TW200843405A - Method of managing network redundancy-checking programs - Google Patents

Method of managing network redundancy-checking programs Download PDF

Info

Publication number
TW200843405A
TW200843405A TW96115089A TW96115089A TW200843405A TW 200843405 A TW200843405 A TW 200843405A TW 96115089 A TW96115089 A TW 96115089A TW 96115089 A TW96115089 A TW 96115089A TW 200843405 A TW200843405 A TW 200843405A
Authority
TW
Taiwan
Prior art keywords
network
transmission channel
header
sequence data
data
Prior art date
Application number
TW96115089A
Other languages
Chinese (zh)
Inventor
Shih-Hui Shao
Pi-Yuan Shih
Che-Hung Sun
Original Assignee
Moxa Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Moxa Technologies Co Ltd filed Critical Moxa Technologies Co Ltd
Priority to TW96115089A priority Critical patent/TW200843405A/en
Publication of TW200843405A publication Critical patent/TW200843405A/en

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention is generally about a method of managing network redundancy-checking programs, and more particularly about a redundancy-checking and managing method under a dual-channel network structure composed of a master control end, a primary transmission channel, a secondary transmission channel, intermediate devices, and remote devices. The invention is characterized by that a COM port under the plural network communication addresses in the master control end is simulated into a single virtual COM port by a driver program of the master control end. As such, a user or a user's application program only needs to manage or monitor the virtual COM port. Since the firmware of the intermediate devices and the driver program already covers all actual operation modes, the user and the user's application program are thereby free from the system complexity resulted form the redundancy mechanism. In other words, the invention is capable of providing the high reliability offered by the two transmission channels without the overhead of managing a large number of COM ports resulted from the two transmission channels.

Description

200843405 4 t 九、發明說明: 【發明所屬之技術領域】 本發明係透過主控端内的驅動程式將主控端内複數個網 路通訊位址下的通訊埠虛擬成單一個通訊埠,而該虛擬後的 通訊埠再藉由冗餘檢查機制來判斷欲傳送之序列資料是否無 效或重複,藉此以達到同時擁有冗餘檢查機制及管理單一網 路通訊位址優勢之功效者。 【先前技術】 按,隨著通訊技術的快速演進,其衍生的通訊網路亦隨 之快速發展’並賴其賴大小而可區分為區域網路以及廣 域網路,其中’區域網路則是由許多相同轉架構所完成的 區域性網路’而廣域網路則是由許多的區域網路所組成的大 型網路,且其服務與連線的細可遍及全國甚至全世界。 不論是區域網路或廣域網路,射最常見的基本架構便 是乙太網路(Ethernet),而在乙太網路中則包括 有利用光纖或絞線為傳輸線路之集線器(Hub)、交_ (switch)或路由器(RQuter)等網路中繼裝 置,而藉由網路中繼裝置與傳輪線路的組合,可使不同網域 路、以及電腦或其他裳置,如監視系統、保全系統 及自動化轉以進行資料、指令的傳輸或控制。 然而傳統商用乙太網路設備僅較適用—般單純且易於掌 5 200843405 &的辦公室等優良’但對於較驗困且無法翻的工業 環境而言並不_,其t主要在於商用乙太網路設備並 無法符合:C業化應财的高度_需求,因而也促使了工業 用乙太網路之發展。 再者’隨著獅化的邏輯控繼、巾央處理器以及各種 輸出/人設備與X業用之作黯統或躺程式等軟硬體製造 廢商亦開始提供附錢人式乙太網路介_產品,藉此亦加 速了工業級乙太網路的革命性發展;然而,由於商用及工業 用的乙太網路具有其通雜,因此者將不再受限於現有 自動化薇商之專有協定及祕輯,藉此亦促使了許多組織 及協會紛紛提倡乙太網路工業協定,讓工業控制設備可以整 合運用於共通的協定。 然而’請參閱第十六圖所示,係為習用技術具雙傳輸通 道之乙太網路I贿構®,而於此架構下之系統主要包括由 主控端A、主傳輸通道B、副傳輸通道C、中繼裝置D及遠 端°又備E等部分所組成,該系統下的主傳輸通道B、副傳輸 L道C主要是為了配合工業乙太網路應用中的高度信賴需求 下戶情計的_,然而與_雙傳輸通道的硬體_相配合 的車人體或_糾是利収餘檢錢制來決定主控端A將選 擇的通道,而所謂的冗餘檢查即是利用資料傳輸封包中多餘 的魏來核對該資訊的演算法。 6 200843405 然而於傳統的乙太網路相較,該架構為了基於保護乙太 網路的貫體層’ g此網路裝置僅需__個網路通訊位址(工p address) ’但當乙太網路連上串列裝置或針對某 些工業用猶,使用者則需要兩套乙太網路及兩組網路通訊 位址’如此不僅可輯乙太晴的實體媒介,亦可保護使用 者端的乙太醜界面及鱗他_的設備,轉上述二組 網路通訊位_配合的冗餘檢查_,㈣錢供網路備援 以及快速喊網路輕的舰,因此冗餘檢錢辦工業乙 太網路通訊則扮一十分重要角色。 、 上述又通道几餘型乙太網路系統雖然具備快速回復網路 的連線此力’且其冗餘備援機制可以滿足工業化應用上的需 求以確保整體工業化乙太網路系統運作順暢,但該雙通道 的冗餘備援m於實作上卻有τ述缺失與不足: ()由於雙通道的冗餘型乙太網路系統具有二組傳輸通道 (主傳輸通道Β、副傳輸通道c),因此主控端八的 使用者則需針對該二組傳輸通道分別進行管控;再者 、’若該主控端Α需針對不同的傳輸條件來開放不同的 UMCOM pQrt) ’管理者則需要多管理 紅控-倍數量的通鱗,因此對於管理該雙通道的 =餘型乙太網路系統之管理者則需要花費雙倍的時間 來管控其傳輪诵道。 200843405 (二)同理,主控端A或遠端設備者若要開發相 關的應用程式,則亦需針對雙通道下的通訊璋( COM ροή)來設計其路徑_的演算法,铁 而對於欲使用雙通道的冗餘型乙太網路系統之相關業 者,則需耗費多餘的時間來開發新的管理程式,以便 判斷雙通道下的通訊埠的切換方式及判斷方法。 緣此’上述習用技術之不足,便為從事此行業者所亟欲 改善之課題’而有待相關業者作進—步改良與創新設計之必 要。 【發明内容】 今’發明人有鑑於上述傳統朗乙太網路產品的缺失與 不足,故發明人·此行業之多年研究發明經驗,經不斷改 良與貫驗,始設計出此種克服商用乙太網路產品缺失之管理 網路冗餘檢查應用程式之方法。 本發明之主要目的乃在於藉由驅動程式以及中繼裝置所 形成之韌體來管理冗餘檢查機制及其所用的通訊埠,因此雖 然主機端包括有二個網路通訊位址,但使用者無需針對二個 網路通訊位址下的各通訊埠進行管理,也因此使用者於實際 上僅需針對-個虛擬的通鱗進行設定;再者,藉由該驅動 程式的判斷流程,雖主機端具有主傳輸通道及副傳輸通道來 傳送相同資料之功效,且由於針對使用者而言卻僅需管理此 8 200843405 f f 虛擬的通鱗,纽’該乙太鱗輯下的域端不但可藉 由冗餘檢錢财輪錢倾通道崎來的高穩定性,而 該架構下的管理者卻不綠理雙傳輸通道下所触的大量通 訊淳。 另外本毛明之次要目的乃在於藉由驅動程式將主傳輸 通道及副雜通道顺_二_路通雜址虛擬成單一的 ifi琿α此主;^的應則£式將僅需針對該虛擬通訊淳上 之資料進行存取’且若針對僅擁有—個網路通訊位址下之乙 太、、、罔路欲進彳t升級至二個網路通訊位址之企業端,該原本已 使用之應用$式將不需設計新的應用程式來與二個網路通訊 位址互相配合存取,因此將可節省相關業者可觀的應用程式 開發時間與精力。 【實施方式】 ( 為達成上述目的及構造,並為使審查委員能對於本發 明之目的及功效有更進一步之瞭解,故本發明所採用之技術 手段,茲繪圖就本發明之較佳實施例詳加說明如下,俾利完 全瞭解。 首先本說明書先藉由說明各硬體之配置方塊圖以及透過 達到本發明之管理網路冗餘檢查應用程式之方法所運用的流 私步驟來加以說明本發明之技術手段,最後再透過本發明實 際運用之態樣來說明,以利審查委員能更明確地瞭解本發 9 200843405 明具體的實作技術。 請參閱第一圖所示,係為本發明較佳實施例之雙通道冗 餘型乙太網路系統架構圖,由圖中可以清楚得知該系統係由 主控端1、主傳輸通道2、副傳輸通道3及中繼裝置4所構 成,而該主控端1則進一步包括有複數的工作站1 1、1 2 、13及14,另,該系統下的主傳輸通道2及副傳輸通道 3則疋為了配合工業乙太網化應用中所欲使用冗餘檢查要求 下所設計的架構。 請參閱第二、三及四圖所示,係分別為本發明較佳實施 例之由主控端傳送資料至中繼裝置之示意圖、由主控端傳送 封包資料之示意圖及由主控端傳送資料並進行封包之示咅圖 ,如圖二所示,當主控端1之工作站1 1分別由主傳輸通道 2、副傳輸通道3傳送序號00〇〇 0〇〇2二組碼 I 框(f r a m e)至中繼裝置4時,由於中繼裝置4之冗餘 檢查機制會避免傳輸資料之重複,因此中繼裝置4將會把重 複的序號00001及00002二組碼框忽略(d r 〇 p )掉,是以,中繼裝置4可進一步將〇 〇 〇 〇 1及〇 〇 〇 〇 2二組碼框傳送至遠端。 然而當工作站11傳送/序列資料5 2至中繼裝置心寺 ’工作站1 1將會把序料5 2進行封包成—傳輪封包^ ’而該中繼裝置4主要係將包含有標記(mark)、長度 200843405 (len)、序列號(sequence number) 及檢一牙(checksum)之表頭5i與序列資料5 2 參考圖m功站11欲傳送-序列資料5 2時, /序列貝才斗5 2將會經過-冗餘機制,而該冗餘機制主要乃 將表頭51加人該序列資料52以形成—傳輸封包5,而該 結合成一傳輪封包5(如圖三所示);請參閱第四圖所示並200843405 4 t IX. Description of the invention: [Technical field of the invention] The invention virtualizes the communication under the plurality of network communication addresses in the main control terminal into a single communication port through the driver in the main control terminal, and The virtual communication then determines whether the sequence data to be transmitted is invalid or duplicated by a redundancy check mechanism, thereby achieving the effect of having both a redundancy check mechanism and the advantage of managing a single network communication address. [Prior Art] According to the rapid evolution of communication technology, its derivative communication network has also developed rapidly. 'Depending on the size, it can be divided into regional network and wide area network, where 'regional network is composed of many The regional network completed by the same transfer architecture, and the wide area network is a large network composed of many regional networks, and its services and connections can be spread all over the country and even the whole world. Whether it is a regional network or a wide area network, the most common basic architecture is Ethernet, and in Ethernet, there are hubs that use optical fibers or stranded cables for transmission lines. Network relay devices such as _ (switch) or router (RQuter), and the combination of network relay devices and transmission lines can enable different network areas, as well as computers or other mobile devices, such as monitoring systems, security System and automation are transferred to transfer or control data or instructions. However, the traditional commercial Ethernet equipment is only suitable for the simple and easy to use 5 200843405 & the office is excellent, but it is not for the industrial environment that is difficult to detect and cannot be turned over. The network equipment is not in line with the high demand of C industry, which has also promoted the development of industrial Ethernet. In addition, with the logic of the lion's logic, the towel processor and various output/human devices and the X industry, such as the system or the flops, the software and hardware manufacturing waste merchants also began to provide money-attached Ethernet. Lusuke_products have also accelerated the revolutionary development of industrial Ethernet networks; however, due to the complexity of commercial and industrial Ethernet networks, they will no longer be limited by existing automated Weishang. The proprietary agreements and secrets have also prompted many organizations and associations to promote the Ethernet industry agreement, allowing industrial control equipment to be integrated into common agreements. However, please refer to the sixteenth figure, which is the Ethernet transmission system of the dual transmission channel of the conventional technology. The system under this architecture mainly includes the host A, the main transmission channel B, and the vice. The transmission channel C, the relay device D and the remote end are also composed of parts such as E. The main transmission channel B and the sub-transmission L channel C under the system are mainly designed to meet the high reliability requirements in industrial Ethernet applications. _, however, the body of the car with the hardware of the _ dual transmission channel or _ correction is the profit detection system to determine the channel that the master A will select, and the so-called redundancy check is Use the extra Wei in the data transmission packet to verify the algorithm. 6 200843405 However, compared with the traditional Ethernet network, the architecture is based on the protection layer of the Ethernet network. This network device only needs __ network communication address (but p address). If the network is connected to the serial device or for some industries, the user needs two sets of Ethernet and two sets of network communication addresses. This way, not only can the physical medium of the computer be used, but also the protection. The side of the ugly interface and the scale of his equipment, the above two groups of network communication bits _ with the redundancy check _, (four) money for network backup and quickly call the network light ship, so redundant check money Running an industrial Ethernet communication plays a very important role. The above-mentioned several-channel Ethernet system has the ability to quickly reply to the network connection and its redundant backup mechanism can meet the needs of industrial applications to ensure the smooth operation of the overall industrialized Ethernet system. However, the dual-channel redundant backup m has a lack of τ in the implementation: () Because the dual-channel redundant Ethernet system has two sets of transmission channels (main transmission channel 副, sub-transmission channel) c), therefore, the user of the master terminal 8 needs to separately control the two groups of transmission channels; furthermore, 'if the master terminal does not need to open different UMCOM pQrt for different transmission conditions) It is necessary to manage the red-control-multiple number of scales, so it takes two times for the manager who manages the dual-channel=remaining Ethernet system to control its pass ramp. 200843405 (2) Similarly, if the host A or remote device wants to develop related applications, it also needs to design its path_ algorithm for the communication channel (COM ροή) under dual channel. For those who want to use a dual-channel redundant Ethernet system, it takes extra time to develop a new management program to determine the switching mode and method of communication between the two channels. Therefore, the above-mentioned deficiencies in the conventional technology are necessary for those who are engaged in this industry to be improved, and it is necessary for the relevant industry to make progress and innovation. [Invention] Today's inventors have in view of the lack and insufficiency of the above-mentioned traditional Ethernet products, so the inventor and the industry's many years of research and invention experience, through continuous improvement and continuous testing, have designed this to overcome commercial B. A method of managing network redundancy checking applications that is missing from the network product. The main purpose of the present invention is to manage the redundancy check mechanism and the communication port used by the firmware formed by the driver and the relay device, so although the host side includes two network communication addresses, the user There is no need to manage the communication ports under the two network communication addresses, and therefore the user only needs to set the virtual scales for the virtual ones; furthermore, the host is determined by the judgment process of the driver. The end has the function of transmitting the same data by the main transmission channel and the sub-transmission channel, and since the user only needs to manage the virtual scale of the 200843405 ff virtual, the domain end of the EB scale can be borrowed not only The redundant check-up money is the high stability of the channel, and the managers under the framework do not have a lot of communication under the dual transmission channel. In addition, the secondary purpose of Ben Maoming is to virtualize the main transmission channel and the sub-hybrid channel into a single ifi珲α by the driver; the formula of the ^ will only need to be The data on the virtual communication port is accessed' and the original is to be upgraded to the enterprise end of the two network communication addresses for the Ethernet network that has only one network communication address. The used application $ will not need to design a new application to interact with two network communication addresses, thus saving considerable application development time and effort. [Embodiment] (In order to achieve the above object and structure, and to enable the reviewing committee to have a better understanding of the object and function of the present invention, the technical means employed in the present invention will be described as a preferred embodiment of the present invention. The details are as follows, and the full understanding of the following is made. First of all, this specification first explains the configuration of the hardware by using the flow chart of the hardware configuration method of the present invention. The technical means of the invention are finally explained by the actual application of the present invention, so that the reviewing committee can have a clearer understanding of the specific implementation technology of the present invention. Please refer to the first figure for the present invention. The architecture of the dual-channel redundant Ethernet system of the preferred embodiment is clearly shown in the figure. The system is composed of the main control terminal 1, the main transmission channel 2, the secondary transmission channel 3, and the relay device 4. The main control terminal 1 further includes a plurality of workstations 1 1 , 1 2 , 13 and 14 . In addition, the main transmission channel 2 and the secondary transmission channel 3 in the system are adapted to cooperate with the industrial B. For the networked application, the architecture designed under the redundancy check requirement is used. Please refer to the second, third and fourth figures, respectively, for transmitting data to the relay device by the master terminal according to a preferred embodiment of the present invention. The schematic diagram, the schematic diagram of transmitting the packet data by the main control end, and the diagram of transmitting the data by the main control end and performing the encapsulation, as shown in FIG. 2, when the workstation 1 of the main control terminal 1 is respectively composed of the main transmission channel 2 and the vice When the transmission channel 3 transmits the sequence number 00〇〇0〇〇2 two groups of code I frames to the relay device 4, since the redundancy check mechanism of the relay device 4 avoids duplication of transmission data, the relay device 4 will The duplicate sequence numbers 00001 and 00002 will be ignored (dr 〇p ), so that the relay device 4 can further transmit the 〇〇〇〇1 and 〇〇〇〇2 two groups of code frames to the far end. However, when the workstation 11 transmits/sequences 5 2 to the relay device, the heart station 'workstation 1 1 will pack the sequence 5 2 into a pass-through packet ^ ' and the relay device 4 will mainly contain the mark (mark ), length 200843405 (len), sequence number (sequence number) and The head of the checksum 5i and the sequence data 5 2 reference map m station 11 wants to transmit - sequence data 5 2, / sequence becai bucket 5 2 will pass the - redundancy mechanism, and the redundancy mechanism is mainly The header 51 is added to the sequence data 52 to form a transmission packet 5, and the combination is a carrier package 5 (as shown in FIG. 3);

冗餘機制再複製_ _輪封包5並分職過主傳輸通道2 及副傳_道3傳送对繼裝置4 ;如,透過上述之冗餘 機制並主傳輸通道2及_輸通道3,工作站丨工將可 使二份相同的相聽5 2傳送至中難置4,但卻不至造 成接收端資料的重複。 明茶閱第五及六圖所示,係分別為本發明較佳實施例之 由中繼裝置傳送資料至主控端之示意圖及由巾繼裝置傳送資 料亚進行冗餘檢查之示意圖,#中繼裝置4由遠端接收一〇 0⑽1碼框並欲傳送至卫作站丨丨時,係紐表頭5丄加 =該序列資料52前而形成—傳輸封包5,再分別由主傳輸 ^道2、副傳輸通道3傳送至工作站i1,待工作站丄工接 / 1才匚日守’。亥工作站工工將忽略重複的碼框;然而該冗 牙、檢查則如圖六所示之示意圖,當具有相同序列號(The redundancy mechanism then duplicates the _ _ round packet 5 and divides the primary transmission channel 2 and the secondary transmission channel 3 to transmit the relay device 4; for example, through the above redundant mechanism and the primary transmission channel 2 and the _transmission channel 3, the workstation Completion will enable two identical listeners to transmit to the Difficulty 4, but will not cause duplication of data at the receiving end. The tea is shown in the fifth and sixth figures, which are respectively a schematic diagram of transmitting data to the main control terminal by the relay device according to a preferred embodiment of the present invention, and a schematic diagram for performing redundancy check by the device relay device. After the device 4 receives a 〇0(10)1 code frame from the far end and wants to transmit it to the Guardian station ,, the button header 5 丄 adds the sequence data 52 to form a transmission packet 5, and then the main transmission channel 2. The sub-transmission channel 3 is transmitted to the workstation i1, and the workstation is connected to the workstation 1/1. The workstation engineer will ignore the duplicate code frame; however, the redundancy and inspection are shown in the figure shown in Figure 6, when they have the same serial number (

SeqUenCe number) (^Sno = 8) 輪封包5欲藉由主傳輸通道2及副傳輸通道3傳送至工 11 200843405 • # 作站1 1時將會經過一冗餘檢查,該冗餘檢查主要乃將二組 傳輸封包5之表頭5 1 (包括有標記、長度、序列號及檢查 和)進行比對;因此經由此冗餘檢查後,該工作站1 1將不 會接收到重複之資料。 然而’上述之冗餘檢查機制於實作上主要乃包括有一驅 動程式將資料寫人網路卡之判斷步驟(如圖七),其步驟如 下: ^SeqUenCe number) (^Sno = 8) The round packet 5 is to be transmitted to the work 11 by the main transmission channel 2 and the sub-transmission channel 3 200843405 • #1 station 1 1 will undergo a redundancy check, which is mainly The headers 5 1 of the two sets of transport packets 5 (including the tag, the length, the serial number, and the checksum) are compared; therefore, after this redundancy check, the workstation 11 will not receive the duplicated data. However, the above-mentioned redundancy check mechanism mainly includes a step of judging the data written by the driver to write the network card (see Figure 7). The steps are as follows: ^

(1〇1)開始; Q 0 2 )確認‘_程歧使肖者所制L式取得欲 傳送的序列資料5 2,若否,執行步驟(人 )為表頭51配置記憶體,若失敗,執行步驟 0 3); (1〇 4)將表頭51插入序列資料5 2之前以形成—傳輪 封包5並指派表頭51之值; ⑴ (1〇5)複製整轉輪封包5(表頭51及序列資料μ ), 攻置主傳輪通道2,若失敗則執行 、丄U Γ );若成功則執行(丄〇 8 ) · (1071傳輸封包5対(dlscard)或忽略( drop) ; % ( 12 200843405 (1〇 8)將傳輸封包5放置副傳輪通道3,若失敗則執行 (1〇 9);若成功則執行(丄丄〇); (1〇9)將傳輸封包5丟棄(discard)或忽略( drop); (110)結束。 -’與上叙職檢查機制於,轉財师料寫入網 卡之_步驟相對應的驅動程式則包括有如圖八所示之驅 動程式從網路卡讀取資料之觸步驟,其步驟如下·· (2 01)開始; Q 0 £ 料可讀取,若否 行步驟(2 1 1 ί 2 0 3 ) 確認中繼裳置 4 之緩衝區域 ( b u f “ ) 是 否空白(存放之前係以從網路讀取,但此時尚 無法形成-完整封包之緩衝區),若否,則執二 步驟(2 Q 4 );若是,職行步驟(2 〇 5 )(1〇1) starts; Q 0 2) Confirms that '_程歧" obtains the sequence data to be transmitted by the L-type L2, and if not, executes the step (person) to configure the memory for the header 51. Steps 3 3); (1〇4) insert the header 51 into the sequence data 5 2 to form a transfer packet 5 and assign the value of the header 51; (1) (1〇5) copy the entire revolving packet 5 ( Header 51 and sequence data μ), attack the main transmission channel 2, if it fails, execute, 丄U Γ ); if successful, execute (丄〇8) · (1071 transmission packet 5 対 (dlscard) or ignore (drop ) ; % ( 12 200843405 (1〇8) Place the transmission packet 5 on the secondary transmission channel 3, if it fails, execute (1〇9); if successful, execute (丄丄〇); (1〇9) will transmit the packet 5 discard (discard) or ignore (drop); (110) end. - 'With the above-mentioned descriptive inspection mechanism, the driver corresponding to the step of writing to the network card _ the driver includes the driver shown in Figure 8. The program steps to read data from the network card, the steps are as follows: (2 01) start; Q 0 £ material can be read, if no step (2 1 1 ί 2 0 3) confirm the relay is set 4 Buffer area ( buf " ) Is it blank (it was read from the network before storage, but this fashion can not form - a buffer of the complete packet), if not, then take the second step (2 Q 4); if yes, the step of the job (2 〇5)

J (2 0 4):已存人網路卡之資料取出並插人緩衝區域之前 端’舉例而言’係為當此情況發生在傳送 的封包為3〇byt es,但接收端第一 到10個byt esW,但這1〇個/、 bytes並不是—完整的傳輪封包,必須等到 13 200843405 後面的2Qbytes#料到達才可以—起檢查 標頭與進行後續的處理,因此前面^ 〇 一 b y t e s需先放入緩衝區,但後面2 〇 b y t e s到達時,再將緩衝區中的1〇 bytes插入2〇bytes的前端再 理; (2 0 5 )檢絲頭5 !是否正確,若否則執行步驟(2 〇 6);若是則執行步驟(2 〇 7); (2 0 6)將資料丢棄或忽略;結束; (2 〇 7)進行冗餘檢查之處理,若該資料無法處理則執行 步驟(2 0 2); (2 0 8 )檢絲頭5 1之序舰是否正確,若否則執行步 驟(2 0 6 ); 少 (2 0 9)將資料傳送給使用者之應用程式;若失敗則執行 步驟(2 0 6); (210) 檢查緩衝區域内之資料是否完整;若否則執行( 2 0 2 ); (211) 結束。 簡而言之,透過如圖七及人所示之湘—驅動程式來對 網路卡進行讀取及寫蚊割,即可了解如何透過此驅動程 式並透過主傳輸通道2及副傳輸通道3來達到本發明之管理 14 200843405 1 » 、几餘檢查應用程式之方法;然而,本發明亦包括了透過 1體將資料寫入網路卡(如圖九)以及透過勤體從網路卡 讀取資料之步驟流程(如圖十),其步驟分別如下: (3 01)開始; (3 0 2 )確認中繼裝置4從其串列埠讀取資料,若否,執 行步驟(3 0 2 ); (3 0 3 )為表頭51配置記憶體,若失敗,執行步驟(3 " 0 3); ( 3 0 4)將表頭5 插入序列資料52之前以形成一傳輸 封包5並指派表頭51之值; (3 0 5 )複製整個傳輸封包5 (表頭51及序列資料5 2 ); (3 0 6 )將傳輸封包5放置主傳輸通道2,若失敗則執行 ( 3 0 7 );若成功則執行( 3 0 8); (3 0 7 )將傳輸封包5丟棄(discard)或忽略( drop); (3 0 8 )將傳輸封包5放置副傳輸通道3,若失敗則執行 (3 0 9 );若成功則執行(310); (3 0 9 )將傳輸封包5丟棄(di scard)或忽略( drop); (310)結束。 15 200843405 '再者,請參閱如下述透縣^體從網路卡讀取資料之 流程(如圖十),其步驟如下: (4 01)開始; (4 0 2 )確_體是否從網路切取資料,若否,執^ 驟(4 1 1) ; Tv (4 0 3 )確認緩衝區域(b u f f e r)是否空白,若否 ’則執行步驟(404) ΒίJ (2 0 4): The data of the saved network card is taken out and inserted into the buffer area. The front end is 'for example', when this happens, the transmitted packet is 3〇byt es, but the receiving end is first. 10 byt esW, but this 1 /, bytes is not - the complete pass packet, must wait until the end of 13 200843405 2Qbytes # material can be - check the header and subsequent processing, so the front ^ 〇 Bytes need to be put into the buffer first, but when 2 〇bytes arrives, insert 1〇bytes in the buffer into the front end of 2〇bytes; (2 0 5) Check head 5! Is it correct, otherwise execute Step (2 〇 6); if yes, execute step (2 〇 7); (2 0 6) discard or ignore the data; end; (2 〇 7) perform redundancy check, if the data cannot be processed, execute Step (2 0 2); (2 0 8) Whether the ordering ship of the wire head 5 1 is correct, if otherwise, execute the step (2 0 6 ); less (2 0 9) to transmit the data to the user's application; If it fails, perform the step (2 0 6); (210) Check whether the data in the buffer area is complete; if not, execute (2 0 2 ); (211) End. In short, by reading and writing the network card through the Xiang-driver shown in Figure 7 and the person, you can learn how to pass the driver and pass the main transmission channel 2 and the sub-transmission channel 3. To achieve the management of the present invention 14 200843405 1 », a number of methods for checking the application; however, the present invention also includes writing data to the network card through a body (as shown in Figure 9) and reading from the network card through the body. Steps of taking the data (Figure 10), the steps are as follows: (3 01) start; (3 0 2) confirm that the relay device 4 reads data from its serial port, and if not, perform the step (3 0 2 (3 0 3 ) configure memory for the header 51. If it fails, perform step (3 " 0 3); (3 0 4) insert the header 5 before the sequence data 52 to form a transport packet 5 and assign The value of the header 51; (3 0 5 ) copy the entire transport packet 5 (header 51 and sequence data 5 2 ); (3 0 6 ) place the transport packet 5 on the main transport channel 2, if it fails, execute (3 0 7 ); if successful, execute (3 0 8); (3 0 7) discard or drop (drop) the transport packet 5; (3 0 8) transmit packet 5 Place the secondary transmission channel 3, if it fails, execute (3 0 9 ); if successful, execute (310); (3 0 9 ) discard the transport packet 5 (di scard or ignore); (310) ends. 15 200843405 'Furthermore, please refer to the process of reading data from the network card as shown in the following figure (Figure 10). The steps are as follows: (4 01) Start; (4 0 2) Whether the _ body is from the network The path is cut to the data. If not, execute the command (4 1 1); Tv (4 0 3 ) to confirm whether the buffer area is blank. If no, execute step (404) Β

CC

υ ,右疋,則執行步驟Γυ , right 疋, then perform the stepsΓ

4 0 5 ) ; V (4 0 4)將已存人網路卡之資料取出並插人緩衝區域之^ 端; 月” C 4 0 5 )檢查表頭5丨是否正確,若賴執行步驟(4 〇 6);若是則執行步驟(4〇7); (4 0 6 )將資料丟棄或忽略;結束; (4 0 7)進行檢查之處理,若該·無法處理4 0 5 ) ; V (4 0 4) Take out the data of the saved network card and insert it into the buffer area; Month" C 4 0 5) Check if the header 5 is correct, if the steps are executed ( 4 〇6); if yes, execute step (4〇7); (4 0 6) discard or ignore the data; end; (4 0 7) check the processing, if this can not be processed

步驟(4 0 2) ; T (4〇8)檢查表頭51之序列號是否正確,若否則執行步 驟(4 0 6 ); , (4 0 9)該勒體將資料寫人中繼裳置4之串列璋;若 則執行步驟(4〇6); 右敗 U 1 0 )檢查緩衝區域内之#料是找整;料 4 0 2) ; 丁1 16 200843405Step (4 0 2); T (4〇8) Check whether the serial number of the header 51 is correct, if otherwise, perform the step (4 0 6 ); , (4 0 9) the Lecture will relay the data to the person. 4 series of 璋; if the step (4 〇 6); right defeat U 1 0) check the buffer area # material is looking for the whole; material 4 0 2); Ding 1 16 200843405

I (41 1)結束。 綜上所述,藉_七、八、九及十之流程t所揭露之方 法,即可清楚了解本伽乃||由鶴程如及減的執行步 驟來達到傳輸資料的冗餘檢查,再者,將上述方法運用到使 用者所使用的程式上,即可讓該顧程式將主傳輸通道 2、副傳輸通道3視為單-的傳送通道,藉此,該應用程式 的相關業者即可不需開發新的應用程式來使用具雙通道冗餘 檢查機制的乙太網路。 然而,為了使審查委員能夠更了解本發明於實作上的 優點’因此請參閱第十-、十二、十三、十四及十五圖所示 之刼作介面圖,假設當使用者欲管理中繼裝置4上丄6個通 A埠’使用者首先則透過如圖十—之介面來增加欲管理的通 几埠,爾後,再透過圖十二之介面來偵測與中繼裝置4所連 接的一組傳輸通道(如主傳輸通道2及副傳輸通道3 ),待 工作站11偵測到中繼裝置4上之二個網路通訊位址時( 1P address)(如圖十三),使用者即可進一步 指定欲開放的資料埠(d a t a ρ 〇 r t)及命令埠( command port),然而截至目前為止,雖然工 作站1 1偵測到二個網路通訊位址,但使用者實際上僅針對 一個虛擬的通訊埠進行設定,亦即當使用者於設定圖十四中 之通訊埠時,實際上係以直接指定主傳輸通道2 (如i 9 2 17 200843405 8 2 · 1〇 0)、副傳輸通道3 (如工9 2 ·工6 8 3 · 1 〇 0 )之通道;再者,若於二侧路通訊位址下 疋、重複上述動作,使用者即可設定多組之通訊埠( p 0 r t) ’然而如圖十五所示,雖然於工作站工 1共有3 2個通訊蟑被設定,但針對使用者或使用者的應用 程式=,將僅需管理或監控16個通訊琿。 *、、:於本文中所揭露之透過韋刃體來提供冗餘檢查的判 斷依據僅為本發明官理網路冗餘檢查應用程式之方法的較 財施例,而於實作中係主要乃將二個以上的通鱗虛擬成 早的通轉,固舉凡利用驅動程式將二個以上的通訊淳虛 擬成單-的通訊埠並朝於—細程式之方法均應同理包含 ;本们作之專她gj内,械種簡祕飾及等效結構變化, 肖應_包含於本創作之專利範關,合予陳明。 —是以’透過上述說明將可得知本發明與制之技術相較 著實具下列優點及特徵: (一)藉由购程式以及中難置所形成之滅,雖然主機 端包括有—侧路通訊位址,但使用者無需針對二個 網路通訊位址下的各通訊痒進行管理,因此使用者於 實際上僅需針對一個虛擬的通訊埠進行設定;再者, 猎由該驅動程式的判斷流程,雖主機端具有主傳輸通 18 200843405 道及副傳輸通道來傳送相同資料之功效,且由於針對 使用者而言卻僅需管理此虛擬的通訊埠,藉此,該乙 太網路架構下的主機端不但可藉由冗餘檢查機制下來 擁有雙傳輸通道所帶來的高穩定性,而該架構下的管 理者卻不需管理雙傳輸通道下所衍生的大量通訊琿。 (二) 藉由驅動程式將主傳輸通道及副傳輸通道所使用的二 個網路通訊位址虛擬成單一的通訊埠,主機端的應用 程式將僅需針對該虛擬通訊琿上之資料進行存取,因 此若針對僅擁有一個網路通訊位址下之乙太網路欲進 行升級至一個網路通訊位址,該乙太網路架構下之應 用程式將不需設計新的應用程式來與二個網路通訊位 址配合存取,因此將可節省相關業者可觀的應用程式 開發時間與精力。 (三) 無論是資料欲透過中繼裝置傳送至主機端或是主機端 欲傳送資料至中繼裝置,藉由冗餘檢查來判斷該資料 封包中之序列號是否相同,若相同便將其中一組資料 封包忽略或放棄,藉此將可避免接收端收到重複的資 料封包;再者,於該冗餘檢查機制下的資料由於會加 入-序舰,因此該資料若欲由主傳輸通道及副傳輪 通道進行傳輸,而該資料於主傳輸通道及副傳輸通道 下的通訊琿則需要相同,藉此將可確保該資料確實= 19 200843405 u - 主傳輸通道及副傳輸通道同時進行傳輸。 (四)再者,於本發明之冗餘檢查機制下若主機端或中繼裳 置於一段時限内(TI ME-OUT)未收到相同序 列號的封包資料,則該中繼裝置可發出一警示訊息至 主控端之工作站,藉此將可提醒網路管理者檢查該傳 輸通道是否斷線或錯誤。 惟,以上所揭露者,僅是本發明之較佳實施例而已,自 不能以此而侷限本發明之專利範圍,因此,舉凡運用本發明 之專利範_做之鱗變倾修飾,仍應包含於本發明所涵 蓋之專利範圍内。 綜上所述,本發明之管理網路冗餘檢查應用程式之方法 ’確實能制其功效及目的,故本發明誠為—實祕優異之 發明’為符合發曰月專利之申請要件,誠符合產業利用性、新 穎性及進步性,爰依法提出申請,盼審委早曰賜准本案, 以保障發明人之辛苦發明,鮮肖骑射任何稽疑,請 不吝來函指示’發明人定當竭力配合,實感公便。 ' 20 200843405 【圖式簡單說明】 第一圖係為本發明較佳實施例之雙通道冗餘型乙太網路 系統架構圖。 第一圖係為本發明較佳實施例之由主控端傳送資料至中 繼裝置之示意圖。 第—圖係為本發明較佳實施例之由主控端傳送封包資料 之不意圖。 第四圖係為本發明較佳實施例之主控端傳送資料並進行 封包之示意圖。 第五圖係為本發明較佳實施例之由中繼裝置傳送資料至 主控端之示意圖。 第、圖係為本發明較佳實施例之由中繼裝置傳送資料並 進行冗餘檢查之示意圖。 "圖係為本發明較佳實施例之由驅動程式將資料寫入 網路卡之判斷步驟流程圖。 第八圖係為本發明較佳實施例之驅動程式從網路卡讀取 資料之判斷步驟流程圖。 第九圖係、為本發明較佳實施例之動體將資料寫入網路卡 之判斷步驟流程圖。 十圖係為本發明較佳實施例之透過拿刀體從網路卡讀取 200843405 資料之步驟流程圖。 第十一圖係為本發明較佳實施例之操作介面圖(一)。 第十二圖係為本發明較佳實施例之操作介面圖(二)。 第十三圖係為本發明較佳實施例之操作介面圖(三)。 第十四圖係為本發明較佳實施例之操作介面圖(四)。 第十五圖係為本發明較佳實施例之操作介面圖(五)。 第十六圖係為習用技術之具雙傳輸通道之乙太網路系統架 構圖。 【主要元件符號說明】 1、主控端 1、工作站 13、工作站 2、工作站 14、工作站 2、主傳輸通道 3、 副傳輸通道 4、 中繼裝置 22 200843405 5 2、序列資料 5、傳輸封包 5 1、表頭 A、 主控端 B、 主傳輸通道 C、 副傳輸通道 D、 中繼裝置 E、 遠端設備 23I (41 1) ends. In summary, by the methods disclosed in the process of _7, VIII, IX and IX, you can clearly understand the gamma || by He Chengru and the implementation steps to achieve redundancy check of the transmission data, and then By applying the above method to the program used by the user, the program can regard the main transmission channel 2 and the sub-transmission channel 3 as single-transmission channels, whereby the relevant operator of the application can A new application needs to be developed to use an Ethernet network with a dual channel redundancy check mechanism. However, in order to enable the review board to better understand the advantages of the present invention in practice, please refer to the interface diagrams shown in the tenth, twelfth, thirteenth, fourteenth and fifteenth, assuming that the user wants The management relay device 4 is connected to the top of the device. The user first increases the number of ports to be managed through the interface shown in FIG. 10, and then detects and relays the device through the interface of FIG. A set of transmission channels (such as the primary transmission channel 2 and the secondary transmission channel 3) connected, when the workstation 11 detects two network communication addresses on the relay device 4 (1P address) (as shown in FIG. 13) The user can further specify the data ρ (data ρ 〇rt) and the command port to be opened. However, until now, although the workstation 11 detects two network communication addresses, the user actually The setting is only for one virtual communication port, that is, when the user sets the communication port in FIG. 14, the user directly specifies the main transmission channel 2 (for example, i 9 2 17 200843405 8 2 · 1〇0) ), sub-transmission channel 3 (such as work 9 2 · work 6 8 3 · 1 〇 0 In addition, if the above action is repeated at the two-way communication address, the user can set multiple groups of communication ports (p 0 rt) 'however, as shown in Figure 15, although at the workstation 1 A total of 32 communication ports are set, but for the user or user application =, only 16 communication ports will need to be managed or monitored. *, ,: The judgment based on the Weishou body to provide redundancy check in this paper is only a more economic example of the method of the official network redundancy check application of the present invention, and is mainly implemented in the implementation. It is the virtual transfer of two or more passscales, and the method of using the driver to virtualize two or more communication messages into a single---------------------------- In her special gj, the mechanical secrets and equivalent structural changes, Xiao Ying _ is included in the patent of this creation, and is given to Chen Ming. - By the above description, it can be seen that the present invention has the following advantages and features in comparison with the technology of the system: (1) by the purchase of the program and the formation of the medium, although the host side includes the side-way Communication address, but the user does not need to manage the communication iterations under the two network communication addresses, so the user only needs to set a virtual communication port; in addition, the driver is hunted by the driver. In the judgment process, although the host side has the function of transmitting the same data to the primary transmission channel 18 200843405 and the secondary transmission channel, and since only the virtual communication port is managed for the user, the Ethernet architecture is adopted. The host side can not only maintain the high stability brought by the dual transmission channel through the redundancy check mechanism, but the administrator under the architecture does not need to manage a large number of communication ports derived from the dual transmission channel. (2) By using the driver to virtualize the two network communication addresses used by the primary transmission channel and the secondary transmission channel into a single communication port, the application on the host side only needs to access the data on the virtual communication port. Therefore, if you want to upgrade to a network communication address for an Ethernet network with only one network communication address, the application under the Ethernet architecture will not need to design a new application. Network communication addresses are used to access, so it can save considerable application development time and effort. (3) Whether the data is to be transmitted to the host through the relay device or the host is to transmit data to the relay device, the redundancy check is used to determine whether the serial numbers in the data packet are the same, and if they are the same, one of them will be the same. The group data packet is ignored or abandoned, so that the receiving end can avoid the repeated data packet received; in addition, the data under the redundancy checking mechanism will be added to the -sequence ship, so the data is intended to be transmitted by the main transmission channel and The secondary transmission channel transmits, and the communication information of the data in the primary transmission channel and the secondary transmission channel needs to be the same, thereby ensuring that the data is indeed = 19 200843405 u - The primary transmission channel and the secondary transmission channel are simultaneously transmitted. (4) Furthermore, under the redundancy check mechanism of the present invention, if the host side or the relay skirt is placed within a certain time limit (TI ME-OUT), the packet information of the same serial number is not received, the relay device may issue A warning message is sent to the workstation of the master terminal, thereby alerting the network administrator to check whether the transmission channel is disconnected or incorrect. However, the above disclosure is only a preferred embodiment of the present invention, and the scope of the invention is not limited thereto, and therefore, the scale modification of the patent application of the present invention should still be included. Within the scope of the patents covered by the present invention. In summary, the method for managing the network redundancy check application of the present invention can indeed make its effect and purpose, so the invention is sincerely - the invention of the excellent secret is in conformity with the application requirements of the patent for the hair of the month. In line with industrial utilization, novelty and progressiveness, 提出 apply in accordance with the law, and hope that the trial committee will grant this case as soon as possible to protect the inventor's hard work, and the new Xiaoqi shooting any doubts, please don't hesitate to instruct the inventor to do his best. Coordination, real sense of public. '20 200843405 BRIEF DESCRIPTION OF THE DRAWINGS The first figure is a schematic diagram of a two-channel redundant Ethernet system architecture according to a preferred embodiment of the present invention. The first figure is a schematic diagram of transmitting data from a host to a relay device in accordance with a preferred embodiment of the present invention. The first figure is a schematic diagram of transmitting packet data by the master terminal in accordance with a preferred embodiment of the present invention. The fourth figure is a schematic diagram of the main control end transmitting data and encapsulating the packet according to the preferred embodiment of the present invention. The fifth figure is a schematic diagram of transmitting data from the relay device to the main control terminal according to a preferred embodiment of the present invention. The figure is a schematic diagram of transmitting data by a relay device and performing redundancy check according to a preferred embodiment of the present invention. "The figure is a flow chart of the judgment steps of the driver to write data to the network card in the preferred embodiment of the present invention. Figure 8 is a flow chart showing the steps of the driver to read data from the network card in accordance with a preferred embodiment of the present invention. The ninth figure is a flow chart of the determining step of the dynamic body writing data to the network card according to the preferred embodiment of the present invention. Figure 10 is a flow chart showing the steps of reading the 200843405 data from the network card through the blade body in accordance with a preferred embodiment of the present invention. The eleventh figure is an operation interface diagram (1) of a preferred embodiment of the present invention. The twelfth figure is an operation interface diagram (2) of the preferred embodiment of the present invention. Figure 13 is a diagram (3) of the operation interface of the preferred embodiment of the present invention. Figure 14 is a diagram (4) of the operation interface of the preferred embodiment of the present invention. The fifteenth figure is an operation interface diagram (5) of a preferred embodiment of the present invention. Figure 16 shows the architecture of an Ethernet system with dual transmission channels for the prior art. [Main component symbol description] 1. Main control terminal 1, workstation 13, workstation 2, workstation 14, workstation 2, main transmission channel 3, secondary transmission channel 4, relay device 22 200843405 5 2. Sequence data 5, transmission packet 5 1. Header A, master terminal B, primary transmission channel C, secondary transmission channel D, relay device E, remote device 23

Claims (1)

200843405 十、申請專利範圍: 1、一種管理網路冗餘檢查應用程式之方法,尤指運用於由主控 知、主傳輸通道、副傳輸通道、中繼裝置及遠端設備所形成 的雙通道網路架構下的冗餘檢查應用程式之方法,其特徵在 於·透過主控端内的驅動程式將主控端内複數個網路通訊位 址下的通汛埠虛擬成單一個通訊埠,藉此使用者或使用者之 應用程式僅需管理或監控該虛擬後的通訊埠。 f , 、 、如申請專利範圍第1項所述之管理網路冗餘檢查應用程式之 方法,其中該虛擬成單一個通訊埠係指主控端下二個網路通 訊位址擁有相同的資料埠及命令琿之通訊埠。 3、如申請專利範圍第1項所述之管理網路冗餘檢查應用程式之 方法,其中當主控端欲傳送一序列資料至中繼裝置時,該序 列貧料會透過虛擬通訊埠並將該序列資料封包成一傳輸封包 〇 C 4如申请專利範圍第1項所述之管理網路冗餘檢查應用程式之 方法,其中該傳輸封包係包括有表頭及序列資料。 如申睛專利feu第4項所述之管理網路冗餘檢查應用程式之 方法,其中若序列資料於主傳輸通道及副傳輸通道同時傳送 時,則主傳輸通道及副傳輸通道下的網路通訊位址之通訊埠 需要相同。 β 女申明專利範圍第4項所述之管理網路冗餘檢查應用程式之 24 200843405 方法,其中该表頭係包括有標記、長度、序列號及檢查和。 7、如中請專概g第^職之管理醜冗餘檢查應用程式之 方法,其中該驅動程式包括有將序列資料寫入主控端中網路 卡之方法,其方法包括有: a、確認、驅動帛式從使用者所運用之應用程式取得欲傳送的 序列資料; ^ b、將欲傳送至網路卡之表頭配置記憶體; C、將表頭插人序列資料之位置前以形成—傳輸封包; d、 指派表頭之值; e、 複製魏傳輸封包至主傳輸通道及副傳輸通道; f、 將重複之傳輸封包丟棄或忽略。 8、如中請專機圍第丨撕狀管理網路·檢查朗程式之 方法’其中該驅動程式包括有將從主控端中網路卡讀取_ 貧料之方法,其方法包括有: a確°忍網路緩衝區中是否有資料可讀取; b、 確認t繼裝置之緩衝區域是否空白; c、 將已存入網路卡之序列資料取出並插入緩衝區域之前蠕 J d、 檢查表頭是否正確; e、 將序列資料吾棄或忽略 f、 進行冗餘檢查之處理; 25 200843405 g、 檢查表頭之序列號是否正確; h、 將序列資料傳送給使用者之應用程式; i、 檢查緩衝區域内之資料是否完整。 9、如申請專利範圍第1項所述之管理網路冗餘檢查應用程式之 方法,其中該驅動程式與中繼裝置所形成的韋刃體包括有透過 該韌體將序列資料寫入主控端中網路卡之方法,其方法包括 a、 確§忍中繼裝置從其串列琿讀取序列資料; b、 將中繼裝置欲傳送至網路卡之表頭配置記憶體; c、 將表頭插入序列資料之位置前以形成一傳輸封包; d、 指派表頭之值; e、 複製整個傳輸封包至主傳輸通道及副傳輸通道; f、 將重複之傳輸封包丟棄或忽略。 L 〇、如申請專利範圍第:項所述之管理網路冗餘檢查應用程式 之方法,其中該驅動程式與中繼裝置所形成的韌體包括從 主控端中網路卡讀取序職料之方法,其方法包括有·· a、 確認該韌體是否從網路卡讀取序列資料; b、 確認中繼裝置之緩衝區域是否空白; c、 將已存人網路卡之序列資料取出並插人緩衝區域之前 端; d、 檢查表頭是否正確; 26 200843405 e、 將序列資料丟棄或忽略 f、 進行冗餘檢查之處理; g、 檢查表頭之序列號是否正確; h、 該韌體將序列資料寫入中繼裝置之串列槔; i、 檢查緩衝區域内之資料是否完整。 27200843405 X. Patent application scope: 1. A method for managing network redundancy check application, especially for dual channel formed by master control, primary transmission channel, secondary transmission channel, relay device and remote device. The method of redundantly checking an application under the network architecture is characterized in that: through the driver in the main control terminal, the communication under the plurality of network communication addresses in the main control terminal is virtualized into a single communication port, This user or user's application only needs to manage or monitor the virtual communication port. f , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .埠 and the command 珲 communication 埠. 3. The method for managing a network redundancy check application according to claim 1, wherein when the master wants to transmit a sequence of data to the relay device, the sequence of poor materials passes through the virtual communication and The sequence data is encapsulated into a transport packet, such as the method for managing a network redundancy check application according to claim 1, wherein the transport packet includes a header and sequence data. The method for managing a network redundancy check application as described in claim 4, wherein if the sequence data is simultaneously transmitted on the primary transmission channel and the secondary transmission channel, the network under the primary transmission channel and the secondary transmission channel The communication address of the communication address needs to be the same. The method of managing a network redundancy check application described in item 4 of the patent scope is described in the method of 2008 20080405, wherein the header includes a mark, a length, a serial number, and a checksum. 7. The method of managing the ugly redundancy check application program, wherein the driver includes a method for writing sequence data into the network card of the host, and the method includes: a. Confirming and driving the program to obtain the sequence data to be transmitted from the application used by the user; ^ b, transferring the header to the network card configuration memory; C, inserting the header into the position of the sequence data Forming a transmission packet; d, assigning a value of the header; e, copying the Wei transmission packet to the primary transmission channel and the secondary transmission channel; f, discarding or ignoring the duplicate transmission packet. 8. If you want to use the special machine to tear the management network and check the program, 'the driver includes the method of reading the _ poor material from the network card in the host, including: a Exactly, whether there is data in the network buffer can be read; b. Confirm whether the buffer area of the device is blank; c. Except the sequence data stored in the network card and insert it into the buffer area. Whether the header is correct; e, the sequence data is discarded or ignored, and the redundancy check is processed; 25 200843405 g, check whether the serial number of the header is correct; h, the application that transmits the sequence data to the user; Check if the data in the buffer area is complete. 9. The method for managing a network redundancy check application according to claim 1, wherein the driver and the relay device form a blade body including the sequence data written into the master through the firmware. The method for the network card in the end, the method comprising: a, the thief relay device reads the sequence data from the serial port; b, the relay device is to be transmitted to the header configuration memory of the network card; c. Inserting the header into the location of the sequence data to form a transport packet; d, assigning the value of the header; e, copying the entire transport packet to the primary transport channel and the secondary transport channel; f. discarding or ignoring the duplicate transport packet. The method for managing a network redundancy check application as described in the scope of the patent application, wherein the firmware formed by the driver and the relay device comprises reading a network card from the host terminal. The method includes the following steps: confirming whether the firmware reads the sequence data from the network card; b, confirming whether the buffer area of the relay device is blank; c, serializing the data of the stored network card Remove and insert the front end of the buffer area; d, check whether the header is correct; 26 200843405 e, discard or ignore the sequence data, perform redundancy check; g, check whether the serial number of the header is correct; h, the The firmware writes the sequence data to the serial port of the relay device; i. Checks whether the data in the buffer area is complete. 27
TW96115089A 2007-04-27 2007-04-27 Method of managing network redundancy-checking programs TW200843405A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96115089A TW200843405A (en) 2007-04-27 2007-04-27 Method of managing network redundancy-checking programs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96115089A TW200843405A (en) 2007-04-27 2007-04-27 Method of managing network redundancy-checking programs

Publications (1)

Publication Number Publication Date
TW200843405A true TW200843405A (en) 2008-11-01

Family

ID=44822272

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96115089A TW200843405A (en) 2007-04-27 2007-04-27 Method of managing network redundancy-checking programs

Country Status (1)

Country Link
TW (1) TW200843405A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI466510B (en) * 2009-02-12 2014-12-21 Realtek Semiconductor Corp Processing apparatus and transmission method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI466510B (en) * 2009-02-12 2014-12-21 Realtek Semiconductor Corp Processing apparatus and transmission method thereof

Similar Documents

Publication Publication Date Title
CN110232037A (en) Host system and its method and accelerating module
WO2013136522A1 (en) Computer system and method for communicating data between computers
CN104486234B (en) A kind of method and server that service switch is unloaded to physical network card
CN104572243B (en) Method and system for sharing Java Virtual Machine
CN104579727B (en) A kind of method and apparatus for the network connection for managing network node
CN107294869A (en) A kind of method and system of Microsoft Loopback Adapter message crawl
JPS60500195A (en) Method and device for smoothly interrupting digital communication links
CN104660449B (en) The method and apparatus for preventing the more main equipment Master of stacking splitting
WO2017088494A1 (en) Link management method and apparatus
CN106878204A (en) The creation method and device of a kind of virtual machine
CN103685578B (en) The data transmission method of master-slave equipment
CN104618189B (en) Link failure detection method and device
CN104170307B (en) Failover methods, devices and systems
CN106230753B (en) Port expander PE downlink port control method and device
CN105162732A (en) Method and device for creating expansion port
CN105429946A (en) System and method of preventing forging IP address based on SDN virtual switch
CN103475552B (en) Method for disturbing the bus communication of control device
CN106445642A (en) Safety communication method based on virtual machine monitor and system
CN106649186A (en) Communication method and device for application program and serial port peripheral
CN103823721B (en) A kind of method and apparatus of interprocess communication
CN104407806B (en) The amending method and device of RAID group hard disc information
CN106790446A (en) Data backup system and method
CN101777979B (en) Operating method and system for intelligent key device
TW200843405A (en) Method of managing network redundancy-checking programs
CN102811143A (en) Method and device for monitoring failure of data link layer, and network equipment