TWI229993B - Topology loop detection mechanism - Google Patents

Topology loop detection mechanism Download PDF

Info

Publication number
TWI229993B
TWI229993B TW92131629A TW92131629A TWI229993B TW I229993 B TWI229993 B TW I229993B TW 92131629 A TW92131629 A TW 92131629A TW 92131629 A TW92131629 A TW 92131629A TW I229993 B TWI229993 B TW I229993B
Authority
TW
Taiwan
Prior art keywords
loop
topology
loop detection
frame
scope
Prior art date
Application number
TW92131629A
Other languages
Chinese (zh)
Other versions
TW200516906A (en
Inventor
Hei-Tao Fung
Original Assignee
Solustek Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Solustek Corp filed Critical Solustek Corp
Priority to TW92131629A priority Critical patent/TWI229993B/en
Application granted granted Critical
Publication of TWI229993B publication Critical patent/TWI229993B/en
Publication of TW200516906A publication Critical patent/TW200516906A/en

Links

Landscapes

  • Small-Scale Networks (AREA)
  • Air Bags (AREA)

Abstract

Broadcast storm due to topology loop may result from end-user mis-configurations, faulty ports, cabling problems, faulty spanning-tree algorithm implementations, and others. This loop detection mechanism helps detecting topology loops and eliminates them. It operates as a watchdog independent of the spanning-tree algorithm. The feature is aiming at enhancing the values of SOLOS.

Description

1229993 五、發明說明(1) 發明所屬之枯浙 本發明是有關於一種在網路 (topology loop)之機制。本發 ^則拓樸迴圈 迴圈,其無關於網路中其他裝^。f別是有關於偵測拓樸 先前技術 廣播風暴(broadcast st〇rm) b 丄 路(LAN,local area netwQr ) ^ 1 聯接之區域網 (multicast)封包之盔窮迴圈。、态之廣播封包與多播 圈存在的關係,以及由窮於 =交是因為網路拓樸迴 ^ ^Cforward) a, ^ ^ fl] 關係,網路拓樸迴圈是前饋多餘路徑:存生的 *良在於,其無效地消耗網路頻寬以及丄 能置於處理重複的流量。因此, " 某二致 „ 〇 之5亥父換态發出框(frame)的話,該交框义 饋至⑽以分析該迴圈制框—其由利用該^;& 項目而完成,該表能將目標為 dlT AC位址(比如具I/G設定之交換器MAC)之框導向至 存在之迴圈偵測法其中之一是以擴充樹協定 (spanning-tree protocol,STp)得無迴圈網路拓樸。正 常情況下,網路中STP保持致能。然而,網路拓樸迴圈仍 可導致某些如下情況: 1 · STP實施方式可能有缺點,且有時無法得到無迴圈 第5頁 11872twf.ptd 12299931229993 V. Description of the invention (1) What the invention belongs to The present invention relates to a mechanism in the topology loop. The hair ^ is a topology loop, which has nothing to do with other equipment in the network. f is related to the detection topology. The prior art broadcast storm (broadcast st om) b 丄 road (LAN, local area netwQr) ^ 1 the loop of the helmet of the connected multicast packet. The relationship between the broadcast packet and the multicast circle of the state, and the relationship between the poor and the equal = due to the network topology ^ ^ Cforward) a, ^ ^ fl] relationship, the network topology loop is a feedforward redundant path: The good thing about Cunsheng is that it consumes network bandwidth inefficiently and can't be placed to handle repeated traffic. Therefore, " If a frame is sent to the parent of the 5th generation of the 5th transformation, the cross frame is fed back to ⑽ to analyze the loop frame-which is completed by using the ^ & project, which The table can direct the frame of the target dlT AC address (such as the switch MAC with I / G settings) to the existing loop detection method. One of them is to use the spanning-tree protocol (STp). Loop network topology. Under normal circumstances, STP remains enabled on the network. However, network topology loops can still lead to some of the following situations: 1 STP implementation may have disadvantages and sometimes cannot be obtained without Page 5 of 11872twf.ptd 1229993

拓樸。 2·埠硬體可能有缺點使其無法正確地回應STp之操 作。 、 3· STP可能被故意地或無意地失能於區域交換器或遠 端交換器或某些埠上。終端使用者接著可能會沒有察到 該拓樸是無迴圈而誤操作該些交換器。 、 4·埠硬體可能有缺點使其無法傳輸或接收封包,導致 單向流量。另,部份斷裂的電纜也會導致單向流量。在兮 凊况下,STP會無思地將一封閉皡(bi〇cking port)轉成, 饋,,因為該埠(或其同等槔)並無接收高級橋接器協定資 料單元(Bridge Protocol Data Uni t,BPDU)。 貝 5· IEEE 規格802· 3ad連線集合(iink aggregati〇n)實 轭方式可能有誤,而從連線集合發出之框回傳至該連線集 合。 '、 6.可能有連線集合錯誤設定的存在。連線兩側會集合 不同的埠。 ” 口 7·虛擬區域網路(virtual Local Area Network, V&LAN)轉譯可能會在遠端交換器上被有意或無意致能。終 端使用者接著可能會沒有察覺到該拓樸是無迴圈而誤操作 該些交換器。 ^ 8.第3層(La^er 3,L3)介面間之橋接器被致能,但所 得拓樸不能免於迴圈。 鳘内容 因此,本發明提供一種迴圈偵測機制法,其中一特殊Topology. 2. Port hardware may have disadvantages that prevent it from responding properly to STp operations. 3. STP may be deliberately or unintentionally disabled on a regional or remote switch or certain ports. The end user may then erroneously operate the switches without seeing that the topology is loopless. 4. The port hardware may have disadvantages that prevent it from transmitting or receiving packets, resulting in unidirectional traffic. In addition, partially broken cables can cause unidirectional traffic. Under the current circumstances, STP will thoughtlessly convert a closed port (biocking port) into a feed because the port (or its equivalent) does not receive the Bridge Protocol Data Uni t, BPDU). The IEEE 802. 3ad connection aggregation (iink aggregation) connection method may be wrong, and the frame sent from the connection aggregation is returned to the connection aggregation. ', 6. There may be a wrong connection set. There are different ports on both sides of the connection.口 7. Virtual Local Area Network (V & LAN) translation may be enabled intentionally or unintentionally on the remote switch. End users may then not realize that the topology is loopless And these switches are operated by mistake. ^ 8. The bridge between the La ^ er 3 (L3) interfaces is enabled, but the resulting topology is not free from loops. 鳘 Content Therefore, the present invention provides a loop Detection mechanism method, one of which is special

1229993 、發明說明(3) $ = ^ π前饋璋上並觀察是否該框會接收於一前饋 換器上之::j j m:框會被遠端交換器或區域交 換器上之前饋埠接收。⑽!:樸迴圈,該框會被區域交 cpu以進-步分析,而不成能將該框擷取至 圈偵i ί = 一目標是在STP機制無法正常運作下操作迴 向連^明之另—目標是在STP無法正常運作情況(比如單 阿埂綠)下偵測迴圈。 ·个 制本地消耗網路頻寬,否則該機 是否ί:: ί::目,標是謹慎地假設遠端(或同等)交換器 本_明、圈偵測之網路os,並假設其能力與設定。 明之又一目標是操作於連線集合層之下。 預防拓樸迴圈。根據上上it 圈偵測機制以 以提供無廣播風=述描述,本發明機制具有下列特性 1 ·操作於STP機制架構之外。 迴圈2。·即使STP無法正常運作下(比如單向連線)仍能偵測 影響3。·消耗較少網路頻寬,否則本身將對於網路造成不良 網路^不ΐ設遠端(或同等)交換器是否執行有迴圈摘測之 、判路的’亦不假設其能力與設定。 11872twf.ptd 第7頁1229993 、 Explanation of the invention (3) $ = ^ π feed forward and observe whether the box will be received on a feed forward converter: jjm: box will be received by the front feed port on the remote switch or area switch . Huh! : Park loop, the frame will be processed by the area cpu for further analysis, but it will not be able to capture the frame to the circle detection i 一 = a goal is to operate the back to the link even if the STP mechanism does not work properly-the other is- The goal is to detect loops in situations where STP is not working properly (such as a single Ao green). · The local system consumes the network bandwidth, otherwise, is the machine ί :: ί :: The goal is to carefully assume that the remote (or equivalent) switch is _ming and circle-detected network os, and assume its Capabilities and settings. Another goal of Ming is to operate under the wired collection layer. Prevent topology loops. According to the above it circle detection mechanism to provide a non-broadcasting wind, as described above, the mechanism of the present invention has the following characteristics: 1. It operates outside the STP mechanism architecture. Loop 2. · Effects can be detected even when STP does not work properly (such as one-way connection) 3. · Consume less network bandwidth, otherwise it will cause a bad network to the network ^ Do not set whether the remote (or equivalent) switch performs loop pick-up and test, and does not assume its ability and set up. 11872twf.ptd Page 7

12299931229993

5 ·其操作於連線集合層之下。 本發明包括以下所描述之階段 施迴圈偵測機制之目標。 以達成上述目標與實 底下實施 ,且提供 伽…,本發明之上述與其他目標,特徵與優點可由 砰細描述中明瞭,實施例可參考附圖而了解。 要知道上述描述與底下詳細描述僅是舉例用 本發明之更進一步解釋。5 · It operates under the wire collection layer. The present invention includes the objective of the loop detection mechanism in the phase described below. In order to achieve the above objectives and implementation, and provide Gamma ..., the above and other objectives, features and advantages of the present invention can be clearly understood from the detailed description of the embodiment, and the embodiments can be understood with reference to the drawings. It is to be understood that the above description and the following detailed description are merely examples for further explanation of the present invention.

一 首先,本發明提供迴圈偵測機制之基本觀念,其送出 特殊多播框於前饋(forward)埠上並觀察該框是否將 在一前饋埠上被接收。如果沒有拓樸迴圈,該框會被丟 ,某些遠端交換器或區域交換器的封閉埠上。如果有拓^ 迴圈,該框會接收於該區域交換器的前饋埠上。該區域交 換器規劃成能擷取該框並送至CPU以更進一步分析而不一需 前饋該框。為教示本發明一較佳實施例,本發明之迴圈^ 測機制之定義將描述成以下數個階段··框袼式,傳輸,接 收與别饋,分析,操作,偵測方案。其他考量點與指令線 介面將於其後描述。 > 框袼式 该迴圈偵測框之框格式列於第1圖之表中。該目標媒 體存取控制(Destination Media Access Control,DMAC)First, the present invention provides a basic concept of a loop detection mechanism, which sends a special multicast frame on a forward port and observes whether the frame will be received on a forward port. If there is no topology loop, the box will be dropped on some closed ports of the remote switch or area switch. If there is a loop, the frame will be received on the feedforward port of the area switch. The area switch is planned to capture the frame and send it to the CPU for further analysis without the need to feed forward the frame. In order to teach a preferred embodiment of the present invention, the definition of the loop detection mechanism of the present invention will be described in the following stages: • Frame type, transmission, reception and feedback, analysis, operation, and detection scheme. Other considerations and command line interfaces will be described later. > Frame type The frame format of this loop detection frame is listed in the table in Figure 1. The destination media access control (DMAC)

11872twf.ptd 第8頁 1229993 五、發明說明⑸ " " 位址例如為01-80-C2-〇〇-〇〇-2f或具Ι/G位元設定之區域交 換器MAC位址。另一方面,MAC位址〇卜8〇-c2一〇〇一〇〇一2f是 GARP保留MAC位址之一。目前來說,此位址尚未使用於任 :標準協定:,故而本發明可使用之。首&,使得該框為 夕播框’使得無關於本發明迴圈偵測之遠 播此框(麵規w2.5.G2.1D 年版(麵s^nfafdf11872twf.ptd Page 8 1229993 V. Description of the invention " " The address is, for example, 01-80-C2-〇〇-〇〇-2f or the area switch MAC address with the 1 / G bit setting. On the other hand, MAC address 80-c2 1002f is one of the GARP reserved MAC addresses. At present, this address has not been used in any of the following: standard agreement :, so this invention can be used. First & make this frame an evening broadcast frame ’so that there is no distance to the loop detection of the present invention broadcast this frame (face gauge w2.5.G2.1D annual version (face s ^ nfafdf

Sec· 12·5 02.1D 1 998 Edition));以及當有拓樸迴圈存 在時,該框可到達該區域交換器。其次,區域可對具此 MAC位址之框給予較高的優先權(相同於卯⑽),增加在拓 樸迴圈與廣播風暴下,框被CPU接收與處理的可能性。使 用此MAC位址會造成CPU對框處理之負擔,因為具此mac位 址之框會通過封閉埠,如同BPDU。因而,較好是當口有^ 數量(較好是1)的交換器進行迴圈偵測下才使用此;^位、 較佳 設定之區 份橋接器 允許發出 位元使得 不需對框 01 -80-c2 BPDU之處 處理所接 位元設定 實,例之目標MAC位址之另一種選擇是具I/G位元 域父換态之MAC位址。在此可使用當成STp中之部 Π)之該MAC位址。接著,此種獨特目標MAC位址可 该框之该父換器可特殊地擷取到該框。打開I / G 邊框是多播框,理由如上述。使用此種MAC位址 進行優先權處理,且框更可能(比起使用 -0 0-0 0-2f之情況,令框被處理成具有相似於 理或優先權之PDU)丟棄於廣播風暴中。另外,在 收框之中不需要軟體協助,除非其目標為具 之區域交換器之MAC位址。此特性使得cpu負擔較Sec · 12 · 5 02.1D 1 998 Edition)); and when a topology loop exists, the box can reach the area switch. Second, the region can give higher priority to the frame with this MAC address (same as 卯 ⑽), increasing the possibility that the frame will be received and processed by the CPU under the topology loop and broadcast storm. Using this MAC address will cause the CPU to burden the frame processing, because the frame with this mac address will pass through the closed port, like BPDU. Therefore, it is better to use this only when the switch with ^ number (preferably 1) is used for loop detection; the ^ bit, the better-set partition bridge allows the bit to be sent so that there is no need for the frame 01- The 80-c2 BPDU is processed in real-time. The other option of the target MAC address is a MAC address with the parent state of the I / G bit field. The MAC address used as part of the STp (ii) can be used here. Then, this unique target MAC address can be specifically retrieved by the parent switch of the frame. Opening the I / G border is a multicast box, for the reasons described above. This MAC address is used for priority processing, and the frame is more likely (than the case of -0 0-0 0-2f, the frame is processed into a PDU with a similar rationale or priority) and discarded in the broadcast storm . In addition, software assistance is not required in the box unless its target is the MAC address of a regional switch. This feature makes the cpu burden more

12299931229993

低,即使有大數量交換器開啟了迴圈偵測。在本發明一較 佳實施例中,具Ι/G位元設定之區域交換器之MAC位址可當 成目標MAC位址。 田 框之來源〇0Urce)MAC位址可為區域交換器之MAC位址 (已清除Ι/G位元)。在此可使用當成STp中之部份橋接器α 之該MAC位址,或可為有關於某些L3介面(VLAN介面)之 位址。要注意,遠端交換器會在前饋表中獲悉此“^位 址。另外,框之來源MAC位址可為傳輸埠的MAC位址。如 有助於辨別來源框之埠。 在此’ δί(*息搁位包括數個類型—長度—值 (Type-Length-Value,TLV)攔位。類型%彳攔位代表要接 值之長度(以位元組為單位)。值副攔位為非必須的,如 存在的話,則其帶有TLV欄位的值。DMAC選擇是關鍵的, 因為其必需是多播位址(I/G設定)並使得框發出者能輕易 擷取到此框。在此較佳實施例中,選擇具I/G設定之交換 IsMAC,因為交換器MAC可獨特地辨別框發出者。擷取機制 =程式化具一項目(entry)之該L2前饋表,該項目將目標 為该MAC位址之該框導向至cpu。 參考第10〜15圖,TLVS與其副欄位將於此處描述。 ^考描述終止器(terminat〇r)之第1〇圖,根據本發明 ^佳貫施例’該TLV為必要的。其用於代表訊息結尾及將 樞延伸至特殊大小與位元組對準。 明r ΐΐ描述埠辨別器(identifier)之第11圖,根據本發 月車父仏貫施例,該TLV為非必要的。要得知發出該框之埠Low, even with a large number of switches with loop detection turned on. In a preferred embodiment of the present invention, the MAC address of the area switch with the 1 / G bit setting can be used as the target MAC address. The source of the field frame is 00Urce. The MAC address can be the MAC address of the regional switch (the 1 / G bit has been cleared). The MAC address used as part of the bridge α in the STp can be used here, or it can be an address related to some L3 interfaces (VLAN interfaces). It should be noted that the remote switch will learn this "^ address in the feedforward table. In addition, the source MAC address of the box can be the MAC address of the transmission port. If it is helpful to identify the port of the source box. Here ' δί (* interest stall includes several Type-Length-Value (TLV) blocks. Type% 彳 block represents the length (in bytes) of the value to be accessed. Value sub-block It is not necessary, if it exists, it has the value of the TLV field. The DMAC selection is critical because it must be a multicast address (I / G setting) and enable the sender of the frame to easily retrieve it Box. In this preferred embodiment, the switch IsMAC with I / G settings is selected because the switch MAC can uniquely identify the sender of the box. Fetching mechanism = program the L2 feedforward table with an entry This project will direct the box targeting the MAC address to the CPU. Refer to Figures 10 ~ 15, TLVS and its sub-fields will be described here. ^ Test Figure 10 describing the terminator (terminat〇r) According to the present invention, the ‘good practice’ embodiment is that the TLV is necessary. It is used to represent the end of a message and extend the pivot to a special size and bit. The group is aligned. Figure 11 describes the port identifier (identifier). According to the car driver ’s consistent implementation of this month, the TLV is unnecessary. You must know the port from which the frame is issued.

12299931229993

之資訊只能從所接收框之來源MAC位址。有時,迴圈 機制可能無法取得乙太框表頭(header)。在決定區域交換 器是否為拓樸迴圈的一部份或該迴圈存在於遠端,得知發 出該框之埠是很重要的。 參考描述VLAN辨別器之第12圖,根據本發明較佳實施 例,該TLV為必要的。其使用於無法辨別出源頭vlan時, 因為迴圈偵測軟體模組無法得知VLM標籤(tag)或其所得 資訊。即使可得知VLAN資訊,由於遠端交換器上可能有 VLAN轉譯,仍不足以信賴。 參考描述交換器辨別器之第丨3圖,根據本發明較佳實 施例,該TLV為非必要的。其有用於當無法從目標MA(:位址 或來源MAC位址辨別出框的發出器時。這可能為迴圈偵測 軟體模組無法付知乙太框表頭或其所得資訊之情況。 參考描述時間類型(timestamp)之第14圖,根據本發 明較佳實施例,該時間類型TLV為非必要的。其有助辨^ 框已持續多久。其載有在有關於區域交換器時脈之"時間 戳(Epoch time)”後之微秒數。迴圈偵測機制可忽略持續 太久的框,其可能為由無止盡迴圈所造成。其可避免惡咅、 貫體重送有效但過時框來造成錯誤偵測之重播攻擊。建議 忽略超過最大框生命周期之框。最大框生命周期等於最大 橋接器暫態延遲(4秒)乘上最大橋接器直徑(7個橋接器)再 加上初始傳輸之最大媒體存取延遲(參考802. 1D之 B · 3 · 1 · 2 )。譬如,建議值是7 · 5秒且不能超過3 〇秒。 參考描述總和檢查(checksum)之第15圖,根據本發明The information can only come from the source MAC address of the received frame. Sometimes, the loopback mechanism may not be able to obtain the Ethernet frame header. When deciding whether a regional switch is part of a topology loop or if the loop exists at the far end, it is important to know the port where the box originated. Referring to Figure 12 describing the VLAN discriminator, this TLV is necessary according to the preferred embodiment of the present invention. It is used when the source vlan cannot be identified, because the loop detection software module cannot know the VLM tag (tag) or the information obtained by it. Even if the VLAN information is available, it may not be reliable because there may be VLAN translations on the remote switch. Referring to Figure 3, which describes the switch discriminator, according to a preferred embodiment of the present invention, the TLV is unnecessary. It is used when the sender of the frame cannot be identified from the target MA (: address or source MAC address. This may be the case where the loop detection software module cannot know the Ethernet frame header or the information it obtains. Reference Figure 14 describing the time type. According to the preferred embodiment of the present invention, the time type TLV is unnecessary. It helps to identify how long the frame has lasted. It contains information about the clock of the regional switch. " Epoch time "in microseconds. The loop detection mechanism can ignore frames that last for too long, which may be caused by endless loops. It can avoid evils and deliver weight effectively But outdated frames cause replay attacks with false detection. It is recommended to ignore frames that exceed the maximum frame life cycle. The maximum frame life cycle is equal to the maximum bridge transient delay (4 seconds) times the maximum bridge diameter (7 bridges). Add the maximum media access delay for the initial transmission (refer to B · 3 · 1 · 2 of 802.1D). For example, the recommended value is 7 · 5 seconds and cannot exceed 30 seconds. Figure 15 according to the invention

H872twf .ptd 第11頁 1229993 五、發明說明(8) ----- 車父佳κ知例,該總和檢查τ L V為必要的。其有助於驗證 框’並避免惡意偽裝迴圈偵測框來干擾網路。總和檢查演 算法與演算法之金鑰匙(key)可能會因交換器而有所不 同。比如,1 6位元組MD5總和檢查係從迴圈偵測軟體與除 了具將〇排除之總和檢查TLV值欄位之CRC之整體乙太$匡所 產生之隨機金鑰匙所計算出。隨機金鑰匙可隨時間改變以 避免送出會造成迴圈偵測之同一框之重播攻擊。如果所接 收之框無法通過總和檢查驗證,該框視為無效。 傳輸 在此將描述本發明所導入之傳輸。迴圈偵測框送出於 指定VLAN上之前饋埠。然而,其也可送於非前饋埠上。、 拓樸迴圈測試於每一各VLAN。雖然相同STP之VUN之 STP計算拓樸必需相同,較好是對各運作中之VLAN測試拓 樸迴圈。理由之一是,受允許之VLAN可能會依各埠而不 同。另一理由是硬體中之STP狀態可能為各埠各 VLAN(per-port-per-VLAN) 〇 通常希望屬於待測VLAN之一埠所送出之迴圈偵測框 夠在VLAN上偵測拓樸迴圈。然而,某些拓樸迴圈是由單向 j線造成,以及永遠在一埠上送出迴圈偵測框會無法偵測 =此情況。例如在第4圖中,交換器A與交換器B由兩條連、 線所連接。交換器A假設為STP根點橋接器,但由於單 線的關係,其BPDU無法到達交換器b的㈣“ i。這會導致 條連線皆處於前饋狀態。假設只有交換器B執行迴圈偵 剛。如果只在port2送出迴圈偵測框,其不會再次到達交H872twf .ptd Page 11 1229993 V. Description of the Invention (8) ----- Known examples of the car father, this sum check τ L V is necessary. It helps verify the frame ’and avoid maliciously disguising the loop detection frame to interfere with the network. The sum check algorithm and the algorithm's golden key may differ from switch to switch. For example, the 16-bit MD5 sum check is calculated from the loop detection software and the random golden key generated by the overall Ethernet $ verse that excludes the CRC with the excluding the sum check TLV value field. The random golden key can be changed over time to avoid sending out a replay attack in the same frame that would cause loop detection. If the box received fails verification by the sum check, the box is considered invalid. Transmission The transmission introduced by the present invention will be described here. The loop detection frame is sent out the previous feed port on the specified VLAN. However, it can also be sent to a non-feedforward port. Topology loop tests are performed on each VLAN. Although the STP calculation topology of the VUN of the same STP must be the same, it is better to test the topology loop of each operating VLAN. One reason is that allowed VLANs may vary from port to port. Another reason is that the STP status in the hardware may be per-port-per-VLAN. 〇It is usually expected that the loop detection frame sent by a port belonging to one of the VLANs to be tested is sufficient to detect extensions on the VLAN. Park Loop. However, some topological loops are caused by one-way j-line, and it is impossible to detect if the loop detection frame is always sent on a port = this situation. For example, in Fig. 4, switch A and switch B are connected by two wires. Switch A is assumed to be the STP root bridge, but due to the single-line relationship, its BPDU cannot reach the switch “i” of switch b. This will cause all connections to be in a feedforward state. Assume that only switch B performs loop detection. .If the loop detection box is sent only at port2, it will not reach the traffic again.

第12頁 1229993 五、發明說明(9) 換器A。因而,在執行迴圈偵測的交換器上,必需在所有 前饋埠上都送出迴圈偵測框。 另一方面,較好是藉由限制送出的框數量來限制網路 與 CPU負擔。描述KIEEE802.3ad,2000 之附錄 43B(Annex 43B of IEEE802.3ad,2〇〇〇)中之低速協定傳輸特徵需求 =了,對每埠之最大流量負載限制為5〇框/秒。以此為 參考,第一傳輸演,算法可如下: 傳輪1 可秒、,區域交換器的所有璋都視為迴圈偵測框 i i •對每一埠,送出一個迴圈偵測框於 T^,jVLANj, ^^^5〇^t#VLAN , an-視同仁。比如,在各埠上使用一最後vid_::個 (last-VID-used)變數。從開啟“以―VID — 框於VLAN上。接著為楂私% q埠送出 b士 ^ 在傳輸後’更新該變數。當變數刭磕 4096時,將其設回至i。 文莜到達 上述/臾异法強§周快速谓測、倉恭 V啊所有淳公平處理間之平衡:载= 二對所有 佳實施型態,因為某些ASIC交換器引二:::选不是最 述如下: 有車®此存在第二傳冑演算法描 •董十母-—秒’區域夺拖ΛΑ ^ J 測機制的潛在可能者:、^ 、 5 %VLAN視為迴圈偵 U •對各VLAN,送出一個洄^占、丨 樸内的所有琿。最多$ 、,貝1框至VLAN之致能拓 迗出至50個此種VLAN。使用整體Page 12 1229993 V. Description of the invention (9) Converter A. Therefore, on a switch that performs loop detection, a loop detection frame must be sent on all feedforward ports. On the other hand, it is better to limit the network and CPU load by limiting the number of frames sent. The characteristics of low-speed protocol transmission in Appendix 43B (Annex 43B of IEEE802.3ad, 2000) describing KIEEE802.3ad, 2000 = Yes, the maximum traffic load per port is limited to 50 frames / second. Taking this as a reference, the algorithm of the first transmission can be as follows: The pass 1 can be seconds, and all the frames of the regional switch are regarded as the loop detection frame ii • For each port, send a loop detection frame at T ^, jVLANj, ^^^ 5〇 ^ t # VLAN, an- are the same. For example, use a last-VID-used variable on each port. From the "VID" box on the VLAN. Then send b for the private port q port ^ Update the variable after transmission. When the variable is 4096, set it back to i. The difference between strong law and strong § weekly quick test, Cang Gong V, the balance between all fair and fair processing: load = two pairs of all good implementation types, because some ASIC switches lead to 2 ::: election is not the most described as follows: Yes Che® There is a description of the second pass algorithm. • Dong Shimian—Second's area grabbing potential ΛΑ ^ J potential detection mechanism:, ^, 5% VLAN as loop detection U • For each VLAN, send A single account occupies all the addresses in the park. A maximum of $, and the frame can be extended to 50 VLANs. Use the overall

11872twf.ptd 第13頁 122999311872twf.ptd Page 13 1229993

切於社所有運作中VLAN last-VID-used 變數以有 作。 ,谓ΛΤΙ逆 此演算法可能會導致在某些時段内 的迴圈偵測框。最糟情況為約80 (4096/5Q)l/。出任j可 :在交換器上只有少量(通常少於50個)的運作中只 接收與前 當未 能拓樸上 變,且將 當開 (前饋埠) 框的話, 樸上的所 換器必需 器在一封 不能前饋 饋 開啟迴圈 之一埠接 其前饋至 啟迴圈偵 接收到迴 該交換器 有其他埠 前饋該框 閉埠上接 該框。 偵測之習知交換器或本發明交換 收到,測框時,其必需保持該: 5玄致旎拓樸上的所有其他琿。It works in all VLAN last-VID-used variables in the operation of the agency. It is said that ΛΤΙ inverse This algorithm may lead to a loop detection frame in some period. The worst case is about 80 (4096 / 5Q) l /. Can assume the role: in the operation of a small number of switches (usually less than 50), only receive and change the topology, and will open the (feedforward port) box, the converter on Park The essential device connects one of the ports that can not feed forward to the open loop and feeds it forward to the start loop. The switch receives the other ports of the switch and feeds the frame to the closed port. The detection switch or the exchange of the present invention, when receiving the frame, it must keep this: 5 All other 上 on the topology.

測的習知交換器在致能拓樸上之 夺:如果不是該交換器發出 改變的該框前饋至該致能 。如果疋该交換器發出該框 至CPU以分析該迴圈 邊 收到迴圈偵測框時/“匡。當該交相 J框時,其必需放棄該框The tested conventional switch is on the enabling topology: if it is not the switch that issued the change, the box is fed forward to the enabling. If the switch sends the box to the CPU to analyze the loop, then when it receives the loop detection box / "Kuang. When the intersecting J box, it must give up the box

當該交換器在致能拓樸之一埠上 該框的指定VID不同於原本VID時,該六 ^圈偵測框,但 變的該框前饋至所指定v丨D之致能拓 、器必需將未經改 接收到此迴圈偵測框並不能證明拓樸迴的所有其他蟑。 VID上前饋該框更能探討拓樸迴圈的可、存在。在指定 非必需的,但沒有前饋法則的話可=。前饋法則為 圈’這將於偵測階段中描述。 ‘、、、古偵測到某些迴When the designated VID of the frame on the switch on one of the enabling topologies is different from the original VID, the six-circle detection frame, but the changed frame is fed forward to the specified enabling, The receiver must receive the loop detection frame without modification and cannot prove all other cockroaches of the top loop. The feed-forward box on VID can further explore the possibility and existence of the topology loop. It is not necessary to specify but can be used if there is no feedforward rule. The feedforward rule is loop 'which will be described in the detection phase. ‘,,, ancient

12299931229993

分析 開啟迴圈偵測上 出之致能拓樸上之一 ^ 父換器必需對該交換器本身所發 下,可能曾經存在咬$之框進行迴圈偵測分析。在此情況 (減少錯誤),迴圍二,在正存在一拓樸迴圈。為穩當起見 果發出該框之埠與桩:^體模組必需再度檢查埠狀態。如 樸迴圈存在。如果1 μ框之埠皆處於前饋狀態,則有拓 域交換器為拓樸迴實際上為不同的兩個帛,則該區 際上為同一埠,則秘部份(如第4圖)。如果該兩埠實 在拓樸迴圈存在於遠端(如第5圖)。 樸迴圈Μ旦在交d!V,在交換器A與交換器8間有拓 換器c開啟了迴圈;Λ與:換⑼間只有-條連線。假設交 η 搶L 1 偵測。攸交換器C送出的迴圈偵測框會在 冋一埠上被接收。 # 操作 捧、一旦偵測到拓樸迴圈,必需告知終端使用者,以補救 月^。如果可能的話,該交換器應自動終止該迴圈。 、當偵測交換器是拓樸迴圈的一部份時,其可中止該埠 以、、s止迴圈’以將其移出STp控制之外並將該埠狀態設為 1閉。對於欲封閉之埠有兩種選擇:框發出埠與框接收 土 β。必需封閉前者的原因為,在單向連線例中,其可能是 問題源頭。比如,在第4圖中,交換器Β較好是封閉p〇rt i 而非封閉port2。由迴圈偵測導致被封閉之埠可在一段時 j (亦即3分鐘)經過後自動回復操作,使得終端使用者不 需要存取該交換器來進行該操作。Analysis One of the enabling topologies in turn-on loop detection. ^ The parent switch must send out the switch itself. There may have been a frame for bit detection for loop detection analysis. In this case (reduced errors), back to the second, there is a topological circle. For the sake of stability, if the port and stub of this box are issued: The body module must check the port status again. Such as the Park Loop exists. If the ports of the 1 μ frame are in the feed-forward state, there are two topological switches that are different in topology, but the two ports in the region are the same port, so the secret part (as shown in Figure 4) . If the two ports actually exist at the far end (see Figure 5). The Park loop M is at d! V, and there is a switch c between switch A and switch 8 to open the loop; Λ and: there is only one connection between the switches. Suppose that η grabs L 1 for detection. The loop detection frame sent by the switch C will be received on the first port. # OPERATION Once the topology loop is detected, the end user must be notified to remedy the month ^. If possible, the switch should automatically terminate the loop. When the detection switch is part of the topology loop, it can suspend the port, s, and s to prevent it from moving outside the STp control and set the port status to 1 closed. There are two options for the port to be closed: the frame sending port and the frame receiving soil β. The former must be closed because, in the case of a one-way connection, it may be the source of the problem. For example, in Figure 4, the switch B is preferably closed port i instead of closed port2. The closed port can be automatically restored after a period of time j (that is, 3 minutes) caused by the loop detection, so that the end user does not need to access the switch to perform the operation.

11872twf.ptd 第15頁 1229993 五、發明說明(12)11872twf.ptd Page 15 1229993 V. Description of the invention (12)

當交換器偵測到遠端迴圈時,該交換器無 圈。交換器必需警告終端使用者來進行補救。ς =该迴 迴圈偵測框可能會被該迴圈重複許多次。交換器、、+測之 該些框以免造成CPU的負擔。此種封閉可在一段益時必需封閉 3分鐘)經過後被移除,使得如果迴圈繼續存在^間(,即 告終端使用者。 、U ’此警 理想上,遠端迴圈可立即自動終止。然而, 之遠%父換器無法在迴圈偵测框中辨別出。要注音,乂圈 偵測機制設計成無關於遠端交換器之合作。可利;在2:When the switch detects a remote loop, the switch is not looped. The switch must alert the end user to remedy. ς = The loop detection frame may be repeated many times by the loop. Switch, and + test these boxes to avoid burdening the CPU. This kind of closure can be closed for 3 minutes after a period of time), and then removed, so that if the loop continues to exist for ^ time (that is, the end user is notified. U, ideally, the remote loop can be immediately and automatically Termination. However, the %% of the parent switch cannot be identified in the loop detection box. To note, the ring detection mechanism is designed to have no cooperation with the remote switch. Keli; at 2:

明迴圈偵測機制範圍外的其他機制來終止遠端 發 偵測 固 導致拓樸迴圈形成的理由有很多。在此將描述可由由 圈偵測機制偵測到的其中一些情況。要注意,決不只有主 些情況’底下描述至少五個階段。 1 )· STP相關問題 當交換器將應為封閉之一埠打開為前饋埠,則形成4 :设圈。廷可能是由錯誤STP與沒有適當反應STP控制之i 硬體所造成。這可能是因為埠設定在當其不該前饋時卻負 饋(亦即該埠上之STP被失能,或埠複製特徵被開啟)。There are many reasons for the formation of topology loops caused by other mechanisms outside the scope of the loop detection mechanism to terminate remote detection. Some of the situations that can be detected by the loop detection mechanism will be described here. It is important to note that there are more than just five scenarios described below. 1) · STP related issues When the switch opens a port that should be closed as a feedforward port, it forms 4: setting circle. This may be caused by faulty STP and i hardware that does not respond properly to STP control. This may be because the port is set to feed back when it should not be feed forward (that is, STP on the port is disabled or the port replication feature is turned on).

2) ·單向連線 、單向連線可能由在傳輸態或接收態之埠硬體阻塞所造 成。也可能由部份破損電纜造成。參考第4圖,當有單向 連$存在時’連線的其中一端將不會接收到任何BPDU,因 而交成則饋狀態。若此端已封閉卻收到BPDU,則形成迴2) · One-way connection or one-way connection may be caused by hardware blockage of the port in the transmitting or receiving state. It may also be caused by partially broken cables. Referring to Fig. 4, when there is a unidirectional link $, one end of the link will not receive any BPDUs, so it will be fed back if it crosses. If this end is closed but BPDU is received, it will form a reply

1229993 五、發明說明(13) 圈。 3 ).連線集合相關問題 當連線兩端具有不同連線集合架構時,可能會形成拓 樸迴圈。參考第7圖之實例,交換器A與交換器B透過兩條 連線連接,以及所有埠在一情況下均處於前饋狀態。則在 父換器B上’連線集合起來並視為兩邏輯埠。在交換器a 上’連線則視為獨立埠。當從交換器B送出廣播框時,交 換器A會透過另一條連線而將該框前饋至交換器B。 4 )· VLAN 轉譯 不慎使用VLAN轉譯可能會造成拓樸迴圈。參考第8圖 之實例,父換器A與交換器b透過四條連線連接,且此時所 有埠處於前饋狀態,但埠上的VLAN指定可能不一致,造成 廣播忙在父換裔A與父換器b間形成迴圈。在此例中,可觀 察到交換器B兩次接收到由VLAN1發出之迴 生™2,第二次發生於簡。因:偵二要二 =,父換器B必需在第一次於VLAN2上接收該迴圈偵測框時 就將之前饋。在交換器BkVLAN1上第2次接收同一迴圈偵 =,’迴圈㈣框中之來源VLAN相同於指定vlan,證、 了有拓樸迴圈存在。 5 )· L 3介面間的橋接器 允許L3介面間橋接之路由器(r〇uter)。此種橋接 來;ϊ/同改變橋接框之指定vlan。拓樸迴圈亦可能形成。 ^於垃路由與路由器B允許VLAN1與VLAN2介面間 ^ ’田、播框在父換器C ’路由器A,與路由器B間形成1229993 V. Description of the invention (13) circle. 3). Problems related to the connection set When the connection ends have different connection set structures, a topology loop may be formed. Referring to the example in FIG. 7, switch A and switch B are connected through two connections, and all ports are in a feed-forward state in one case. Then the connections on the parent switch B are aggregated and regarded as two logical ports. The connection on switch a is considered as a separate port. When a broadcast frame is sent from switch B, switch A will feed the frame to switch B through another connection. 4) · VLAN translation Inadvertent use of VLAN translation may cause topology loops. Referring to the example in Figure 8, parent switch A and switch b are connected through four connections, and at this time all ports are in the feedforward state, but the VLAN assignment on the port may be inconsistent, causing the broadcast to be busy between parent A and parent A loop is formed between the switches b. In this example, you can observe that Switch B received Regeneration ™ 2 from VLAN 1 twice, and the second time occurred in Jane. Because: Detecting two requires two =, parent switch B must feed forward when receiving the loop detection frame on VLAN 2 for the first time. Receive the same loop detection for the second time on the switch BkVLAN1 =, the source VLAN in the 'loop loop' box is the same as the specified vlan. 5). Bridge between L3 interfaces Router that allows bridging between L3 interfaces. This kind of bridging comes; ϊ / Same as changing the designated vlan of the bridging frame. Topological loops may also form. ^ Yu Routing and Router B allow the interface between VLAN1 and VLAN2 ^ ‘field and broadcast frame are in parent switch C’ Router A and Router B

11872twf.ptd 第17頁 1229993 五發明說明(14) 迴圈。在此實例中,笼目@ 出之迴圃e、a, 規察到交換器C兩次接收到由VLAN1發 而,’第—次在VLAN2,第二次在漏1。因 迴圈價測框必需在第一次於關2上接收該 收同—迴圈偵測=i則在交換器C於几·1上第2次接 定VLAN,俄明二·Γ寺迴圈偵測框中之來源几―相同於指 其他考量,Γ有拓樸迴圈存在。 調度 们則::m:圈,,故,在-個交換器上致能迴圈 為了能終止所有;測到;交;圈。 圈偵測。 、圈而在所有父換器上開啟迴 :$區域父換器無法終止遠端迴圈,若只在一個 :測。= 需選擇良好交換器位置以執行迴圈 置的父換器可例如為存在潛在拓樸迴圈之: 父換裔。此種交換器通常位於分佈層(distributi〇n 1ayer)中。 正常情況下,存取層交換器之上傳埠會連至分佈層^ 換器。如果致能所有埠是重要關鍵的話,在上傳埠偵^ = 圈所得幫助大於在邊緣埠偵測迴圈。、瘦 CPU負載 在支援迴圈偵測情況下,通常期望在所有交換器上 行迴圈偵測。此時,若以01-80-C2 -00-0 0-2 f作為y圈伯執 測框之目標MAC位址會導致CPU上負載過量。較好是利用具 ΗΠΙΙ 11872twf.ptd 第18頁 1229993 五、發明說明(15) I/G位元設定之交換器MAC位址卷 在ASIC交換器引擎,給予目:成目標MAC位址。然而存 债測框之產生有較高‘先權「且,交換器MAC位址之迴圈 會重複很多次。因而,接收=石樸迴圈存在,該些框 可能 圈偵測框與偵測拓樸迴圈之 不會遠小 能性。 偵測能力 迴圈 蓋所有已 不論 價測框仍 制而丟棄 如果 在1〜8 0秒 雖然 限定本發 和範圍内 範圍當視 於利用 〇l-80-c2-〇〇n2f μ & υυ 做為目標MAC位址之可 偵測無法保證能偵測所 知情況。 樸迴圈,雖然現已涵 該機制目前看來如何完敕 可能無法到達來源交換J ’因為各種理由,迴圈 。 吳比如,可能被廣播抑 使用第二迴圈偵測框傳輸曾 内完成迴圈偵測。 /、斤法,交換器通常可 本^明已以較佳會 明,任m ^ 例揭露如上,然豆並非用以 ’當可作些許之更;ί :不脫離本發明之精神 後附之申^ | n ~ +,因此本發明之保護 甲-專利槌圍所界定者為準。11872twf.ptd Page 17 1229993 Five invention descriptions (14) Loop. In this example, cage head @ 出 之 回 园 e, a, observed that switch C received twice from VLAN1, ‘the first time was in VLAN2, and the second time was leaking 1. Because the round trip price measurement frame must receive the same on Guan 2 for the first time — loop detection = i, the second time VLAN is connected on switch C on Ji · 1. The origin of the circle detection box is the same as other considerations. There is a topology loop in Γ. The schedulers are :: m: circle, so, enable the loop on a switch in order to terminate all; measure; cross; circle. Circle detection. , Circle and open back on all parent converters: The $ area parent converter cannot terminate the remote loop, if only in one: test. = A parent switch that needs to select a good switch position to perform a loop can be, for example, a potential topology loop: parent switch. Such exchangers are usually located in a distribution layer. Under normal circumstances, the upload port of the access layer switch is connected to the distribution layer switch. If enabling all ports is important, detecting ^ = circles at the upload port helps more than detecting loops at the edge ports. 3. Thin CPU load When loop detection is supported, it is usually expected to perform loop detection on all switches. At this time, if 01-80-C2 -00-0 0-2 f is used as the target MAC address of the y-ring frame, the CPU will be overloaded. It is better to use a switch with MAC address of 11872twf.ptd, page 18, 1229993 V. Description of the invention (15) I / G bit setting In the ASIC switch engine, give the target: the target MAC address. However, the generation of the deposit detection frame has a high 'priority' and the loop of the MAC address of the switch will be repeated many times. Therefore, the reception = Shipu loop exists, these frames may circle the detection frame and detection Topology loop will not be far from small. Detecting ability All loops cover will be discarded regardless of the price measurement frame. If it is within 1 ~ 80 seconds, although it is limited to the range of the hair and the range, it is considered to be used. 80-c2-〇〇n2f μ & υυ The detectability of the target MAC address cannot guarantee the detection of the known situation. Piao Huihuan, although it has already been described how the mechanism currently seems to be complete, the source may not be reached. Exchange J 'loops for various reasons. For example, Wu may be broadcasted and use the second loop detection frame to transmit the loop detection done within the loop. It will be clear that the example of Ren m ^ is disclosed as above, but the bean is not used to 'when something can be changed; ί: Append without appending to the spirit of the present invention ^ | n ~ +, so the protection of the present invention-patent mallet The area defined shall prevail.

1229993 圖式簡單說明 第1圖顯 式表。 第2圖顯 指令表。 第3圖_ 設定表。 第4圖顯 $根據本發明_ ^根據本發明— 較佳實施例之迴圈偵測框格 較佳實施例之迴圈偵測設定 車父佳實施例之顯示迴圈偵測 $根據本發明— 成之拓樸迴闺之士一較佳實施例之單向連線所造 第5圖顯 示根據本發明 之方塊圖。 之方塊圖 圈之 $根據本發 第6圖顯卞& & 方塊圖。根據本發明一較佳實 月 較佳實施例之遠端拓樸迴圈 施例之STP相關拓樸迴 第7、圖顯示根據本發明—1 設定所導致欠拓樸 χ 一較佳實施例之連線集合錯誤第8圖顯禾柄缺4 塊圖。 根據本發明 成之拓樸迴_之方一較佳實施例之VLAN轉譯所造第9圖顯条括从A回。 σ 不根據本發明 Α 接器所造成之拓樸i回固—較佳實施例之L3介面間之橋 續1 Λ 拓樸迴圈之方说第10圖_ M i 方塊圖 根據本發明 ^止器類型表(f11圖顯示根據本發明 (TLV)攔位之終止 較佳實施例之類型長度 值 較佳實施例之TLV攔位之棒 辨別器類型表 第1 2圖顯不根據本發一 VLAN辨別器類型表。 1 ~較佳實施例之TLV攔位之1229993 Schematic description Figure 1 shows the table. Figure 2 shows the instruction list. Figure 3_ Setting table. Figure 4 shows according to the present invention. ^ According to the present invention-the circle detection sash of the preferred embodiment. The circle detection of the preferred embodiment sets the display circle detection of the car driver embodiment. According to the present invention — The fifth embodiment of the one-way connection of a preferred embodiment of Cheng Zhituo, a returnee, shows a block diagram according to the present invention. The block diagram of the circle $ is shown in Figure 6 of the & & block diagram. The STP related topology of the remote topology loop embodiment according to a preferred embodiment of the present invention is shown in Fig. 7. The figure shows the lack of topology caused by the setting of the present invention -1. Figure 8 shows that the set is wrong. According to the present invention, FIG. 9 made by the VLAN translation of a preferred embodiment of the topology of the topology is shown from A to A. σ Topology i is not solidified according to the A connector of the present invention—the bridge between the L3 interfaces of the preferred embodiment continued 1 Λ Topology loop diagram Figure 10_ M i Block diagram according to the present invention ^ The device type table (f11 shows the termination type of the preferred embodiment according to the present invention (TLV). The length value of the preferred embodiment of the TLV stopping type discriminator type table. Figure 12 shows a VLAN according to the present invention. Discriminator type table. 1 ~ TLV of the preferred embodiment

11872twf.ptd 第20頁 圖式簡單說明 一較佳實施例之TLV欄位之交 第1 3圖顯示根據本發明 換器辨別器類型表。 第1 4圖顯示根據本發明 間類型表。 第1 5圖顯示根據本發明 和檢查類型表。11872twf.ptd Page 20 Brief description of the drawings The intersection of TLV fields of a preferred embodiment Figure 13 shows a table of types of converter discriminators according to the present invention. Fig. 14 shows a table of types according to the present invention. Fig. 15 shows a table according to the present invention and inspection types.

圖式標示說明 Swi tch A :交換器A Swi tch B :交換器B Swi tch C :交換器C Router A :路由器A Router B :路由器B 一較佳實施例之TLV攔位之時 一較佳實施例之TLV欄位之總Schematic description Swi tch A: Switch A Swi tch B: Switch B Swi tch C: Switch C Router A: Router A Router B: Router B Total of TLV fields

Claims (1)

1229993 ...... . . _ 六、申請專利範圍 1 · 一種網路之拓樸迴圈偵測機制,包括: 送出一迴圈偵測框;以及 偵測一拓樸迴圈。 2 ·如申請專利範圍第1項所述之抬樸迴圈偵測機制, 其中該迴圈偵測框包括多數攔位’該些攔位至少包括: 一目標媒體存取控制(D M A C )位址;以及 一來源媒體存取控制(SMAC)位址。 3 ·如申請專利範圍第2項所述之拓樸迴圈偵測機制, 其中該 DMAC 位址是 〇1一80 - c2-〇〇一〇〇一 。 4 ·如申請專利範圍第2項所述之拓樸迴圈偵測機制, 其中該DMAC位址是具i/g位元設定之—區域交換器之媒體 存取控制(MAC)位址。 5 ·如申請專利範圍第2項所述之拓樸迴圈偵測機制, 其中該SMAC位址是具丨/G位元清除之一區域交換器之MAC位 址。 6 ·如申請專利範圍第2項所述之拓樸迴圈偵測機制, 其中$亥迴圈偵測框更包括一類空/長度’其載有該迴圈偵 測框之長度。 Λ 7·如申請專利範圍第2項所述之拓樸迴圈偵測機制, 其中該迴圈偵測框更包括一snap。 8·如申請專利範圍第2項所述之拓樸迴圈偵測機制, 其中該迴圈偵測框更包括一訊息’其包括多數個類型— 度-值(T L V)欄位。 9·如申請專利範圍第8項所述之拓樸迴圈偵測機制,1229993 ........ _ 6. Scope of Patent Application 1 · A network topology detection mechanism, including: sending a loop detection frame; and detecting a topology loop. 2 · The loop detection mechanism as described in item 1 of the scope of the patent application, wherein the loop detection frame includes a plurality of stops. The stops include at least: a target media access control (DMAC) address ; And a source media access control (SMAC) address. 3. The topology loop detection mechanism as described in item 2 of the scope of the patent application, wherein the DMAC address is 〇80-c2-00001. 4. The topology loop detection mechanism described in item 2 of the scope of patent application, wherein the DMAC address is a media access control (MAC) address of an area switch with i / g bit setting. 5. The topology loop detection mechanism described in item 2 of the scope of the patent application, wherein the SMAC address is the MAC address of a regional switch with 丨 / G bit clearing. 6 · The topology loop detection mechanism described in item 2 of the scope of the patent application, wherein the $ HAI loop detection frame further includes a type of empty / length 'which contains the length of the loop detection frame. Λ 7: The topology loop detection mechanism described in item 2 of the scope of patent application, wherein the loop detection frame further includes a snap. 8. The topology loop detection mechanism described in item 2 of the scope of the patent application, wherein the loop detection frame further includes a message, which includes a plurality of type-degree-value (T L V) fields. 9. The topology loop detection mechanism described in item 8 of the scope of patent application, 12299931229993 其中該迴圈偵測框更包括一TLV攔位,該TLV攔位包括: 伸至:=器2示一訊息之尾端以及將該迴圈債測框延 1甲至特疋大小與位疋組對準; 一埠辨別器,決定該區域交換器是否為該拓樸迴圈之 一部份,或者該拓樸迴圈位於遠端; 一VLAN辨別器,針 發出器,係由於該bv — 或其資訊; 對無法被辨別之该些迴圈彳貞測框之 迴圈偵測軟體模組無法取得該乂[ 一交換器辨別器,針對無法從該DMAC位址或該^…位 址辨別出之該些迴圈偵測框之發出器; 一時間戳記,辨別該迴圈偵測框已持續多久,以預防 一重播攻擊;以及 一總和檢查,證認該迴圈偵測框,以預防一偽裝迴圈 偵測框干擾該網路。 1 〇·如申請專利範圍第丨項所述之拓樸迴圈偵測機制, 其中偵測該拓樸迴圈之步驟包括: 一傳輸步驟; 一接收與前饋步驟; 一分析步驟;以及 一動作步驟。 1 1 ·如申凊專利範圍第1 〇項所述之相樸迴圈偵測機 制,其中該傳輸步驟包括: 一第一傳輸演算法,強調快速偵測、負載不過量、以 及公平對待所有VLAN或多數個埠間之平衡,包括:The loop detection frame further includes a TLV stop. The TLV stop includes: Extending to: = Device 2 shows the end of a message and extending the loop debt measurement frame by 1 A to the size and position of the loop. Group alignment; a port discriminator, determines whether the area switch is part of the topology loop, or the topology loop is located at the far end; a VLAN discriminator, needle sender, because of the bv — Or its information; the loop detection software modules of the loop frames that cannot be discerned cannot obtain the frame [a switch discriminator, which cannot be distinguished from the DMAC address or the ^ ... address The issuer of the loop detection frames; a time stamp to identify how long the loop detection frames have lasted to prevent a replay attack; and a sum check to identify the loop detection frames to prevent A disguised loop detection frame is interfering with the network. 1 0. The topology loop detection mechanism described in item 丨 of the patent application scope, wherein the steps of detecting the topology loop include: a transmission step; a receiving and feedforward step; an analysis step; and Action steps. 1 1 · As described in claim 10 of the patent scope of the similar loop detection mechanism, where the transmission step includes: a first transmission algorithm, emphasis on rapid detection, not overload, and fair treatment of all VLANs Or a balance between multiple ports, including: 1229993 六、申請專利範圍 秒都有可能傳輸該 該區域交換器之所有埠在每一 迴圈偵測框;以及 在母一瑋上之待測VLAN上送出該迴圈偵測框,該 VLAN處於前饋狀態,公平對待最多5〇個該些vun ;以及 一第二傳輸演算法,包括: 、 動作中之該區域交換器之所有該些VLAN在每一秒 句視為可傳輸該迴圈偵測框;以及 、、, 對每一該几―,在運作中之一拓樸中所有該些埠 运出一個該迴圈偵測框,對最多5〇個几〇如此做。 制,2·如申請專利範圍第11項所述之拓樸迴圈偵測機 1〜8 0 ^ "亥苐一傳輸凉算法之债測該拓樸迴圈所需時間在 制 框 13 ·如申請專利範圍第1 0項所述之拓樸迴圈偵測機 其中該接收與前镇步驟包括: J 在運作中之該拓樸中之一前饋埠上接收該迴圈偵測 改纖若該區域交換器未發出該框,則該區域交換器將未經 、交之該迴圈偵測框前饋至運作中之該拓樸上之 该些埠;以及 §该區域交換器在一封閉埠上接收該迴圈偵測框時, /、该迴圈偵測框且不再前饋該迴圈偵測框。 14·如申請專利範圍第丨0項所述之拓樸迴圈偵測機 | ,其中該分析步驟包括·· 判断疋否存在該拓樸迴圈,係根據發出該迴圈偵測框1229993 VI. It is possible to transmit the loop detection frame for all ports of the area switch in every second in the patent application range; and send the loop detection frame to the VLAN to be tested on the mother and the VLAN. Feed-forward status, fair treatment of up to 50 of these vuns; and a second transmission algorithm, including:, All the VLANs of the area switch in action are considered to be able to transmit the loop detection in every second sentence Frames; and, for each one of them, one of the loop detection frames is shipped from all the ports in one of the topologies in operation, and this is done for up to 50 dozens. 2. The topological loop detection machine 1 ~ 8 0 as described in item 11 of the scope of the patent application. The time required for the topological loop is measured in frame 13. · The topology loop detection machine as described in item 10 of the scope of patent application, wherein the steps of receiving and preceding include: J receiving the loop detection and fiber modification on a feedforward port of the topology in operation If the regional switch does not send out the frame, the regional switch feeds forward the loop detection frame to the ports on the topology in operation; and § the regional switch When receiving the loop detection frame on the closed port, /, the loop detection frame and no longer feed forward the loop detection frame. 14 · The topology loop detection machine described in item 丨 0 of the scope of patent application, wherein the analysis step includes: · judging whether or not the topology loop exists, according to the loop detection frame issued 11872UV 丨'.ptd 1229993 六、申請專利範圍 - 之該埠與接收該迴圈偵測框之該埤是否皆處於前饋狀態; 若該些埠處於不同該些埠中,該區域交換器=樸 迴圈之一部份;以及 條 若該些埠為同一該埠,則該拓樸迴圈存在於遠端。 1 5·如申請專利範圍第丨〇項所述之拓樸迴圈偵* 制’其中該動作步驟包括: 該埠如果出現一早向連線的話,封閉發出該迴圈偵測框之 如果偵測到一遠端拓樸迴圈的話,警告終端使 行補救;以及 、缅使用者進 在一段時間經過後,自動回復操作。 制,2·中如在申」’預專一利4範圍第15項所述之拓樸迴圈偵測機 :動回復操作’使得終端使用者無需存取 ^ 'Λ^-stp 11^ ^ ^ ^ ^ 其係當該區域交換琴“碭’則偵測到該拓樸迴圈, 時,該拓樸以::該封閉淳錯誤地開啟為該前饋痒 其中1-8.旦如:二 中崞硬體陷於—傳則偵測到該拓樸迴圈,且其 ",如申請專:範圍或第 =收態。 其中一旦偵測到-連線3項所述之拓樸迴圈債測機制,11872UV 丨 '.ptd 1229993 6. The scope of patent application-whether the port and the frame receiving the loop detection frame are both in the feedforward state; if the ports are in different ports, the area switch = Pu A part of the loop; and if the ports are the same port, the topology loop exists at the far end. 1 5 · The topology loop detection system described in item No. 丨 0 of the scope of patent application, where the action steps include: If the port is connected early, the loop detection box of the loop detection box is closed. When a remote topology loop is reached, the terminal is warned to make remedies; and, after a period of time has elapsed, the user will automatically reply to the operation. System, 2 · As stated in the application, "Topology loop detection machine described in item 15 of the scope of pre-exclusive benefits: dynamic recovery operation" makes the end user not need to access ^ 'Λ ^ -stp 11 ^ ^ ^ ^ ^ This is when the topology exchange circle "砀" is detected in the area, when the topology is: The closed loop is incorrectly turned on for the feedforward itching. Among them 1-8. Zhongli hardware is trapped-it is detected that the topology loop, and its ", such as the application: range or the first state of receipt. Among them, once the-topology loop described in the line 3 is detected Debt testing mechanism, 1lB72twf.ptd 第25頁 迷線集合’則偵測到該拓樸迴圈,其中 1229993 六、申請專利範圍 連線兩端具有不同該連線集合 20·如申請專利範圍第〗項所述 其中一旦偵測到VLAN轉譯,則偵測樸迴圈偵測機制, 埠上之VLAN指定工作係不一致。、*垓拓樸迴圈,且對該 2 1 ·如申請專利範圍第〗項所述 其中係根據偵測到多數個L3介面間 f迴圈偵測機制, 圈,且其中一路由器允許13介而„橋接偵測該拓樸迴 其改變該橋接器迴圈㈣框之指迴圏痛測框橋接, 22.如申請專利範圍第】項所述之 ; = 潛在該拓樸迴圏處之該區域成 * t Ϊ ;〇 Λ:::;:::::- 位址以減少CPU負載。 址係口又成忒DMAC 其中,第1項所述之拓樸迴圈偵測機制, °又為失犯,失能之該埠接收或前饋該迴圈偵測 王,致此之該埠送出該迴圈偵測框,且當偵測到該拓樸 圈時,該埠封閉。 ^ 2>5·如申請專利範圍第1項所述之拓樸迴圈偵測機制, >、中4拓樸迴圈債測機制無關於交換器債測一拓樸迴圈之 能力。 2 6 ·如申請專利範圍第1項所述之拓樸迴圈偵測機制, 其中該拓樸迴圈偵測機制允許任何的總和檢查/證認演算 法。 第26頁 11872twf.ptd1lB72twf.ptd Page 25 The lost line set 'The topology loop was detected, of which 1229999 6. The scope of the patent application has two different ends of the connection line. If a VLAN translation is detected, the loop detection mechanism is detected. The VLAN assignments on the port are inconsistent. , * 垓 Topology loop, and the 2 1 · As described in item No. of the scope of the patent application, which is based on the detection of the f-loop detection mechanism between most L3 interfaces, and one of the routers allows 13 And „Bridge detection The topology changes the finger loop pain detection frame bridge of the bridge loop frame, 22. As described in the item of the scope of the patent application]; = Potential of the topology loop The area becomes * t ;; 〇Λ :::; :::::-address to reduce the CPU load. The address system port also becomes DMAC where the topology loop detection mechanism described in item 1, For the crime, the disabled port receives or feeds back the loop detection king, so that the port sends out the loop detection frame, and when the topology loop is detected, the port is closed. ^ 2 & gt 5. · The topology loop detection mechanism as described in item 1 of the scope of the patent application, >, China 4 Topology Loop Debt Testing Mechanism has nothing to do with the ability of the converter debt to test a topology loop. 2 6 · The topology loop detection mechanism described in item 1 of the scope of the patent application, wherein the topology loop detection mechanism allows any sum check / certification authentication algorithm. Page 11872twf.ptd
TW92131629A 2003-11-12 2003-11-12 Topology loop detection mechanism TWI229993B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW92131629A TWI229993B (en) 2003-11-12 2003-11-12 Topology loop detection mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW92131629A TWI229993B (en) 2003-11-12 2003-11-12 Topology loop detection mechanism

Publications (2)

Publication Number Publication Date
TWI229993B true TWI229993B (en) 2005-03-21
TW200516906A TW200516906A (en) 2005-05-16

Family

ID=36083258

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92131629A TWI229993B (en) 2003-11-12 2003-11-12 Topology loop detection mechanism

Country Status (1)

Country Link
TW (1) TWI229993B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201431320A (en) 2013-01-24 2014-08-01 Accton Technology Corp Method and network device for loop detection
US20160094945A1 (en) * 2014-09-26 2016-03-31 Sunil Kulkarni Variable interval for periodic fix requests of multiple clients
CN107251492A (en) * 2015-02-23 2017-10-13 三菱电机株式会社 Relay and communication system

Also Published As

Publication number Publication date
TW200516906A (en) 2005-05-16

Similar Documents

Publication Publication Date Title
US11228515B2 (en) Data packet detection method, device, and system
US7701936B2 (en) Obtaining path information related to a bridged network
US8862943B2 (en) Connectivity fault notification
US8634308B2 (en) Path detection in trill networks
JP4567367B2 (en) Insert address to enable OAM function
US20040165595A1 (en) Discovery and integrity testing method in an ethernet domain
CN108123824A (en) A kind of network fault detecting method and device
WO2008119300A1 (en) A protecting method and device for ethernet tree service
US20190007302A1 (en) Mechanism for Dual Active Detection Link Monitoring in Virtual Switching System with Hardware Accelerated Fast Hello
WO2016041379A1 (en) Method and apparatus for implementing nni ping
US20120236866A1 (en) Communication system and communication device
WO2019157802A1 (en) Method, device, and network system for measuring network performance
WO2009092257A1 (en) Fault detection method and device for provider backbone transport network
TW200901677A (en) Data driven connection fault management (DDCFM) in CFM maintenance points
US20200044964A1 (en) Defect detection in ip/mpls network tunnels
CN108737183A (en) A kind of monitoring method and device of forwarding-table item
US20080267080A1 (en) Fault Verification for an Unpaired Unidirectional Switched-Path
US20110069607A1 (en) Methods and systems for continuity check of ethernet multicast
JP7450042B2 (en) Multicast packet detection methods, network devices, and systems
CN102724097B (en) A kind of ESADI processing method and system
EP2482516B1 (en) Method for customer edge device auto management and provider edge device
TWI229993B (en) Topology loop detection mechanism
CN114690680A (en) Data processing method, controller and first network equipment
US7636315B2 (en) Broadcast traceroute
TWI308438B (en) Method for exchanging a network message

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees