TCP/IP protocol stack, the protocol overhead is effectively saved.
It should be understood that, although the steps in the flowchart of fig. 1 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 1 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of other steps or sub-steps of other steps.
In one embodiment, as shown in fig. 5, there is provided a fault detection apparatus of an IP transparent ad hoc network, including: a protocol construction module 502, a detection module 504, and a detection output module 506, wherein:
a protocol construction module 502, configured to construct a MAC control message protocol; the MAC control message protocol includes: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count;
the detection module 504 is configured to determine a link to be detected, and take two endpoints of the link to be detected as a source node and a destination node respectively; according to the MAC address and the maximum hop count of the destination node which are acquired in advance, a network diagnosis instruction is sent to a source node; the source node generates a request message according to the diagnosis instruction; the MAC address and the maximum hop count of the destination node in the request message are respectively filled in the MAC address field and the maximum hop count field of the destination node, the MAC address of the source node is filled in the MAC address field of the source node, the message sequence number field is filled in the sequence number of the source node, and the message type field is filled in the request message; inquiring a local routing table to determine whether a routing table entry corresponding to a destination node MAC address field exists according to the request message, and if not, returning a message with a unreachable path; if yes, the request message is sent to the next hop of the routing table item, and after the next hop receives the request message, whether the node is a destination node MAC address field is judged; when the node is not the destination node MAC address field, judging whether the maximum hop count field is larger than 1, if not, feeding back a message exceeding the maximum hop count to the source node; if yes, inquiring a local routing table to determine whether a routing table item corresponding to a destination node MAC address field exists, if not, feeding back a path unreachable message to a source node, and if yes, continuously forwarding the request message to the next hop; if the node is the destination node MAC address field, feeding back a response message to the source node;
and the detection output module 506 is configured to determine whether the link fails or not and the failure type according to the message type fed back to the source node.
In one embodiment, the detection output module 506 is further configured to determine that the number of hops for forwarding the message exceeds the allowed maximum number of hops if the message exceeding the maximum number of hops is returned; if the return path is not reachable, determining that the route from the source node or the intermediate node to the destination node does not exist, wherein the path is not reachable; if the response message is returned, the link communication from the source node to the destination node is determined to be normal.
In one embodiment, the detection module 504 is further configured to fill the message type field with a response message if the next hop node is the destination node MAC address field, fill the source node MAC address field with the MAC address of the current node, fill the destination node MAC address field with the source node MAC address field of the request message, fill ttl with the maximum number of hops allowed by the response message, and fill the message sequence number field with the sequence number in the response message.
For specific limitation of the fault detection device of the IP transparent ad hoc network, reference may be made to the limitation of the fault detection method of the IP transparent ad hoc network, which is not described herein. All or part of each module in the fault detection device of the IP transparent transmission ad hoc network can be realized by software, hardware and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a fault detection method for an IP transparent ad hoc network. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 6 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In an embodiment a computer device is provided comprising a memory storing a computer program and a processor implementing the steps of the method of the above embodiments when the computer program is executed.
In one embodiment, a computer readable storage medium is provided, on which a computer program is stored which, when executed by a processor, implements the steps of the method of the above embodiments.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (8)

1. The fault detection method of the IP transparent transmission ad hoc network is characterized by comprising the following steps:
constructing a MAC control message protocol; the MAC control message protocol includes: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count;
determining a link to be detected, and taking two endpoints of the link to be detected as a source node and a destination node respectively;
according to the MAC address and the maximum hop count of the destination node which are acquired in advance, a network diagnosis instruction is sent to a source node;
the source node generates a request message according to the diagnosis instruction; the MAC address and the maximum hop count of the destination node in the request message are respectively filled in the MAC address field and the maximum hop count field of the destination node, the MAC address of the source node is filled in the MAC address field of the source node, the message sequence number field is filled in the sequence number of the source node, and the message type field is filled in the request message;
inquiring a local routing table to determine whether a routing table entry corresponding to a destination node MAC address field exists according to the request message, and if not, returning a message with a unreachable path;
if yes, the request message is sent to the next hop of the routing table item, and after the next hop receives the request message, whether the node is a destination node MAC address field is judged;
when the node is not the destination node MAC address field, judging whether the maximum hop count field is larger than 1, if not, feeding back a message exceeding the maximum hop count to the source node; if yes, inquiring a local routing table to determine whether a routing table item corresponding to a destination node MAC address field exists, if not, feeding back a path unreachable message to a source node, and if yes, continuously forwarding the request message to the next hop;
if the node is the destination node MAC address field, feeding back a response message to the source node;
and judging whether the link fails or not and judging the failure type according to the message type fed back to the source node.
2. The method of claim 1, wherein determining whether the link is faulty and the type of fault based on the type of message fed back to the source node comprises:
if the message exceeding the maximum hop count is returned, determining that the hop count of message forwarding exceeds the allowed maximum hop count;
if the return path is not reachable, determining that the route from the source node or the intermediate node to the destination node does not exist, wherein the path is not reachable;
if the response message is returned, the link communication from the source node to the destination node is determined to be normal.
3. The method of claim 1, wherein feeding back a reply message to the source node if the node is a destination node MAC address field, comprises:
if the node is the destination node MAC address field, the message type field is filled into a response message, the source node MAC address field is filled into the MAC address of the current node, the destination node MAC address field is filled into the source node MAC address field of the request message, ttl is filled into the maximum number of hops allowed to pass by the response message, and the message sequence number field is filled into the sequence number in the response message.
4. A fault detection device for an IP transparent ad hoc network, the device comprising:
the protocol construction module is used for constructing a MAC control message protocol; the MAC control message protocol includes: a message type field, a source node MAC address field, a destination node MAC address field, a maximum hop count field and a message sequence number field; the contents filled in the message type field comprise: request message, response message, path unreachable message and message exceeding maximum hop count;
the detection module is used for determining a link to be detected, and taking two endpoints of the link to be detected as a source node and a destination node respectively; according to the MAC address and the maximum hop count of the destination node which are acquired in advance, a network diagnosis instruction is sent to a source node; the source node generates a request message according to the diagnosis instruction; the MAC address and the maximum hop count of the destination node in the request message are respectively filled in the MAC address field and the maximum hop count field of the destination node, the MAC address of the source node is filled in the MAC address field of the source node, the message sequence number field is filled in the sequence number of the source node, and the message type field is filled in the request message; inquiring a local routing table to determine whether a routing table entry corresponding to a destination node MAC address field exists according to the request message, and if not, returning a message with a unreachable path; if yes, the request message is sent to the next hop of the routing table item, and after the next hop node receives the request message, whether the node is a destination node MAC address field is judged; when the node is not the destination node MAC address field, judging whether the maximum hop count field is larger than 1, if not, feeding back a message exceeding the maximum hop count to the source node; if yes, inquiring a local routing table to determine whether a routing table item corresponding to a destination node MAC address field exists, if not, feeding back a path unreachable message to a source node, and if yes, continuously forwarding the request message to the next hop; if the node is the destination node MAC address field, feeding back a response message to the source node;
and the detection output module is used for judging whether the link fails or not and judging the failure type according to the message type fed back by the Xiang Yuan node.
5. The apparatus of claim 4, wherein the detection output module is further configured to determine that the number of hops for forwarding the message exceeds the allowed maximum number of hops if a message exceeding the maximum number of hops is returned; if the return path is not reachable, determining that the route from the source node or the intermediate node to the destination node does not exist, wherein the path is not reachable; if the response message is returned, the link communication from the source node to the destination node is determined to be normal.
6. The apparatus of claim 4, wherein the detection module is further configured to, if the node is a destination node MAC address field, fill a message type field with a reply message, fill a source node MAC address field with a MAC address of a current node, fill a destination node MAC address field with a source node MAC address field of a request message, fill ttl with a maximum number of hops allowed by the reply message, and fill a message sequence number field with a sequence number in the reply message.
7. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 3 when the computer program is executed.
8. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 3.
CN202110303855.1A 2021-03-22 2021-03-22 Fault detection method and device for IP transparent transmission ad hoc network and computer equipment Active CN115134271B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110303855.1A CN115134271B (en) 2021-03-22 2021-03-22 Fault detection method and device for IP transparent transmission ad hoc network and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110303855.1A CN115134271B (en) 2021-03-22 2021-03-22 Fault detection method and device for IP transparent transmission ad hoc network and computer equipment

Publications (2)

Publication Number Publication Date
CN115134271A CN115134271A (en) 2022-09-30
CN115134271B true CN115134271B (en) 2023-07-25

Family

ID=83374621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110303855.1A Active CN115134271B (en) 2021-03-22 2021-03-22 Fault detection method and device for IP transparent transmission ad hoc network and computer equipment

Country Status (1)

Country Link
CN (1) CN115134271B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004057801A1 (en) * 2002-12-23 2004-07-08 Telefonaktiebolaget Lm Ericsson (Publ) Bridging between a bluetooth scatternet and an ethernet lan
WO2012159461A1 (en) * 2011-05-24 2012-11-29 中兴通讯股份有限公司 Layer-2 path maximum transmission unit discovery method and node
CN103051542A (en) * 2012-12-11 2013-04-17 武汉烽火网络有限责任公司 Method for realizing connectivity detection based on data link layer Ethernet MAC (media access control) address
CN104158867A (en) * 2014-08-06 2014-11-19 电子科技大学 Information multi-hop forwarding method based on WAVE (wireless access in vehicular environments) protocol
CN104301912A (en) * 2014-09-28 2015-01-21 北京盈进科技有限公司 Method and device for detecting on-off of path
WO2016150105A1 (en) * 2015-03-20 2016-09-29 中兴通讯股份有限公司 Fault location method, device and system for ethernet link
CN106506366A (en) * 2016-11-07 2017-03-15 瑞斯康达科技发展股份有限公司 A kind of method for realizing multi protocol label exchange path inquiry and node
CN109412851A (en) * 2018-10-26 2019-03-01 迈普通信技术股份有限公司 Link layer path detection method, apparatus and system
CN111711571A (en) * 2020-08-20 2020-09-25 湖南智领通信科技有限公司 Ad hoc network on-demand routing method and device supporting IP transparent transmission and computer equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8634308B2 (en) * 2010-06-02 2014-01-21 Brocade Communications Systems, Inc. Path detection in trill networks

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004057801A1 (en) * 2002-12-23 2004-07-08 Telefonaktiebolaget Lm Ericsson (Publ) Bridging between a bluetooth scatternet and an ethernet lan
WO2012159461A1 (en) * 2011-05-24 2012-11-29 中兴通讯股份有限公司 Layer-2 path maximum transmission unit discovery method and node
CN103051542A (en) * 2012-12-11 2013-04-17 武汉烽火网络有限责任公司 Method for realizing connectivity detection based on data link layer Ethernet MAC (media access control) address
CN104158867A (en) * 2014-08-06 2014-11-19 电子科技大学 Information multi-hop forwarding method based on WAVE (wireless access in vehicular environments) protocol
CN104301912A (en) * 2014-09-28 2015-01-21 北京盈进科技有限公司 Method and device for detecting on-off of path
WO2016150105A1 (en) * 2015-03-20 2016-09-29 中兴通讯股份有限公司 Fault location method, device and system for ethernet link
CN106506366A (en) * 2016-11-07 2017-03-15 瑞斯康达科技发展股份有限公司 A kind of method for realizing multi protocol label exchange path inquiry and node
CN109412851A (en) * 2018-10-26 2019-03-01 迈普通信技术股份有限公司 Link layer path detection method, apparatus and system
CN111711571A (en) * 2020-08-20 2020-09-25 湖南智领通信科技有限公司 Ad hoc network on-demand routing method and device supporting IP transparent transmission and computer equipment

Also Published As

Publication number Publication date
CN115134271A (en) 2022-09-30

Similar Documents

Publication Publication Date Title
CN110798403B (en) Communication method, communication device and communication system
CN113595897B (en) Path detection method and device
EP4106274A1 (en) Forwarding path establishment method and apparatus, and computer-readable storage medium
CN112367257B (en) Route notification method and device
WO2021232906A1 (en) Method for determining packet forwarding and backup path and related device
WO2020173424A1 (en) Message processing method, and gateway device
US11870683B2 (en) 3GPP network function set adaptation for pre-5G network elements
CN108270881B (en) Domain name resolution method and device
US20210194999A1 (en) Packet sending method, network device, and computer storage medium
CN115134271B (en) Fault detection method and device for IP transparent transmission ad hoc network and computer equipment
CN114513453A (en) Fault processing method and device
CN108810935B (en) Flow forwarding method and device
CN114268578B (en) Data transmission method, device, equipment and storage medium for switching line
CN101656654B (en) Routing method and device
CN113872843B (en) Route generation method, route processing method and device
WO2021249173A1 (en) Distributed storage system, abnormality processing method therefor, and related device
CN114978600A (en) Abnormal flow processing method, system, equipment and storage medium
CN112260971B (en) Fault tolerance method and device for network equipment system, computer equipment and storage medium
CN111405639B (en) Wireless network connection method and device, readable storage medium and computer equipment
CN102413038B (en) Processing method and system for inaccessibility of next hop of route
EP3806386B1 (en) Multicast fast switching method, device, apparatus, and storage medium
CN112953789B (en) Link detection method and device
CN110912997B (en) Method and device for checking Loopback interface of triangular networking
CN114124753B (en) Message sending method and device
CN113472647B (en) Message forwarding method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant