TWI229993B - Topology loop detection mechanism - Google Patents
Topology loop detection mechanism Download PDFInfo
- Publication number
- TWI229993B TWI229993B TW92131629A TW92131629A TWI229993B TW I229993 B TWI229993 B TW I229993B TW 92131629 A TW92131629 A TW 92131629A TW 92131629 A TW92131629 A TW 92131629A TW I229993 B TWI229993 B TW I229993B
- Authority
- TW
- Taiwan
- Prior art keywords
- loop
- topology
- loop detection
- frame
- scope
- Prior art date
Links
Landscapes
- Small-Scale Networks (AREA)
- Air Bags (AREA)
Abstract
Description
1229993 五、發明說明(1) 發明所屬之枯浙 本發明是有關於一種在網路 (topology loop)之機制。本發 ^則拓樸迴圈 迴圈,其無關於網路中其他裝^。f別是有關於偵測拓樸 先前技術 廣播風暴(broadcast st〇rm) b 丄 路(LAN,local area netwQr ) ^ 1 聯接之區域網 (multicast)封包之盔窮迴圈。、态之廣播封包與多播 圈存在的關係,以及由窮於 =交是因為網路拓樸迴 ^ ^Cforward) a, ^ ^ fl] 關係,網路拓樸迴圈是前饋多餘路徑:存生的 *良在於,其無效地消耗網路頻寬以及丄 能置於處理重複的流量。因此, " 某二致 „ 〇 之5亥父換态發出框(frame)的話,該交框义 饋至⑽以分析該迴圈制框—其由利用該^;& 項目而完成,該表能將目標為 dlT AC位址(比如具I/G設定之交換器MAC)之框導向至 存在之迴圈偵測法其中之一是以擴充樹協定 (spanning-tree protocol,STp)得無迴圈網路拓樸。正 常情況下,網路中STP保持致能。然而,網路拓樸迴圈仍 可導致某些如下情況: 1 · STP實施方式可能有缺點,且有時無法得到無迴圈 第5頁 11872twf.ptd 12299931229993 V. Description of the invention (1) What the invention belongs to The present invention relates to a mechanism in the topology loop. The hair ^ is a topology loop, which has nothing to do with other equipment in the network. f is related to the detection topology. The prior art broadcast storm (broadcast st om) b 丄 road (LAN, local area netwQr) ^ 1 the loop of the helmet of the connected multicast packet. The relationship between the broadcast packet and the multicast circle of the state, and the relationship between the poor and the equal = due to the network topology ^ ^ Cforward) a, ^ ^ fl] relationship, the network topology loop is a feedforward redundant path: The good thing about Cunsheng is that it consumes network bandwidth inefficiently and can't be placed to handle repeated traffic. Therefore, " If a frame is sent to the parent of the 5th generation of the 5th transformation, the cross frame is fed back to ⑽ to analyze the loop frame-which is completed by using the ^ & project, which The table can direct the frame of the target dlT AC address (such as the switch MAC with I / G settings) to the existing loop detection method. One of them is to use the spanning-tree protocol (STp). Loop network topology. Under normal circumstances, STP remains enabled on the network. However, network topology loops can still lead to some of the following situations: 1 STP implementation may have disadvantages and sometimes cannot be obtained without Page 5 of 11872twf.ptd 1229993
拓樸。 2·埠硬體可能有缺點使其無法正確地回應STp之操 作。 、 3· STP可能被故意地或無意地失能於區域交換器或遠 端交換器或某些埠上。終端使用者接著可能會沒有察到 該拓樸是無迴圈而誤操作該些交換器。 、 4·埠硬體可能有缺點使其無法傳輸或接收封包,導致 單向流量。另,部份斷裂的電纜也會導致單向流量。在兮 凊况下,STP會無思地將一封閉皡(bi〇cking port)轉成, 饋,,因為該埠(或其同等槔)並無接收高級橋接器協定資 料單元(Bridge Protocol Data Uni t,BPDU)。 貝 5· IEEE 規格802· 3ad連線集合(iink aggregati〇n)實 轭方式可能有誤,而從連線集合發出之框回傳至該連線集 合。 '、 6.可能有連線集合錯誤設定的存在。連線兩側會集合 不同的埠。 ” 口 7·虛擬區域網路(virtual Local Area Network, V&LAN)轉譯可能會在遠端交換器上被有意或無意致能。終 端使用者接著可能會沒有察覺到該拓樸是無迴圈而誤操作 該些交換器。 ^ 8.第3層(La^er 3,L3)介面間之橋接器被致能,但所 得拓樸不能免於迴圈。 鳘内容 因此,本發明提供一種迴圈偵測機制法,其中一特殊Topology. 2. Port hardware may have disadvantages that prevent it from responding properly to STp operations. 3. STP may be deliberately or unintentionally disabled on a regional or remote switch or certain ports. The end user may then erroneously operate the switches without seeing that the topology is loopless. 4. The port hardware may have disadvantages that prevent it from transmitting or receiving packets, resulting in unidirectional traffic. In addition, partially broken cables can cause unidirectional traffic. Under the current circumstances, STP will thoughtlessly convert a closed port (biocking port) into a feed because the port (or its equivalent) does not receive the Bridge Protocol Data Uni t, BPDU). The IEEE 802. 3ad connection aggregation (iink aggregation) connection method may be wrong, and the frame sent from the connection aggregation is returned to the connection aggregation. ', 6. There may be a wrong connection set. There are different ports on both sides of the connection.口 7. Virtual Local Area Network (V & LAN) translation may be enabled intentionally or unintentionally on the remote switch. End users may then not realize that the topology is loopless And these switches are operated by mistake. ^ 8. The bridge between the La ^ er 3 (L3) interfaces is enabled, but the resulting topology is not free from loops. 鳘 Content Therefore, the present invention provides a loop Detection mechanism method, one of which is special
1229993 、發明說明(3) $ = ^ π前饋璋上並觀察是否該框會接收於一前饋 換器上之::j j m:框會被遠端交換器或區域交 換器上之前饋埠接收。⑽!:樸迴圈,該框會被區域交 cpu以進-步分析,而不成能將該框擷取至 圈偵i ί = 一目標是在STP機制無法正常運作下操作迴 向連^明之另—目標是在STP無法正常運作情況(比如單 阿埂綠)下偵測迴圈。 ·个 制本地消耗網路頻寬,否則該機 是否ί:: ί::目,標是謹慎地假設遠端(或同等)交換器 本_明、圈偵測之網路os,並假設其能力與設定。 明之又一目標是操作於連線集合層之下。 預防拓樸迴圈。根據上上it 圈偵測機制以 以提供無廣播風=述描述,本發明機制具有下列特性 1 ·操作於STP機制架構之外。 迴圈2。·即使STP無法正常運作下(比如單向連線)仍能偵測 影響3。·消耗較少網路頻寬,否則本身將對於網路造成不良 網路^不ΐ設遠端(或同等)交換器是否執行有迴圈摘測之 、判路的’亦不假設其能力與設定。 11872twf.ptd 第7頁1229993 、 Explanation of the invention (3) $ = ^ π feed forward and observe whether the box will be received on a feed forward converter: jjm: box will be received by the front feed port on the remote switch or area switch . Huh! : Park loop, the frame will be processed by the area cpu for further analysis, but it will not be able to capture the frame to the circle detection i 一 = a goal is to operate the back to the link even if the STP mechanism does not work properly-the other is- The goal is to detect loops in situations where STP is not working properly (such as a single Ao green). · The local system consumes the network bandwidth, otherwise, is the machine ί :: ί :: The goal is to carefully assume that the remote (or equivalent) switch is _ming and circle-detected network os, and assume its Capabilities and settings. Another goal of Ming is to operate under the wired collection layer. Prevent topology loops. According to the above it circle detection mechanism to provide a non-broadcasting wind, as described above, the mechanism of the present invention has the following characteristics: 1. It operates outside the STP mechanism architecture. Loop 2. · Effects can be detected even when STP does not work properly (such as one-way connection) 3. · Consume less network bandwidth, otherwise it will cause a bad network to the network ^ Do not set whether the remote (or equivalent) switch performs loop pick-up and test, and does not assume its ability and set up. 11872twf.ptd Page 7
12299931229993
5 ·其操作於連線集合層之下。 本發明包括以下所描述之階段 施迴圈偵測機制之目標。 以達成上述目標與實 底下實施 ,且提供 伽…,本發明之上述與其他目標,特徵與優點可由 砰細描述中明瞭,實施例可參考附圖而了解。 要知道上述描述與底下詳細描述僅是舉例用 本發明之更進一步解釋。5 · It operates under the wire collection layer. The present invention includes the objective of the loop detection mechanism in the phase described below. In order to achieve the above objectives and implementation, and provide Gamma ..., the above and other objectives, features and advantages of the present invention can be clearly understood from the detailed description of the embodiment, and the embodiments can be understood with reference to the drawings. It is to be understood that the above description and the following detailed description are merely examples for further explanation of the present invention.
一 首先,本發明提供迴圈偵測機制之基本觀念,其送出 特殊多播框於前饋(forward)埠上並觀察該框是否將 在一前饋埠上被接收。如果沒有拓樸迴圈,該框會被丟 ,某些遠端交換器或區域交換器的封閉埠上。如果有拓^ 迴圈,該框會接收於該區域交換器的前饋埠上。該區域交 換器規劃成能擷取該框並送至CPU以更進一步分析而不一需 前饋該框。為教示本發明一較佳實施例,本發明之迴圈^ 測機制之定義將描述成以下數個階段··框袼式,傳輸,接 收與别饋,分析,操作,偵測方案。其他考量點與指令線 介面將於其後描述。 > 框袼式 该迴圈偵測框之框格式列於第1圖之表中。該目標媒 體存取控制(Destination Media Access Control,DMAC)First, the present invention provides a basic concept of a loop detection mechanism, which sends a special multicast frame on a forward port and observes whether the frame will be received on a forward port. If there is no topology loop, the box will be dropped on some closed ports of the remote switch or area switch. If there is a loop, the frame will be received on the feedforward port of the area switch. The area switch is planned to capture the frame and send it to the CPU for further analysis without the need to feed forward the frame. In order to teach a preferred embodiment of the present invention, the definition of the loop detection mechanism of the present invention will be described in the following stages: • Frame type, transmission, reception and feedback, analysis, operation, and detection scheme. Other considerations and command line interfaces will be described later. > Frame type The frame format of this loop detection frame is listed in the table in Figure 1. The destination media access control (DMAC)
11872twf.ptd 第8頁 1229993 五、發明說明⑸ " " 位址例如為01-80-C2-〇〇-〇〇-2f或具Ι/G位元設定之區域交 換器MAC位址。另一方面,MAC位址〇卜8〇-c2一〇〇一〇〇一2f是 GARP保留MAC位址之一。目前來說,此位址尚未使用於任 :標準協定:,故而本發明可使用之。首&,使得該框為 夕播框’使得無關於本發明迴圈偵測之遠 播此框(麵規w2.5.G2.1D 年版(麵s^nfafdf11872twf.ptd Page 8 1229993 V. Description of the invention " " The address is, for example, 01-80-C2-〇〇-〇〇-2f or the area switch MAC address with the 1 / G bit setting. On the other hand, MAC address 80-c2 1002f is one of the GARP reserved MAC addresses. At present, this address has not been used in any of the following: standard agreement :, so this invention can be used. First & make this frame an evening broadcast frame ’so that there is no distance to the loop detection of the present invention broadcast this frame (face gauge w2.5.G2.1D annual version (face s ^ nfafdf
Sec· 12·5 02.1D 1 998 Edition));以及當有拓樸迴圈存 在時,該框可到達該區域交換器。其次,區域可對具此 MAC位址之框給予較高的優先權(相同於卯⑽),增加在拓 樸迴圈與廣播風暴下,框被CPU接收與處理的可能性。使 用此MAC位址會造成CPU對框處理之負擔,因為具此mac位 址之框會通過封閉埠,如同BPDU。因而,較好是當口有^ 數量(較好是1)的交換器進行迴圈偵測下才使用此;^位、 較佳 設定之區 份橋接器 允許發出 位元使得 不需對框 01 -80-c2 BPDU之處 處理所接 位元設定 實,例之目標MAC位址之另一種選擇是具I/G位元 域父換态之MAC位址。在此可使用當成STp中之部 Π)之該MAC位址。接著,此種獨特目標MAC位址可 该框之该父換器可特殊地擷取到該框。打開I / G 邊框是多播框,理由如上述。使用此種MAC位址 進行優先權處理,且框更可能(比起使用 -0 0-0 0-2f之情況,令框被處理成具有相似於 理或優先權之PDU)丟棄於廣播風暴中。另外,在 收框之中不需要軟體協助,除非其目標為具 之區域交換器之MAC位址。此特性使得cpu負擔較Sec · 12 · 5 02.1D 1 998 Edition)); and when a topology loop exists, the box can reach the area switch. Second, the region can give higher priority to the frame with this MAC address (same as 卯 ⑽), increasing the possibility that the frame will be received and processed by the CPU under the topology loop and broadcast storm. Using this MAC address will cause the CPU to burden the frame processing, because the frame with this mac address will pass through the closed port, like BPDU. Therefore, it is better to use this only when the switch with ^ number (preferably 1) is used for loop detection; the ^ bit, the better-set partition bridge allows the bit to be sent so that there is no need for the frame 01- The 80-c2 BPDU is processed in real-time. The other option of the target MAC address is a MAC address with the parent state of the I / G bit field. The MAC address used as part of the STp (ii) can be used here. Then, this unique target MAC address can be specifically retrieved by the parent switch of the frame. Opening the I / G border is a multicast box, for the reasons described above. This MAC address is used for priority processing, and the frame is more likely (than the case of -0 0-0 0-2f, the frame is processed into a PDU with a similar rationale or priority) and discarded in the broadcast storm . In addition, software assistance is not required in the box unless its target is the MAC address of a regional switch. This feature makes the cpu burden more
12299931229993
低,即使有大數量交換器開啟了迴圈偵測。在本發明一較 佳實施例中,具Ι/G位元設定之區域交換器之MAC位址可當 成目標MAC位址。 田 框之來源〇0Urce)MAC位址可為區域交換器之MAC位址 (已清除Ι/G位元)。在此可使用當成STp中之部份橋接器α 之該MAC位址,或可為有關於某些L3介面(VLAN介面)之 位址。要注意,遠端交換器會在前饋表中獲悉此“^位 址。另外,框之來源MAC位址可為傳輸埠的MAC位址。如 有助於辨別來源框之埠。 在此’ δί(*息搁位包括數個類型—長度—值 (Type-Length-Value,TLV)攔位。類型%彳攔位代表要接 值之長度(以位元組為單位)。值副攔位為非必須的,如 存在的話,則其帶有TLV欄位的值。DMAC選擇是關鍵的, 因為其必需是多播位址(I/G設定)並使得框發出者能輕易 擷取到此框。在此較佳實施例中,選擇具I/G設定之交換 IsMAC,因為交換器MAC可獨特地辨別框發出者。擷取機制 =程式化具一項目(entry)之該L2前饋表,該項目將目標 為该MAC位址之該框導向至cpu。 參考第10〜15圖,TLVS與其副欄位將於此處描述。 ^考描述終止器(terminat〇r)之第1〇圖,根據本發明 ^佳貫施例’該TLV為必要的。其用於代表訊息結尾及將 樞延伸至特殊大小與位元組對準。 明r ΐΐ描述埠辨別器(identifier)之第11圖,根據本發 月車父仏貫施例,該TLV為非必要的。要得知發出該框之埠Low, even with a large number of switches with loop detection turned on. In a preferred embodiment of the present invention, the MAC address of the area switch with the 1 / G bit setting can be used as the target MAC address. The source of the field frame is 00Urce. The MAC address can be the MAC address of the regional switch (the 1 / G bit has been cleared). The MAC address used as part of the bridge α in the STp can be used here, or it can be an address related to some L3 interfaces (VLAN interfaces). It should be noted that the remote switch will learn this "^ address in the feedforward table. In addition, the source MAC address of the box can be the MAC address of the transmission port. If it is helpful to identify the port of the source box. Here ' δί (* interest stall includes several Type-Length-Value (TLV) blocks. Type% 彳 block represents the length (in bytes) of the value to be accessed. Value sub-block It is not necessary, if it exists, it has the value of the TLV field. The DMAC selection is critical because it must be a multicast address (I / G setting) and enable the sender of the frame to easily retrieve it Box. In this preferred embodiment, the switch IsMAC with I / G settings is selected because the switch MAC can uniquely identify the sender of the box. Fetching mechanism = program the L2 feedforward table with an entry This project will direct the box targeting the MAC address to the CPU. Refer to Figures 10 ~ 15, TLVS and its sub-fields will be described here. ^ Test Figure 10 describing the terminator (terminat〇r) According to the present invention, the ‘good practice’ embodiment is that the TLV is necessary. It is used to represent the end of a message and extend the pivot to a special size and bit. The group is aligned. Figure 11 describes the port identifier (identifier). According to the car driver ’s consistent implementation of this month, the TLV is unnecessary. You must know the port from which the frame is issued.
12299931229993
之資訊只能從所接收框之來源MAC位址。有時,迴圈 機制可能無法取得乙太框表頭(header)。在決定區域交換 器是否為拓樸迴圈的一部份或該迴圈存在於遠端,得知發 出該框之埠是很重要的。 參考描述VLAN辨別器之第12圖,根據本發明較佳實施 例,該TLV為必要的。其使用於無法辨別出源頭vlan時, 因為迴圈偵測軟體模組無法得知VLM標籤(tag)或其所得 資訊。即使可得知VLAN資訊,由於遠端交換器上可能有 VLAN轉譯,仍不足以信賴。 參考描述交換器辨別器之第丨3圖,根據本發明較佳實 施例,該TLV為非必要的。其有用於當無法從目標MA(:位址 或來源MAC位址辨別出框的發出器時。這可能為迴圈偵測 軟體模組無法付知乙太框表頭或其所得資訊之情況。 參考描述時間類型(timestamp)之第14圖,根據本發 明較佳實施例,該時間類型TLV為非必要的。其有助辨^ 框已持續多久。其載有在有關於區域交換器時脈之"時間 戳(Epoch time)”後之微秒數。迴圈偵測機制可忽略持續 太久的框,其可能為由無止盡迴圈所造成。其可避免惡咅、 貫體重送有效但過時框來造成錯誤偵測之重播攻擊。建議 忽略超過最大框生命周期之框。最大框生命周期等於最大 橋接器暫態延遲(4秒)乘上最大橋接器直徑(7個橋接器)再 加上初始傳輸之最大媒體存取延遲(參考802. 1D之 B · 3 · 1 · 2 )。譬如,建議值是7 · 5秒且不能超過3 〇秒。 參考描述總和檢查(checksum)之第15圖,根據本發明The information can only come from the source MAC address of the received frame. Sometimes, the loopback mechanism may not be able to obtain the Ethernet frame header. When deciding whether a regional switch is part of a topology loop or if the loop exists at the far end, it is important to know the port where the box originated. Referring to Figure 12 describing the VLAN discriminator, this TLV is necessary according to the preferred embodiment of the present invention. It is used when the source vlan cannot be identified, because the loop detection software module cannot know the VLM tag (tag) or the information obtained by it. Even if the VLAN information is available, it may not be reliable because there may be VLAN translations on the remote switch. Referring to Figure 3, which describes the switch discriminator, according to a preferred embodiment of the present invention, the TLV is unnecessary. It is used when the sender of the frame cannot be identified from the target MA (: address or source MAC address. This may be the case where the loop detection software module cannot know the Ethernet frame header or the information it obtains. Reference Figure 14 describing the time type. According to the preferred embodiment of the present invention, the time type TLV is unnecessary. It helps to identify how long the frame has lasted. It contains information about the clock of the regional switch. " Epoch time "in microseconds. The loop detection mechanism can ignore frames that last for too long, which may be caused by endless loops. It can avoid evils and deliver weight effectively But outdated frames cause replay attacks with false detection. It is recommended to ignore frames that exceed the maximum frame life cycle. The maximum frame life cycle is equal to the maximum bridge transient delay (4 seconds) times the maximum bridge diameter (7 bridges). Add the maximum media access delay for the initial transmission (refer to B · 3 · 1 · 2 of 802.1D). For example, the recommended value is 7 · 5 seconds and cannot exceed 30 seconds. Figure 15 according to the invention
H872twf .ptd 第11頁 1229993 五、發明說明(8) ----- 車父佳κ知例,該總和檢查τ L V為必要的。其有助於驗證 框’並避免惡意偽裝迴圈偵測框來干擾網路。總和檢查演 算法與演算法之金鑰匙(key)可能會因交換器而有所不 同。比如,1 6位元組MD5總和檢查係從迴圈偵測軟體與除 了具將〇排除之總和檢查TLV值欄位之CRC之整體乙太$匡所 產生之隨機金鑰匙所計算出。隨機金鑰匙可隨時間改變以 避免送出會造成迴圈偵測之同一框之重播攻擊。如果所接 收之框無法通過總和檢查驗證,該框視為無效。 傳輸 在此將描述本發明所導入之傳輸。迴圈偵測框送出於 指定VLAN上之前饋埠。然而,其也可送於非前饋埠上。、 拓樸迴圈測試於每一各VLAN。雖然相同STP之VUN之 STP計算拓樸必需相同,較好是對各運作中之VLAN測試拓 樸迴圈。理由之一是,受允許之VLAN可能會依各埠而不 同。另一理由是硬體中之STP狀態可能為各埠各 VLAN(per-port-per-VLAN) 〇 通常希望屬於待測VLAN之一埠所送出之迴圈偵測框 夠在VLAN上偵測拓樸迴圈。然而,某些拓樸迴圈是由單向 j線造成,以及永遠在一埠上送出迴圈偵測框會無法偵測 =此情況。例如在第4圖中,交換器A與交換器B由兩條連、 線所連接。交換器A假設為STP根點橋接器,但由於單 線的關係,其BPDU無法到達交換器b的㈣“ i。這會導致 條連線皆處於前饋狀態。假設只有交換器B執行迴圈偵 剛。如果只在port2送出迴圈偵測框,其不會再次到達交H872twf .ptd Page 11 1229993 V. Description of the Invention (8) ----- Known examples of the car father, this sum check τ L V is necessary. It helps verify the frame ’and avoid maliciously disguising the loop detection frame to interfere with the network. The sum check algorithm and the algorithm's golden key may differ from switch to switch. For example, the 16-bit MD5 sum check is calculated from the loop detection software and the random golden key generated by the overall Ethernet $ verse that excludes the CRC with the excluding the sum check TLV value field. The random golden key can be changed over time to avoid sending out a replay attack in the same frame that would cause loop detection. If the box received fails verification by the sum check, the box is considered invalid. Transmission The transmission introduced by the present invention will be described here. The loop detection frame is sent out the previous feed port on the specified VLAN. However, it can also be sent to a non-feedforward port. Topology loop tests are performed on each VLAN. Although the STP calculation topology of the VUN of the same STP must be the same, it is better to test the topology loop of each operating VLAN. One reason is that allowed VLANs may vary from port to port. Another reason is that the STP status in the hardware may be per-port-per-VLAN. 〇It is usually expected that the loop detection frame sent by a port belonging to one of the VLANs to be tested is sufficient to detect extensions on the VLAN. Park Loop. However, some topological loops are caused by one-way j-line, and it is impossible to detect if the loop detection frame is always sent on a port = this situation. For example, in Fig. 4, switch A and switch B are connected by two wires. Switch A is assumed to be the STP root bridge, but due to the single-line relationship, its BPDU cannot reach the switch “i” of switch b. This will cause all connections to be in a feedforward state. Assume that only switch B performs loop detection. .If the loop detection box is sent only at port2, it will not reach the traffic again.
第12頁 1229993 五、發明說明(9) 換器A。因而,在執行迴圈偵測的交換器上,必需在所有 前饋埠上都送出迴圈偵測框。 另一方面,較好是藉由限制送出的框數量來限制網路 與 CPU負擔。描述KIEEE802.3ad,2000 之附錄 43B(Annex 43B of IEEE802.3ad,2〇〇〇)中之低速協定傳輸特徵需求 =了,對每埠之最大流量負載限制為5〇框/秒。以此為 參考,第一傳輸演,算法可如下: 傳輪1 可秒、,區域交換器的所有璋都視為迴圈偵測框 i i •對每一埠,送出一個迴圈偵測框於 T^,jVLANj, ^^^5〇^t#VLAN , an-視同仁。比如,在各埠上使用一最後vid_::個 (last-VID-used)變數。從開啟“以―VID — 框於VLAN上。接著為楂私% q埠送出 b士 ^ 在傳輸後’更新該變數。當變數刭磕 4096時,將其設回至i。 文莜到達 上述/臾异法強§周快速谓測、倉恭 V啊所有淳公平處理間之平衡:载= 二對所有 佳實施型態,因為某些ASIC交換器引二:::选不是最 述如下: 有車®此存在第二傳冑演算法描 •董十母-—秒’區域夺拖ΛΑ ^ J 測機制的潛在可能者:、^ 、 5 %VLAN視為迴圈偵 U •對各VLAN,送出一個洄^占、丨 樸内的所有琿。最多$ 、,貝1框至VLAN之致能拓 迗出至50個此種VLAN。使用整體Page 12 1229993 V. Description of the invention (9) Converter A. Therefore, on a switch that performs loop detection, a loop detection frame must be sent on all feedforward ports. On the other hand, it is better to limit the network and CPU load by limiting the number of frames sent. The characteristics of low-speed protocol transmission in Appendix 43B (Annex 43B of IEEE802.3ad, 2000) describing KIEEE802.3ad, 2000 = Yes, the maximum traffic load per port is limited to 50 frames / second. Taking this as a reference, the algorithm of the first transmission can be as follows: The pass 1 can be seconds, and all the frames of the regional switch are regarded as the loop detection frame ii • For each port, send a loop detection frame at T ^, jVLANj, ^^^ 5〇 ^ t # VLAN, an- are the same. For example, use a last-VID-used variable on each port. From the "VID" box on the VLAN. Then send b for the private port q port ^ Update the variable after transmission. When the variable is 4096, set it back to i. The difference between strong law and strong § weekly quick test, Cang Gong V, the balance between all fair and fair processing: load = two pairs of all good implementation types, because some ASIC switches lead to 2 ::: election is not the most described as follows: Yes Che® There is a description of the second pass algorithm. • Dong Shimian—Second's area grabbing potential ΛΑ ^ J potential detection mechanism:, ^, 5% VLAN as loop detection U • For each VLAN, send A single account occupies all the addresses in the park. A maximum of $, and the frame can be extended to 50 VLANs. Use the overall
11872twf.ptd 第13頁 122999311872twf.ptd Page 13 1229993
切於社所有運作中VLAN last-VID-used 變數以有 作。 ,谓ΛΤΙ逆 此演算法可能會導致在某些時段内 的迴圈偵測框。最糟情況為約80 (4096/5Q)l/。出任j可 :在交換器上只有少量(通常少於50個)的運作中只 接收與前 當未 能拓樸上 變,且將 當開 (前饋埠) 框的話, 樸上的所 換器必需 器在一封 不能前饋 饋 開啟迴圈 之一埠接 其前饋至 啟迴圈偵 接收到迴 該交換器 有其他埠 前饋該框 閉埠上接 該框。 偵測之習知交換器或本發明交換 收到,測框時,其必需保持該: 5玄致旎拓樸上的所有其他琿。It works in all VLAN last-VID-used variables in the operation of the agency. It is said that ΛΤΙ inverse This algorithm may lead to a loop detection frame in some period. The worst case is about 80 (4096 / 5Q) l /. Can assume the role: in the operation of a small number of switches (usually less than 50), only receive and change the topology, and will open the (feedforward port) box, the converter on Park The essential device connects one of the ports that can not feed forward to the open loop and feeds it forward to the start loop. The switch receives the other ports of the switch and feeds the frame to the closed port. The detection switch or the exchange of the present invention, when receiving the frame, it must keep this: 5 All other 上 on the topology.
測的習知交換器在致能拓樸上之 夺:如果不是該交換器發出 改變的該框前饋至該致能 。如果疋该交換器發出該框 至CPU以分析該迴圈 邊 收到迴圈偵測框時/“匡。當該交相 J框時,其必需放棄該框The tested conventional switch is on the enabling topology: if it is not the switch that issued the change, the box is fed forward to the enabling. If the switch sends the box to the CPU to analyze the loop, then when it receives the loop detection box / "Kuang. When the intersecting J box, it must give up the box
當該交換器在致能拓樸之一埠上 該框的指定VID不同於原本VID時,該六 ^圈偵測框,但 變的該框前饋至所指定v丨D之致能拓 、器必需將未經改 接收到此迴圈偵測框並不能證明拓樸迴的所有其他蟑。 VID上前饋該框更能探討拓樸迴圈的可、存在。在指定 非必需的,但沒有前饋法則的話可=。前饋法則為 圈’這將於偵測階段中描述。 ‘、、、古偵測到某些迴When the designated VID of the frame on the switch on one of the enabling topologies is different from the original VID, the six-circle detection frame, but the changed frame is fed forward to the specified enabling, The receiver must receive the loop detection frame without modification and cannot prove all other cockroaches of the top loop. The feed-forward box on VID can further explore the possibility and existence of the topology loop. It is not necessary to specify but can be used if there is no feedforward rule. The feedforward rule is loop 'which will be described in the detection phase. ‘,,, ancient
12299931229993
分析 開啟迴圈偵測上 出之致能拓樸上之一 ^ 父換器必需對該交換器本身所發 下,可能曾經存在咬$之框進行迴圈偵測分析。在此情況 (減少錯誤),迴圍二,在正存在一拓樸迴圈。為穩當起見 果發出該框之埠與桩:^體模組必需再度檢查埠狀態。如 樸迴圈存在。如果1 μ框之埠皆處於前饋狀態,則有拓 域交換器為拓樸迴實際上為不同的兩個帛,則該區 際上為同一埠,則秘部份(如第4圖)。如果該兩埠實 在拓樸迴圈存在於遠端(如第5圖)。 樸迴圈Μ旦在交d!V,在交換器A與交換器8間有拓 換器c開啟了迴圈;Λ與:換⑼間只有-條連線。假設交 η 搶L 1 偵測。攸交換器C送出的迴圈偵測框會在 冋一埠上被接收。 # 操作 捧、一旦偵測到拓樸迴圈,必需告知終端使用者,以補救 月^。如果可能的話,該交換器應自動終止該迴圈。 、當偵測交換器是拓樸迴圈的一部份時,其可中止該埠 以、、s止迴圈’以將其移出STp控制之外並將該埠狀態設為 1閉。對於欲封閉之埠有兩種選擇:框發出埠與框接收 土 β。必需封閉前者的原因為,在單向連線例中,其可能是 問題源頭。比如,在第4圖中,交換器Β較好是封閉p〇rt i 而非封閉port2。由迴圈偵測導致被封閉之埠可在一段時 j (亦即3分鐘)經過後自動回復操作,使得終端使用者不 需要存取該交換器來進行該操作。Analysis One of the enabling topologies in turn-on loop detection. ^ The parent switch must send out the switch itself. There may have been a frame for bit detection for loop detection analysis. In this case (reduced errors), back to the second, there is a topological circle. For the sake of stability, if the port and stub of this box are issued: The body module must check the port status again. Such as the Park Loop exists. If the ports of the 1 μ frame are in the feed-forward state, there are two topological switches that are different in topology, but the two ports in the region are the same port, so the secret part (as shown in Figure 4) . If the two ports actually exist at the far end (see Figure 5). The Park loop M is at d! V, and there is a switch c between switch A and switch 8 to open the loop; Λ and: there is only one connection between the switches. Suppose that η grabs L 1 for detection. The loop detection frame sent by the switch C will be received on the first port. # OPERATION Once the topology loop is detected, the end user must be notified to remedy the month ^. If possible, the switch should automatically terminate the loop. When the detection switch is part of the topology loop, it can suspend the port, s, and s to prevent it from moving outside the STp control and set the port status to 1 closed. There are two options for the port to be closed: the frame sending port and the frame receiving soil β. The former must be closed because, in the case of a one-way connection, it may be the source of the problem. For example, in Figure 4, the switch B is preferably closed port i instead of closed port2. The closed port can be automatically restored after a period of time j (that is, 3 minutes) caused by the loop detection, so that the end user does not need to access the switch to perform the operation.
11872twf.ptd 第15頁 1229993 五、發明說明(12)11872twf.ptd Page 15 1229993 V. Description of the invention (12)
當交換器偵測到遠端迴圈時,該交換器無 圈。交換器必需警告終端使用者來進行補救。ς =该迴 迴圈偵測框可能會被該迴圈重複許多次。交換器、、+測之 該些框以免造成CPU的負擔。此種封閉可在一段益時必需封閉 3分鐘)經過後被移除,使得如果迴圈繼續存在^間(,即 告終端使用者。 、U ’此警 理想上,遠端迴圈可立即自動終止。然而, 之遠%父換器無法在迴圈偵测框中辨別出。要注音,乂圈 偵測機制設計成無關於遠端交換器之合作。可利;在2:When the switch detects a remote loop, the switch is not looped. The switch must alert the end user to remedy. ς = The loop detection frame may be repeated many times by the loop. Switch, and + test these boxes to avoid burdening the CPU. This kind of closure can be closed for 3 minutes after a period of time), and then removed, so that if the loop continues to exist for ^ time (that is, the end user is notified. U, ideally, the remote loop can be immediately and automatically Termination. However, the %% of the parent switch cannot be identified in the loop detection box. To note, the ring detection mechanism is designed to have no cooperation with the remote switch. Keli; at 2:
明迴圈偵測機制範圍外的其他機制來終止遠端 發 偵測 固 導致拓樸迴圈形成的理由有很多。在此將描述可由由 圈偵測機制偵測到的其中一些情況。要注意,決不只有主 些情況’底下描述至少五個階段。 1 )· STP相關問題 當交換器將應為封閉之一埠打開為前饋埠,則形成4 :设圈。廷可能是由錯誤STP與沒有適當反應STP控制之i 硬體所造成。這可能是因為埠設定在當其不該前饋時卻負 饋(亦即該埠上之STP被失能,或埠複製特徵被開啟)。There are many reasons for the formation of topology loops caused by other mechanisms outside the scope of the loop detection mechanism to terminate remote detection. Some of the situations that can be detected by the loop detection mechanism will be described here. It is important to note that there are more than just five scenarios described below. 1) · STP related issues When the switch opens a port that should be closed as a feedforward port, it forms 4: setting circle. This may be caused by faulty STP and i hardware that does not respond properly to STP control. This may be because the port is set to feed back when it should not be feed forward (that is, STP on the port is disabled or the port replication feature is turned on).
2) ·單向連線 、單向連線可能由在傳輸態或接收態之埠硬體阻塞所造 成。也可能由部份破損電纜造成。參考第4圖,當有單向 連$存在時’連線的其中一端將不會接收到任何BPDU,因 而交成則饋狀態。若此端已封閉卻收到BPDU,則形成迴2) · One-way connection or one-way connection may be caused by hardware blockage of the port in the transmitting or receiving state. It may also be caused by partially broken cables. Referring to Fig. 4, when there is a unidirectional link $, one end of the link will not receive any BPDUs, so it will be fed back if it crosses. If this end is closed but BPDU is received, it will form a reply
1229993 五、發明說明(13) 圈。 3 ).連線集合相關問題 當連線兩端具有不同連線集合架構時,可能會形成拓 樸迴圈。參考第7圖之實例,交換器A與交換器B透過兩條 連線連接,以及所有埠在一情況下均處於前饋狀態。則在 父換器B上’連線集合起來並視為兩邏輯埠。在交換器a 上’連線則視為獨立埠。當從交換器B送出廣播框時,交 換器A會透過另一條連線而將該框前饋至交換器B。 4 )· VLAN 轉譯 不慎使用VLAN轉譯可能會造成拓樸迴圈。參考第8圖 之實例,父換器A與交換器b透過四條連線連接,且此時所 有埠處於前饋狀態,但埠上的VLAN指定可能不一致,造成 廣播忙在父換裔A與父換器b間形成迴圈。在此例中,可觀 察到交換器B兩次接收到由VLAN1發出之迴 生™2,第二次發生於簡。因:偵二要二 =,父換器B必需在第一次於VLAN2上接收該迴圈偵測框時 就將之前饋。在交換器BkVLAN1上第2次接收同一迴圈偵 =,’迴圈㈣框中之來源VLAN相同於指定vlan,證、 了有拓樸迴圈存在。 5 )· L 3介面間的橋接器 允許L3介面間橋接之路由器(r〇uter)。此種橋接 來;ϊ/同改變橋接框之指定vlan。拓樸迴圈亦可能形成。 ^於垃路由與路由器B允許VLAN1與VLAN2介面間 ^ ’田、播框在父換器C ’路由器A,與路由器B間形成1229993 V. Description of the invention (13) circle. 3). Problems related to the connection set When the connection ends have different connection set structures, a topology loop may be formed. Referring to the example in FIG. 7, switch A and switch B are connected through two connections, and all ports are in a feed-forward state in one case. Then the connections on the parent switch B are aggregated and regarded as two logical ports. The connection on switch a is considered as a separate port. When a broadcast frame is sent from switch B, switch A will feed the frame to switch B through another connection. 4) · VLAN translation Inadvertent use of VLAN translation may cause topology loops. Referring to the example in Figure 8, parent switch A and switch b are connected through four connections, and at this time all ports are in the feedforward state, but the VLAN assignment on the port may be inconsistent, causing the broadcast to be busy between parent A and parent A loop is formed between the switches b. In this example, you can observe that Switch B received Regeneration ™ 2 from VLAN 1 twice, and the second time occurred in Jane. Because: Detecting two requires two =, parent switch B must feed forward when receiving the loop detection frame on VLAN 2 for the first time. Receive the same loop detection for the second time on the switch BkVLAN1 =, the source VLAN in the 'loop loop' box is the same as the specified vlan. 5). Bridge between L3 interfaces Router that allows bridging between L3 interfaces. This kind of bridging comes; ϊ / Same as changing the designated vlan of the bridging frame. Topological loops may also form. ^ Yu Routing and Router B allow the interface between VLAN1 and VLAN2 ^ ‘field and broadcast frame are in parent switch C’ Router A and Router B
11872twf.ptd 第17頁 1229993 五發明說明(14) 迴圈。在此實例中,笼目@ 出之迴圃e、a, 規察到交換器C兩次接收到由VLAN1發 而,’第—次在VLAN2,第二次在漏1。因 迴圈價測框必需在第一次於關2上接收該 收同—迴圈偵測=i則在交換器C於几·1上第2次接 定VLAN,俄明二·Γ寺迴圈偵測框中之來源几―相同於指 其他考量,Γ有拓樸迴圈存在。 調度 们則::m:圈,,故,在-個交換器上致能迴圈 為了能終止所有;測到;交;圈。 圈偵測。 、圈而在所有父換器上開啟迴 :$區域父換器無法終止遠端迴圈,若只在一個 :測。= 需選擇良好交換器位置以執行迴圈 置的父換器可例如為存在潛在拓樸迴圈之: 父換裔。此種交換器通常位於分佈層(distributi〇n 1ayer)中。 正常情況下,存取層交換器之上傳埠會連至分佈層^ 換器。如果致能所有埠是重要關鍵的話,在上傳埠偵^ = 圈所得幫助大於在邊緣埠偵測迴圈。、瘦 CPU負載 在支援迴圈偵測情況下,通常期望在所有交換器上 行迴圈偵測。此時,若以01-80-C2 -00-0 0-2 f作為y圈伯執 測框之目標MAC位址會導致CPU上負載過量。較好是利用具 ΗΠΙΙ 11872twf.ptd 第18頁 1229993 五、發明說明(15) I/G位元設定之交換器MAC位址卷 在ASIC交換器引擎,給予目:成目標MAC位址。然而存 债測框之產生有較高‘先權「且,交換器MAC位址之迴圈 會重複很多次。因而,接收=石樸迴圈存在,該些框 可能 圈偵測框與偵測拓樸迴圈之 不會遠小 能性。 偵測能力 迴圈 蓋所有已 不論 價測框仍 制而丟棄 如果 在1〜8 0秒 雖然 限定本發 和範圍内 範圍當視 於利用 〇l-80-c2-〇〇n2f μ & υυ 做為目標MAC位址之可 偵測無法保證能偵測所 知情況。 樸迴圈,雖然現已涵 該機制目前看來如何完敕 可能無法到達來源交換J ’因為各種理由,迴圈 。 吳比如,可能被廣播抑 使用第二迴圈偵測框傳輸曾 内完成迴圈偵測。 /、斤法,交換器通常可 本^明已以較佳會 明,任m ^ 例揭露如上,然豆並非用以 ’當可作些許之更;ί :不脫離本發明之精神 後附之申^ | n ~ +,因此本發明之保護 甲-專利槌圍所界定者為準。11872twf.ptd Page 17 1229993 Five invention descriptions (14) Loop. In this example, cage head @ 出 之 回 园 e, a, observed that switch C received twice from VLAN1, ‘the first time was in VLAN2, and the second time was leaking 1. Because the round trip price measurement frame must receive the same on Guan 2 for the first time — loop detection = i, the second time VLAN is connected on switch C on Ji · 1. The origin of the circle detection box is the same as other considerations. There is a topology loop in Γ. The schedulers are :: m: circle, so, enable the loop on a switch in order to terminate all; measure; cross; circle. Circle detection. , Circle and open back on all parent converters: The $ area parent converter cannot terminate the remote loop, if only in one: test. = A parent switch that needs to select a good switch position to perform a loop can be, for example, a potential topology loop: parent switch. Such exchangers are usually located in a distribution layer. Under normal circumstances, the upload port of the access layer switch is connected to the distribution layer switch. If enabling all ports is important, detecting ^ = circles at the upload port helps more than detecting loops at the edge ports. 3. Thin CPU load When loop detection is supported, it is usually expected to perform loop detection on all switches. At this time, if 01-80-C2 -00-0 0-2 f is used as the target MAC address of the y-ring frame, the CPU will be overloaded. It is better to use a switch with MAC address of 11872twf.ptd, page 18, 1229993 V. Description of the invention (15) I / G bit setting In the ASIC switch engine, give the target: the target MAC address. However, the generation of the deposit detection frame has a high 'priority' and the loop of the MAC address of the switch will be repeated many times. Therefore, the reception = Shipu loop exists, these frames may circle the detection frame and detection Topology loop will not be far from small. Detecting ability All loops cover will be discarded regardless of the price measurement frame. If it is within 1 ~ 80 seconds, although it is limited to the range of the hair and the range, it is considered to be used. 80-c2-〇〇n2f μ & υυ The detectability of the target MAC address cannot guarantee the detection of the known situation. Piao Huihuan, although it has already been described how the mechanism currently seems to be complete, the source may not be reached. Exchange J 'loops for various reasons. For example, Wu may be broadcasted and use the second loop detection frame to transmit the loop detection done within the loop. It will be clear that the example of Ren m ^ is disclosed as above, but the bean is not used to 'when something can be changed; ί: Append without appending to the spirit of the present invention ^ | n ~ +, so the protection of the present invention-patent mallet The area defined shall prevail.
1229993 圖式簡單說明 第1圖顯 式表。 第2圖顯 指令表。 第3圖_ 設定表。 第4圖顯 $根據本發明_ ^根據本發明— 較佳實施例之迴圈偵測框格 較佳實施例之迴圈偵測設定 車父佳實施例之顯示迴圈偵測 $根據本發明— 成之拓樸迴闺之士一較佳實施例之單向連線所造 第5圖顯 示根據本發明 之方塊圖。 之方塊圖 圈之 $根據本發 第6圖顯卞& & 方塊圖。根據本發明一較佳實 月 較佳實施例之遠端拓樸迴圈 施例之STP相關拓樸迴 第7、圖顯示根據本發明—1 設定所導致欠拓樸 χ 一較佳實施例之連線集合錯誤第8圖顯禾柄缺4 塊圖。 根據本發明 成之拓樸迴_之方一較佳實施例之VLAN轉譯所造第9圖顯条括从A回。 σ 不根據本發明 Α 接器所造成之拓樸i回固—較佳實施例之L3介面間之橋 續1 Λ 拓樸迴圈之方说第10圖_ M i 方塊圖 根據本發明 ^止器類型表(f11圖顯示根據本發明 (TLV)攔位之終止 較佳實施例之類型長度 值 較佳實施例之TLV攔位之棒 辨別器類型表 第1 2圖顯不根據本發一 VLAN辨別器類型表。 1 ~較佳實施例之TLV攔位之1229993 Schematic description Figure 1 shows the table. Figure 2 shows the instruction list. Figure 3_ Setting table. Figure 4 shows according to the present invention. ^ According to the present invention-the circle detection sash of the preferred embodiment. The circle detection of the preferred embodiment sets the display circle detection of the car driver embodiment. According to the present invention — The fifth embodiment of the one-way connection of a preferred embodiment of Cheng Zhituo, a returnee, shows a block diagram according to the present invention. The block diagram of the circle $ is shown in Figure 6 of the & & block diagram. The STP related topology of the remote topology loop embodiment according to a preferred embodiment of the present invention is shown in Fig. 7. The figure shows the lack of topology caused by the setting of the present invention -1. Figure 8 shows that the set is wrong. According to the present invention, FIG. 9 made by the VLAN translation of a preferred embodiment of the topology of the topology is shown from A to A. σ Topology i is not solidified according to the A connector of the present invention—the bridge between the L3 interfaces of the preferred embodiment continued 1 Λ Topology loop diagram Figure 10_ M i Block diagram according to the present invention ^ The device type table (f11 shows the termination type of the preferred embodiment according to the present invention (TLV). The length value of the preferred embodiment of the TLV stopping type discriminator type table. Figure 12 shows a VLAN according to the present invention. Discriminator type table. 1 ~ TLV of the preferred embodiment
11872twf.ptd 第20頁 圖式簡單說明 一較佳實施例之TLV欄位之交 第1 3圖顯示根據本發明 換器辨別器類型表。 第1 4圖顯示根據本發明 間類型表。 第1 5圖顯示根據本發明 和檢查類型表。11872twf.ptd Page 20 Brief description of the drawings The intersection of TLV fields of a preferred embodiment Figure 13 shows a table of types of converter discriminators according to the present invention. Fig. 14 shows a table of types according to the present invention. Fig. 15 shows a table according to the present invention and inspection types.
圖式標示說明 Swi tch A :交換器A Swi tch B :交換器B Swi tch C :交換器C Router A :路由器A Router B :路由器B 一較佳實施例之TLV攔位之時 一較佳實施例之TLV欄位之總Schematic description Swi tch A: Switch A Swi tch B: Switch B Swi tch C: Switch C Router A: Router A Router B: Router B Total of TLV fields
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW92131629A TWI229993B (en) | 2003-11-12 | 2003-11-12 | Topology loop detection mechanism |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW92131629A TWI229993B (en) | 2003-11-12 | 2003-11-12 | Topology loop detection mechanism |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI229993B true TWI229993B (en) | 2005-03-21 |
TW200516906A TW200516906A (en) | 2005-05-16 |
Family
ID=36083258
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW92131629A TWI229993B (en) | 2003-11-12 | 2003-11-12 | Topology loop detection mechanism |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI229993B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201431320A (en) | 2013-01-24 | 2014-08-01 | Accton Technology Corp | Method and network device for loop detection |
US20160094945A1 (en) * | 2014-09-26 | 2016-03-31 | Sunil Kulkarni | Variable interval for periodic fix requests of multiple clients |
CN107251492A (en) * | 2015-02-23 | 2017-10-13 | 三菱电机株式会社 | Relay and communication system |
-
2003
- 2003-11-12 TW TW92131629A patent/TWI229993B/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
TW200516906A (en) | 2005-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11228515B2 (en) | Data packet detection method, device, and system | |
US7701936B2 (en) | Obtaining path information related to a bridged network | |
US8862943B2 (en) | Connectivity fault notification | |
US8634308B2 (en) | Path detection in trill networks | |
JP4567367B2 (en) | Insert address to enable OAM function | |
US20040165595A1 (en) | Discovery and integrity testing method in an ethernet domain | |
CN108123824A (en) | A kind of network fault detecting method and device | |
WO2008119300A1 (en) | A protecting method and device for ethernet tree service | |
US20190007302A1 (en) | Mechanism for Dual Active Detection Link Monitoring in Virtual Switching System with Hardware Accelerated Fast Hello | |
WO2016041379A1 (en) | Method and apparatus for implementing nni ping | |
US20120236866A1 (en) | Communication system and communication device | |
WO2019157802A1 (en) | Method, device, and network system for measuring network performance | |
WO2009092257A1 (en) | Fault detection method and device for provider backbone transport network | |
TW200901677A (en) | Data driven connection fault management (DDCFM) in CFM maintenance points | |
US20200044964A1 (en) | Defect detection in ip/mpls network tunnels | |
CN108737183A (en) | A kind of monitoring method and device of forwarding-table item | |
US20080267080A1 (en) | Fault Verification for an Unpaired Unidirectional Switched-Path | |
US20110069607A1 (en) | Methods and systems for continuity check of ethernet multicast | |
JP7450042B2 (en) | Multicast packet detection methods, network devices, and systems | |
CN102724097B (en) | A kind of ESADI processing method and system | |
EP2482516B1 (en) | Method for customer edge device auto management and provider edge device | |
TWI229993B (en) | Topology loop detection mechanism | |
CN114690680A (en) | Data processing method, controller and first network equipment | |
US7636315B2 (en) | Broadcast traceroute | |
TWI308438B (en) | Method for exchanging a network message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |