CN1645834A - Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network - Google Patents

Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network Download PDF

Info

Publication number
CN1645834A
CN1645834A CN 200510018238 CN200510018238A CN1645834A CN 1645834 A CN1645834 A CN 1645834A CN 200510018238 CN200510018238 CN 200510018238 CN 200510018238 A CN200510018238 A CN 200510018238A CN 1645834 A CN1645834 A CN 1645834A
Authority
CN
China
Prior art keywords
bridge
port
topology
loop
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510018238
Other languages
Chinese (zh)
Inventor
周旭扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200510018238 priority Critical patent/CN1645834A/en
Publication of CN1645834A publication Critical patent/CN1645834A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The topology discovering message transmitted periodically by Loop control net bridge returns to control net bridge the whole loop, and records the state of net bridge and link. The control bridge notifies the topology message to other net bridge through topology instruction, and appoints protective net bridge and protective port to prevent net bridge from blocking protective port, and avoids data to cycle in loop. The net bridge selects shortest path, and implements spatial reuse according to the topology message. Meanwhile the net bridge use heart rate message to examine connectivity of link. When the failure of link is found, it notifies protective net bridge to accomplish fast protection switching.

Description

The method and apparatus that MAC bridge coil loop discovery, space reuse and protection are switched
Technical field
The present invention relates to data communication network.The present invention be more particularly directed to the MAC bridge coil, Ethernet for example, loop topology is found, the connectivity inspection and the APS of space reuse network.
Background technology
Be accompanied by the continuous appearance of the universal and new business of Internet, the growth of the data traffic exponentially level in local area network (LAN) and metropolitan area network.A kind of technology that metropolitan area network mainly adopts is Synchronous Digital Hierarchy (SDH/SONET), and SDH/SONET provides self-healing ability, and the mode of switching by protection provides 50ms protection with interior 1+1 and 1:N.SDH/SONET adopts time division multiplexing mode, mainly adapts to voice transfer, and being used for transfer of data then has the higher and lower shortcoming of efficient of cost.
Be positioned at the MAC bridge coil, particularly Ethernet of link layer, because its simple, low-cost and widely used characteristics progressively are widely applied in the construction of metropolitan area network and garden net.At present the major technique of the loop prevention that mainly adopts of MAC bridge coil and trail protection is by the Spanning-Tree Protocol of IEEE definition bunch, comprises 802.1D Spanning-Tree Protocol, 802.1W RSTP and 802.1S Multiple Spanning Tree Protocol.The subject matter that agreement in the Spanning-Tree Protocol bunch faces is to use Spanning-Tree Protocol only to comprise an active topology in loop, and the transmission path of data is not a shortest path, and the utilization ratio of loop is not high.In addition, these agreements can only provide second protection of level, and promptly when a link occurs fault, agreement needs the time more than 1 second to find fault and select another active link in many cases.This situation can not satisfy some application requirements for sensitivity fault time.
The 802.17RPR (Resilient Packet Ring) of IEEE definition has realized Topology Discovery and the following quick protective switch of 50ms, but RPR need introduce a brand-new MAC layer, realizes comparatively complicated; RPR only supports two fine loops, other complex topology structure that may exist in the inapplicable network.
Summary of the invention
The present invention is directed to the MAC bridge coil; Ethernet particularly; the loop utilization ratio is not high, lacks the shortcoming of 50ms with interior quick protective switch function, and a kind of method of loop topology discovery, space reuse and the APS in the MAC bridge coil is provided.
For the purpose of literal simple and clear, make as giving a definition:
" link ": the point-to-point passage that transmits mac frame.This passage can be an Ethernet physical link or many physical links that use the link aggregation technology, also can be one " tunnel ".Can use technology such as WDM, MSTP, ATM, MPLS and various Routing Protocols in " tunnel ".
" loop ": comprise two MAC bridges at least by one or more and join end to end and constitute.Each MAC bridge comprises two ports at least, and connects adjacent MAC bridge by these two ports by link;
" VLAN loop ": the MAC bridge coil of supporting IEEE 802.1Q, because port can belong to different VLAN, so the practical topology in different VLAN is a subclass of physical topology, if the topology in a VLAN constitutes a loop, then the loop among this VLAN can be described as the VLAN loop;
" main ring ": comprise from the loop of ring.Main ring be relatively under from the ring appellation, this main ring also can be other loop from the ring;
" from ring ": comprise two or more identical MAC bridges and one or more of identical link and connectivity port two loops, one of them loop is as main ring, and the MAC bridge that does not comprise in this main ring in another loop, link and port constitute from ring.Main ring is the appellation of affiliated relatively main ring, should also can be the main ring of other loop from ring;
" access bridge ": main ring and from two MAC bridges of ring common link end points promptly comprises two main ring ports and the MAC bridge from the central port.Insert bridge and finish the function of going into main ring from articulating;
" logical links ": the transfer path of two Access Network bridge locations in main ring.Logical links is finished from the transmitting-receiving of information between two access bridges of ring, makes from ring logically to constitute a complete loop;
" closure ": the expression loop is in normal operating conditions, and there is not fault in link;
Open to the outside world: have one or more inefficacy or interruption in the link of expression loop;
" control frame ": realize various control messages of the present invention, comprise Topology Discovery message, topology indication, topology indication confirmation, topological invalid indication, heartbeat message, topology change report, topology change confirmation etc.;
" forwarding state ": port forwarding and receiving data frames and control frame, the mac learning function of port enables;
" blocked state ": control frame is only transmitted and received to port, abandons the Frame that receives and need to transmit, and the mac learning function of port is forbidden;
" control forwarding state ": port is transmitted and is received control frame, only transmits and receive the unicast data frames that destination address is the MAC Address of bridge in the affiliated loop, abandons other Frame, and the mac learning function of port is forbidden;
Technical scheme of the present invention is as follows:
According to an aspect of the present invention, a MAC bridge in each loop selection loop of MAC bridge coil is as the control bridge, periodically send Topology Discovery message by the one or more ports in the loop, this message comprises source bridge identifier and topology information, topology information by the MAC Address of source bridge and transmit port mutually the cost of connected link constitute.MAC bridge in the loop is after receiving Topology Discovery message, select another or a plurality of port as transmitting port, and the topology information that the cost of the link that will be linked to each other with transmit port by the MAC Address of oneself constitutes is increased in the Topology Discovery message, transmits this message by transmit port.Topology Discovery message transmits and finally returns the control bridge along loop; the topology information that comprises in the control bridge recording messages; generate the topology indication according to this information; and belong to a port of this loop respectively as protection bridge and protection port in bridge in the loop and the bridge under selecting; use protection bridge identifier and protection port numbers to constitute protection information, additional this information in the topology indication.The control bridge selects the port of bridge in this loop as transmit port, and adjacent MAC bridge sends this indication in loop.The MAC bridge is after receiving the topology indication, write down the topology information that comprises in this indication, send the topology indication to the MAC bridge that sends this indication and confirm, and, transmit this topology indication to own another adjacent MAC bridge in loop according to the topology information that comprises in the indication.Simultaneously relatively more own sign of bridge and the protection bridge identifier in the topology indication, if identical, this bridge is for protecting bridge, and the protection port of appointment is set to blocked state.
According to an aspect of the present invention, in order to reduce the transmission of unnecessary Topology Discovery message, reduce taking of bridge resources and bandwidth resources, avoid occurring the confusion that causes by different bridge state differences, loop can only comprise a control bridge when closure state, the zone of each connection also can only comprise a control bridge when open state.MAC bridge in the loop after receiving Topology Discovery message, with oneself bridge identifier and this message in the source bridge identifier that comprises compare.If the bridge identifier value of oneself is bigger, it oneself is not the control bridge of this loop that this MAC bridge is understood, and will stop to come from the transmission of the Topology Discovery message of self, and another port of selecting this loop simultaneously is as transmitting port; If the bridge identifier value of oneself is less, this MAC bridge will abandon this message, resend the Topology Discovery message that comes from self simultaneously.
According to an aspect of the present invention, if the agreement in the MAC bridge coil in the Spanning-Tree Protocol of operation IEEE definition bunch, can further be optimized for: comprise the control bridge of the MAC bridge of the root that is in forwarding state (root) port of protocol definition and optional (alternate) port that is in non-forwarding state, periodically send Topology Discovery message by above-mentioned two ports as these two loops that port was connected.Topology information uses the link cost of the protocol definition in the Spanning-Tree Protocol bunch of this bridge operation as the cost that sends link in the message.After MAC bridge in the loop receives Topology Discovery message, write down the receiving port of this message, the root port of selecting this bridge is as transmitting port.Certain bridge in the loop will receive the Topology Discovery message that is derived from same control bridge at two ports, and the Topology Discovery message that receives is transmitted by another port.After this message arrived another bridge, the receiving port of another homology Topology Discovery message that the bridge selection is write down was transmitted this message as transmitting port.In the topology information that the bridge that receives Topology Discovery message increases in message, the link cost that uses the protocol definition in the Spanning-Tree Protocol bunch of this bridge operation is as the cost that sends link.Topology Discovery message will be returned control bridge record topology information, control bridge thereafter and use the transmit port of root port as the topology indication, continue the Topology Discovery process.
According to another aspect of the present invention, if the agreement in the MAC bridge coil in the Spanning-Tree Protocol of operation IEEE definition bunch, can further be optimized for: comprise the control bridge of the MAC bridge of the root port that is in forwarding state of protocol definition and the optional port that is in non-forwarding state as these two loops that port was connected, periodically send Topology Discovery message by the root port that is in forwarding state, topology information uses the link cost of the protocol definition in the Spanning-Tree Protocol bunch of this bridge operation as the cost that sends link in the message.After MAC bridge in the loop receives Topology Discovery message,, then abandon this message if receiving port is in non-forwarding state; Otherwise select all ports that are in forwarding state as transmitting port, transmit this message.The topology information that increases in message uses the link cost of the protocol definition in the Spanning-Tree Protocol bunch of this bridge operation as the cost that sends link.Topology Discovery message will be returned the control bridge and finish topological record, control bridge thereafter and use the transmit port of root port as the topology indication, continue the Topology Discovery process.
According to an aspect of the present invention, if the MAC bridge coil comprise main ring and from the ring, can further be optimized for: insert bridge after the Topology Discovery message that receives from ring, this message is provided with one from the ring sign, according to the MAC filtered data base, select port in the main ring as transmitting port.The cost of the transmission link that comprises in the topology information that increases in message uses this bridge and another to insert the cost sum that is arranged in all links of main ring between the bridge, perhaps uses a pre-configured numerical value.The MAC bridge comprises after the Topology Discovery message of ring sign receiving in the main ring, select another port that this bridge belongs to main ring as transmitting port, but this bridge does not increase topology information in this message.Insert bridge after the port that belongs to main ring receives the Topology Discovery message that is derived from MAC bridge from ring, identify this message by the source bridge identifier in the message, cancel in this message from ring sign, and select this bridge belong to this from the port of ring as transmitting port.
According to an aspect of the present invention, if the MAC bridge coil comprises main ring and the agreement from the Spanning-Tree Protocol of ring and operation IEEE definition bunch, can further be optimized for: two access bridges relatively between them in two loops through the link cost summation between two paths of control bridge.The path that summation is big will become the path from ring, insert bridge and belong to port from ring to sending topological invalid message from ring control bridge to it.This control bridge resends Topology Discovery message after receiving topological invalid message, begin after this to insert bridge after receiving the Topology Discovery message that is derived from this control bridge from the Topology Discovery of ring, handles according to the described mode of epimere.
According to an aspect of the present invention, adjacent bridge uses heartbeat message detection link failure in loop.Bridge periodically sends heartbeat message to adjacent bridge.Do not receive heartbeat message when the port of bridge in loop in a fixing cycle, the quantity of perhaps receiving message is during less than a threshold value, and bridge is thought the link occurs fault that this port connected.For fear of causing the both link ends bridge inconsistent to the judgement of Link State because of the single direction of link breaks down, after this bridge is provided with failure identification in the heartbeat message that this port sends, and notifies adjacent bridge this link occurs fault.Adjacent bridge is recognized this link occurs fault after receiving this message.The port that receives the heartbeat message that comprises failure identification necessarily can not comprise failure identification in the heartbeat message that it sends, two ports avoiding connecting a link send the heartbeat message that comprises failure identification simultaneously and cause fault recovery not discern.
According to an aspect of the present invention, after bridge detected fault in the loop, the port that connects faulty link was set to blocked state, reported this fault by the protection bridge of topology change report in this loop.The catch net bridge joint refreshes the MAC filtered data base after receiving the topology change report of report link failure, protects port to be set to forwarding state, and the bridge transmission topology change to this fault of report simultaneously confirms.After bridge in the loop receives this confirmation, refresh the MAC filtered data base, carry out following logic simultaneously, the bridge of notice from ring and main ring refreshes the MAC filtered data base: if this bridge is not to insert bridge, then transmit this confirmation by another port in the loop; If this bridge is to insert bridge and message source main ring under bridge, then transmit this confirmation by another port in the main ring; If this bridge is to insert bridge, message source receives from ring and by the port from ring under bridge, then transmits this confirmation by two ports in the main ring under the bridge; If this bridge is to insert bridge, message source receives from ring and by the port the main ring under bridge, then transmits this confirmation by another port in the affiliated main ring and the port from ring.
According to an aspect of the present invention, adjacent bridge uses heartbeat message detection link failure recovery in loop.Receive the heartbeat message that does not contain failure identification when bridge at the port that faulty link connects, the quantity of perhaps receiving this type of message in a fixing cycle is during greater than a threshold value, thinks this link failure recovery.For fear of causing the both link ends bridge inconsistent to the judgement of Link State because of the single direction of link breaks down, after this bridge is removed failure identification in the heartbeat message that receiving port sends, and notifies adjacent bridge link failure recovery.Adjacent bridge is recognized this link failure recovery after receiving this message.
According to an aspect of the present invention, after bridge detects fault recovery in the loop, start and recover waiting timer, and behind timer expired, report this fault recovery by the protection bridge of topology change report in this loop.The recovery waiting timer is used to avoid because the continuous generation that the Loop Protection that the Link State instability causes is switched.The catch net bridge joint refreshes the MAC filtered data base after receiving the topology change report of report link failure recovery, protects port to be set to blocked state, and the bridge transmission topology change to this fault recovery of report simultaneously confirms.After bridge in the loop receives this confirmation, when refreshing the MAC filtered data base, carry out following logic, the bridge of notice from ring and main ring refreshes the MAC filtered data base: if this bridge is not to insert bridge, then transmit this confirmation by another port in the loop; If this bridge is to insert bridge and message source main ring under bridge, then transmit this confirmation by another port in the main ring; If this bridge is to insert bridge, message source receives from ring and by the port from ring under bridge, then transmits this confirmation by two ports in the main ring under the bridge; If this bridge is to insert bridge, message source receives from ring and by the port the main ring under bridge, then transmits this confirmation by another port in the affiliated main ring and the port from ring.The bridge that detects fault recovery receives after topology change confirms, the port that connects the fault recovery link is set to forwarding state.
According to an aspect of the present invention, if the MAC bridge coil comprise main ring and from the ring, can further be optimized for: receiving after topology confirms from the access network of ring, insert bridge identifiers and two Access Network bridge locations in the link cost summation from ring, by the bridge announcement of topology indication in main ring with two.After bridge in the main ring received this indication, record confirmed from ring topology information and the indication of transmission topology.When the above fault in two places or two places takes place the main ring link, when causing the logical links fault from ring, select this type of to realize that from ring protection switches.Method is: logical links break down from the ring; selection from the cost on loop chain road and main ring link cost sum minimum from ring (the main ring link cost uses one bigger the link cost summation of these two main ring paths between two access bridges of ring); send Trouble Report to it, realize protecting and switch.To make other logical links from ring of this main ring be communicated with owing to the path between two access bridges is communicated with this moment.If still exist this moment comprise the fault logic link from ring, will repeat above-mentioned system of selection.If after this realize protecting also breaking down of switching, insert bridge and will at first notify main ring, and use above-mentioned system of selection to reselect another and switch from encircling to realize protecting from ring; If there is no another can realize protecting switch from the ring.Should use above-mentioned system of selection under it, to seek protection from ring from ring.
According to an aspect of the present invention, the MAC bridge is by the topology information of record, the link cost summation of relatively leading to two paths of other bridge in the loop through the both direction of affiliated loop, select the less path of summation to lead to the shortest path of target bridge as bridge, and, be recorded in the MAC filtered data base of bridge the port that the MAC Address and the shortest path of target bridge comprises.If both direction link cost summation is identical, select not comprise protect bridge the path as shortest path.The protection bridge protects port to be set to control forwarding state.
According to an aspect of the present invention, different bridges can use the Frame that different VLAN identity markings is transmitted in the same loop in loop, and become the transmission bridge of corresponding VLAN Frame respectively.Port in the big protection bridge that the path comprised of the control bridge is specified the protection bridge of a specific bridge as this VLAN according to the topology information that comprises---this protection bridge is by loop both direction difference minimum towards the link cost summation of the transmission bridge of this vlan data---and given link cost summation is as protecting port.
According to an aspect of the present invention, the present invention can realize in one or more network equipment.The network equipment comprises switch, router and other bag forwarding unit, the webserver and user terminal or main frame etc.
According to above-mentioned aspect of the present invention and others, can provide the device that comprises above-mentioned or other method.
Beneficial effect of the present invention: method of the present invention can be in any MAC bridge coil, find to find loop topology automatically under loop topology or the agreement situation in operation Spanning-Tree Protocol bunch by pre-configured mode, and be that shortest path is selected in the transmission of data in the loop according to the topology situation of record, improve the loop space utilization ratio.Method of the present invention can also provide 50ms to switch with interior protection in loop, and can adapt to and comprise a plurality of different loops, and there are the various complex topology structure of common link in loop.
Description of drawings
Fig. 1 is a schematic diagram of finding an embodiment of loop topology in loop;
Fig. 2 is a schematic diagram of finding an embodiment of loop topology in the network of different VLAN loop topologies;
Fig. 3 is at the schematic diagram of finding an embodiment of loop topology from ring;
Fig. 4 is a schematic diagram of finding an embodiment of loop topology in the MAC bridge coil of the agreement in operation Spanning-Tree Protocol bunch;
Fig. 5 is a schematic diagram of finding another embodiment of loop topology in the MAC bridge coil of the agreement in operation Spanning-Tree Protocol bunch;
Fig. 6 is the schematic diagram that carries out an embodiment of topology indication and confirmation in loop;
Fig. 7 is the schematic diagram that inserts an embodiment of a bridge in the loop shown in Figure 6;
Fig. 8 is the schematic diagram that shifts out an embodiment of a bridge in the loop shown in Figure 6;
Fig. 9 is the agreement in operation Spanning-Tree Protocol bunch, comprises a main ring and one and finds loop topology and carry out the topology indication and the schematic diagram of an embodiment confirming from the MAC bridge coil of ring;
Figure 10 is a schematic diagram of realizing the embodiment that control is transmitted in loop;
Figure 11 uses a plurality of topology example, the schematic diagram of the embodiment that reuse the implementation space in the loop shown in Figure 10;
Figure 12 is the schematic diagram of finding link failure in the loop and realizing the embodiment that protection is switched;
Figure 13 is the schematic diagram of finding link failure recovery and return to an embodiment of normal condition in loop shown in Figure 12;
Figure 14 comprises a loop and two bridge registration and revising from the schematic diagram of an embodiment who encircles topology from the hoop main ring from the MAC bridge coil of ring at one;
Figure 15 is that the main ring in MAC bridge coil shown in Figure 14 is found the many places link failure, utilizes the schematic diagram of realizing the embodiment that protection is switched from ring;
After Figure 16 is the link failure recovery of the main ring in MAC bridge coil shown in Figure 14, the schematic diagram of the embodiment that loop circuit state recovers;
Figure 17 is the block diagram of the implement device of one embodiment of the present of invention;
Figure 18 is the block diagram of the topological data library structure of one embodiment of the present of invention;
Figure 19 is the schematic diagram of an embodiment of the application of the present invention in network;
Figure 20 is the schematic diagram of another embodiment of the application of the present invention in network;
Embodiment
Lower part is described the specific embodiment of the present invention in detail.The professional and technical personnel it must be understood that can use some or all of aspect of the present invention in practice, also can cast aside these details and implement.For fear of unnecessarily making content of the present invention remarkable inadequately, the part that the present invention knows the professional and technical personnel is explained or is not described in detail.Accordingly, illustrate and accompanying drawing be to be used for the example meaning rather than to be used for limited significance.
In addition, be more readily understood in order to make the present invention, various operations will use a plurality of separation steps to be described in order.But the order of description does not also mean that the necessary and order of these operations, and particularly Biao Shu order is associated.
Fig. 1 is an embodiment who finds loop topology in MAC bridge coil 100.Be in blocked state when the port of each bridge in loop is initial in the loop 100.
Topology Discovery message is used for the discovery of loop topology, can comprise source bridge identifier, topology version number, type identification and the topology information of message.The source bridge identifier is made of the MAC Address of source bridge, also can use priority+MAC Address to constitute.Topology version number is since 0, and by bridge increase automatically in described topology indication of follow-up embodiment and validation process.The type identification of Topology Discovery message is used to show the type of this message, specifically acts among the follow-up embodiment to be described.Topology information is made up of some clauses and subclauses, is used for the MAC Address of bridge that recording messages passes through and the cost of link.
Topology Discovery message can optionally comprise topology example collection, mapping table verification and mapping table request, is used for distinguishing the different topology that may exist at different VLAN.The topology example collection number is made up of one or more topology example, and each topology example is represented the defined VLAN of one or more IEEE 802.1Q topology in one network.Corresponding relation between topology example number and the VLAN is the relation of one-to-many.Each bridge in the loop comprises one mapping table, writes down this corresponding relation.All bridges all use topology example number 0, and corresponding to other VLAN except that the explicit VLAN that comprises in the mapping table, this mapping is not included in the mapping table.The mapping table content of each bridge must be identical in each loop.The mapping table verification is that mapping table uses for example CRC32 or the digest algorithm result that calculates of HMAC-MD5 for example of checking algorithm, is used for verifying whether the mapping table of bridge in the loop is consistent.Whether the mapping table request is used for the bridge of mark loop need specify the mapping table content by the control bridge, for example do not need to represent with 0, and 1 expression needs.
Bridge such as B1 (110) select in its two port one 11 and 112 in loop, the less port one 11 of port numbers for example, use the topology version number, the type identification that write down in this bridge sign, the topological database for example 00 to generate Topology Discovery message 120, and in first clauses and subclauses of this message topology information the minute book bridge MAC Address and send the cost of link B1 (110)-B4 (113) after, periodically send this message.If desired, Topology Discovery message 120 can also comprise topology example collection, mapping verification and the mapping table request that number is made of these topologically corresponding all topology example.Mapping table request initial value is made as 0.
Other bridge in the loop is B4 (113) for example, after port one 14 is received Topology Discovery message 120, uses the Topology Discovery message processing logic, and this message is handled.The Topology Discovery message processing logic is defined as follows:
If comprise the mapping verification in this Topology Discovery message, bridge B4 (113) will finish the mapping table verification.Bridge calculate own mapping table check value and and information in the mapping verification that comprises compare, if numerical value difference, the mapping table that two bridges are described is inconsistent, bridge can select to abandon this message and end processing procedure, perhaps this message mapping request is put 1 and enter subsequent processes.After message is passed through the mapping table verification, bridge B4 (113) writes down MAC Address of oneself and the cost of conversion link B4 (113)-B3 (116) in the topology information territory of this message, form Topology Discovery message 121, in loop, send by its another port one 15.Other bridge in the network will use the Topology Discovery message processing logic to handle Topology Discovery message according to identical mode.
In order to reduce the transmission of Topology Discovery message unnecessary in the network, in loop 100, can only there be a control bridge, periodically send Topology Discovery message and send the topology indication.Bridge is in the Topology Discovery message transmitting process, in loop, elect the control bridge by an election logic---receive the Topology Discovery message that is derived from bridge B1 (110) as bridge B4 (113) after, the source bridge identifier that comprises in this bridge bridge identifier and this message with oneself compares.If the bridge identifier value of oneself is bigger, it oneself is not the control bridge of this loop that this MAC bridge is understood, and will stop to come from the transmission of the Topology Discovery message of self, and another port of selecting this loop simultaneously is as transmitting port; If the bridge identifier value of oneself is less, this MAC bridge will abandon this message, resend the Topology Discovery message that comes from self simultaneously.
Topology Discovery message process bridge B4 (113), B3 (116) and B2 (119) that bridge B1 (110) sends, and will receive at port one 12 by own after sending Topology Discovery message 121,122 and 123 respectively.Topology Discovery message 123 comprises the topology information of whole network.Bridge B1 (110) is recorded in the topological database of bridge indication of beginning topology and validation process with the topology of loop after port one 12 receives Topology Discovery message 123.Topology indication and validation process are described in follow-up embodiment.Because each bridge has used the election logic when forwarding topology is found message, the Topology Discovery message of having only a bridge such as bridge B1 (110) to send in the therefore final loop can be returned this bridge, this bridge will continue periodically to send Topology Discovery message as the control bridge of network 100.Other bridges will stop the transmission of Topology Discovery message in the loop.
Fig. 2 is an embodiment who finds loop topology in MAC bridge coil 200.Fig. 2 has increased link B2 (219)-B4 (213) on the basis of Fig. 1.Link B2 (219)-B4 (213) belongs to different VLAN respectively with the port that is comprised among B2 (219)-B3 (216)-B4 (213), and by configuration make two different in bridge example set respectively with network in two different VLAN loops be that B1 (210)-B4 (213)-B2 (219)-B1 (210) is corresponding with B1 (210)-B4 (213)-B3 (216)-B2 (219)-B1 (210).The common factor of these two example set should be empty set, and promptly all examples in two example set are all inequality.
Bridge B1 (210) will send two Topology Discovery message 220 and 230 of using different topology example collection, and receive at port 212 by own after forming message 221,222,223 and message 231,232 through two loops respectively, note two topologys that the VLAN loop is different respectively, and begin the topology indication and the validation process of two VLAN loops respectively.
Fig. 3 is an embodiment who finds loop topology in MAC bridge coil 300.Network 300 be one from the ring, loop is connected to main ring by two access bridge B1 (310) and B4 (317).The port that each bridge links to each other with loop in the loop is in blocked state when initial.
Inserting the link that is arranged in main ring between bridge B1 (310) and the B4 (317) can be considered as circularizing structure from a logical links 331 of ring thereby make from annular.Topology Discovery message is after entering main ring, and type identification is set to 10, and the expression message source is since ring; After leaving main ring, type identification will be re-set as 00.Inserting bridge only sends by the port from ring in the Topology Discovery message that comes from self from ring.Bridge from ring also will use the election logic, select the control bridge.Present embodiment hypothesis bridge B1 (310) is the control bridge from ring, sends Topology Discovery message 320 by the port from ring 311.Message arrives bridge B4 (317) through bridge B2 (313) and B3 (316) and after forming Topology Discovery message 321 and 322 respectively.Bridge B4 (317) generates to the link cost summation of bridge B1 (310) or pre-configured path cost in the main ring link that writes down from the topological database of cost by bridge B4 (317) of ring logical links 331.Bridge B4 (317) uses the Topology Discovery message processing logic, oneself the MAC Address and the cost of logical links 331 are attached in the topology information that Topology Discovery message 322 comprised, and the type of message sign is set to 10, form new Topology Discovery message 323, send this message by the main ring active topology.Other bridge in the main ring such as B5 (330), receive Topology Discovery message 323 after, find that this message then directly transmits this message by another port in the main ring since ring.Topology Discovery message 323 arrives bridge B1 (310) by main ring, and this bridge identifies this message by the source bridge identifier in the message, finishes the transmission of Topology Discovery message in logical links.Bridge B1 (310) becomes the control bridge of this loop, the topology of loop is recorded in the topological database of bridge indication of beginning topology and validation process.
Fig. 4 is an embodiment who finds loop topology in the loop 400 of the agreement in operation Spanning-Tree Protocol bunch.Loop 400 can be corresponding to the topology of a Spanning-Tree Protocol or RSTP, also can be corresponding to the topology of the tree of the common generation in the Multiple Spanning Tree Protocol, common Internal Spanning Tree or Multiple Spanning Tree Instance, and use corresponding Spanning-Tree Protocol computational activity topology.Use empty circles to represent to be in the root port of forwarding state among the figure, solid circles represents to be in the designated port of forwarding state, and two short vertical lines represent to be in the optional port of non-forwarding state, hollow box indicating Topology Discovery message.
Topology Discovery message 430 is by root port that is in forwarding state 411 that comprises the protocol definition in the Spanning-Tree Protocol bunch in the loop and the bridge B3 (410) that is in the optional port 412 of non-forwarding state, sends by its root port 411.The form of Topology Discovery message is with embodiment illustrated in fig. 1 identical, and type identification is set to 00, and the expression message source is from root port; The cost that sends link is used the link cost that defines in the corresponding Spanning-Tree Protocol.If operation IEEE 802.1s Multiple Spanning Tree Protocol in the loop, Topology Discovery message 430 also comprises topology example collection, mapping table verification and mapping table request, and wherein the topology example collection is made up of all MSTID (multiple spanning tree sign) among the MST Configuration Table (multiple spanning tree allocation list) of Multiple Spanning Tree Protocol; The mapping table verification can be used the MST Configuration Identification (multiple spanning tree configuration identifier) that generate in the agreement more; Hint obliquely at the table request and put 0.
Other bridge in the loop is B2 (413) for example, after the designated port 415 of the protocol definition in its Spanning-Tree Protocol bunch is received Topology Discovery message 430, in topological database, note neighbours B3 (410) on the own root port direction that in loop, is positioned at Topology Discovery message source bridge and the port 415 that is attached thereto.Simultaneously, the Topology Discovery message processing logic described in bridge B2 (413) calling graph 1 embodiment is handled Topology Discovery message 430, after the formation Topology Discovery message 431, sends this message by its root port 414 in loop.If use Multiple Spanning Tree Protocol in loop, in different topology example, each port of bridge may be different.This moment, bridge should be made amendment to the topology example collection in the Topology Discovery message according to the topology example under its root port, deleted topology example that this port do not comprise number.Other bridge in the loop will repeat this process, and for example B1 (416) will send Topology Discovery message 432 after receiving Topology Discovery message 431.
Topology Discovery message 440 is sent by its optional port 412 by bridge B3 (410).The form of this message is identical with Topology Discovery message 430, and just type identification is set to 01, and the expression message source is from optional port.Other bridge in the loop is B4 (419) for example, after its designated port 421 is received Topology Discovery message 440, in topological database, note neighbours B3 (410) on the optional port direction that oneself in loop, is positioned at this message source bridge and the port 421 that is attached thereto, and using the Topology Discovery message processing logic to handle this message, after forming Topology Discovery message 441, in loop, send this message by its root port 420.
Bridge B1 (416) will receive the Topology Discovery message 431 and 441 that is derived from same bridge 410 at its two different designated ports 417 and 418.After this bridge B1 (416) will no longer find message 432 to its root port forwarding topology, but after handling the topology information processing, forward from own another port loop, for example the Topology Discovery message 431 of port 417 receptions will form Topology Discovery message 433 from port 418 transmissions; The Topology Discovery message 441 that port 418 receives will form Topology Discovery message 442 and send from port 417.
Topology Discovery message 433 is transmitted by port 421 to the neighbours B3 (410) that oneself is positioned on the optional port direction by this bridge through after bridge B4 (419) processing and forming Topology Discovery message 434, and is received at its optional port 412 by bridge B3 (410); Topology Discovery message 442 will be transmitted by port 415 to the neighbours B3 (410) that oneself is positioned on the root port direction by this bridge, and be received at its root port 411 by bridge B3 (410) through after bridge B2 (413) processing and forming Topology Discovery message 443.Bridge B3 (410) is as the control bridge of loop, is recorded in the topological database of bridge indication of beginning topology and validation process in the topology of loop.
Fig. 5 is an embodiment who finds loop topology in MAC bridge coil 500.Network 500 can be corresponding to the topology of a Spanning-Tree Protocol or RSTP, also can be corresponding to the topology of the tree of the common generation in the Multiple Spanning Tree Protocol, common Internal Spanning Tree or Multiple Spanning Tree Instance, and use agreement computational activity topology in the corresponding Spanning-Tree Protocol bunch.Use empty circles to represent to be in the root port of forwarding state among the figure, solid circles represents to be in the designated port of forwarding state, and two short vertical lines represent to be in the optional port of non-forwarding state, hollow box indicating Topology Discovery message.
Topology Discovery message 520 by root port that is in forwarding state 511 that comprises the protocol definition in the Spanning-Tree Protocol bunch in the loop and the bridge B3 (510) that is in the optional port 512 of non-forwarding state, sends by its root port 511.The form of Topology Discovery message 520 is with embodiment illustrated in fig. 1 identical.Other bridge in the loop is B2 (513) for example, after its designated port 515 is received Topology Discovery message 520, use the Topology Discovery message processing logic, after the formation Topology Discovery message 521,530 and 532, send in loop by its port 514,540 and 541 that is in forwarding state respectively.Other bridge such as B1 (516), B4 (519) will repeat this process and send Topology Discovery message 522 and 523 respectively.Topology Discovery message 523 is received at its optional port 512 by bridge B3 (510).Bridge B3 (510) is as the control bridge of loop, and the topology of loop is recorded in the topological database of bridge indication of beginning topology and validation process.
Bridge B5 (542) will repeat said process and send Topology Discovery message 531 after its port is received Topology Discovery message 530, this may cause the wide-scale distribution of Topology Discovery message before Topology Discovery is finished.Bridge receives Topology Discovery message at its port that is in non-forwarding state, for example B6 (543) is after its optional port receives Topology Discovery message 532, it is abandoned, make in the loop of finding by Topology Discovery message to comprise two optional ports that are in non-forwarding state.
Fig. 6 has described in the loop 600 embodiment of topology indication and validation process.Loop 600 can be corresponding to a main ring, also can be corresponding one from ring, optionally move the agreement in the Spanning-Tree Protocol bunch in the loop.Link in the loop such as B1 (616)-B4 (619) can a corresponding main ring or the physical link from ring, also can be corresponding to the logical links between two access bridges from ring.Use empty circles to represent to protect bridge to transmit port among the figure, two short vertical lines represent to protect bridge protection port, the indication of the hollow box indicating topology of dotted line, and the indication of the hollow box indicating topology of solid line confirms that the solid line filled box is represented topological invalid indication.
The topology indication can comprise source bridge identifier, topology version number and the topology information of message, and can optionally comprise topology example collection and mapping table according to the Topology Discovery message that receives.The content of source bridge identifier, topology version number, topology information and topology example collection is identical with the corresponding part of embodiment among Fig. 1 with form, is generated according to the content in the topological database by the control bridge.Mapping table has reflected the corresponding relation of control bridge VLAN sign and topology example number, has comprised all the elements of mapping table in the control bridge, comprises the mapping table request and put at 1 o'clock by topology indication transmission in the Topology Discovery message of receiving.The topology indication also comprises the protection bridge and the protection port of the loop of appointment.Under the situation of the agreement in operation Spanning-Tree Protocol bunch, the protection bridge must be the control bridge, and the protection port must be the protection bridge is in blocked state in loop an optional port; Under the situation of not moving Spanning-Tree Protocol, protection bridge and protection port can be specified according to specific logic by the control bridge.From ring, the protection port must be the port that connects from the ring physical link, and can not be the port that connects logical links.
Control bridge B3 (610) adds 1 with topology version number that should topology in the topological database after entering the Topology Discovery state, select protection bridge and protection port in the loop simultaneously---be B3 (610) and port 612 in the present embodiment.The control bridge is according to the situation of whether moving the agreement in the Spanning-Tree Protocol bunch, the port of forwarding state of selecting the less port of its two port middle-end slogans in loop or being in the protocol definition in the Spanning-Tree Protocol bunch sends topology indication 630 as transmit port in loop.Other bridge such as B2 (613) in the control bridge loop after it is transmitted port 615 and receives topology indication 630, with message copy message processing unit in the bridge, send topology indication 630 another port 614 in its loop simultaneously immediately.Bridge starts corresponding topological the indication and retransmits timer after transmission or forwarding topology indication.Behind this timer expired, do not confirm, then retransmit this topology indication if bridge also receives corresponding topology.If bridge through for several times, is for example retransmitted for 3 times and all do not received topology after the topology indication 630 and confirm that bridge is removed its topological database, and send topological invalid indications 650 and 651 by two ports 614 and 615 of bridge in loop 600.
Message processing unit among the bridge B2 (613) will be verified message after receiving topology indication 630.If in report, find mistake, for example do not comprise this bridge or abnormal loop occurs, the then invalid indication 650 of broadcast topology and 651 in loop 600 in the report.Topology is indicated by after verifying, its topological database of information updating during bridge is indicated according to topology, and the protection bridge identifier during relatively the sign of oneself is indicated with topology simultaneously, if identical, this bridge is the protection bridge.Bridge B2 (613) sends the topology indication and confirms 640 by the receiving port 615 of this topology indication.The topology indication confirms to comprise all information of topology indication.Bridge B3 (610) stops corresponding topology indication repeating transmission timer after port 611 receives topology confirmation report 640, finish the discovery on Home Network bridged ring road.Bridge in the loop will repeat said process, and bridge B1 (616), B4 (619) and B3 (610) will receive topology indication 631,632 and 633 respectively, and the indication of transmission topology respectively confirms 641,642 and 643.Each bridge in the loop is after receiving that respectively topology confirms, the protection bridge is transmitted port and is set to forwarding state, and the protection port is set to blocked state; Two of other bridges are transmitted port and are set to forwarding state.
If the agreement in the MAC bridge coil 600 operation Spanning-Tree Protocols bunch, the role of the Spanning-Tree Protocol of arbitrary port in the loop then, (for example the Root Bridge of network 600 changes because some specific reasons the link failure in loop change, perhaps link cost except that loop or topological structure change in the network), when causing the network activity topology to change, bridge is removed its topological database, sends topological invalid indication by its two ports in loop.
After the port of bridge in the loop 600 in loop receives topological invalid indication, remove its topological database, and the invalid indication of another port forwarding topology in loop.Control bridge B3 (610) removes its topological database, but no longer transmits this message after receiving topological invalid indication.Bridge restarts the Topology Discovery process after receiving topological invalid indication.At this moment, bridge all will be responded an invalid indication of topology at receiving port when any control frame that receives except that topological invalid indication and Topology Discovery message.
Fig. 7 has described an embodiment who inserts a bridge in loop 600.Use empty circles to represent to protect bridge to transmit port among the figure, two short vertical lines represent to protect bridge protection port, hollow box indicating Topology Discovery message.
After loop 600 is finished Topology Discovery and topology indication and validation process, inserted a new bridge B5 (660).B5 (660) arrives control bridge B3 (610) will send Topology Discovery message 661 process bridge B4 (619) formation Topology Discovery message 662 in loop after.Bridge B3 (610) will call the election logic and judge.If bridge B3 (610) bridge identifier value is less, B3 (610) will resend Topology Discovery message, finish the discovery of the new topology of loop.B5 (660) also will be according to the Topology Discovery message of receiving that is derived from bridge B3 (610), stops to come from the transmission of the Topology Discovery message of self; If bridge B3 (610) bridge identifier value is bigger, this bridge will send topological invalid indication to network, and the former loop topology of other bridges is invalid in the informing network.Simultaneously, bridge B3 (610) finds message 662 with forwarding topology, the Topology Discovery process of beginning loop.
If the agreement in the loop in the operation Spanning-Tree Protocol bunch, the insertion of loop 600 www.chinanews.com's bridges will cause corresponding Spanning-Tree Protocol state to change, thereby cause the transmission of topological invalid indication, and begin new Topology Discovery process.
Fig. 8 has described an embodiment who shifts out a bridge in loop 600.Use empty circles to represent to protect bridge to transmit port among the figure, two short vertical lines represent to protect bridge protection port.
After loop 600 is finished Topology Discovery and topology indication and validation process, shift out bridge B4 (619) in the loop 600.The generation that the protection that this process will cause describing among the following embodiment is switched., will cause controlling bridge B3 (610) and resend Topology Discovery message again after " closure " at loop, restart the Topology Discovery process.
Fig. 9 finds from an embodiment of ring in MAC bridge coil 700.Use empty circles to represent to be in the root port of forwarding state among the figure, solid circles represents to be in the designated port of forwarding state, and two short vertical lines represent to be in the optional port of non-forwarding state, and filled box is represented topological invalid indication.
Network 700 can be corresponding to the topology of a Spanning-Tree Protocol or RSTP, also can be corresponding to the topology of the tree of the common generation in the Multiple Spanning Tree Protocol, common Internal Spanning Tree or Multiple Spanning Tree Instance, and use corresponding Spanning-Tree Protocol computational activity topology.
According to the method described in Fig. 4 or Fig. 5 embodiment, can find that in Fig. 9 two loops are B3 (713)-B2 (712)-B1 (711)-B4 (714)-B3 (713) and B6 (716)-B5 (715)-B2 (712)-B1 (711)-B4 (714)-B7 (717)-B6 (716).Wherein bridge B3 (713) and B6 (716) are respectively the control bridges of two loops.In the process of Topology Discovery or topology confirmation, bridge B2 (712) and bridge B4 (714) will find that they are two end points that belong to two bridge common link B2 (712)-B1 (711)-B4 (714).It is the cost of B2 (712)-B3 (713)-B4 (714) and B2 (712)-B5 (715)-B6 (716)-B7 (717) that bridge B2 (712) will compare two paths that it leads to B4 (714), and sends topological invalid indication 720 to the big link B2 (712) of path cost-B5 (715).Equally, bridge B4 (714) also will send topological invalid indication 721 to B4 (714)-B7 (717).Bridge B6 (716) will restart the Topology Discovery process after receiving topological invalid message.Bridge B2 (712) and B4 (714) will become from the logical links of ring.When Topology Discovery message arrived bridge B2 (712) or B4 (714), this bridge changed over the Topology Discovery type of message from ring, and the first place that is about to the type identification of former Topology Discovery message changes 1 (become 10 or 01 by 00 and become 11) into.This message will arrive another terminal B 4 (714) or B2 (712) by logical links, and finally get back to B6 (716), and this bridge is finished Topology Discovery and topology indication and validation process according to the Topology Discovery message that receives.
Figure 10 has described the embodiment that each bridge control is transmitted in the loop 800.Loop 800 can be corresponding to a main ring, also can be corresponding one from ring, can optionally move the agreement in the Spanning-Tree Protocol bunch in the loop.Link in the loop such as B1 (816)-B4 (819) can a corresponding main ring or the physical link from ring, also can be corresponding to the logical links between two access bridges from ring.
Bridge B3 (810) is the protection bridge of loop, and port 811 is to transmit port, and port 812 is protection ports.Bridge B3 comprises MAC filtered data base 830 in (810).Bridge B3 (810) calculates the shortest path of each bridge in the loop according to its topological database, and with the address of each bridge with transmit port together accordingly, uses the form of static filtering list item to record in the MAC filtered data base 830.If loop is the VLAN loop, then also should add the VLAN sign of topology example correspondence.If the two paths costs of going to another bridge the loop by loop from this bridge are identical, then select not comprise that paths of protection port in the protection bridge.For example bridge B3 (810) passes through port 811,811 and 812 respectively to the shortest path of bridge B2 (813), B1 (816) and B4 (819).After loop paths is calculated and finished, the protection port 812 in the protection bridge will convert the control forwarding state to, participate in the forwarding of packet, but this port only be transmitted the unicast packet of particular category.The destination address of such packet is the MAC Address of other bridge in the loop.The learning functionality of port is not still worked.
Other bridge in the loop also makes and calculates shortest path in the same way and be recorded in the MAC filtered data base.For example bridge B2 (813) calculate bridge B3 (810), B1 (816) and B4 (819) shortest path respectively by port 815,814 and 814, and use the form of static filtering list item to be recorded in the MAC filtered data base 831 result.
Figure 11 has described an embodiment who comprises a plurality of topology example in loop 800.This loop also can be regarded a plurality of VLAN loops as, the corresponding topology example of each VLAN loop.By a plurality of topology example of operation in a loop; and in different instances, specify different protection bridges and protect port; can make the pairing vlan data frame of different instances that different forward-paths is arranged, realize the space reuse of loop, improve the utilance of loop bandwidth effectively.For example: topology example 1 is corresponding to VLAN1 among Figure 11; use bridge B3 (810) and port 812 respectively as the protection bridge of this example with protect port; topology example 2 is corresponding to VLAN2, uses bridge B2 (813) and port 815 respectively as the protection bridge of this example with protect port.
Transmit by control, for destination address is the unicast packet of the MAC Address of bridge in the loop, each bridge can use shortest path to transmit, improve the loop utilance effectively, this uses the applied environment of route technology very favourable (destination address of all unicast packet in the loop is the MAC Address of bridge in the loop at this moment, and unicast packet will use route technology to transmit after leaving bridge) for bridge other port outside the division ring road port that respectively inserts in the loop.But the loop bandwidth utilance that can not improve the unicast packet, broadcast packet and the multicast packets that comprise other destination address is effectively transmitted in control.In actual applications; the unicast packet, broadcast packet and the multicast packets that come from same bridge can be used identical VLAN sign carry out mark; corresponding to a topology example; and the bridge of difference minimum of specifying the link cost summation of this bridge on the thing both direction makes the unicast packet, broadcast packet and the multicast packets that come from this bridge all select the shortest forward-path as the protection bridge of this topology example.For example: transmit the packet that enters loop by bridge B1 (816) and use VLAN sign 1 to carry out mark, corresponding to topology example 1; By bridge B4 (819) transmit enter loop packet use VLAN sign 2 to carry out mark, corresponding to topology example 2.
Figure 12 has described an embodiment who finds link failure in loop 900.Loop 900 can be corresponding to a main ring, also can be corresponding one from ring, optionally move the agreement in the Spanning-Tree Protocol bunch in the loop.Link in the loop such as B1 (916)-B4 (919) can a corresponding main ring or the physical link from ring, also can be corresponding to the logical links between two access bridges from ring.Use empty circles to represent to protect bridge to transmit port among the figure, two short vertical lines represent to protect bridge protection port, the hollow box indicating topology change report of solid line, and the hollow box indicating topology change of dotted line confirms.
Bridge uses the fault in the heartbeat message discovery link.Bridge comprises two heartbeat timers, and two ports in the corresponding loop are used for periodically sending heartbeat message respectively.Bridge comprises two fail timers, respectively two ports in the corresponding loop.If after the fail timer of a port is overtime, less than a threshold value, bridge thinks that link occurs fault and this port that this port links to each other are set to blocked state less than the message count of receiving heartbeat message at this port or receiving.Fail timer is restarted after overtime.Heartbeat message also can be used for realizing flow and congested control.
After link B1 (916) in the network 900-B2 (913) breaks down.B1 (916) and B2 (913) will send topology change report 930 and 931 to protection bridge B3 (910) respectively.This report comprises type of message, shows to be reported as the link failure report; This report also comprises link to be described, and describes the link that inefficacy takes place.Link is described and is used the MAC Address of both link ends bridge to describe respective link.Other bridge in the network such as B4 (919) after receiving topology change report 931, transmit this message (using 932 marks among the figure) to the protection bridge immediately.Protection bridge B3 (910) arrives message processing unit with this message copy after receiving topology change report 930 or 932, and confirms 940 and 941 by port 911 and 912 to sending topology change respectively.Topology change confirms to comprise type of message, shows that this message is that link failure confirms; Topology change confirms also to comprise link and describes, and describes the link that inefficacy takes place.The message processing unit of protection bridge is revised own topological database, and it is invalid that the stale link road sign is shown, and will protect port modifications be forwarding state, the Frame forwarding in the participation loop.Simultaneously, the protection bridge is removed the static entry that calculates under the control forwarding state in the MAC filtered data base that generates, and refreshes dynamic entry.The protection bridge also will increase the topology version number in the topological database.Topology change report 930 and 932 will successively arrive protection bridge B3 (910), and this bridge is handled one that arrives earlier, and another report is no longer handled.
Bridge such as B4 (919) arrive message processing unit with this message copy, and carry out following logic after receiving the topology change confirmation: if this bridge is not to insert bridge, then transmit this confirmation by another port in the loop; If this bridge is to insert bridge and message source main ring under bridge, then transmit this confirmation by another port in the main ring; If this bridge is to insert bridge, message source receives from ring and by the port from ring under bridge, then transmits this confirmation by two ports in the main ring under the bridge; If this bridge is to insert bridge, message source receives from ring and by the port the main ring under bridge, then transmits this confirmation by another port in the affiliated main ring and the port from ring and exists side by side soon that this message another port in loop forwards.Message processing unit will be revised the topological database of bridge, be invalid with the stale link line, remove the static entry that calculates under the control forwarding state in the MAC filtered data base that generates simultaneously, and refresh dynamic entry.If the bridge support can not refresh the dynamic entry for the port that receives topology change and confirm of target port in the bridge.Bridge also will increase the topology version number in the topological database.
After the link occurs fault in the loop, the former control bridge of loop will no longer send Topology Discovery message, then send this message by the bridge at faulty link two ends.The bridge at faulty link two ends is finally selected a control bridge by the election logic, regularly sends Topology Discovery message by this control bridge.The bridge that comprises faulty link is provided with a sign with this message after receiving Topology Discovery message, and this message is sent from receiving port.The bridge of message process is no longer handled this message, but this message is transmitted forward from another interface by the type of this this message of sign understanding.Message will be got back to the control bridge, and whether the control bridge is understood loop topology according to the Topology Discovery message that receives and changed.If change has taken place, as increasing or having removed bridge or changed the weights of link, the control bridge will send the topology indication, and wait for corresponding topology indication confirmation.
Figure 13 has described an embodiment who finds link failure recovery in loop 900.Use empty circles to represent to protect bridge to transmit port among the figure, two short vertical lines represent to protect bridge protection port, the hollow box indicating topology change report of solid line, and the hollow box indicating topology change of dotted line confirms.
After the fault recovery of link B1 (916)-B2 (913), bridge B1 (916) and B2 (913) begin to receive the other side's heartbeat message, thereby detect link failure recovery.Bridge B1 (916) and B2 (913) start recovery waiting timer separately respectively, and send topology change report 960 and 961 to protection bridge B3 (910) respectively behind timer expired.This report comprises type of message, shows to be reported as the link-recovery report; This report also comprises link to be described, and describes the link of fault recovery.Link is described and is used the MAC Address of both link ends bridge to describe respective link.Other bridge in the network such as B4 (919) after receiving topology change report 961, transmit this message (using 962 marks among the figure) to the protection bridge immediately.
Protection bridge B3 (910) arrives message processing unit with this message copy after receiving topology change report 960 or 962, and confirms 970 and 971 by port 911 and 912 to sending topology change respectively.Topology change confirms to comprise type of message, shows that this message is that link-recovery confirms; Topology change confirms also to comprise link and describes, and describes the link of fault recovery.The message processing unit of protection bridge is revised the topological database of oneself, the fault recovery link is indicated effectively, and will protect the status modifier of port to be the control forwarding state.Simultaneously, the protection bridge refreshes all list items in the MAC filtered data base of bridge, and calculates shortest path, uses static entry to be recorded in the MAC filtered data base.The protection bridge also will increase the topology version number in the topological database.
Bridge such as B4 (919) arrive message processing unit with this message copy, and carry out following logic after receiving topology change confirmation 971: if this bridge is not to insert bridge, then transmit this confirmation by another port in the loop; If this bridge is to insert bridge and message source main ring under bridge, then transmit this confirmation by another port in the main ring; If this bridge is to insert bridge, message source receives from ring and by the port from ring under bridge, then transmits this confirmation by two ports in the main ring under the bridge; If this bridge is to insert bridge, message source receives from ring and by the port the main ring under bridge, then transmits this confirmation by another port in the affiliated main ring and the port from ring.Message processing unit will be revised the topological database of oneself, and the fault recovery link is indicated effectively, refresh all list items in the MAC filtered data base of bridge, and calculate shortest path, use static entry to be recorded in the MAC filtered data base.Bridge also will increase the topology version number in the topological database.
When bridge B1 (916) and B2 (913) receive after topology change confirms, respectively port 914 and 917 is set to forwarding state.
Behind the link failure recovery, the control bridge of network when fault will stop to send Topology Discovery message; The control bridge of network before fault takes place will resend Topology Discovery message.
In Figure 12 and Figure 13, if loop 900 corresponding to one from the ring, link in the loop for example B1 (916)-B4 (919) is a logical links, then the transmission cycle of the heartbeat message between B1 (916) and the B4 (919) can increase, and this message only is used to realize flow and congested control, and is not used in the Link State that detects in other loop.The connectedness of logical links is safeguarded by main ring.
If operation generates the agreement in the number protocol family in the loop 900; transmit in order to realize quick protective switch and control; should make this agreement only be used for computational activity topology and write down the logic state of port, and should not make the actual working state of this protocol modification bridge port in agreement.For example can not the actual working state of port be changed into blocked state from forwarding state with this agreement.In addition, when bridge is found link-state change by heartbeat message, can optionally change Link State in the Spanning-Tree Protocol, the hand shaking process that this may cause bridge to send topological alteration notifying or trigger RSTP or Multiple Spanning Tree Protocol.If the virtual route of link for setting up by tunneling technique between two nodes of operation ATM agreement or mpls protocol, this variation can trigger the signal of reroute of PVC or the LDP message of MPLS or the like similar report.
Figure 14-Figure 16 has described and found link failure and link failure recovery in MAC bridge coil 1000, realizes the embodiment that protection is switched.
Figure 14 uses empty circles to represent to protect bridge to transmit port, and two short vertical lines represent to protect bridge protection port, the indication of the hollow box indicating topology of solid line, and the indication of the hollow box indicating topology of dotted line confirms.As shown in figure 14, network 1000 comprises a main ring and two from ring.When after the topology indication of ring and validation process are finished, the less bridge of MAC Address value from two access bridges of ring, for example from B2 (1012) and the B6 (1016) from ring B6 (1016)-B8 (1018)-B5 (1015)-B6 (1016) of ring B2 (1012)-B7 (1017)-B3 (1013)-B2 (1012), will be respectively in main ring broadcasting from encircling topology indication for example 1020, this topology indication can comprise topology version number, the source bridge identifier of message, topology example number, the MAC Address of two access bridges and two bridges link cost summation in the path from ring.Each bridge in the main ring will be responded topological letter of instruction example as 1021 receiving this after encircle topology indication., after receiving topology indication confirmation, finish from ring control bridge from encircling the registration of topology main ring.
When from the loop chain road for example from link B2 (the 1012)-B7 (1017) of ring B2 (1012)-B7 (1017)-B3 (1013) when breaking down, if should not exist secondaryly, should will lose defencive function from ring from ring from ring.To use from encircling the bridge of topology indication to main ring from ring and report this state this moment.If should exist secondary from ring from ring, insert bridge B2 (1012) and B3 (1013) and recomputate two bridges in the anchor chain diameter cost summation from ring, report from encircling the bridge of topology indication to main ring by the bridge use that MAC Address value in two bridges is less, and after the topology indication confirmation of receiving main ring, finish from the modification of ring information.
Figure 15 uses empty circles to represent to protect bridge to transmit port, and two short vertical lines represent to protect bridge protection port, the hollow box indicating topology change report of solid line, and the hollow box indicating topology change of dotted line confirms.As shown in figure 15, as link of main ring such as B2 (1012)-B3 (1013) when breaking down, the protection port of protection bridge will be set to forwarding state, realize the protection of link.As another link in the main ring such as B5 (1015)-B6 (1016) when also breaking down, will no longer there be complete path between each bridge of main ring, two logical links from ring also no longer are communicated with.The topology change report that no longer terminates of the protection bridge in loop this moment; make two access bridge B2 (1012) from ring; B3 (1013); the logical links from ring under B5 (1015) and B6 (1016) learn separately by heartbeat message and the topology change report that receives respectively breaks down; this moment bridge B2 (1012); B3 (1013); B5 (1015) and B6 (1016) will select one to realize that from ring protection switches, and method is: select from the cost on loop chain road and main ring link cost sum minimum from ring (the main ring link cost uses this higher value from encircle two main ring path link cost summations between two access bridges).The cost of hypothesis link B6 (1016)-B1 (1011)-B2 (1012)-B7 (1017)-B3 (1013)-B4 (1014)-B5 (1015) is less than B2 (1012)-B1 (1011)-B6 (1016)-B8 (1018)-B5 (1015)-B4 (1014)-B3 (1013), so selection inserts bridge B2 (1012) and B3 (1013) will be respectively to send topology change report 1040 from environment-development in the present embodiment.Should be after receiving topology change report from the protection bridge B7 (1070) of ring, its protection port is set to forwarding state and responds topology change confirm 1041., after receiving the topology change confirmation, refreshing the MAC filtered data base, finish the protection of loop and switch at each bridge.
After finishing protection and switch from ring, if should also break down from ring, then from encircle earlier to its higher level's loop consult protection may, if unsuccessful, that attempts then that it may comprise is secondary from ring.For example after finishing protection by method mentioned above and switching, link B2 (1012)-B7 (1017) breaks down, and bridge B2 (1012) and B7 (1017) will detect fault and send topology change respectively and report.Insert bridge B2 (1012) and B3 (1013) after receiving the topology change report, the response topology change confirms, send the topology change report to main ring simultaneously---insert bridge owing to detect out of order bridge B2 (1012) in this example, therefore the transmission of the report of the topology change from ring and reception all oneself are finished by this bridge, can save in specific implementation.This report will cause relevant bridge to use system of selection mentioned above, use link B6 (1016)-B8 (1018)-B5 (1015) to finish protection and switch.If before link B2 (1012)-B7 (1017) breaks down; from ring breaking down B6 (1016)-B8 (1018)-B5 (1015)-B6 (1016), other that inserts that bridge B2 (1012) and B3 (1013) can find its main ring by its topological database can not be finished defencive function from encircling.B2 (1012) and B3 (1013) are when the topology change report that receives B2 (1012) mentioned above and B7 (1017) transmission; to respond topology change confirms; and the inquiry topological database, understand whether comprise from ring secondary from ring and whether still have defencive function (promptly not comprising faulty link).If comprise secondary protection from ring, and B2 (1012) and B3 (1013) will be to sending the topology change report from environment-development, and by secondary finish to protect from ring switch.
As shown in figure 16, after the link of the main ring of network such as B2 (1012)-B3 (1013) recover, bridge B2 (1012) and B3 (1013) will detect the recovery of link.By its topological database recognize the protection of main ring switch by from the ring B2 (1012)-B7 (1017)-B3 (1012)-B2 (1012) finish; insert bridge B2 (1012) and B3 (1012) and send topology change report 1050 to this protection bridge B7 (1017) from ring respectively; and after receiving that topology change confirms 1051, port one 052 and 1053 is set to forwarding state.If recovered link is B5 (1015)-B6 (1016), B5 (1015) and B6 (1016) will send the topology change report to loop.Insert bridge B2 (1012) and B3 (1012) after receiving this report,, the topology change report is sent to bridge B7 (1017), finish similar failover procedure according to its topological database.
Figure 17 is the block diagram of implement device according to an embodiment of the invention.Bridge 1110 is arranged in a loop, comprises two ports and links to each other with two links in this ring, and two ports are represented to port one 111 with east orientation port one 112 and west respectively; Two links that port connected are represented to link 1130 with east orientation link 1131 and west respectively.If the bridge shown in the figure be the protection bridge of loop then port one 112 and 1111 according to appointment, correspond respectively to and transmit port and protection port; Otherwise port one 112 and 1111 is the forwarding port.Bridge 1110 also comprises a topological database 1114, is used to write down the working condition of topological structure and the path cost and the loop of loop.Bridge 1110 comprises a MAC filtered data base (or being called forwarding database) 1113, is used for record data frame forward-path.
In certain embodiments, the MAC filtered data base of some bridge refresh slower.In order to reach the purpose of quick protection, bridge can be when refreshing MAC filtered data base dynamic entry, and two ports in a time that sets in advance in loop send packet in the mode of broadcasting.This time is generally 50ms-1s according to the time length setting that bridge refreshes all dynamic data bases.
In one embodiment of the invention, each bridge in the ring uses control frame 1140 to communicate.Control frame can use a special multicast address to send as destination address.Bridge should guarantee that control frame uses the highest priority to handle and send.Bridge comprises an information process unit 1126, is used to handle the various control frames of reception.Information process unit can use the CPU that comprises in the bridge to realize with software mode, also can adopt FPGA or ASIC to realize with the mode of hardware or firmware.
Bridge 1110 comprises a Topology Discovery timer 1118, is used for periodically sending Topology Discovery message.During agreement in the bridge 1110 off-duty Spanning-Tree Protocols bunch, the topology discovery function that the Topology Discovery timer is described in bridge starts embodiment above starts after sending Topology Discovery message.Bridge determines according to the election logic whether oneself is the control bridge of loop in follow-up process.If bridge is not the control bridge of loop, then will stop the Topology Discovery timer.During agreement in bridge 1110 operation Spanning-Tree Protocols bunch, if bridge is the control bridge of loop, the Topology Discovery timer starts after sending Topology Discovery message.Behind the Topology Discovery timer expired, bridge 1110 resends Topology Discovery message according to selected topology discovery method by a port or two ports in port one 111 and 1112.The Topology Discovery timer was set short time before Topology Discovery is finished, for example 1 second, make sending than the short fixed cycle with of Topology Discovery message; After Topology Discovery was finished, this timer can be set to long time as 30 seconds.When loop breaks down, one in the bridge at faulty link two ends will start the Topology Discovery timer and send Topology Discovery message, and original control bridge will stop oneself Topology Discovery timer in the loop, no longer send Topology Discovery message.
Bridge 1110 comprises two topology indication timers 1116 and 1117 both direction of corresponding loop respectively.Topology indication timer is used for resending of topology indication.Bridge 1110 starts corresponding topology indication timer after the port to a direction of loop sends the topology indication.If receive that at this transmit port corresponding topology confirms before the topology indication timer expired, then stop this topology indication timer; Otherwise behind topology indication timer expired, bridge will resend the topology indication, and restart topology indication timer.The value of topology indication timer is provided with according to link and bridge actual conditions, should be slightly larger than the two-way time of whole loop and the processing time sum of bridge.Confirm the invalid indication of bridge broadcast topology in loop if after sending three topology indications continuously, all can not receive corresponding topology indication.
The both direction that comprises two heartbeat timers 1124 and 1125 corresponding loops in the bridge 1110.The heartbeat timer is used for the transmission of heartbeat message cycle.The transmission cycle is provided with according to the desired protection switch time of network, and the cycle is short more, and link failure is found soon more, but it is many more to take the bandwidth of link.In an embodiment of the present invention, the bandwidth that takies of heartbeat message link bandwidth 0.025% to 1% between.Bridge starts or restarts the heartbeat timer of this direction correspondence after sending topology indication confirmation or heartbeat message to loop.Behind the heartbeat timer expired, bridge to heartbeat timer counterparty to loop send heartbeat message.Heartbeat message can comprise the current loading condition of link, is used to realize flow and congested control.Flow and congestion control method can be the fair algorithm realization of RPR definition with reference to IEEE 802.17.
Comprise in the bridge 1110 and recover waiting timer 1119, the frequent generation that the protection that is used to avoid link connection status instability to cause is switched.Bridge starts this timer after detecting link-recovery.If before timer expired, link failure no longer takes place in this link, and then behind this timer expired, bridge is thought the recovery that this link is stable; Otherwise bridge does not recover to protection bridge report topology.Recover waiting timer and can default to 10 seconds according to loop situation value in relative broad range.
Bridge 1110 comprises the both direction of two fail timers 1122 and 1123 corresponding loops.Bridge starts or restarts the fail timer of this direction correspondence after receiving topology indication confirmation or heartbeat message on the loop.After fail timer was overtime, bridge was not received heartbeat message in the corresponding port, and the quantity of perhaps receiving message is during less than a threshold value, and bridge is thought the link occurs fault that this port connected.After this bridge is provided with failure identification in the heartbeat message that this port sends, and notifies adjacent bridge this link occurs fault.Receive the heartbeat message that does not contain failure identification when bridge at the port that faulty link connects, the quantity of perhaps receiving this type of message in a fixing cycle is during greater than a threshold value, thinks this link failure recovery.After this bridge is removed failure identification in the heartbeat message that receiving port sends, and notifies adjacent bridge this link failure recovery.The value of fail timer is generally 4 times of heartbeat timer value.
Bridge 1110 comprises the both direction of two topology change report timers 1120 and 1121 corresponding loops.Topology change report timer is used for resending of topology change report.After bridge sends the topology change report by a port, start corresponding topology change report timer.If before topology change report timer expired, receive that at this transmit port corresponding topology change confirms, bridge stops this topology change report timer; Otherwise behind topology change report timer expired, bridge resends the topology change report, and restarts topology change report timer.The value of topology change report timer requires to decide according to the guard time of loop, but should handle and transmit the temporal summation of topology change report greater than propagation delay time and each bridge of whole loop.Confirm the invalid indication of bridge broadcast topology in loop if after sending three topology changes report continuously, all can not receive corresponding topology change.
Bridge 1110 can select to comprise a topological fail timer 1115, is used for the auxiliary fault of finding loop topology.The topology fail timer starts after bridge receives the topology indication and upgrades topological database, and restarts after receiving Topology Discovery message.If topological fail timer is overtime, promptly bridge is not being received Topology Discovery message in the corresponding cycle, and this bridge is promptly thought and broken down beginning invalid indication of broadcast topology in loop in the loop topology.The value of topology fail timer 1115 is generally 3-4 times that controls bridge Topology Discovery message transmission time interval in the network.
Figure 18 has described an embodiment in bridge of topological database.Each bridge is after the topology indication that receives the transmission of control bridge, and the information of indicating according to topology generates this database.Mapping table in the topological database is used for writing down the corresponding relation of the topology example number and the VLAN sign of bridge; The mapping table verification is generated according to the data in the mapping table by corresponding algorithm, is used to verify the consistency of mapping table.
Because bridge can be included in one or more loop, topological database can comprise a plurality of loop information.The control bridge identifier is used for writing down the source control bridge identifier that the topology confirmation is comprised in the loop information; The topological sequence number that the topology version number record is current, control bridge will use this record to send Topology Discovery message and topology indication; Connectivity port 1 and two ports of connectivity port 2 record bridges in this loop; Example set is used to write down pairing all topology example of this loop number.
Topological database comprises the loop topology information set, is used for writing down the topological structure of loop.This information set comprises validity information, the connection status of record link; Comprise MAC Address, the bridge in the record loop; Comprise the cost that the pairing bridge of MAC Address that link cost is used for writing down these clauses and subclauses leads to the link between the pairing bridge of MAC Address in the next clauses and subclauses (loop topology information concentrates the link cost in last clauses and subclauses to write down the cost that the pairing bridge of MAC Address in these clauses and subclauses leads to the link between the pairing bridge of MAC Address in first clauses and subclauses); It is physical link or logical links that Linktype is used to write down this link.
Topological database also comprises from the ring information set, be used to write down loop from ring information.This information set comprises validity information, and record is from " closure " or the open to the outside world state of ring; Comprise two access bridge MAC Address, be used to write down these two access bridges from ring; Comprise path cost, write down this summation from all link costs of ring between two access bridges.
If the described method of embodiment is carried out loop discovery among bridge use Fig. 4, topological database also comprises loop discovery information, is used to write down the receiving port of bridge Topology Discovery information.
Figure 19 has described the embodiment that the present invention uses in MAC bridge coil 1200.Connect two main rings from ring in the network 1200.Bridge in the loop uses the election logic, makes B1 (1210) become the control bridge of loop.B1 (1210) sends Topology Discovery message 1220, also forms Topology Discovery message 1221 and 1222 respectively through bridge B2 (1211), B3 (1212).Topology Discovery message 1222 will be passed logical links 1213 and be arrived B5 (1214), also form Topology Discovery message 1224 and 1225 respectively through bridge B6 (1215) and B7 (1216) after the formation Topology Discovery message 1223.Topology Discovery message 1225 will be passed another logical links 1217 and finally be got back to source bridge B1 (1210).Bridge B1 (1210) writes down network topology, and the indication of transmission topology is also finished Topology Discovery after receiving topological indication confirmation, forms by a topological structure from two main rings of ring connection, and switches by the invention process space reuse and protection.
Figure 20 has described the embodiment that the present invention uses in MAC bridge coil 1300.Network 1300 is topologys that a bridge connects two loops.Two loops all do not comprise the logical links that is made of the other side's link, are separate systems, comprise separately control bridge and protection bridge.Bridge B4 (1303) comprises the topology information of two loops.
Embodiment among Figure 19 and Figure 20 is two embodiment that the present invention uses in network, and in actual applications, the present invention also may have the multiple form of expression.These two embodiment just are used to explain meaning, rather than are used for limited significance.
In some realization of the present invention, the method and apparatus that the present invention comprised can be realized by the computer system of running series software program.These software programs comprise a series of instruction and are carried out by the processor in the hardware system.When initial condition, these instructions can be kept among data storage device, internal memory or the Flash (flash memory), also can provide with the form of software product.Software product can be stored in the medium of any embodied on computer readable, for example: the magnetic access media of floppy disk, CD-ROM, hard disk drive, optical data memory of DVD or the like.These instructions can also be stored in the long-range memory device, and the webserver for example, and is carried out by processor in internal memory by network copy.
During other of the present invention is realized, use the mode of hardware or firmware.For example, use ASIC or FPGA to realize the present invention.
Method and apparatus involved in the present invention is tangible for those skilled in the art.Under the prerequisite that does not deviate from the spirit and scope of the present invention, may there be a lot of variants in the present invention, and may have many changes and change.Therefore, the present invention is not subjected to the restriction of embodiment mentioned above.

Claims (11)

1. method of switching in the discovery of MAC bridge coil intermediate ring road, space reuse and protection, wherein the MAC bridge coil comprises one or more loop that comprises two MAC bridges at least.This method comprises:
1) a MAC bridge in each loop selection loop periodically sends the Topology Discovery message by the one or more ports in the loop as the control bridge.This message comprises source bridge identifier and topology information, topology information by the MAC Address of source bridge and transmit port mutually the cost of connected link constitute;
2) the MAC bridge in the loop is after receiving Topology Discovery message, select another or a plurality of port as transmitting port, and will by oneself MAC Address and transmit port mutually the topology information that constitutes of the cost of connected link be increased in the Topology Discovery message, transmit this message by transmit port;
3) Topology Discovery message transmits and finally returns the control bridge along loop; the topology information that comprises in the control bridge recording messages; generate the topology indication according to this information; and belong to a port of this loop respectively as protection bridge and protection port in a bridge in the loop and this bridge under selecting; use protection bridge identifier and protection port numbers to constitute protection information, additional this information in the topology indication.The control bridge selects the port of bridge in this loop as transmit port, and the adjacent MAC bridge in loop sends this indication;
4) the MAC bridge is after receiving the topology indication, write down the topology information that comprises in this indication, send the topology indication to the MAC bridge that sends this indication and confirm, and, transmit this topology indication to own another adjacent MAC bridge in loop according to the topology information that comprises in the indication.Simultaneously, bridge is the sign of oneself and the protection bridge identifier in the topology indication relatively, if identical, this bridge is the protection bridge, and the protection port of appointment is set to blocked state.
2. method according to claim 1, the MAC bridge in the loop after receiving Topology Discovery message, this bridge with oneself bridge identifier and this message in the source bridge identifier that comprises compare.If the bridge identifier value of oneself is bigger, this bridge will stop to come from the transmission of the Topology Discovery message of self, and another port of selecting this loop simultaneously is as transmitting port; If the bridge identifier value of oneself is less, this bridge will abandon this message, resend the Topology Discovery message that comes from self simultaneously.
3. method according to claim 1, the wherein agreement in the Spanning-Tree Protocol of MAC bridge coil operation IEEE definition bunch.Method further comprises:
1) comprises the control bridge of the MAC bridge of the root port that is in forwarding state of protocol definition and the optional port that is in non-forwarding state, periodically send Topology Discovery message by above-mentioned two ports as these two loops that port was connected.Topology information uses the link cost of the protocol definition in the Spanning-Tree Protocol bunch of this bridge operation as the cost that sends link in the message;
2) after the MAC bridge of the agreement in the operation Spanning-Tree Protocol bunch receives Topology Discovery message, if another port at this bridge receives the Topology Discovery message with identical sources bridge identifier, another receiving port of then selecting to write down in the bridge is as transmitting port; Otherwise write down the receiving port of this message, and the root port of selecting this bridge is as transmitting port.The topology information that increases in this message uses the link cost of the protocol definition in the Spanning-Tree Protocol bunch of this bridge operation as the cost that sends link.
3) the control bridge uses the transmit port of root port as the topology indication.
4. method according to claim 1, the wherein agreement in the Spanning-Tree Protocol of MAC bridge coil operation IEEE definition bunch.Method further comprises:
1) comprises the control bridge of the MAC bridge of the root port that is in forwarding state of protocol definition and the optional port that is in non-forwarding state, periodically send Topology Discovery message by the root port that is in forwarding state as these two loops that port was connected.Topology information uses the link cost of the protocol definition in the Spanning-Tree Protocol bunch of this bridge operation as the cost that sends link in the message;
2) after the MAC bridge of the agreement in the operation Spanning-Tree Protocol bunch receives Topology Discovery message,, then abandon this message if receiving port is in non-forwarding state; Otherwise select all ports that are in forwarding state as transmitting port.The topology information that increases in this message uses the link cost of the protocol definition in the Spanning-Tree Protocol bunch of this bridge operation as the cost that sends link;
3) the control bridge uses the transmit port of root port as the topology indication.
5. method according to claim 1, wherein the MAC bridge coil comprise main ring and from the ring.Method further comprises:
1) inserts bridge after the Topology Discovery message that receives from ring, this message is provided with one from the ring sign,, selects port in the main ring as the forwarding port according to the MAC filtered data base.The cost of the transmission link that comprises in the topology information that increases in message uses this bridge and another to insert the cost sum that is arranged in all links of paths of main ring between the bridge, perhaps uses a pre-configured numerical value;
2) the MAC bridge comprises after the Topology Discovery message of ring sign receiving in the main ring, select another port that this bridge belongs to main ring as transmitting port, but this bridge does not increase topology information in this message;
3) insert bridge after the port that belongs to main ring receives the Topology Discovery message that is derived from MAC bridge from ring, identify this message by the source bridge identifier in the message, cancel in this message from ring sign, and select this bridge belong to this from the port of ring as transmitting port.
6. method according to claim 1, wherein the MAC bridge coil comprises main ring and the agreement from the Spanning-Tree Protocol of ring and operation IEEE definition bunch.Method further comprises:
1) two access bridges compare the link cost summation of passing through between them between two paths of controlling bridge in two loops.The path that summation is big will become the path from ring, insert bridge and belong to from the port of ring by it and send topological invalid message;
2) the control bridge resends Topology Discovery message after receiving topological invalid message, begins from the Topology Discovery of ring.
7. method according to claim 1, adjacent bridge uses heartbeat message detection link failure and fault recovery in the loop.Bridge periodically sends heartbeat message to adjacent bridge.Do not receive heartbeat message when the port of bridge in loop in a fixing cycle, the quantity of perhaps receiving message is during less than a threshold value, and bridge is thought the link occurs fault that this port connected.After this bridge is provided with failure identification in the heartbeat message that this port sends, and notifies adjacent bridge this link occurs fault.The port that receives the heartbeat message that comprises failure identification necessarily can not comprise failure identification in the heartbeat message that it sends.Receive the heartbeat message that does not contain failure identification when bridge at the port that faulty link connects, the quantity of perhaps receiving this type of message in a fixing cycle is during greater than a threshold value, thinks this link failure recovery.After this bridge is removed failure identification in the heartbeat message that receiving port sends, and notifies adjacent bridge this link failure recovery.
8. method according to claim 1, method further comprises:
1) after bridge detected fault in the loop, the port that connects faulty link was set to blocked state, reported this fault by the protection bridge of topology change report in this loop;
2) after bridge detects fault recovery in the loop, wait for a fixed cycle, if this link no longer breaks down during this period, bridge is reported this fault recovery by the protection bridge of topology change report in this loop;
3) after the catch net bridge joint is received the topology change report of report link failure, refresh the MAC filtered data base, protect port to be set to forwarding state, the bridge transmission topology change to this fault of report simultaneously confirms;
4) after the catch net bridge joint is received the topology change report of report link failure recovery, refresh the MAC filtered data base, protect port to be set to blocked state, the bridge transmission topology change to this fault recovery of report simultaneously confirms;
5) after the bridge in the loop receives the topology change confirmation, carry out following method, refresh the MAC filtered data base simultaneously:
If a. this bridge is not to insert bridge, then transmit this confirmation by another port in the loop;
If b. this bridge is to insert bridge and message source main ring under bridge, then transmit this confirmation by another port in the main ring;
If c. this bridge is to insert bridge, message source receives from ring and by the port from ring under bridge, then transmits this confirmation by two ports in the main ring under the bridge;
If d. this bridge is to insert bridge, message source receives from ring and by the port the main ring under bridge, then transmits this confirmation by another port in the affiliated main ring and the port from ring.
6) bridge that detects fault recovery receives after topology change confirms, the port that connects the fault recovery link is set to forwarding state.
9. method according to claim 8, method further comprises:
1) receiving after topology confirms from the access bridge of ring, inserting bridge identifiers and two Access Network bridge locations in the link cost summation from ring, by the bridge announcement of topology indication in main ring two.After bridge in the main ring received this indication, record confirmed from ring information and the indication of transmission topology;
2) the above fault in two places or two places taking place when the main ring link, when causing one or more logical links fault from ring, selects this type of to realize that from ring protection switches.System of selection is: logical links break down from the ring; selection from the cost on loop chain road and main ring link cost sum minimum from ring (the main ring link cost uses one bigger the link cost summation of these two main ring paths between two access bridges of ring); send Trouble Report to it, realize protecting and switch.To make other logical links from ring of this main ring be communicated with owing to the path between two access bridges is communicated with this moment.If still exist this moment comprise the fault logic link from ring, will repeat above-mentioned system of selection;
3) when 2) in realization protection switch when ring also breaks down, insert bridge and will at first notify main ring, and use 2) in method select another to realize that from ring protection switches.If there is no another can realize protecting switch from the ring.Should use 2 from ring) method under it, seek protection from ring.
10. method according to claim 1, the MAC bridge is by the topology information of record, the link cost summation of relatively leading to two paths of other bridge in the loop through the both direction of affiliated loop, select the less path of summation to lead to the shortest path of target bridge as bridge, and, be recorded in the MAC filtered data base of bridge the port that the MAC Address and the shortest path of target bridge comprises.If both direction link cost summation is identical, select not comprise protect bridge the path as shortest path.The protection bridge protects port to be set to control forwarding state.
11. method according to claim 1, the Frame that different bridges use different VLAN identity markings to transmit in loop, and become the transmission bridge of corresponding VLAN Frame respectively.Port in the big protection bridge that the path comprised of the control bridge is specified the protection bridge of a specific bridge as this VLAN according to the topology information that comprises---this protection bridge is by loop both direction difference minimum towards the link cost summation of the transmission bridge of this vlan data---and given link cost summation is as protecting port.
CN 200510018238 2005-02-02 2005-02-02 Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network Pending CN1645834A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510018238 CN1645834A (en) 2005-02-02 2005-02-02 Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510018238 CN1645834A (en) 2005-02-02 2005-02-02 Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network

Publications (1)

Publication Number Publication Date
CN1645834A true CN1645834A (en) 2005-07-27

Family

ID=34875702

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510018238 Pending CN1645834A (en) 2005-02-02 2005-02-02 Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network

Country Status (1)

Country Link
CN (1) CN1645834A (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007054025A1 (en) * 2005-11-11 2007-05-18 Huawei Technologies Co., Ltd. A data processing method in a bridged network, a network bridge and a bridged network
WO2007107098A1 (en) * 2006-03-20 2007-09-27 Zte Corporation A method and system for unidirectional fault detection in ring networks
WO2008031336A1 (en) * 2006-09-07 2008-03-20 Huawei Technologies Co., Ltd. A method, apparatus and system for avoiding data to cycle in loop in a ring ethernet
CN100409634C (en) * 2006-01-23 2008-08-06 杭州华三通信技术有限公司 Fast ring network protecting method and system
CN1852211B (en) * 2006-04-11 2010-04-07 华为技术有限公司 Method and apparatus for eliminating ring ID error report message on ring network
CN101043354B (en) * 2006-04-28 2010-05-12 华为技术有限公司 Uplink protection method and system for wideband Communication apparatus
CN101815029A (en) * 2009-02-19 2010-08-25 中兴通讯股份有限公司 Address refreshing method of sub-loop virtual channel
WO2010145213A1 (en) * 2009-11-02 2010-12-23 中兴通讯股份有限公司 Ethernet topology management method and loop network node
CN101072241B (en) * 2006-05-11 2011-04-20 华为技术有限公司 Method and device for improving shortest path bridge reliability
CN101317377B (en) * 2006-08-25 2011-05-04 华为技术有限公司 Device, method and system for configuring Ethernet service in passive optical network
CN102387078A (en) * 2011-10-19 2012-03-21 杭州华三通信技术有限公司 Method and routing bridge for maintaining neighbourship in TRILL (Transparent Interconnection of Lots of Links) network
CN101662421B (en) * 2008-08-28 2012-09-05 中兴通讯股份有限公司 Method and device for transmitting control message based on ethernet multi-ring network
CN101729261B (en) * 2008-10-30 2012-10-03 阿自倍尔株式会社 Ring connection control circuit and method, ring switching hub and Ethernet system
CN101686199B (en) * 2009-07-20 2012-12-19 中兴通讯股份有限公司 Method, device and system for processing control message in Ethernet protection system
CN101371504B (en) * 2006-01-10 2013-02-13 思科技术公司 Seamless spanning tree upgrade of a linecard
CN104125083A (en) * 2013-04-24 2014-10-29 中兴通讯股份有限公司 Active/standby switchover method, device, equipment and system for network equipment
CN104579982A (en) * 2015-01-06 2015-04-29 杭州华三通信技术有限公司 Second-layer multicast data message forwarding method and device
US9237092B2 (en) 2009-11-11 2016-01-12 Huawei Technologies Co., Ltd. Method, apparatus, and system for updating ring network topology information
CN106789389A (en) * 2016-04-15 2017-05-31 新华三技术有限公司 A kind of method and device for preventing loop
CN108337145A (en) * 2017-01-19 2018-07-27 中兴通讯股份有限公司 The processing method and processing device of polycyclic road network
CN108600097A (en) * 2018-04-20 2018-09-28 闫晓峰 Can multi-path transmission data communication apparatus, data communication network system and data communication method
CN109617777A (en) * 2018-12-24 2019-04-12 新华三技术有限公司 A kind of the business datum retransmission method and device of RPR intersecting ring
CN113055227A (en) * 2021-03-02 2021-06-29 北京航天自动控制研究所 Ring topology networking communication-oriented fault processing method and device and storage medium
CN115277299A (en) * 2022-07-11 2022-11-01 国电南瑞科技股份有限公司 Synchronous loop communication system suitable for cascade converter topology

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007054025A1 (en) * 2005-11-11 2007-05-18 Huawei Technologies Co., Ltd. A data processing method in a bridged network, a network bridge and a bridged network
CN101371504B (en) * 2006-01-10 2013-02-13 思科技术公司 Seamless spanning tree upgrade of a linecard
CN100409634C (en) * 2006-01-23 2008-08-06 杭州华三通信技术有限公司 Fast ring network protecting method and system
WO2007107098A1 (en) * 2006-03-20 2007-09-27 Zte Corporation A method and system for unidirectional fault detection in ring networks
CN1852211B (en) * 2006-04-11 2010-04-07 华为技术有限公司 Method and apparatus for eliminating ring ID error report message on ring network
CN101043354B (en) * 2006-04-28 2010-05-12 华为技术有限公司 Uplink protection method and system for wideband Communication apparatus
CN101072241B (en) * 2006-05-11 2011-04-20 华为技术有限公司 Method and device for improving shortest path bridge reliability
CN101317377B (en) * 2006-08-25 2011-05-04 华为技术有限公司 Device, method and system for configuring Ethernet service in passive optical network
WO2008031336A1 (en) * 2006-09-07 2008-03-20 Huawei Technologies Co., Ltd. A method, apparatus and system for avoiding data to cycle in loop in a ring ethernet
US8462795B2 (en) 2008-08-28 2013-06-11 Zte Corporation Method and device for transmitting control message based on multi-ring ethernet
CN101662421B (en) * 2008-08-28 2012-09-05 中兴通讯股份有限公司 Method and device for transmitting control message based on ethernet multi-ring network
CN101729261B (en) * 2008-10-30 2012-10-03 阿自倍尔株式会社 Ring connection control circuit and method, ring switching hub and Ethernet system
CN101815029A (en) * 2009-02-19 2010-08-25 中兴通讯股份有限公司 Address refreshing method of sub-loop virtual channel
CN101815029B (en) * 2009-02-19 2014-09-10 中兴通讯股份有限公司 Address refreshing method of sub-loop virtual channel
CN101686199B (en) * 2009-07-20 2012-12-19 中兴通讯股份有限公司 Method, device and system for processing control message in Ethernet protection system
CN102055635B (en) * 2009-11-02 2015-04-01 中兴通讯股份有限公司 TM method for Ethernet ring network and ring network node
CN102055635A (en) * 2009-11-02 2011-05-11 中兴通讯股份有限公司 TM method for Ethernet ring network and ring network node
WO2010145213A1 (en) * 2009-11-02 2010-12-23 中兴通讯股份有限公司 Ethernet topology management method and loop network node
US9237092B2 (en) 2009-11-11 2016-01-12 Huawei Technologies Co., Ltd. Method, apparatus, and system for updating ring network topology information
CN102387078A (en) * 2011-10-19 2012-03-21 杭州华三通信技术有限公司 Method and routing bridge for maintaining neighbourship in TRILL (Transparent Interconnection of Lots of Links) network
CN102387078B (en) * 2011-10-19 2014-11-12 杭州华三通信技术有限公司 Method and routing bridge for maintaining neighbourship in TRILL (Transparent Interconnection of Lots of Links) network
CN104125083A (en) * 2013-04-24 2014-10-29 中兴通讯股份有限公司 Active/standby switchover method, device, equipment and system for network equipment
CN104579982A (en) * 2015-01-06 2015-04-29 杭州华三通信技术有限公司 Second-layer multicast data message forwarding method and device
CN106789389B (en) * 2016-04-15 2020-07-03 新华三技术有限公司 Method and device for preventing loop from being generated
CN106789389A (en) * 2016-04-15 2017-05-31 新华三技术有限公司 A kind of method and device for preventing loop
CN108337145A (en) * 2017-01-19 2018-07-27 中兴通讯股份有限公司 The processing method and processing device of polycyclic road network
CN108600097A (en) * 2018-04-20 2018-09-28 闫晓峰 Can multi-path transmission data communication apparatus, data communication network system and data communication method
CN108600097B (en) * 2018-04-20 2020-09-22 闫晓峰 Communication equipment capable of transmitting data in multiple paths, data communication network system and data communication method
CN109617777A (en) * 2018-12-24 2019-04-12 新华三技术有限公司 A kind of the business datum retransmission method and device of RPR intersecting ring
CN109617777B (en) * 2018-12-24 2021-08-20 新华三技术有限公司 Service data forwarding method and device for RPR (resilient packet ring) intersected ring
CN113055227A (en) * 2021-03-02 2021-06-29 北京航天自动控制研究所 Ring topology networking communication-oriented fault processing method and device and storage medium
CN115277299A (en) * 2022-07-11 2022-11-01 国电南瑞科技股份有限公司 Synchronous loop communication system suitable for cascade converter topology
CN115277299B (en) * 2022-07-11 2023-08-29 国电南瑞科技股份有限公司 Synchronous loop communication system suitable for cascading converter topology

Similar Documents

Publication Publication Date Title
CN1645834A (en) Method and device for loop discovery, space reuse and protection conversion in MAC bridge connecting network
US7558878B2 (en) Optimal sync for rapid spanning tree protocol
Albrightson et al. EIGRP--A fast routing protocol based on distance vectors
CN101047601A (en) Implementing method and system of double-attach network based on VPLS
CN103765835B (en) Topology Discovery in hybrid network
US20110267962A1 (en) Method and system for predictive designated router handover in a multicast network
CN1412977A (en) Method for propagating fault information in RPR network and corresponding RPR data packet
CN101051995A (en) Protection switching method based on no connection network
CN1716912A (en) Method and apparatus providing rapid end-to-end failover in a packet switched communications network
US20120281524A1 (en) Technique for Controlling Data Forwarding in Computer Networks
CN1453963A (en) Method of bluetooth routing according to request and network formation and communication method of bluetooth group network
CN1722726A (en) Layer-2 VPN equipment supporting pseudo line tag reflection and networking method
CN1969491A (en) System and method for preserving multicast data forwarding during control failures in a router
JP2009542109A (en) Mobile ad hoc network (MANET) and method for implementing multiple paths for fault tolerance
CN1770738A (en) Stack manager protocol with automatic set up mechanism
CN1649320A (en) System and its method for guaranteeing service quality in virtual special net based network
CN1838620A (en) Method for detecting chain circuit fault between end-to-end notes in mixed network
CN101051951A (en) Method and device for securing server connection reliability
CN1913496A (en) Conversion control method and system of OAM message
CN101060485A (en) Topology changed messages processing method and processing device
CN101610221B (en) IP unicast smoothly switching method during STP switch and device thereof
CN1423876A (en) Routing switch for dynamically reroutng traffic due to detection of faulty link
CN101075970A (en) Method and apparatus for selecting router
CN1929444A (en) Operator's boundary notes, virtual special LAN service communication method and system
CN101047624A (en) Tag distribution method and tag selling method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication