EP2183889A1 - Method of establishing constraints on service stream routing in a virtual local network - Google Patents

Method of establishing constraints on service stream routing in a virtual local network

Info

Publication number
EP2183889A1
EP2183889A1 EP08784735A EP08784735A EP2183889A1 EP 2183889 A1 EP2183889 A1 EP 2183889A1 EP 08784735 A EP08784735 A EP 08784735A EP 08784735 A EP08784735 A EP 08784735A EP 2183889 A1 EP2183889 A1 EP 2183889A1
Authority
EP
European Patent Office
Prior art keywords
bridge
port
network
ports
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP08784735A
Other languages
German (de)
French (fr)
Inventor
Christophe Le Guern
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sagemcom Energy and Telecom SAS
Original Assignee
Sagem Communications SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sagem Communications SAS filed Critical Sagem Communications SAS
Publication of EP2183889A1 publication Critical patent/EP2183889A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/467Arrangements for supporting untagged frames, e.g. port-based VLANs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/48Routing tree calculation

Definitions

  • the present invention relates to a method of establishing service flow routing constraints in a local network or infrastructure consisting of interconnected bridges.
  • Local or infrastructure networks are known that route Ethernet-based service flows either between a first user's equipment and a second user's equipment, or between a first user's equipment and the equipment of a first user.
  • several users in the case of point-to-point and point-to-multipoint communications or multipoint-to-multipoint communications, respectively.
  • the term network will be used to designate a physical network that is local or infrastructure.
  • VLANs Virtual Local Area Network
  • a virtual network defines a logical topology of the physical architecture of a network.
  • the user equipment subscribers, service providers, professional users, etc.
  • the user equipment are first grouped either on the basis of physical criteria such as the MAC (Medium Access Control) address. ) specific to each user equipment, either on the port numbers specific to each user equipment, or on the basis of services such as layer 2, 3 or higher of the OSI model, or on the basis of protocols used by each user equipment to communicate.
  • MAC Medium Access Control
  • the user equipment of a network is most often interconnected by equipment called bridges.
  • the groups of user equipment obtained are interconnected logically between them by these bridges to form a virtual network. It can be noted that a virtual network can also be created for each equipment group. Virtual networks connected by bridges are then obtained.
  • bridges of a network allow access to services because they are also connected to one or more groups of equipment and then allow the exchange of service flows between user equipment belonging to this or these groups.
  • one of these bridges called the headend bridge, is also connected to a service provider's equipment to provide service flows to the user equipment of all groups.
  • Ethernet bridges With reference to the type of service flow frames they carry.
  • the virtual network considered thereafter will be a layer 2 virtual network.
  • An Ethernet bridge is a device that has a number of ports (at least two) to which user devices or certain other bridges of the network are connected.
  • each Ethernet bridge includes a bridge matrix that informs the bridge of the internal link to establish between two (or more) of its ports when a service flow frame is to be transferred from user equipment (or bridge) to another user equipment (or to another bridge). For this, each bridge undergoes a learning phase that allows to know the equipment or bridges that are connected to each of its ports. The transfer matrix then memorizes the relationships between each port and the addresses of the user equipment or bridges that are connected to this port.
  • a network can only work if the paths between bridges of the Ethernet frames do not form loops, which occurs when an exchanged frame passes twice through the same bridge. Indeed, when broadcast frames will be sent on such a network, each bridge sends them through all its ports. The frames then circulate in loops and are multiplied each time by a bridge. The frames have no life, so they can turn indefinitely in one of the loops of the VLAN. This is commonly known as the "broadcast storm".
  • STP spanning tree protocol
  • ISO / IEC 15802-3: 1998 standard IEEE Std 802.1D-1998)
  • RSTP Rapid Spanning Tree Protocol
  • MSTP Multiple Spanning Tree Protocol
  • the STP protocol allows the regular exchange between the bridges of the network of protocol units called BPDUs (Bridge Protocol Data Unit in English) in order to obtain a tree topology of the virtual network or so that a new topology of this virtual network can be determined when an event occurs on the network (connection of a new equipment, rupture of a segment between two bridges, failure of a bridge, ).
  • BPDUs Bridge Protocol Data Unit in English
  • STP is a Layer 2 protocol, that is, it operates directly at the Ethernet bridges of the network. This protocol is said convergent because from a finite number of exchanges of BPDU units, the role of each bridge network is defined to determine the paths taken by the Ethernet frames.
  • the STP protocol is broken down into three successive steps which are respectively an election stage of the root bridge (root bridge in English), a step associating the port attributes and a step of assigning the port states according to the port attribute associations.
  • each bridge B 1 of the network is associated with a unique identifier IDB (Bridge Identifier in English).
  • Each bridge B also keeps in memory a parameter IDR 1 (Root Identifier in English) likely to take the value of a bridge identifier.
  • the identifier IDB 1 of a bridge has two parts: firstly, the priority (expressed on 2 bytes) and, on the other hand, the MAC address of the bridge (expressed on 6 bytes).
  • the priority of a bridge is IEEE 802. The default ID is equal for all bridges. However, as we will see later, the administrator may have an interest in defining different priority values according to the bridges.
  • Each bridge B 1 of the network then considers that it is the root bridge of the virtual network. Then begins sending a BPDU by one of the bridges of the virtual network, for example by the bridge B 1 , to the other bridges to which it is connected.
  • a B 1 + I bridge receives this BPDU.
  • the bridge B 1+ ] compares the IDB bridge identifier 1 contained in the received BPDU unit with its parameter IDR 1+ ] and two cases can then occur.
  • the bridge identifier IDB 1 received by the bridge B 1 + I has a value lower than that of the parameter IDR 1+ I that it stores, the value of its parameter IDR 1 + I is replaced by the IDB bridge ID 1 received.
  • the bridge B 1+ 1 then considers that the root bridge is the bridge B 1 .
  • this bridge identifier IDB 1 has a value greater than that of its parameter IDR 1 + I
  • the bridge B, + i does not make any substitutions and continues to consider that the root bridge is the one designated by the value of its IDR 1 + I parameter.
  • the bridges B 1 of the virtual network By exchanging their IDR parameter values 1 via BPDUs, the bridges B 1 of the virtual network all end up having the same value of parameter IDR, and consequently to elect by common agreement a single bridge to rank root bridge of the virtual network.
  • the step of association of the attributes of port begins following the stage of election of the root bridge.
  • the purpose of this step is that a so-called port attribute is associated with each port of each bridge of the virtual network.
  • the attribute associated with a port defines the role played through this port in the determination of the paths of the Ethernet frames through the virtual network.
  • the port attributes that give this port the transfer status are the attributes 'designated' ⁇ designated in English) and 'root' (root). These two terms are to be considered later within the meaning of the IEEE Standard Std 802.1D-2004.
  • the attribute associated with this port gives this port the so-called blocking state.
  • the port attributes that give this port the blocking state are the 'alternate' (also known as 'backup') attributes.
  • the protocol STP associates with each port of the various bridges the attribute is designated (D), is root (R), or alternates (A) which will make it possible to define if this port is in the state of either transfer or blocking.
  • the root attribute is associated with a port of each bridge other than the root bridge.
  • the port of a bridge is elected to the rank of root port when it is in connection with the root bridge and allows that the exchange of frames between this bridge and the root bridge is the fastest among the possible exchanges between the other ports of this bridge and the root bridge.
  • the root port of a bridge is the one that provides the most 'direct' access of this bridge to the root bridge.
  • the designated attribute is associated with at least one port of each bridge.
  • the root bridge ports are all associated with the 'designated' attribute. We can refer to the IEEE Std standard. 802. ID for more details.
  • the ports of each bridge that are not associated with either the root attribute or the designated attribute are associated with the alternate attribute.
  • the step of assigning the port states follows the step of associating the port attributes. In this step, each port associated with the designated attribute or attribute root is considered in the transfer state and each port associated with the alternate attribute is considered in the blocking state.
  • Fig. 1 is a diagram of an example of a NET virtual network.
  • an internal link I 1 ⁇ is here considered as linking a port of a bridge to only one other of the ports of this bridge.
  • the present invention is not limited to three-port Ethernet bridges because the only constraint imposed on these bridges is that the number of their ports is greater than or equal to 2.
  • Each equipment group comprises a certain number of user equipment of which only two are shown in FIG. 1: the user equipment EUi situated in the group Gi and the user equipment UE 2 located in the group G 2 .
  • the equipment group G 5 comprises an equipment E of an operator or service provider. This equipment is intended to provide service flow frames for all user equipment of all equipment groups.
  • the topology of the virtual network NET is a ring topology that is to say that each bridge of the virtual network is connected to two other of its bridges.
  • This logical topology is used for example when the physical architecture of this network is of the sonet / SDH type.
  • This example of topology has been chosen to facilitate the explanations that follow.
  • the present invention is not limited to this type of logical topology but can be applied to virtual networks whose topology is more complex than that of FIG. 1, for example when each bridge is connected to more than two other bridges.
  • the present invention is not related to the type of the physical architecture because the present invention is in layer 2 of the OSI model while the physical architecture is in layer 1 of this model.
  • Fig. 2 represents an example of the NET virtual network following a convergence of the STP protocol.
  • the ports Pi 2 , P 2 2 , P 3 , 2 and P 43 are associated with the root attribute R and the ports Pi i3 , P 2j3 , P 3j3 , P 5i 2 and P 5 3 are associated with the designated attribute D.
  • the port P 42 which is associated with the alternate attribute A is in the blocking state thus logically opening the loop formed by the ring topology of this virtual network ( the segment 'blocked' between the ports P 4 2 and P 3; 3 is in dotted line in Fig. 2).
  • the port of each bridge connecting a user equipment group to this bridge is associated with the designated attribute D so that this port is in the transfer state.
  • each port in the transfer state of a bridge B 1 regularly sends a BPDU to the port of another bridge B j to which it is connected.
  • This other port can be in the transfer state but also in the blocking state.
  • the STP protocol since a port of the bridge B j which is likely to receive at regular intervals these BPDU units no longer receive these units, the STP protocol then considers that an event has occurred on the segment connecting these two ports. and restart a convergence to obtain a new logical topology of the virtual network without taking into account this segment.
  • the STP protocol determines that one of the bridges of a virtual network is elected root bridge. It is possible to force the STP protocol to always elect the same bridge as a root bridge. This is useful, in particular, for this root bridge to be the bridgehead of the network. For this, the STP protocol electing the root bridge from the identifiers associated with these bridges and these identifiers being defined, among others from a priority value, the administrator can force this protocol to always elect the root bridge as being the head bridge by assigning the lowest possible priority value to this head bridge.
  • the NET network administrator when configuring this network, determines particular paths taken by service flow Ethernet frames by allowing or preventing these frames from being routed through the internal links of the different bridges of the NET virtual network. . Fixed administrator thus constraints called flow of service flow. Once the routing constraints have been defined, the administrator manually configures the transfer matrix Mt 1 of each bridge B, according to the routing constraints chosen, and this, by means of a network manager. According to the example of FIG. 2, each internal link l, k of each Ethernet bridge
  • the UEi user equipment can then directly exchange Ethernet frames with the user equipment UE 2 via the bridges Bi and B 2 without their exchanges passing through the headend bridge B 5 on which a
  • a service provider may want to connect a device C for controlling flow exchanges between users. This device C is shown in FIG. 2 as being part of the equipment E.
  • the network administrator defines service flow constraints that force each exchange of flows to pass necessarily through the headend bridge.
  • the STP protocol automatically initiates a new convergence as soon as this event is detected in order to determine a new logical topology of the NET virtual network, that is to say new associations of the port attributes. and determining the states of the different ports of the bridges of the virtual network NET taking into account the break of the segment connecting the bridges Bi and B 5 .
  • Fig. 4 represents a diagram of the result of this new convergence of the STP protocol.
  • the ports Pi 3 , P 2 3, P 3j3 and P 43 are now associated with the root attribute R and the ports P 2j2 , P 3i2 and P 4; 2 are now associated with the designated attribute D.
  • the port Pi 2 now associated with the alternate attribute A is in the blocking state.
  • the NET virtual network still does not work despite this new convergence of the STP protocol because the user equipments of the Gi G 2 and G 3 groups no longer have access to the network because of the definition of the routing constraints. It is necessary for the administrator to manually re-define the routing constraints via the network manager as quickly as possible so that users do not have a break in service access that is prolonged.
  • the aim of the present invention is to avoid that the introduction of routing constraints in a network makes it tedious for its administrator, the reconfiguration of a virtual network, determined from this network, and causes a loss quality of service when an event occurs on the network.
  • the present invention relates to a method of establishing service flow routing constraints in a network of bridges. interconnected between them, said routing constraints defining those internal links between ports of each of said decks whose establishment is prohibited, one of said bridges being considered to be the head-end bridge, said method comprising a step of association of bridge port attributes of the network in which is associated with the port, which provides the most direct access to said headend bridge, a root attribute.
  • the method is characterized in that it comprises:
  • said port attribute association step of a bridge being executed as soon as an event occurs on said network, said step of obtaining said associations between ports of each bridge and port attributes is preceded by a step detecting the updating of the attributes associated with the ports of at least one of said bridges.
  • said step of defining the routing constraints comprises a step of associating the root attribute associated with a port of a bridge with a so-called leading attribute and with each other attribute of a port. a bridge to a subscriber attribute, the establishment of an internal link between two ports of a bridge is then prohibited if one of these two ports is not associated with the head attribute.
  • each bridge being associated with an identifier formed inter alia of a priority value
  • the bridge which is considered to be the headend bridge is the bridge associated with the identifier whose priority value is the lowest among the priority values of the identifiers associated with the other bridges.
  • the present invention also relates to a device for setting service flow routing constraints intended to be associated with an Ethernet bridge of said network subjected to routing constraints.
  • the present invention relates to a computer program for establishing service flow routing constraints of an Ethernet bridge of a network subject to said routing constraints.
  • the said computer program implements the steps of the above method of establishing.
  • FIG. . 1 which represents a diagram of an example of a virtual network
  • FIG. 2 which represents an example of the virtual network obtained from the network of FIG. 1 following a convergence of the STP protocol
  • FIG. 3 which represents a diagram of the virtual local network of FIG. 2 when routing constraints were imposed during the configuration of this network
  • FIG. 4 which represents a diagram of the result of a new convergence of the STP protocol following an event occurring on the network of FIG. 3 according to the state of the art
  • FIG. 5 which represents a diagram of the result of a new convergence of the STP protocol following an event occurring on the network of FIG. 3 according to the present invention
  • FIG. 6 which is a flowchart of the steps of the service flow routing constraint method according to the present invention
  • FIG. 7 which shows a block diagram of a service flow routing setting apparatus according to the present invention.
  • the proposed invention is to define service flow routing constraints in a network, based on the port attributes associated with the service ports. each bridge of this network.
  • the routing constraints are then re-defined automatically according to rules for establishing internal links between the ports of each of these bridges.
  • Fig. 6 is a flow diagram of the steps of the service flow routing constraint method according to the present invention.
  • This method is intended to be executed by each bridge of a network as soon as a virtual network has been determined and at each port of each bridge has been assigned either a root attribute R, designated D, or alternating A.
  • the method starts with a step 200 of obtaining the associations between attributes and ports of a bridge B 1 .
  • step 200 three associations are obtained for each bridge B 1 , in particular the associations between the port Pij and the designated attribute D, the association between the port Pi 3 and the designated attribute D and the association between the Pi 2 port and the R root attribute.
  • Step 200 is followed by a step 300 of definition of the routing constraints relating to each bridge.
  • each bridge B 1 of the network can be associated with one or more routing constraints.
  • step 300 of definition of the routing constraints relating to a bridge B 1 the establishment of any internal link l 1 is prohibited ; k between two ports of a bridge B, if one of these two ports is not associated with the root attribute R.
  • the method of establishing routing constraints described above can be used during the configuration of a virtual network, thus avoiding an administrator having to manually configure the transfer matrices of the various bridges of this network.
  • the method can also be used when the configuration of a new logical topology of the virtual network, obtained as soon as an event occurs on this network.
  • step 200 it is advantageous for step 200 to be preceded by a step 100 of detecting the updating of the attributes associated with the ports of at least one of said bridges.
  • Fig. 5 illustrates the result of the execution of the routing constraint setting method according to the example of FIG. 4.
  • the link li i which was prohibited according to FIG. 4 is now allowed and the link I] 2 which was previously allowed is now prohibited according to FIG. 5.
  • said step 300 comprises a step of associating the root attribute R (associated with a port of a bridge) with a so-called head attribute H ⁇ Head in English and each other attribute of a port of a bridge to a subscriber attribute S (Subsc ⁇ ber in English), the establishment of an internal link between two ports of a bridge being then prohibited if one of these two ports are not associated with the H head attribute.
  • each bridge being associated with an identifier formed inter alia of a priority value
  • the bridge which is considered to be the headend bridge is the bridge associated with the identifier whose priority value is the lowest among the priority values of the identifiers associated with the other bridges.
  • said detection step 100 is implemented by software interrupt.
  • Fig. 7 is a block diagram of a service flow routing set-up device D according to the present invention.
  • the device D is intended to be associated with an Ethernet bridge B 1 of a network subject to said routing constraints.
  • the device D is integrated in the bridge B 1 but, according to another embodiment, the device D can only be associated with the bridge B 1 .
  • the bridge B 1 comprises a communication bus B to which are connected means PROC for processing digital data, a nonvolatile memory 15 ROMi a RAM ,, P ports, j associated to COM means for receiving and transmit service flow frames, MTT means 1 for transferring an incoming frame on a port P g to one or more other ports P 1; k and MAP means for associating an attribute with each of its ports and, in particular at the port that provides the most direct access to said head bridge the root attribute R.
  • the MAP means implement the STP protocol.
  • the bridge B 1 also includes a transfer matrix Mti which stores, on the one hand, the data defining the relationships between equipment (and / or bridges) and ports of this bridge, relationships that it has learned during a phase and on the other hand, the associations between ports of the bridge B, and port attributes determined by the MAP means 1 .
  • the device D comprises means MOA for obtaining said associations between ports of the bridge B 1 and port attributes, stored in the transfer matrix Mti and means MDA for defining transport constraints between the ports of the bridge B 1 as a function of the port attributes associated with each bridge port B 1 .
  • the means MDA prohibit the establishment of a link between two ports of the bridge B 1 if one of these two ports is not associated with the root attribute R.
  • each root attribute R associated with a port of the bridge B 1 is associated with the head attribute H and each other attribute of a port of the bridge B 1 is associated with the attribute d Subscriber S.
  • the establishment of an internal link between two ports of a bridge is then prohibited if one of these two ports is not associated with the attribute of head H.
  • the non-volatile memory ROM 1 then stores the PRG1 and PRG2 programs and digital data allow, among other things, their implementation. More generally, the ROM 1 is readable by the processing means PROC 1 , integrated or not to the bridge B 1 and can be removable.
  • the memory ROM thus stores the associations between port attributes and ports of the bridge B 1 and the data of the transfer matrix Mt 1 obtained, on the one hand, during a prior learning phase and on the other hand the data defining the routing constraints imposed on this transfer matrix.
  • the programs according to the present invention are transferred into the RAM RAM 1 which then contains the executable code of the invention as well as the data necessary for the implementation of the invention.
  • this program is interrupted and the program PRG2 is launched in order to redefine the routing constraints relating to this port.
  • the program PRG1 then resumes its execution as soon as the program PRG2 ends.

Abstract

The present invention relates to a method of establishing constraints on service stream routing in a local or infrastructure network consisting of interconnected bridges, said routing constraints defining those of the internal links between ports of each of said bridges whose establishment is prohibited, one of said bridges being considered to be the network head bridge, said method comprising a step of associating port attributes of bridges of the network, in the course of which a root attribute is associated with the port, which affords the most direct access to said network head bridge, characterized in that it comprises: - a step (200) of obtaining said associations between ports of each bridge and port attributes, and - a step (300) of defining routing constraints relating to each bridge in the course of which the establishment of any internal link between two ports of a bridge is prohibited if one of these two ports is not associated with the root attribute.

Description

Procédé d'établissement de contraintes d'acheminement de flux de service dans un réseau local virtuel Method for establishing service flow routing constraints in a VLAN
La présente invention concerne un procédé d'établissement de contraintes d'acheminement de flux de service dans un réseau local ou d'infrastructure constitué de ponts interconnectés entre eux.The present invention relates to a method of establishing service flow routing constraints in a local network or infrastructure consisting of interconnected bridges.
Il est connu des réseaux locaux ou d'infrastructure qui acheminent des flux de service par trames Ethernet soit entre un équipement d'un premier usager et un équipement d'un second usager, soit entre un équipement d'un premier usager et les équipements de plusieurs usagers dans le cas respectivement de communications point à point et de communications point à multipoints ou de communications multipoint à multipoint. Dans la suite de la description, le terme réseau sera utilisé pour désigner un réseau physique qu'il soit local ou d'infrastructure.Local or infrastructure networks are known that route Ethernet-based service flows either between a first user's equipment and a second user's equipment, or between a first user's equipment and the equipment of a first user. several users in the case of point-to-point and point-to-multipoint communications or multipoint-to-multipoint communications, respectively. In the remainder of the description, the term network will be used to designate a physical network that is local or infrastructure.
Afin de s'affranchir des contraintes de l'architecture physique d'un réseauTo overcome the constraints of the physical architecture of a network
(contraintes géographiques des équipements, contraintes d'adressage, etc.), il est commun de déterminer à partir de cette architecture un, voire plusieurs réseaux dits virtuels. Ces réseaux virtuels sont communément appelés VLAN (Virtuel Local Area Network) dans le cas de réseaux locaux mais cette appellation VLAN est également classiquement utilisée pour désigner un réseau virtuel déterminé à partir d'un réseau d'infrastructure.(geographic constraints of equipment, addressing constraints, etc.), it is common to determine from this architecture one or more so-called virtual networks. These virtual networks are commonly called VLANs (Virtual Local Area Network) in the case of local networks but this VLAN designation is also conventionally used to designate a virtual network determined from an infrastructure network.
Un réseau virtuel définit une topologie logique de l'architecture physique d'un réseau. Pour cela, les équipements d'usagers (abonnés, fournisseurs de service, utilisateurs professionnels, etc.) connectés à ce réseau sont tout d'abord regroupés soit sur la base de critères physiques tels que l'adresse MAC (Médium Access Control en anglais) propre à chaque équipement d'usager, soit sur les numéros de ports propres à chaque équipement d'usager, soit sur la base de services par exemple de couche 2, 3 ou supérieure du modèle OSI, soit sur la base de protocoles utilisés par chaque équipement d'usager pour communiquer.A virtual network defines a logical topology of the physical architecture of a network. For this purpose, the user equipment (subscribers, service providers, professional users, etc.) connected to this network are first grouped either on the basis of physical criteria such as the MAC (Medium Access Control) address. ) specific to each user equipment, either on the port numbers specific to each user equipment, or on the basis of services such as layer 2, 3 or higher of the OSI model, or on the basis of protocols used by each user equipment to communicate.
Les équipements d'usagers d'un réseau sont le plus souvent interconnectés par des équipements appelés ponts.The user equipment of a network is most often interconnected by equipment called bridges.
Ainsi, une fois les regroupements d'équipements d'usagers effectués à partir de l'architecture physique du réseau, les groupes d'équipements d'usagers obtenus sont interconnectés de manière logique entre eux par ces ponts pour former un réseau virtuel. On peut noter qu'un réseau virtuel peut également être créé pour chaque groupe d'équipements. On obtient alors des réseaux virtuels connectés par des ponts.Thus, once the user equipment groupings made from the physical architecture of the network, the groups of user equipment obtained are interconnected logically between them by these bridges to form a virtual network. It can be noted that a virtual network can also be created for each equipment group. Virtual networks connected by bridges are then obtained.
La plupart des ponts d'un réseau permet l'accès à des services car ils sont également reliés à un, voire plusieurs, groupes d'équipements et permettent alors l'échange de flux de services entre les équipements d'usagers appartenant à ce ou ces groupes. De plus, l'un de ces ponts, appelé pont de tête de réseau, est également relié à un équipement d'un fournisseur de services afin de fournir les flux de service à destination des équipements d'usagers de tous les groupes. Par la suite, nous considérerons des ponts dits Ethernet en référence au type de trames de flux de service qu'ils acheminent. Le réseau virtuel considéré par la suite sera donc un réseau virtuel de couche 2.Most bridges of a network allow access to services because they are also connected to one or more groups of equipment and then allow the exchange of service flows between user equipment belonging to this or these groups. In addition, one of these bridges, called the headend bridge, is also connected to a service provider's equipment to provide service flows to the user equipment of all groups. Subsequently, we will consider so-called Ethernet bridges with reference to the type of service flow frames they carry. The virtual network considered thereafter will be a layer 2 virtual network.
Un pont Ethernet est un dispositif qui comporte un certain nombre de ports (au moins deux) auxquels sont connectés des équipements d'usagers ou certains autres ponts du réseau. De plus, chaque pont Ethernet comporte une matrice de transfert (Bridge matrix en anglais) qui informe le pont de la liaison interne à établir entre deux (voire plusieurs) de ses ports lorsque qu'une trame de flux de service doit être transférée d'un équipement d'usager (ou d'un pont) vers un autre équipement d'usager (ou vers un autre pont). Pour cela, chaque pont subit une phase d'apprentissage qui lui permet de connaître le ou les équipements ou ponts qui sont connectés à chacun de ses ports. La matrice de transfert mémorise alors les relations entre chaque port et les adresses des équipements d'usagers ou ponts qui sont reliés à ce port.An Ethernet bridge is a device that has a number of ports (at least two) to which user devices or certain other bridges of the network are connected. In addition, each Ethernet bridge includes a bridge matrix that informs the bridge of the internal link to establish between two (or more) of its ports when a service flow frame is to be transferred from user equipment (or bridge) to another user equipment (or to another bridge). For this, each bridge undergoes a learning phase that allows to know the equipment or bridges that are connected to each of its ports. The transfer matrix then memorizes the relationships between each port and the addresses of the user equipment or bridges that are connected to this port.
Un réseau ne peut fonctionner que si les chemins entre ponts des trames Ethernet ne forment pas de boucles, ce qui a lieu lorsqu'une trame échangée passe deux fois par le même pont. En effet, lorsque des trames de diffusion seront envoyées sur un tel réseau, chaque pont les renvoie par tous ses ports. Les trames circulent alors en boucles et sont multipliées à chaque passage par un pont. Les trames n'ayant pas de durée de vie, elles peuvent donc tourner indéfiniment dans une des boucles du réseau local virtuel. C'est ce qui est couramment appelé « tempête de diffusion ».A network can only work if the paths between bridges of the Ethernet frames do not form loops, which occurs when an exchanged frame passes twice through the same bridge. Indeed, when broadcast frames will be sent on such a network, each bridge sends them through all its ports. The frames then circulate in loops and are multiplied each time by a bridge. The frames have no life, so they can turn indefinitely in one of the loops of the VLAN. This is commonly known as the "broadcast storm".
Afin d'éviter que de telles situations ne se produisent, il est nécessaire de définir un réseau virtuel dont la topologie logique est arborescente c'est-à-dire qui ne comporte pas de boucle. Pour cela, il est d'usage d'utiliser un protocole dit Spanning Tree (STP) défini par la norme ISO/IEC 15802-3:1998 (IEEE Std 802.1D-1998) ou l'une de ses extensions telles que le protocole RSTP (Rapid Spanning Tree Protocol) défini par l'annexe 802. Iw de la norme IEEE Std 802.1D-2004 ou encore le protocole MSTP (Multiple spanning Tree Protocol) défini par la norme IEEE Std 802.1s intégrée dans la norme 802. IQ.In order to prevent such situations from occurring, it is necessary to define a virtual network whose logical topology is arborescent, that is to say which has no loop. For this purpose, it is customary to use a spanning tree protocol (STP) defined by the ISO / IEC 15802-3: 1998 standard (IEEE Std 802.1D-1998) or one of its extensions such as the protocol Rapid Spanning Tree Protocol (RSTP) defined by Annex 802. Iw of the IEEE Std 802.1D-2004 standard or the Multiple Spanning Tree Protocol (MSTP) defined by the IEEE Std 802.1s standard integrated in the 802.1 standard. .
Nous nous limiterons à décrire par la suite le principe du protocole STP dans le cas d'un réseau simple afin de montrer comment une boucle d'un réseau peut être supprimée. On parle plutôt d'ouverture de boucle. Néanmoins, le protocole STP ainsi que ses extensions permettent d'ouvrir les boucles de réseaux bien plus complexes.We will limit ourselves to describing the principle of the STP protocol in the case of a simple network in order to show how a loop of a network can be suppressed. We are talking about opening a loop. Nevertheless, the STP protocol as well as its extensions make it possible to open much more complex network loops.
Le protocole STP permet l'échange régulier entre les ponts du réseau d'unités protocolaires appelées BPDU (Bridge Protocol Data Unit en anglais) afin d'obtenir une topologie arborescente du réseau virtuel ou afin qu'une nouvelle topologie de ce réseau virtuel puisse être déterminée dès lors qu'un événement survient sur le réseau (connexion d'un nouvel équipement, rupture d'un segment entre deux ponts, défaut de fonctionnement d'un pont,...).The STP protocol allows the regular exchange between the bridges of the network of protocol units called BPDUs (Bridge Protocol Data Unit in English) in order to obtain a tree topology of the virtual network or so that a new topology of this virtual network can be determined when an event occurs on the network (connection of a new equipment, rupture of a segment between two bridges, failure of a bridge, ...).
Le protocole STP est un protocole de couche 2, c'est-à-dire qu'il opère directement au niveau des ponts Ethernet du réseau. Ce protocole est dit convergent car à partir d'un nombre fini d'échanges d'unités BPDU, le rôle de chaque pont du réseau est défini afin de déterminer les chemins empruntés par les trames Ethernet.STP is a Layer 2 protocol, that is, it operates directly at the Ethernet bridges of the network. This protocol is said convergent because from a finite number of exchanges of BPDU units, the role of each bridge network is defined to determine the paths taken by the Ethernet frames.
Pour cela, le protocole STP se décompose en trois étapes successives qui sont respectivement une étape d'élection du pont racine (root bridge en anglais), une étape d'association des attributs de port et une étape d'affectation des états de port selon les associations des attributs de port.For this, the STP protocol is broken down into three successive steps which are respectively an election stage of the root bridge (root bridge in English), a step associating the port attributes and a step of assigning the port states according to the port attribute associations.
Au cours de l'étape d'élection du pont racine, les ponts du réseau se mettent d'accord pour élire l'un d'entre eux au rang de pont racine. Pour cela, à chaque pont B1 du réseau est associé un identifiant unique IDB, (Bridge Identifier en anglais).During the root bridge election stage, the network bridges agree to elect one of them as a root bridge. For this, each bridge B 1 of the network is associated with a unique identifier IDB (Bridge Identifier in English).
Chaque pont B, garde de plus en mémoire un paramètre IDR1 (Root Identifier en anglais) susceptible de prendre la valeur d'un identifiant de pont. L'identifiant IDB1 d'un pont comporte deux parties : d'une part, la priorité (exprimée sur 2 octets) et, d'autre part, l'adresse MAC du pont (exprimée sur 6 octets). La priorité d'un pont est selon la norme IEEE 802. ID définie par défaut égale pour tous les ponts. Cependant, comme on le verra par la suite, l'administrateur peut avoir intérêt à définir des valeurs de priorité différentes selon les ponts.Each bridge B, also keeps in memory a parameter IDR 1 (Root Identifier in English) likely to take the value of a bridge identifier. The identifier IDB 1 of a bridge has two parts: firstly, the priority (expressed on 2 bytes) and, on the other hand, the MAC address of the bridge (expressed on 6 bytes). The priority of a bridge is IEEE 802. The default ID is equal for all bridges. However, as we will see later, the administrator may have an interest in defining different priority values according to the bridges.
Au début de l'étape d'élection du pont racine, le paramètre IRD1 de chaque pontAt the beginning of the root bridge election step, the IRD parameter 1 of each bridge
B1 est égal à l'identifiant IDB1 du pont B1 qui le mémorise. Chaque pont B1 du réseau considère alors qu'il est le pont racine du réseau virtuel. Commence alors l'envoi d'une unité BPDU par un des ponts du réseau virtuel, par exemple par le pont B1, vers les autres ponts auxquels il est relié.B 1 is equal to the identifier IDB 1 of the bridge B 1 which stores it. Each bridge B 1 of the network then considers that it is the root bridge of the virtual network. Then begins sending a BPDU by one of the bridges of the virtual network, for example by the bridge B 1 , to the other bridges to which it is connected.
Admettons qu'un pont B1+I reçoive cette unité BPDU. Le pont B1+] compare alors l'identifiant de pont IDB1 contenu dans l'unité BPDU reçue avec son paramètre IDR1+] et deux cas peuvent alors se produire.Suppose a B 1 + I bridge receives this BPDU. The bridge B 1+ ] then compares the IDB bridge identifier 1 contained in the received BPDU unit with its parameter IDR 1+ ] and two cases can then occur.
Dans le cas où l'identifiant de pont IDB1 reçu par le pont B1+I a une valeur inférieure à celle du paramètre IDR1+I qu'il mémorise, la valeur de son paramètre IDR1+I est remplacée par l'identifiant de pont IDB1 reçu. Le pont B1+ 1 considère alors que le pont racine est le pont B1. Dans le cas où cet identifiant de pont IDB1 a une valeur supérieure à celle de son paramètre IDR1+I, le pont B,+i n'effectue aucun remplacement et continue à considérer que le pont racine est celui désigné par la valeur de son paramètre IDR1+I.In the case where the bridge identifier IDB 1 received by the bridge B 1 + I has a value lower than that of the parameter IDR 1+ I that it stores, the value of its parameter IDR 1 + I is replaced by the IDB bridge ID 1 received. The bridge B 1+ 1 then considers that the root bridge is the bridge B 1 . In the case where this bridge identifier IDB 1 has a value greater than that of its parameter IDR 1 + I , the bridge B, + i does not make any substitutions and continues to consider that the root bridge is the one designated by the value of its IDR 1 + I parameter.
Par l'échange de leurs valeurs de paramètre IDR1 via des unités BPDU, les ponts B1 du réseau virtuel finissent par tous avoir la même valeur de paramètre IDR, et par conséquent d'élire d'un commun accord un seul pont au rang de pont racine du réseau virtuel.By exchanging their IDR parameter values 1 via BPDUs, the bridges B 1 of the virtual network all end up having the same value of parameter IDR, and consequently to elect by common agreement a single bridge to rank root bridge of the virtual network.
L'étape d'association des attributs de port débute suite à l'étape d'élection du pont racine. Le but de cette étape est qu'un attribut dit de port soit associé à chaque port de chaque pont du réseau virtuel. L'attribut associé à un port définit le rôle joué par ce port dans la détermination des chemins des trames Ethernet à travers le réseau virtuel.The step of association of the attributes of port begins following the stage of election of the root bridge. The purpose of this step is that a so-called port attribute is associated with each port of each bridge of the virtual network. The attribute associated with a port defines the role played through this port in the determination of the paths of the Ethernet frames through the virtual network.
Lorsqu'un port est susceptible d'acheminer des trames Ethernet arrivant du pont racine vers les équipements d'usagers du groupe auquel il est connecté et d'acheminer les trames arrivant de ces équipements d'usagers vers le pont racine, l'attribut associé à ce port confère à ce port l'état dit de transfert. Selon la norme IEEE Std 802. ID- 2004, les attributs de port qui confèrent à ce port l'état de transfert sont les attributs 'désigné' {designated en anglais) et 'racine' {root en anglais). Ces deux termes sont à considérer par la suite au sens de la norme IEEE Std 802.1D-2004. Lorsqu'un port ne peut ni acheminer des trames Ethernet arrivant du pont racine vers les équipements d'usagers du groupe auquel il est connecté et ni acheminer les trames arrivant de ces équipements d'usagers vers le pont racine, l'attribut associé à ce port confère à ce port l'état dit de blocage. Selon la norme IEEE Std 802.1D-2004, les attributs de port qui confèrent à ce port l'état de blocage sont les attributs 'alterné' (alternate en anglais) encore appelé 'sauvegardé' (backup en anglais).When a port is able to route Ethernet frames arriving from the root bridge to the user equipment of the group to which it is connected and to route the frames arriving from these user equipments to the root bridge, the associated attribute to this port gives this port the so-called transfer status. According to the IEEE Standard Std 802. ID-2004, the port attributes that give this port the transfer status are the attributes 'designated' {designated in English) and 'root' (root). These two terms are to be considered later within the meaning of the IEEE Standard Std 802.1D-2004. When a port can not route Ethernet frames arriving from the root bridge to the user equipment of the group to which it is connected and neither route the frames arriving from these user devices to the root bridge, the attribute associated with this port gives this port the so-called blocking state. According to the IEEE Std 802.1D-2004 standard, the port attributes that give this port the blocking state are the 'alternate' (also known as 'backup') attributes.
Au cours de l'étape d'association des attributs de port, le protocole STP associe à chaque port des différents ponts l'attribut soit désigné (D), soit racine (R), soit alterné (A) qui permettra de définir si ce port est dans l'état soit de transfert soit de blocage. On notera que l'attribut racine est associé à un port de chaque pont autre que le pont racine. Pour cela, le port d'un pont est élu au rang de port racine lorsqu'il est en liaison avec le pont racine et qu'il permet que l'échange de trames entre ce pont et le pont racine soit le plus rapide parmi les échanges possibles entre les autres ports de ce pont et le pont racine. En d'autres termes, est élu port racine d'un pont celui qui procure l'accès le plus 'direct' de ce pont au pont racine. De plus, l'attribut désigné est associé à au moins un port de chaque pont. Enfin, les ports du pont racine sont tous associés à l'attribut 'désigné'. On peut se référer à la norme IEEE Std. 802. ID pour plus de détails.During the step of association of the attributes of port, the protocol STP associates with each port of the various bridges the attribute is designated (D), is root (R), or alternates (A) which will make it possible to define if this port is in the state of either transfer or blocking. Note that the root attribute is associated with a port of each bridge other than the root bridge. For this, the port of a bridge is elected to the rank of root port when it is in connection with the root bridge and allows that the exchange of frames between this bridge and the root bridge is the fastest among the possible exchanges between the other ports of this bridge and the root bridge. In other words, the root port of a bridge is the one that provides the most 'direct' access of this bridge to the root bridge. In addition, the designated attribute is associated with at least one port of each bridge. Finally, the root bridge ports are all associated with the 'designated' attribute. We can refer to the IEEE Std standard. 802. ID for more details.
Une fois que l'association de l'attribut désigné ou racine est réalisée, les ports de chaque pont qui ne sont pas associés ni à l'attribut racine ni à l'attribut désigné, sont associés à l'attribut alterné.Once the association of the designated attribute or root is performed, the ports of each bridge that are not associated with either the root attribute or the designated attribute are associated with the alternate attribute.
L'étape d'affectation des états de port suit l'étape d'association des attributs de port. Au cours de cette étape, chaque port associé à l'attribut désigné ou à l'attribut racine est considéré dans l'état de transfert et chaque port associé à l'attribut alterné est considéré dans l'état de blocage.The step of assigning the port states follows the step of associating the port attributes. In this step, each port associated with the designated attribute or attribute root is considered in the transfer state and each port associated with the alternate attribute is considered in the blocking state.
La Fig. 1 représente un schéma d'un exemple d'un réseau virtuel NET. Le réseau virtuel NET est constitué de cinq groupes d'équipements référencés G1 (i=l à 5) respectivement connectés aux cinq ponts Ethernet B, (i=l à 5) que comporte le réseau à partir duquel le réseau virtuel NET a été obtenu.Fig. 1 is a diagram of an example of a NET virtual network. The virtual network NET consists of five groups of equipment referenced G 1 (i = 1 to 5) respectively connected to the five Ethernet bridges B, (i = 1 to 5) that comprises the network from which the virtual network NET has been got.
Chaque pont Ethernet B1, selon cet exemple comporte trois ports P,j (j=l à 3) et une matrice de transfert référencée Mt1 qui définit les liaisons internes I1 k (k=l à 3) entre les trois ports P(J de chaque pont B1. On peut noter que pour faciliter l'exposé de l'invention, une liaison interne I1 ^ est ici considérée comme liant un port d'un pont à un seul autre des ports de ce pont. Cependant, une liaison interne peut également être considérée comme liant un port à plusieurs autres ports d'un même pont sans pour autant que l'invention n'en soit modifiée. Chaque flèche, à l'intérieur de la matrice de transfert Mt1, signifie que la liaison I1^ peut être établie. Sur la Fig. 1, seules les liaisons du pont Bi sont référencées li,k (k=l à 3).Each Ethernet bridge B 1 , according to this example comprises three ports P, j (j = 1 to 3) and a transfer matrix referenced Mt 1 which defines the internal links I 1 k (k = 1 to 3) between the three ports P (J of each bridge B 1. It may be noted that to facilitate the disclosure of the invention, an internal link I 1 ^ is here considered as linking a port of a bridge to only one other of the ports of this bridge. , an internal link can also be considered as linking a port to several other ports of the same bridge without the invention being modified, each arrow inside the transfer matrix Mt 1 means The link I 1 can be established in Fig. 1. Only the links of the bridge Bi are referenced li , k (k = 1 to 3).
La présente invention ne se limite pas aux ponts Ethernet à trois ports car la seule contrainte imposée à ces ponts est que le nombre de leurs ports soit supérieur ou égal à 2.The present invention is not limited to three-port Ethernet bridges because the only constraint imposed on these bridges is that the number of their ports is greater than or equal to 2.
Chaque groupe d'équipements comporte un certain nombre d'équipements d'usagers dont deux seulement sont représentés à la Fig. 1 : l'équipement d'usager EUi situé dans le groupe Gi et l'équipement d'usager EU2 situé dans le groupe G2. De plus, le groupe d'équipement G5 comporte un équipement E d'un opérateur ou fournisseur de service. Cet équipement est destiné à fournir les trames de flux de services à destination de tous les équipements d'usagers de tous les groupes d'équipements.Each equipment group comprises a certain number of user equipment of which only two are shown in FIG. 1: the user equipment EUi situated in the group Gi and the user equipment UE 2 located in the group G 2 . In addition, the equipment group G 5 comprises an equipment E of an operator or service provider. This equipment is intended to provide service flow frames for all user equipment of all equipment groups.
La topologie du réseau virtuel NET est une topologie en anneau c'est-à-dire que chaque pont du réseau virtuel est relié à deux autres de ses ponts. Cette topologie logique est utilisée par exemple lorsque l'architecture physique de ce réseau est du type sonet/SDH. Cet exemple de topologie a été choisi afin de faciliter les explications qui vont suivre. Cependant, la présente invention ne se limite pas à ce type de topologie logique mais peut s'appliquer à des réseaux virtuels dont la topologie est plus complexe que celle de la Fig. 1 , par exemple lorsque chaque pont est relié à plus de deux autres ponts. De plus, la présente invention n'est pas liée au type de l'architecture physique car la présente invention se situe en couche 2 du modèle OSI alors que l'architecture physique se situe elle en couche 1 de ce modèle.The topology of the virtual network NET is a ring topology that is to say that each bridge of the virtual network is connected to two other of its bridges. This logical topology is used for example when the physical architecture of this network is of the sonet / SDH type. This example of topology has been chosen to facilitate the explanations that follow. However, the present invention is not limited to this type of logical topology but can be applied to virtual networks whose topology is more complex than that of FIG. 1, for example when each bridge is connected to more than two other bridges. In addition, the present invention is not related to the type of the physical architecture because the present invention is in layer 2 of the OSI model while the physical architecture is in layer 1 of this model.
La Fig. 2 représente un exemple du réseau virtuel NET suite à une convergence du protocole STP. Selon l'exemple donné par cette figure, les ports Pi 2, P2 2, P3,2 et P43 sont associés à l'attribut racine R et les ports Pii3, P2j3, P3j3, P5i2 et P5 3 sont associés à l'attribut désigné D. Enfin, le port P42 qui est associé à l'attribut alterné A est dans l'état de blocage ouvrant ainsi de manière logique la boucle formée par la topologie en anneau de ce réseau virtuel (le segment 'bloqué' entre les ports P4 2 et P3;3 est en pointillé sur la Fig. 2). Le port de chaque pont qui relie un groupe d'équipements d'usagers à ce pont est associé à l'attribut désigné D afin que ce port soit dans l'état de transfert.Fig. 2 represents an example of the NET virtual network following a convergence of the STP protocol. According to the example given by this figure, the ports Pi 2 , P 2 2 , P 3 , 2 and P 43 are associated with the root attribute R and the ports Pi i3 , P 2j3 , P 3j3 , P 5i 2 and P 5 3 are associated with the designated attribute D. Finally, the port P 42 which is associated with the alternate attribute A is in the blocking state thus logically opening the loop formed by the ring topology of this virtual network ( the segment 'blocked' between the ports P 4 2 and P 3; 3 is in dotted line in Fig. 2). The port of each bridge connecting a user equipment group to this bridge is associated with the designated attribute D so that this port is in the transfer state.
On peut noter que le protocole STP surveille en permanence l'évolution de la topologie logique qu'il vient de déterminer. On parle en général de topologie active. Pour cela, chaque port en état de transfert d'un pont B1 envoie à intervalle régulier une unité BPDU au port d'un autre pont Bj auquel il est relié.It can be noted that the STP protocol continuously monitors the evolution of the logical topology that it has just determined. We usually talk about active topology. For this purpose, each port in the transfer state of a bridge B 1 regularly sends a BPDU to the port of another bridge B j to which it is connected.
Cet autre port peut être dans l'état de transfert mais également dans l'état de blocage. Ainsi, dès lors qu'un port du pont Bj qui est susceptible de recevoir à intervalle régulier ces unités BPDU ne reçoit plus ces unités, le protocole STP considère alors qu'un événement s'est produit sur le segment qui relie ces deux ports et relance une convergence afin d'obtenir une nouvelle topologie logique du réseau virtuel sans prendre en compte ce segment.This other port can be in the transfer state but also in the blocking state. Thus, since a port of the bridge B j which is likely to receive at regular intervals these BPDU units no longer receive these units, the STP protocol then considers that an event has occurred on the segment connecting these two ports. and restart a convergence to obtain a new logical topology of the virtual network without taking into account this segment.
Le protocole STP détermine qu'un des ponts d'un réseau virtuel est élu pont racine. Il est possible de contraindre le protocole STP à élire toujours le même pont au rang de pont racine. Ceci est utile, en particulier, pour que ce pont racine soit le pont de tête du réseau. Pour cela, le protocole STP élisant le pont racine à partir des identifiants associés à ces ponts et ces identifiants étant définis, entre autre à partir d'une valeur de priorité, l'administrateur peut contraindre ce protocole à toujours élire le pont racine comme étant le pont de tête en affectant la valeur de priorité la plus basse possible à ce pont de tête.The STP protocol determines that one of the bridges of a virtual network is elected root bridge. It is possible to force the STP protocol to always elect the same bridge as a root bridge. This is useful, in particular, for this root bridge to be the bridgehead of the network. For this, the STP protocol electing the root bridge from the identifiers associated with these bridges and these identifiers being defined, among others from a priority value, the administrator can force this protocol to always elect the root bridge as being the head bridge by assigning the lowest possible priority value to this head bridge.
L'administrateur du réseau virtuel NET, lors de la configuration de ce réseau , détermine des chemins particuliers empruntés par des trames Ethernet de flux de service en autorisant ou en interdisant que ces trames soient acheminées par les liaisons internes des différents ponts du réseau virtuel NET. L'administrateur fixe ainsi des contraintes dites d'acheminement de flux de service. Une fois les contraintes d'acheminement définies, l'administrateur configure manuellement la matrice de transfert Mt1 de chaque pont B, selon les contraintes d'acheminement choisies et, ce, au moyen d'un gestionnaire de réseau. Selon l'exemple de la Fig. 2, chaque liaison interne l, k de chaque pont EthernetThe NET network administrator, when configuring this network, determines particular paths taken by service flow Ethernet frames by allowing or preventing these frames from being routed through the internal links of the different bridges of the NET virtual network. . Fixed administrator thus constraints called flow of service flow. Once the routing constraints have been defined, the administrator manually configures the transfer matrix Mt 1 of each bridge B, according to the routing constraints chosen, and this, by means of a network manager. According to the example of FIG. 2, each internal link l, k of each Ethernet bridge
B, est autorisée, c'est-à-dire qu'aucune contrainte d'acheminement particulière n'est imposée à la matrice de transfert Mt1 de chaque pont B1. L'équipement de l'usager EUi peut alors directement échanger des trames Ethernet avec l'équipement d'usager EU2 via les ponts Bi et B2 sans pour cela que leurs échanges passent par le pont de tête de réseau B5 sur lequel un fournisseur de service peut vouloir, par exemple, connecter un dispositif C de contrôle d'échanges de flux entre usagers. Ce dispositif C est représenté sur la Fig. 2 comme étant intégré à l'équipement E.B, is allowed, that is to say that no particular routing constraint is imposed on the transfer matrix Mt 1 of each bridge B 1 . The UEi user equipment can then directly exchange Ethernet frames with the user equipment UE 2 via the bridges Bi and B 2 without their exchanges passing through the headend bridge B 5 on which a For example, a service provider may want to connect a device C for controlling flow exchanges between users. This device C is shown in FIG. 2 as being part of the equipment E.
Pour pallier ce problème d'échange direct de flux entre équipements d'usagers, échange qui n'est pas souhaité par les opérateurs et autres fournisseurs de services qui souhaitent protéger tout usage frauduleux de leurs flux de services, l'administrateur du réseau définit des contraintes d'acheminement de flux de service qui obligent chaque échange de flux à passer obligatoirement par le pont de tête de réseau.To overcome this problem of direct exchange of user equipment flows, an exchange that is not desired by operators and other service providers who wish to protect any fraudulent use of their service flows, the network administrator defines service flow constraints that force each exchange of flows to pass necessarily through the headend bridge.
La Fig. 3 représente un schéma du réseau virtuel NET lorsque de telles contraintes ont été imposées lors de la configuration de ce réseau. Selon ces contraintes d'acheminement, l'établissement des liaisons lij2 et I1 3 du pont Bi est autorisé tandis que l'établissement de la liaison interne li i de ce pont Bi (liaison entre les ports Pi,i et Pj 3) est interdit. Cette contrainte d'acheminement est schématiquement illustrée sur la Fig. 3 par la suppression de la flèche entre les ports Pi=i et P I 3. On peut noter que, selon l'exemple de la Fig. 3, les matrices de transfert des ponts B, autres que le pont racine B5, ont également été contraintes par une contrainte similaire à celle imposée à la matrice de transfert Mtj. Ainsi, lorsque les équipements d'usagers EUi et EU2 échangent des trames Ethernet, ces trames transitent systématiquement par le pont de tête de réseau B5 et l'opérateur peut alors contrôler les échanges de flux entre ces deux équipements d'usagers à partir du dispositif C.Fig. 3 represents a diagram of the virtual network NET when such constraints have been imposed during the configuration of this network. According to these routing constraints, the establishment of the links li j2 and I 1 3 of the bridge Bi is authorized while the establishment of the internal link li i of this bridge Bi (connection between the ports Pi , i and Pj 3 ) forbidden. This routing constraint is schematically illustrated in FIG. 3 by removing the arrow between the ports Pi = i and P I 3 . It may be noted that according to the example of FIG. 3, the bridge transfer matrices B, other than the root bridge B 5 , were also constrained by a constraint similar to that imposed on the transfer matrix Mtj. Thus, when the UEi and UE 2 user equipments exchange Ethernet frames, these frames routinely pass through the headend bridge B 5 and the operator can then control the flow exchanges between these two user equipments from of the device C.
Considérons maintenant le cas où un événement survient sur le réseau lorsque celui-ci correspond au réseau virtuel NET tel que configuré selon l'exemple de la Fig. 3. Cet événement est par exemple la rupture du segment entre les ponts Bi et B5, illustrée sur la Fig. 3 par la croix référencée X. Les échanges en cours entre les équipements d'usagers EU1 et EU2, entre autres, sont alors interrompus ou sont rendus impossibles du fait des contraintes d'acheminement. Ces contraintes interdisent aux trames Ethernet d'être échangées entre les ponts Bi et B2 et de plus la contrainte d'acheminement n'est plus respectée. Le pont B5 est maintenant inaccessible via le segment reliant les ponts Bj et B5.Consider now the case where an event occurs on the network when it corresponds to the virtual network NET as configured according to the example of FIG. 3. This event is for example the breaking of the segment between the bridges Bi and B 5 , illustrated in FIG. 3 by the cross referenced X. The exchanges in progress between the User equipment EU 1 and EU 2 , among others, are then interrupted or made impossible because of the routing constraints. These constraints prevent Ethernet frames from being exchanged between the bridges Bi and B 2 and furthermore the routing constraint is no longer respected. The bridge B 5 is now inaccessible via the segment connecting the bridges Bj and B 5 .
Le protocole STP, comme on l'a vu précédemment, lance alors automatiquement une nouvelle convergence dès la détection de cet événement afin de déterminer une nouvelle topologie logique du réseau virtuel NET, c'est-à-dire de nouvelles associations des attributs de port et de détermination des états des différents ports des ponts du réseau virtuel NET en tenant compte de la rupture du segment reliant les ponts Bi et B5.The STP protocol, as we have seen previously, then automatically initiates a new convergence as soon as this event is detected in order to determine a new logical topology of the NET virtual network, that is to say new associations of the port attributes. and determining the states of the different ports of the bridges of the virtual network NET taking into account the break of the segment connecting the bridges Bi and B 5 .
La Fig. 4 représente un schéma du résultat de cette nouvelle convergence du protocole STP. Les ports Pi 3, P23, P3j3 et P43 sont maintenant associés à l'attribut racine R et les ports P2j2, P3i2 et P4;2 sont maintenant associés à l'attribut désigné D. Enfin, le port Pi 2 maintenant associé à l'attribut alterné A est dans l'état de blocage.Fig. 4 represents a diagram of the result of this new convergence of the STP protocol. The ports Pi 3 , P 2 3, P 3j3 and P 43 are now associated with the root attribute R and the ports P 2j2 , P 3i2 and P 4; 2 are now associated with the designated attribute D. Finally, the port Pi 2 now associated with the alternate attribute A is in the blocking state.
Cependant, le réseau virtuel NET ne fonctionne toujours pas malgré cette nouvelle convergence du protocole STP car les équipements d'usagers des groupes Gi G2 et G3 n'ont plus accès au réseau à cause de la définition des contraintes d'acheminement. Il est nécessaire pour cela que l'administrateur re-définisse manuellement les contraintes d'acheminement via le gestionnaire de réseau et ce le plus rapidement possible afin que les usagers n'aient pas une rupture d'accès au service qui se prolonge.However, the NET virtual network still does not work despite this new convergence of the STP protocol because the user equipments of the Gi G 2 and G 3 groups no longer have access to the network because of the definition of the routing constraints. It is necessary for the administrator to manually re-define the routing constraints via the network manager as quickly as possible so that users do not have a break in service access that is prolonged.
Cette mise à jour des contraintes d'acheminement est en général fastidieuse pour l'administrateur qui devra intervenir sur chaque pont du réseau. En pratique, l'administrateur du réseau préfère le plus souvent ne pas modifier les contraintes d'acheminement mais plutôt réparer l'événement au plus vite. Une telle stratégie implique un risque de perte de qualité de service importante pour les usagers dans le cas où une telle réparation se prolonge dans le temps.This update of the routing constraints is generally tedious for the administrator who will have to intervene on each bridge of the network. In practice, the network administrator most often prefers not to modify the routing constraints but rather to repair the event as quickly as possible. Such a strategy implies a risk of loss of quality of service important for users in the event that such a repair is extended over time.
Le but de la présente invention est d'éviter que l'introduction de contraintes d'acheminement dans un réseau ne rende fastidieuse, pour son administrateur, la reconfiguration d'un réseau virtuel, déterminé à partir de ce réseau, et ne provoque une perte de qualité de service lorsqu'un événement survient sur le réseau.The aim of the present invention is to avoid that the introduction of routing constraints in a network makes it tedious for its administrator, the reconfiguration of a virtual network, determined from this network, and causes a loss quality of service when an event occurs on the network.
A cet effet, la présente invention concerne un procédé d'établissement de contraintes d'acheminement de flux de service dans un réseau constitué de ponts interconnectés entre eux, lesdites contraintes d'acheminement définissant celles des liaisons internes entre ports de chacun desdits ponts dont l'établissement est interdit, l'un desdits ponts étant considéré comme étant le pont de tête de réseau, ledit procédé comportant une étape d'association d'attributs de port des ponts du réseau au cours de laquelle est associé au port, qui procure l'accès le plus direct audit pont de tête de réseau, un attribut racine. Le procédé est caractérisé en ce qu'il comporte :For this purpose, the present invention relates to a method of establishing service flow routing constraints in a network of bridges. interconnected between them, said routing constraints defining those internal links between ports of each of said decks whose establishment is prohibited, one of said bridges being considered to be the head-end bridge, said method comprising a step of association of bridge port attributes of the network in which is associated with the port, which provides the most direct access to said headend bridge, a root attribute. The method is characterized in that it comprises:
- une étape d'obtention desdites associations entre ports de chaque pont et attributs de port, eta step of obtaining said associations between ports of each bridge and port attributes, and
- une étape de définition des contraintes d'acheminement relatives à chaque pont au cours de laquelle est interdit l'établissement de toute liaison interne entre deux ports d'un pont si l'un de ces deux ports n'est pas associé à l'attribut racine.a step of defining the routing constraints relating to each bridge during which the establishment of any internal link between two ports of a bridge is forbidden if one of these two ports is not associated with the root attribute.
Avantageusement, ladite étape d'association d'attribut de port d'un pont étant exécutée dès qu'un événement survient sur ledit réseau, ladite étape d'obtention desdites associations entre ports de chaque pont et attributs de port est précédée d'une étape de détection de la mise à jour des attributs associés aux ports d'au moins un desdits ponts.Advantageously, said port attribute association step of a bridge being executed as soon as an event occurs on said network, said step of obtaining said associations between ports of each bridge and port attributes is preceded by a step detecting the updating of the attributes associated with the ports of at least one of said bridges.
Ainsi, le procédé selon la présente invention peut également être utilisé lors de l'obtention d'une nouvelle topologie logique d'un réseau virtuel déterminée à partir dudit réseau dès qu'un événement survient sur ce réseau. Selon un mode de réalisation, ladite étape de définition des contraintes d'acheminement comporte une étape d'association de l'attribut racine associé à un port d'un pont à un attribut dit de tête et de chaque autre attribut d'un port d'un pont à un attribut dit d'abonné, l'établissement d'une liaison interne entre deux ports d'un pont étant alors interdit si l'un de ces deux ports n'est pas associé à l'attribut de tête. Avantageusement, chaque pont étant associé à un identifiant formé entre autre d'une valeur de priorité, le pont qui est considéré comme étant le pont de tête de réseau est le pont associé à l'identifiant dont la valeur de priorité est la plus faible parmi les valeurs de priorité des identifiants associés aux autres ponts.Thus, the method according to the present invention can also be used when obtaining a new logical topology of a virtual network determined from said network as soon as an event occurs on this network. According to one embodiment, said step of defining the routing constraints comprises a step of associating the root attribute associated with a port of a bridge with a so-called leading attribute and with each other attribute of a port. a bridge to a subscriber attribute, the establishment of an internal link between two ports of a bridge is then prohibited if one of these two ports is not associated with the head attribute. Advantageously, each bridge being associated with an identifier formed inter alia of a priority value, the bridge which is considered to be the headend bridge is the bridge associated with the identifier whose priority value is the lowest among the priority values of the identifiers associated with the other bridges.
Ainsi, en affectant la valeur de priorité la plus faible au pont dudit réseau qui est connecté à un équipement d'un opérateur de service, un seul et même pont sera toujours considéré comme étant le pont de tête et l'opérateur pourra ainsi connecter à ce pont de tête un équipement qui lui permettra de délivrer et/ou de contrôler les flux de service qui transitent sur le réseau même si ces flux transitent entre usagers. Selon un mode de réalisation du procédé, lesdites contraintes d'acheminement sont définies à partir d'un réseau virtuel déterminé à partir dudit réseau, une topologie logique dudit réseau virtuel est alors obtenue suite à une convergence d'un protocole de type STP. Selon l'un de ses aspects matériels, la présente invention concerne également un dispositif d'établissement de contraintes d'acheminement de flux de service destiné à être associé avec un pont Ethernet dudit réseau soumis audites contraintes d' acheminement.Thus, by assigning the lowest priority value to the bridge of said network which is connected to a service operator's equipment, one and the same bridge will always be considered as the head bridge and the operator can thus connect to this bridge head equipment that will allow it to deliver and / or control the flow of service that pass through the network even if these flows pass between users. According to one embodiment of the method, said routing constraints are defined from a virtual network determined from said network, a logical topology of said virtual network is then obtained following a convergence of an STP type protocol. According to one of its material aspects, the present invention also relates to a device for setting service flow routing constraints intended to be associated with an Ethernet bridge of said network subjected to routing constraints.
Selon un autre de ses aspects, la présente invention concerne un programme d'ordinateur destiné à établir des contraintes d'acheminement de flux de service d'un pont Ethernet d'un réseau soumis auxdites contraintes d'acheminement. Ledit programme d'ordinateur met en œuvre les étapes du procédé d'établissement ci- dessus.In another of its aspects, the present invention relates to a computer program for establishing service flow routing constraints of an Ethernet bridge of a network subject to said routing constraints. The said computer program implements the steps of the above method of establishing.
Les caractéristiques de l'invention mentionnées ci-dessus, ainsi que d'autres, apparaîtront plus clairement à la lecture de la description suivante d'un exemple de réalisation, ladite description étant faite en relation avec les dessins joints, parmi lesquels: la Fig. 1 qui représente un schéma d'un exemple d'un réseau virtuel, la Fig. 2 qui représente un exemple du réseau virtuel obtenu à partir du réseau de la Fig. 1 suite à une convergence du protocole STP, la Fig. 3 qui représente un schéma du réseau local virtuel de la Fig. 2 lorsque des contraintes d'acheminement ont été imposées lors de la configuration de ce réseau, la Fig. 4 qui représente un schéma du résultat d'une nouvelle convergence du protocole STP suite à un événement survenu sur le réseau de la Fig. 3 selon l'état de la technique, la Fig. 5 qui représente un schéma du résultat d'une nouvelle convergence du protocole STP suite à un événement survenu sur le réseau de la Fig. 3 selon la présente invention, la Fig. 6 qui représente un diagramme des étapes du procédé d'établissement de contraintes d'acheminement de flux de service selon la présente invention, et la Fig. 7 qui représente un schéma synoptique d'un dispositif d'établissement de contraintes d'acheminement de flux de service selon la présente invention.The characteristics of the invention mentioned above, as well as others, will appear more clearly on reading the following description of an exemplary embodiment, said description being made in connection with the attached drawings, among which: FIG. . 1 which represents a diagram of an example of a virtual network, FIG. 2 which represents an example of the virtual network obtained from the network of FIG. 1 following a convergence of the STP protocol, FIG. 3 which represents a diagram of the virtual local network of FIG. 2 when routing constraints were imposed during the configuration of this network, FIG. 4 which represents a diagram of the result of a new convergence of the STP protocol following an event occurring on the network of FIG. 3 according to the state of the art, FIG. 5 which represents a diagram of the result of a new convergence of the STP protocol following an event occurring on the network of FIG. 3 according to the present invention, FIG. 6 which is a flowchart of the steps of the service flow routing constraint method according to the present invention, and FIG. 7 which shows a block diagram of a service flow routing setting apparatus according to the present invention.
L'invention proposée consiste à définir des contraintes d'acheminement de flux de services dans un réseau, en fonction des attributs de port associés aux ports de chaque pont de ce réseau. Ainsi, dès qu'un nouvel attribut de port est associé à un port d'un pont, notamment dès qu'un événement survient dans le réseau et que les attributs de port ont été mis à jour automatiquement, les contraintes d'acheminement sont alors re-définies automatiquement selon des règles d'établissement des liaisons internes entre les ports de chacun de ces ponts.The proposed invention is to define service flow routing constraints in a network, based on the port attributes associated with the service ports. each bridge of this network. Thus, as soon as a new port attribute is associated with a port of a bridge, especially as soon as an event occurs in the network and the port attributes have been updated automatically, the routing constraints are then re-defined automatically according to rules for establishing internal links between the ports of each of these bridges.
La Fig. 6 représente un diagramme des étapes du procédé d'établissement de contraintes d'acheminement de flux de service selon la présente invention.Fig. 6 is a flow diagram of the steps of the service flow routing constraint method according to the present invention.
Ce procédé est destiné à être exécuté par chaque pont d'un réseau dès lors qu'un réseau virtuel a été déterminé et qu'à chaque port de chaque pont a été attribué soit un attribut racine R, soit désigné D, soit alterné A.This method is intended to be executed by each bridge of a network as soon as a virtual network has been determined and at each port of each bridge has been assigned either a root attribute R, designated D, or alternating A.
Le procédé débute par une étape 200 d'obtention des associations entre attributs et ports d'un pont B1. En reprenant l'exemple de la Fig. 2, au cours de l'étape 200, trois associations sont obtenues pour chaque pont B1, notamment les associations entre le port Pij et l'attribut désigné D, l'association entre le port Pi 3 et l'attribut désigné D et l'association entre le port Pi 2 l'attribut racine R.The method starts with a step 200 of obtaining the associations between attributes and ports of a bridge B 1 . Following the example of FIG. 2, during step 200, three associations are obtained for each bridge B 1 , in particular the associations between the port Pij and the designated attribute D, the association between the port Pi 3 and the designated attribute D and the association between the Pi 2 port and the R root attribute.
L'étape 200 est suivie d'une étape 300 de définition des contraintes d'acheminement relatives à chaque pont. A chaque pont B1 du réseau peut être associée une voire plusieurs contraintes d'acheminement.Step 200 is followed by a step 300 of definition of the routing constraints relating to each bridge. At each bridge B 1 of the network can be associated with one or more routing constraints.
Au cours de l'étape 300 de définition des contraintes d'acheminement relatives à un pont B1, est interdit l'établissement de toute liaison interne l1;k entre deux ports d'un pont B, si l'un de ces deux ports n'est pas associé à l'attribut racine R.During the step 300 of definition of the routing constraints relating to a bridge B 1 , the establishment of any internal link l 1 is prohibited ; k between two ports of a bridge B, if one of these two ports is not associated with the root attribute R.
Prenons l'exemple du pont B] défini selon l'exemple de configuration du réseau virtuel NET donné par la Fig. 2. Trois liaisons I] 1, li;2 et lii3 peuvent potentiellement être établies selon les trames à transférer et le contenu de la matrice de transfert Mti comme expliqué dans la partie introductive. Au cours de l'étape 300, l'établissement de la liaison Ii j définie entre les ports Pi i et Pi 3 est interdit selon la règle précédemment énoncée car ni le port Pi ,i, ni le Pj 3 ne sont associés à l'attribut racineTake the example of the bridge B] defined according to the configuration example of the virtual network NET given in FIG. 2. Three links I] 1 , li ; 2 and li i3 can potentially be established according to the frames to be transferred and the contents of the transfer matrix Mti as explained in the introductory part. During the step 300, the establishment of the link Ii j defined between the ports Pi i and Pi 3 is prohibited according to the rule previously stated because neither the port Pi , i , nor the Pj 3 are associated with the root attribute
R. Par contre, l'établissement de la liaison I] 2 qui est définie entre les ports Pi,i et Pi;2 est autorisé, selon la règle précédemment énoncée, car le port Pi 2 est associé avec l'attribut racine R. Il en est de même de la liaison I] 3.A. On the other hand, the establishment of the link I] 2 which is defined between the ports Pi, i and Pi ; 2 is authorized, according to the rule previously stated, because the port Pi 2 is associated with the root attribute R. It is the same for the link I] 3 .
Le procédé d'établissement de contraintes d'acheminement décrit ci-dessus peut être utilisé lors de la configuration d'un réseau virtuel, évitant ainsi à un administrateur de devoir configurer manuellement les matrices de transfert des différents ponts de ce réseau. Cependant, le procédé peut également être utilisé lors de la configuration d'une nouvelle topologie logique du réseau virtuel, obtenue dès qu'un événement survient sur ce réseau.The method of establishing routing constraints described above can be used during the configuration of a virtual network, thus avoiding an administrator having to manually configure the transfer matrices of the various bridges of this network. However, the method can also be used when the configuration of a new logical topology of the virtual network, obtained as soon as an event occurs on this network.
Ainsi, il est avantageux que l'étape 200 soit précédée d'une étape 100 de détection de la mise à jour des attributs associés aux ports d'au moins un desdits ponts.Thus, it is advantageous for step 200 to be preceded by a step 100 of detecting the updating of the attributes associated with the ports of at least one of said bridges.
La Fig. 5 illustre le résultat de l'exécution du procédé d'établissement de contraintes d'acheminement selon l'exemple de la Fig. 4. En particulier, concernant le pont Bi, la liaison li i qui était interdite selon la Fig. 4 est maintenant autorisée et la liaison I] 2 qui était jusque là autorisée est maintenant interdite selon la Fig. 5. Selon un mode de réalisation de l'étape 300, ladite étape 300 comporte une étape d'association de l'attribut racine R (associé à un port d'un pont) à un attribut dit de tête H {Head en anglais) et de chaque autre attribut d'un port d'un pont à un attribut dit d'abonné S (Subscήber en anglais), l'établissement d'une liaison interne entre deux ports d'un pont étant alors interdit si l'un de ces deux ports n'est pas associé à l'attribut de tête H.Fig. 5 illustrates the result of the execution of the routing constraint setting method according to the example of FIG. 4. In particular, concerning the bridge Bi, the link li i which was prohibited according to FIG. 4 is now allowed and the link I] 2 which was previously allowed is now prohibited according to FIG. 5. According to an embodiment of step 300, said step 300 comprises a step of associating the root attribute R (associated with a port of a bridge) with a so-called head attribute H {Head in English and each other attribute of a port of a bridge to a subscriber attribute S (Subscήber in English), the establishment of an internal link between two ports of a bridge being then prohibited if one of these two ports are not associated with the H head attribute.
Avantageusement, chaque pont étant associé à un identifiant formé entre autre d'une valeur de priorité, le pont qui est considéré comme étant le pont de tête de réseau est le pont associé à l'identifiant dont la valeur de priorité est la plus faible parmi les valeurs de priorité des identifiants associés aux autres ponts. Selon un mode de réalisation de l'invention, les étapes 200 et 300 étant mises en œuvre par un programme d'ordinateur, ladite étape de détection 100 est mise en œuvre par interruption logicielle.Advantageously, each bridge being associated with an identifier formed inter alia of a priority value, the bridge which is considered to be the headend bridge is the bridge associated with the identifier whose priority value is the lowest among the priority values of the identifiers associated with the other bridges. According to one embodiment of the invention, the steps 200 and 300 being implemented by a computer program, said detection step 100 is implemented by software interrupt.
La Fig. 7 représente un schéma synoptique d'un dispositif D d'établissement de contraintes d'acheminement de flux de service selon la présente invention. Le dispositif D est destiné à être associé avec un pont Ethernet B1 d'un réseau soumis auxdites contraintes d'acheminement. Selon le mode de réalisation représenté à la Fig. 7, le dispositif D est intégré dans le pont B1 mais, selon un autre mode de réalisation, le dispositif D peut être seulement associé au pont B1.Fig. 7 is a block diagram of a service flow routing set-up device D according to the present invention. The device D is intended to be associated with an Ethernet bridge B 1 of a network subject to said routing constraints. According to the embodiment shown in FIG. 7, the device D is integrated in the bridge B 1 but, according to another embodiment, the device D can only be associated with the bridge B 1 .
Le pont B1 comporte un bus de communication B auquel sont reliés des moyens PROC de traitement de données numériques, une mémoire non volatile ROMi15 une mémoire vive RAM,, des ports P,j qui sont associés à des moyens COM, pour recevoir et émettre des trames de flux de service, des moyens MTT1 pour transférer une trame entrante sur un port Pg vers un, voire plusieurs autres ports P1;k et des moyens MAP, pour associer un attribut à chacun de ses ports et, notamment au port qui procure l'accès le plus direct audit pont de tête l'attribut racine R. Les moyens MAP, mettent en œuvre le protocole STP. Le pont B1 comporte également une matrice de transfert Mti qui mémorise, d'une part, les données définissant les relations entre équipements (et/ou ponts) et ports de ce pont, relations qu'elle a apprise au cours d'une phase d'apprentissage et, d'autre part, les associations entre ports du pont B, et attributs de port déterminées par les moyens MAP1.The bridge B 1 comprises a communication bus B to which are connected means PROC for processing digital data, a nonvolatile memory 15 ROMi a RAM ,, P ports, j associated to COM means for receiving and transmit service flow frames, MTT means 1 for transferring an incoming frame on a port P g to one or more other ports P 1; k and MAP means for associating an attribute with each of its ports and, in particular at the port that provides the most direct access to said head bridge the root attribute R. The MAP means implement the STP protocol. The bridge B 1 also includes a transfer matrix Mti which stores, on the one hand, the data defining the relationships between equipment (and / or bridges) and ports of this bridge, relationships that it has learned during a phase and on the other hand, the associations between ports of the bridge B, and port attributes determined by the MAP means 1 .
Le dispositif D comporte des moyens MOA pour obtenir lesdites associations entre ports du pont B1 et attributs de port, mémorisées dans la matrice de transfert Mti et des moyens MDA pour définir des contraintes d'acheminement entre les ports du pont B1 en fonction des attributs de port associés à chaque port du pont B1.The device D comprises means MOA for obtaining said associations between ports of the bridge B 1 and port attributes, stored in the transfer matrix Mti and means MDA for defining transport constraints between the ports of the bridge B 1 as a function of the port attributes associated with each bridge port B 1 .
Selon la présente invention, les moyens MDA interdisent l'établissement d'une liaison entre deux ports du pont B1 si l'un de ces deux ports n'est pas associé à l'attribut racine R.According to the present invention, the means MDA prohibit the establishment of a link between two ports of the bridge B 1 if one of these two ports is not associated with the root attribute R.
Selon un autre mode de réalisation des moyens MDA, chaque attribut racine R associé à un port du pont B1 est associé à l'attribut de tête H et chaque autre attribut d'un port du pont B1 est associé à l'attribut d'abonné S. L'établissement d'une liaison interne entre deux ports d'un pont est alors interdit si l'un de ces deux ports n'est pas associé à l'attribut de tête H.According to another embodiment of the means MDA, each root attribute R associated with a port of the bridge B 1 is associated with the head attribute H and each other attribute of a port of the bridge B 1 is associated with the attribute d Subscriber S. The establishment of an internal link between two ports of a bridge is then prohibited if one of these two ports is not associated with the attribute of head H.
Selon un mode de réalisation, un programme PRGl étant utilisé pour mettre en œuvre les moyens MAP, ainsi que les accès aux données de la matrice de transfert Mti, un programme PRG2 met alors en œuvre les moyens MOA et MDA.According to one embodiment, a PRG1 program being used to implement the MAP means, as well as the data accesses of the transfer matrix Mti, a program PRG2 then implements the means MOA and MDA.
La mémoire non volatile ROM1 mémorise alors les programmes PRGl et PRG2 et les données numériques permettent, entre autre, leur mise en oeuvre. De manière plus générale, la mémoire ROM1 est lisible par les moyens de traitement PROC1, intégrée ou non au pont B1 et peut être amovible.The non-volatile memory ROM 1 then stores the PRG1 and PRG2 programs and digital data allow, among other things, their implementation. More generally, the ROM 1 is readable by the processing means PROC 1 , integrated or not to the bridge B 1 and can be removable.
La mémoire ROM, mémorise ainsi les associations entre attributs de ports et ports du pont B1 et les données de la matrice de transfert Mt1 obtenues, d'une part, au cours d'une phase d'apprentissage préalable et d'autre part les données définissant les contraintes d'acheminement imposées à cette matrice de transfert. Lors de la mise sous tension du pont B1, les programmes selon la présente invention sont transférés dans la mémoire vive RAM1 qui contient alors le code exécutable de l'invention ainsi que les données nécessaires à la mise en oeuvre de l'invention. Ainsi, dès lors qu'un attribut de port est nouvellement associé à un port par le programme PRGl, ce programme est interrompu et le programme PRG2 est lancé afin de redéfinir les contraintes d'acheminement relatives à ce port. Le programme PRGl reprend alors son exécution dès que le programme PRG2 se termine. The memory ROM thus stores the associations between port attributes and ports of the bridge B 1 and the data of the transfer matrix Mt 1 obtained, on the one hand, during a prior learning phase and on the other hand the data defining the routing constraints imposed on this transfer matrix. When powering up the bridge B 1 , the programs according to the present invention are transferred into the RAM RAM 1 which then contains the executable code of the invention as well as the data necessary for the implementation of the invention. Thus, as soon as a port attribute is newly associated with a port by the PRG1 program, this program is interrupted and the program PRG2 is launched in order to redefine the routing constraints relating to this port. The program PRG1 then resumes its execution as soon as the program PRG2 ends.

Claims

REVENDICATIONS
1) Procédé d'établissement de contraintes d'acheminement de flux de service dans un réseau local ou d'infrastructure constitué de ponts interconnectés entre eux, lesdites contraintes d'acheminement définissant celles des liaisons internes entre ports de chacun desdits ponts dont l'établissement est interdit, l'un desdits ponts étant considéré comme étant le pont de tête de réseau, ledit procédé comportant une étape d'association d'attributs de port des ponts du réseau au cours de laquelle est associé au port, qui procure l'accès le plus direct audit pont de tête de réseau, un attribut racine, caractérisé en ce qu'il comporte1) Method for establishing service flow routing constraints in a local network or infrastructure consisting of interconnected bridges, said routing constraints defining those of the internal links between ports of each of said bridges whose establishment is forbidden, one of said bridges being considered to be the head-end bridge, said method comprising a bridge port attribute association step of the network during which is associated with the port, which provides access the most direct to said headend bridge, a root attribute, characterized in that it comprises
- une étape (200) d'obtention desdites associations entre ports de chaque pont et attributs de port, eta step (200) for obtaining said associations between ports of each bridge and port attributes, and
- une étape (300) de définition des contraintes d'acheminement relatives à chaque pont au cours de laquelle est interdit l'établissement de toute liaison interne entre deux ports d'un pont si l'un de ces deux ports n'est pas associé à l'attribut racine.a step (300) for defining the routing constraints relating to each bridge during which the establishment of any internal link between two ports of a bridge is forbidden if one of these two ports is not associated to the root attribute.
2) Procédé selon la revendication 1, ladite étape d'association d'attribut de port d'un pont étant exécutée dès qu'un événement survient sur ledit réseau local ou d'infrastructure, caractérisé en ce que ladite étape (200) d'obtention desdites associations entre ports de chaque pont et attributs de port est précédée d'une étape (100) de détection de la mise à jour des attributs associés aux ports d'au moins un desdits ponts.2) Method according to claim 1, said step of association of port attribute of a bridge being executed as soon as an event occurs on said local or infrastructure network, characterized in that said step (200) of obtaining said associations between ports of each bridge and port attributes is preceded by a step (100) for detecting the updating of the attributes associated with the ports of at least one of said bridges.
3) Procédé selon la revendication 1 ou 2, caractérisé en ce que ladite étape (200) de définition des contraintes d'acheminement comporte une étape d'association de l'attribut racine associé à un port d'un pont à un attribut dit de tête (H) et de chaque autre attribut d'un port d'un pont à un attribut dit d'abonné (S), l'établissement d'une liaison interne entre deux ports d'un pont étant alors interdit si l'un de ces deux ports n'est pas associé à l'attribut de tête.3) Method according to claim 1 or 2, characterized in that said step (200) for defining the routing constraints comprises a step of associating the root attribute associated with a port of a bridge with a so-called attribute of head (H) and each other attribute of a port of a bridge to a subscriber attribute (S), the establishment of an internal link between two ports of a bridge then being prohibited if one of these two ports is not associated with the header attribute.
4) Procédé selon l'une des revendications 1 à 3, chaque pont étant associé à un identifiant formé entre autre d'une valeur de priorité, caractérisé en ce que le pont qui est considéré comme étant le pont de tête de réseau est le pont associé à l'identifiant dont la valeur de priorité est la plus faible parmi les valeurs de priorité des identifiants associés aux autres ponts.4) Method according to one of claims 1 to 3, each bridge being associated with an identifier formed inter alia of a priority value, characterized in that the bridge which is considered to be the headend bridge is the bridge associated with the identifier whose priority value is the lowest among the priority values of the identifiers associated with the other bridges.
5) Procédé selon l'une des revendications 1 à 4, lesdites contraintes d'acheminement étant définies à partir d'un réseau virtuel déterminé à partir dudit réseau local ou d'infrastructure, caractérisé en ce qu'une topologie logique dudit réseau virtuel est alors obtenue suite à une convergence d'un protocole de type STP.5) Method according to one of claims 1 to 4, said routing constraints being defined from a virtual network determined from said local area network or infrastructure, characterized in that a logical topology of said virtual network is then obtained following a convergence of an STP type protocol.
6) Procédé selon l'une des revendications 1 à 5, caractérisé en ce que lesdits ponts sont des ponts Ethernet.6) Method according to one of claims 1 to 5, characterized in that said bridges are Ethernet bridges.
7) Dispositif d'établissement de contraintes d'acheminement de flux de service destiné à être associé avec un des ponts d'un réseau local ou d'infrastructure soumis auxdites contraintes d'acheminement, lesdites contraintes d'acheminement définissant celles des liaisons internes de ce pont dont l'établissement est interdit, l'un desdits ponts du réseau étant déterminé comme étant le pont de tête de réseau, ledit pont comportant des moyens (MAP1) pour associer un attribut à chaque port d'un pont dudit réseau et au port de chaque pont qui procure l'accès le plus direct audit pont de tête un attribut dit racine (R), caractérisé en ce qu'il comporte : - des moyens (MOA) pour obtenir lesdites associations entre ports de chaque pont et attributs de port, etA service flow routing constraint setting apparatus for associating with one of the bridges of a local area network or infrastructure subject to said routing constraints, said routing constraints defining those of the internal links of the network. this bridge, the establishment of which is forbidden, one of the said bridges of the network being determined as being the head-end bridge, the said bridge comprising means (MAP 1 ) for associating an attribute with each port of a bridge of the said network and to the port of each bridge which provides the most direct access to said head bridge an attribute called root (R), characterized in that it comprises: - means (MOA) to obtain said associations between ports of each bridge and attributes of port, and
- des moyens (MDA) pour définir des contraintes d'acheminement dudit pont en interdisant l'établissement de toute liaison interne entre deux de ses ports si l'un de ces deux ports n'est pas associé à l'attribut racine (R).means (MDA) for defining routing constraints of said bridge by prohibiting the establishment of any internal link between two of its ports if one of these two ports is not associated with the root attribute (R) .
8) Pont Ethernet d'un réseau local ou d'infrastructure constitué de ponts interconnectés entre eux et destiné à être soumis à des contraintes d'acheminement de flux de service, lesdites contraintes d'acheminement définissant celles des liaisons internes de ce pont dont l'établissement est interdit, l'un desdits ponts du réseau étant déterminé comme étant le pont de tête de réseau, ledit pont comportant des moyens (MAP,) pour associer un attribut à chaque port d'un pont dudit réseau et au port de chaque pont qui procure l'accès le plus direct audit pont de tête un attribut dit racine (R), caractérisé en ce qu'il est associé à un dispositif conforme à la revendication 7. 9) Programme d'ordinateur d'établissement de contraintes d'acheminement de flux de service d'un pont d'un réseau local virtuel soumis auxdites contraintes d'acheminement, caractérisé en ce qu'il met en œuvre les étapes du procédé d'établissement conforme à l'une des revendications 1 à 6. 8) Ethernet bridge of a local area network or infrastructure consisting of bridges interconnected with each other and intended to be subject to service flow constraints, said routing constraints defining those of the internal links of this bridge whose establishment is prohibited, one of said bridges of the network being determined to be the head-end bridge, said bridge including means (MAP) for associating an attribute with each port of a bridge of said network and with the port of each bridge which provides the most direct access to said head bridge a so-called root attribute (R), characterized in that it is associated with a device according to claim 7. 9) Computer program for establishing service flow routing constraints of a bridge of a virtual local area network subject to said routing constraints, characterized in that it implements the steps of the method of establishment according to one of claims 1 to 6.
EP08784735A 2007-07-13 2008-07-11 Method of establishing constraints on service stream routing in a virtual local network Withdrawn EP2183889A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0705101A FR2918831B1 (en) 2007-07-13 2007-07-13 METHOD FOR ESTABLISHING CONVEYINGS FOR DELIVERING SERVICE FLOWS IN A VIRTUAL LOCAL NETWORK
PCT/EP2008/005697 WO2009010243A1 (en) 2007-07-13 2008-07-11 Method of establishing constraints on service stream routing in a virtual local network

Publications (1)

Publication Number Publication Date
EP2183889A1 true EP2183889A1 (en) 2010-05-12

Family

ID=39223060

Family Applications (1)

Application Number Title Priority Date Filing Date
EP08784735A Withdrawn EP2183889A1 (en) 2007-07-13 2008-07-11 Method of establishing constraints on service stream routing in a virtual local network

Country Status (3)

Country Link
EP (1) EP2183889A1 (en)
FR (1) FR2918831B1 (en)
WO (1) WO2009010243A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5836042B2 (en) * 2011-10-04 2015-12-24 株式会社日立製作所 Management server program

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007022238A2 (en) * 2005-08-17 2007-02-22 Nortel Networks Limited High-availability networking with intelligent failover

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2009010243A1 *

Also Published As

Publication number Publication date
FR2918831B1 (en) 2009-08-28
WO2009010243A1 (en) 2009-01-22
FR2918831A1 (en) 2009-01-16

Similar Documents

Publication Publication Date Title
US20210359910A1 (en) Packet data unit (pdu) structure for supporting distributed relay control protocol (drcp)
US9813290B2 (en) Method and system for supporting distributed relay control protocol (DRCP) operations upon misconfiguration
US8320282B2 (en) Automatic control node selection in ring networks
US7489700B2 (en) Virtual access router
US9191278B2 (en) System and method for locating offending network device and maintaining network integrity
US8667177B2 (en) Interface grouping for media access control address pinning in a layer two network
FR2873524A1 (en) LOCAL NETWORK WITH VIRTUAL GROUP (S) OF HEART EQUIPMENT WHICH IS CLEAR AT THE LEVEL TWO SWITCHING
EP1774731A2 (en) A network device architecture for centralized packet processing
US7646732B2 (en) Full mesh status monitor
FR2930100A1 (en) METHOD OF ESTABLISHING A COMMUNICATION PATH IN AN EXTENSIVE COMMUNICATION NETWORK, TUNNEL HEADS, COMPUTER PROGRAM PRODUCT AND CORRESPONDING STORAGE MEDIUM
EP2436155B1 (en) Method for path management between a source node and a destination node at the link layer level, corresponding source node and table
EP1552650B1 (en) Method for the automatic configuration of an ip telephony device and/or data, system and device implementing same
EP3682600B1 (en) Management of connection with other residential gateways of a residential gateway implementing link aggregation
EP2183889A1 (en) Method of establishing constraints on service stream routing in a virtual local network
FR3072529B1 (en) ROUTING DATA IN A RESIDENTIAL GATEWAY IMPLEMENTING LINK AGGREGATION
US9923731B1 (en) Seamless migration from multiple spanning tree protocol to ethernet ring protection switching protocol
Cisco Configuring and Monitoring from the Management Console
EP2789132B1 (en) Gateway adapted for vod
EP4145798B1 (en) Method for configuring a joint for routing in accordance with the border gateway protocol_ bgp and associated border router
EP1884099B1 (en) Access control method and device
EP1762051A1 (en) Method for managing an interconnection between telecommunication networks and device therefor
WO2024068725A1 (en) Method for managing data traffic between a source entity and a recipient entity, and corresponding entity and computer program
Sequeira CompTIA Network+ N10-006 Quick Refernce
Headquarters Services Ready Small Branch Network System Assurance Guide

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20091210

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA MK RS

DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SAGEMCOM ENERGY & TELECOM

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SAGEMCOM ENERGY & TELECOM SAS

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 12/46 20060101AFI20160914BHEP

Ipc: H04L 12/753 20130101ALI20160914BHEP

INTG Intention to grant announced

Effective date: 20161004

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20170215