WO2008138867A2 - Method for managing network components, and a network component - Google Patents

Method for managing network components, and a network component Download PDF

Info

Publication number
WO2008138867A2
WO2008138867A2 PCT/EP2008/055712 EP2008055712W WO2008138867A2 WO 2008138867 A2 WO2008138867 A2 WO 2008138867A2 EP 2008055712 W EP2008055712 W EP 2008055712W WO 2008138867 A2 WO2008138867 A2 WO 2008138867A2
Authority
WO
WIPO (PCT)
Prior art keywords
network
network components
logical
components
network component
Prior art date
Application number
PCT/EP2008/055712
Other languages
English (en)
French (fr)
Other versions
WO2008138867A3 (en
Inventor
Ingo HÜTTER
Michael Weber
Original Assignee
Thomson Licensing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing filed Critical Thomson Licensing
Publication of WO2008138867A2 publication Critical patent/WO2008138867A2/en
Publication of WO2008138867A3 publication Critical patent/WO2008138867A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies

Definitions

  • the invention refers to a method for managing network components and to a network component.
  • Networks in particular local networks, can occasionally comprise a great number of network components communicating with each other via physical connections, for example via cable connections and/or wireless connections.
  • each of the network components must have specific information about the other network components.
  • the network components must have knowledge of which other network components are connected to the network.
  • discovery wherein methods for discovering new network components and network components that do no longer exist are called discovery methods.
  • the known discovery methods comprise two different embodiments.
  • the network components are subdivided in two different classes.
  • a first class comprises the network components to be found by means of the discovery method and a second class comprises the network components that are to find other network components.
  • the UPnP protocol is concerned, a subdivision in "control points” and other "devices” is an example thereof.
  • all network components are equal, with the result that all of the network components can find all of the other network components in the network.
  • each network component emits data packets, which are called discovery data packets, to all other network components of the network at regular intervals. Subsequently, the responses of the other network components to the emitted data packets are waited for. A missing response packet indicates that the associated network component is no longer connected.
  • a method for managing network components in a network, wherein logical connections between the network components are used to form a logical structure; the fact that a network component that was disconnected from the network after the logical structure has been formed is missing is detected by at least one detecting one of the network components that was directly connected to the disconnected network component in the logical structure; the at least one detecting network component generates at least one message informing that one of the network components has been disconnected; and all network components remaining in the network are informed through the at least one generated message that one of the network components has been disconnected.
  • a network component comprising connection units configured to form logical connections to other network components; a control unit connected to the connection units and configured to check the logical connections to the other network components; an information unit connected to the connection units and configured to generate a message informing that one of the network components is missing and to transmit the generated message via one of the logical connections; and a transfer unit connected to the connection units and configured to receive a message informing that one of the network components is missing via one of the logical connections and to transmit said message via another one of the logical connections.
  • the invention comprises the idea of establishing a logical structure in the network at a given point in time, said logical structure including all network components.
  • this logical structure there are individual network components which only monitor the existence of neighboring network components. If one of the network components is then removed from the network at a later point, the logical structure consisting of logical connections helps to detect that the removed network component is missing and to transfer this knowledge to all of the remaining network components. Preferrably, this knowledge is transferred to all of the remaining network components via the logical connections of the logical structure.
  • the disconnection, removal or detachment of the network component from the network is an expression for the disconnection or separation of physical connections of the network component to other network components of the network.
  • the fact that the removed or disconnected network component is missing can either be detected by preferrably exactly one network component or by a plurality of network components which, in the logical structure, were directly connected to the disconnected network component via an appropriate logical connection.
  • the detecting network components can each generate a message informing that a network component has been disconnected from the network, thus informing the remaining network components through these messages.
  • the logical structure does not have to orientate itself by the actual physical connections between the network components of the network.
  • a direct logical connection can be established even between network components which are connected to each other via one or more other network components rather than directly via physical connections.
  • the logical connections can comprise TCP socket connections (TCP - "Transmission Control Protocol") .
  • the logical connections can be formed by means of an exchange of data packets according to the UDP ( "User Datagram Protocol”) network protocol.
  • the logical structure may comprise a topography which is optimized for detecting the removal of a network component and for transmitting the message thereabout to the remaining network components .
  • An advantageous embodiment of the invention provides that the message generated by the detecting network component is transmitted to all of the remaining network components via a plurality or all of the logical connections of the logical structure.
  • the logical structure therefore, provides an effective means for distributing the information that one network component has been disconnected from the network as quickly as possible throughout the network.
  • An advantageous further development of the invention provides that the fact that the network component disconnected from the network is missing is detected by the detecting one of the network components by checking one of the logical connections of the logical structure.
  • This check is, preferrably, carried out in a proactive manner.
  • the check of the logical connection can be achieved by sending test packets via the logical connection at certain, for example regular, time intervals .
  • a preferred embodiment of the invention provides that the logical structure is formed by the network components in a self-organizing manner by establishing the logical connections between the network components. This is to advantage in that it does not require any managing unit which is superordinate to the network.
  • An appropriate further development of the invention provides that, when forming the logical structure in a self-organizing manner, the network components each use a search function to discover an accessible logical port of another one of the network components and, thereafter, establish the respective logical connection between themselves and the other one of the network components via the discovered accessible logical port.
  • Such logical ports are, for example, TCP sockets.
  • the search can be carried out by means of a traditional group discovery method, which is also called a multicast discovery method.
  • An appropriate group call request is answered only by those network components that have an unassigned logical port at the time of the request. If the searching network component itself has an unassigned or at least accessible logical port, then this port is ignored during the search.
  • the message generated by the detecting network component comprises information about the disconnected network component.
  • the message may comprise information about which of the network components has been disconnected from the network, for example by describing its original physical position or its position in the network.
  • the message can, for example, provide information about the function of the disconnected network component. This is to advantage in that the network components remaining in the network can prepare themselves for the fact that this function is no longer provided in the network.
  • the message about a network component having been disconnected does not provide any further information about the disconnected network component, it is, as an alternative, possible to re-explore the entire network or a partial network, for example by accessing known discovery methods in order to fathom the change in the network topology, resulting from the disconnection of the disconnected network component.
  • the other network component retrieves and transfers the message generated by the detecting network component. On the one hand, this can be achieved by the message being transferred directly, for example as a message packet.
  • the message can also be evaluated in order that a new message packet can subsequently be formed, which will then be transferred.
  • a preferred embodiment of the invention provides that the logical structure is formed without any ring topologies. This is to ensure that a closed logical structure is prevented from forming, with the result that at least one logical port of a network component always continues to be available so that, when an additional network component is introduced in the network, there is the possibility to connect the additional network component to the existing logical structure via a logical connection .
  • each network component is in communication with no more than two other network components via logical connections, so that the logical structure is formed as a "string" of sorts, which comprises two terminal components. If a network component is now removed from the network, this string is broken up into two partial strings, and the information about the string having been broken up can be transferred very quickly to the remaining network components via the remaining logical connections in the two partial strings. As a result, the data traffic required for applying the method and / or the time required for informing all network components is/are minimized. This relationship will be illustrated below by studying a local network comprising a number n of network components.
  • each network component emits discovery packets to all other network components and, owing to the incoming response packets returned from the network components arranged in the network, determines whether one of the network components having previously responded does not respond any longer.
  • the network comprises 100 network components exchanging information in the traditional manner at an interval of 5 minutes, then, as a result, it takes 5 minutes on average until a network component is detected to have left the network. According to the method described herein, however, this takes only 3 seconds, starting from the assumption that the data traffic is uniform.
  • the logical connections between the network components are formed as packet-based connections.
  • the logical connections can be formed on a line transmission basis.
  • Fig. 1 is a schematic diagram of the structure of a network component with logical ports
  • Fig. 2 is a schematic diagram of a logical structure comprising a plurality of network components
  • Fig. 3 is a flow diagram of a method for generating a logical structure in a network.
  • Fig. 1 is a schematic diagram of the structure of a network component G with logical ports P, A.
  • the network component G is able to enter into logical connections 1 to other network components (not illustrated) in order to establish a logical structure.
  • the logical ports P, A of the network component G comprise a passive port P serving to accept logical connections from other network components. That means that a logical connection running from the other network component to the network component G via the passive port P is initiated by the other network component.
  • the logical ports P, A of the network component G comprise an active port A which can be used to establish a logical connection 1 to a passive port of another network component (not illustrated) .
  • a search process is run through the network component G in order to find accessible passive ports of other network components in a network.
  • Examples of a logical connection 1 between the network component G and another network component are TCP socket connections which are used to exchange data at regular intervals. Furthermore, the logical connection 1 can be formed by exchanging UDP packets between the network component G and the other network component.
  • the search process is run through the network component G in order to find those network components in the network which comprise accessible passive ports.
  • the network component G will then establish a logical connection 1 between its active port A and the passive port of the network component found, in order form a logical structure.
  • search processes are known from traditional discovery methods .
  • Fig. 2 is a schematic diagram of a logical structure 10 comprising network components G1...G7 which are connected to each other by means of logical connections 1...7.
  • a logical connection 2 is, for example, established between the network component G2 and the network component G3 by forming the logical connection 2 between the active port A of the network component G2 and the passive port P of the network component G3.
  • the logical connections 1...7 are used to exchange information for monitoring the connections 1...7 between the network components G1...G7.
  • the logical connections 1...7 can be used to exchange information which is used to check whether the logical structure 10 formed by means of the logical connections 1...7 comprises a ring topology. By avoiding a ring topology, it is ensured that network components G1...G7 with accessible passive ports P are always available in the logical structure 10, wherein new additional network components having been introduced in the network can use their active ports to establish logical connections.
  • the network components Gl and G6 comprise passive ports P which are accessible at any rate. It is true that a passive port P can establish logical connections 1...7 to a plurality of active ports A, as is the case with the passive port P of the network component G5 in the logical structure 10 shown in Fig. 2.
  • the network component G5 is connected to the network components G4 and G7 by means of the logical connections 4 and 7, with the result that the logical structure 10 comprises a branched topology.
  • a sufficient number of such branches is available in the logical structure 10 and the logical structure 10, furthermore, comprises a ring topology or substructures with ring topologies, then this may result in no other accessible passive ports being available in the logical structure 10. It is, therefore, necessary to avoid ring topologies.
  • branched topologies as used in the logical structure 10 shown in Fig. 2 are avoided as well, so that the logical structure 10 will then only comprise a linear topology.
  • a logical structure 10 without any ring topology is to further advantage in that a message transferred along the logical connections 1...7 by the network components G1...G7 will, at some point, reach the end of the logical structure 10. In a ring topology, additional measures would have to be taken to prevent the message from running repeatedly through the logical structure 10.
  • a network component G1...G7 having established a logical connection 1...7 to another network component G1...G7 by means of its active port A emits a data packet via the logical connection 1...7.
  • the emitted data packet is transferred by means of the other network component G1...G7. If the data packet arrives at a network component G1...G7 the active port A of which is not connected, the data packet is marked appropriately and returned. In this manner, the network component G1...G7 having emitted the data packet detects that at least one substructure of the logical structure 10 in which it is arranged comprises a terminal point so that the substructure does not have any ring topology.
  • the network component G1...G7 detects that it has formed a logical structure 10 or a substructure (not illustrated) with a ring topology by means of the logical connection 1...7 established via its active port A. It can then disconnect the logical connection 1...7 to avoid the ring topology and can, subsequently, search for another network component G1...G7 with an accessible, for example unused and, therefore, unassigned passive port P.
  • the logical structure 10 can be used to detect a disconnection of a network component G1...G7 from the network and to inform the remaining network components G1...G7 thereof via the logical connections 1...7.
  • the procedure required to this end will be illustrated below by means of an example assuming that the network component G3 has been disconnected from the network, for example by simply pulling off the network plug or by switching off the network component G3.
  • the network components G1...G7 check each of the particular connections 1...7 running to them at regular intervals. Therefore, the logical connections 2 and 3 are regularly checked by the network components G2 and G4, for example by exchanging data packets between the network components G2 and G3 on the one hand and between the network components G3 and G4 on the other hand. For that reason, the non-existence of the network component G3 will be detected by the network components G2 and G4 within a short time, because the connections 2 and 3 will then not be functioning any longer.
  • the network components G2 and G4 each prepare messages comprising information about the fact that the network component G3 is missing. This information may comprise further additional information about the network component G3, for example information about the functions executed by the network component G3 in the network.
  • the messages are sent to the remaining network components (network components Gl, G5, G6, and G7 in Fig. 2) via the remaining connections (connections 1, 3, 4, 6, and 7 in Fig. 2) .
  • a discovery method is then re-applied in order to determine whether a plurality of coherent network components G1...G7 has been separated from the network.
  • the network component G3 Since the network component G3 is no longer available, there is now a logical structure 10 which is divided in two partial structures (not illustrated) , that are a partial structure with the network components Gl and G2 and a further partial structure with the network components G4, G5, G6, and G7. Since there is no longer any logical connection 2, the active port A of the network component G2 is unassigned, with the result that the network component G2 must run through the search process in order to find another network component with an accessible passive port, for example the network component G4 with the passive port P which is now open because the logical connection 3 to the network component G3 has been separated. As an alternative, the search process can also be used to find the network component G6 with the unassigned passive port P.
  • the network component Gl also comprises an unassigned passive port P, but a connection between the active port A of the network component G2 and the passive port P of the network component Gl would result in a logical structure with a ring topology, which is avoided according to the method described above.
  • Fig. 3 is a flow diagram of a method for generating a logical structure 10 in a network with network components G1...G7. The method is applied by a network component G1...G7 in order to form a logical connection 1...7 to another network component G1...G7. After the method shown in Fig. 3 has been applied in all network components G1...G7 of the network either successively or at least simultaneously, a logical structure 10 will be established, which does not comprise any ring topology.
  • the method is started in a first step 20. Then, it is checked 21 whether the active port A is already connected. If this is the case, the system waits in a step 22 until the active port A is not connected any longer. This can, for example, be achieved by separating a network component G1...G7 from an already formed logical structure 10. If, however, the active port A is not connected, all network components G1...G7 comprising an accessible passive port P are searched for in the network in a next step 23. If this search criterion is limited not only to accessible passive ports P but even to unassigned passive ports P, that means to those passive ports that are not connected at all, then a linear unbranched structure can be formed according to the present method.
  • step 30 If the logical connection 1...7 was established successfully in step 29, it is checked in a further step 30 whether the logical connection 1...7 thus formed is part of a logical structure 10 with ring topology, that means whether this connection is what is called a circular connection. This is, for example, achieved by emitting a data packet as described above. If a ring topology or a ring is, thus, available 31, the connection is separated again in a next step 32.
  • a change in topology is, for example, achieved by removing network components G1...G7 from the network or by adding further network components to the network.
  • Such a change in topology, in particular caused by adding further network components to the network can be detected or examined by means or with the help of traditional discovery methods which are typically based on group call or multicast methods.
  • Step 31 in which it is determined whether a ring topology or a ring has been formed can, optionally, also be used to determine how many network components G1...G7 participate in the ring, that means to determine the size of what is called the ring length.
  • a counter which is incremented when running through a network component G1...G7 is dispatched together with the emitted data packet. Once the data packet has again arrived at the original network component G1...G7, the counter reading corresponds to the ring length of the ring formed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
PCT/EP2008/055712 2007-05-09 2008-05-08 Method for managing network components, and a network component WO2008138867A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102007021647A DE102007021647A1 (de) 2007-05-09 2007-05-09 Verfahren zum Verwalten von Netzwerkkomponenten und Netzwerkkomponente
DE102007021647.7 2007-05-09

Publications (2)

Publication Number Publication Date
WO2008138867A2 true WO2008138867A2 (en) 2008-11-20
WO2008138867A3 WO2008138867A3 (en) 2009-01-08

Family

ID=39829281

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2008/055712 WO2008138867A2 (en) 2007-05-09 2008-05-08 Method for managing network components, and a network component

Country Status (2)

Country Link
DE (1) DE102007021647A1 (de)
WO (1) WO2008138867A2 (de)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030076789A1 (en) * 2001-08-27 2003-04-24 Norihiko Kimura Network system, addressing method, communication control device and method thereof
EP1524600A2 (de) * 2003-10-17 2005-04-20 Microsoft Corporation Verfahren zur Bereitstellung einer garantierten verteilten Ausfallbenachrichtigung

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991830A (en) * 1996-01-04 1999-11-23 Compaq Computer Corp. Apparatus and method for coupling multiple peripheral devices to a single port of a computer
US7117273B1 (en) * 2000-01-25 2006-10-03 Cisco Technology, Inc. Methods and apparatus for maintaining a map of node relationships for a network
DE10323401B4 (de) * 2003-05-23 2007-12-27 Nokia Siemens Networks Gmbh & Co.Kg Verfahren und Netzwerkanordnung zur Diensterbringung für nicht im Netzwerk angemeldete Teilnehmerendgeräte eines Telekommunikationsnetzwerkes

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030076789A1 (en) * 2001-08-27 2003-04-24 Norihiko Kimura Network system, addressing method, communication control device and method thereof
EP1524600A2 (de) * 2003-10-17 2005-04-20 Microsoft Corporation Verfahren zur Bereitstellung einer garantierten verteilten Ausfallbenachrichtigung

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
BRYANT M SHAND CISCO SYSTEMS OCT 2004 S: "A Framework for Loop-free Convergence; draft-bryant-shand-lf-conv-frm wk-00.txt" IETF STANDARD-WORKING-DRAFT, INTERNET ENGINEERING TASK FORCE, IETF, CH, 1 October 2004 (2004-10-01), XP015011215 ISSN: 0000-0004 *
ZHUANG S Q ET AL: "On failure detection algorithms in overlay networks" INFOCOM 2005. 24TH ANNUAL JOINT CONFERENCE OF THE IEEE COMPUTER AND CO MMUNICATIONS SOCIETIES. PROCEEDINGS IEEE MIAMI, FL, USA 13-17 MARCH 2005, PISCATAWAY, NJ, USA,IEEE, vol. 3, 13 March 2005 (2005-03-13), pages 2112-2123, XP010829335 ISBN: 978-0-7803-8968-7 *

Also Published As

Publication number Publication date
WO2008138867A3 (en) 2009-01-08
DE102007021647A1 (de) 2008-11-13

Similar Documents

Publication Publication Date Title
US7881230B2 (en) Facilitating self configuring link aggregation using link aggregation control protocol
EP2816772B1 (de) Verarbeitungsverfahren für lacp-verhandlungen, relaisknoten und system
US7760695B2 (en) Methods and systems for centralized cluster management in wireless switch architecture
EP1982447B1 (de) System und verfahren zur erkennung und wiederherstellung von aufgrund virtueller schalter zustande gekommenenr linkfehler
US8705341B2 (en) Power over ethernet management devices and connection between ethernet devices
EP1655905A1 (de) Managementprotokoll für Stapelvermittler mit automatischer Zuweisung von Kennungen des Stapelvermittlers
EP1655904A1 (de) Managementprotokoll für Stapelvermittler mit Durchgangsmodus
CN104735001B (zh) 软件定义网络中的链路发现方法、装置及系统
EP1655906A1 (de) Managementprotokoll für Stapelvermittler mit temporärer Suspendierung der Überwachung
CA2311197A1 (en) Enhanced dual counter rotating ring network control system
CN105450779B (zh) 一家电设备连接多服务器的方法
CN1937569A (zh) 具有冗余路径的局域网中的消息处理
WO2005027427A1 (ja) ノード冗長方法、インタフェースカード、インタフェースデバイス、ノード装置およびパケットリングネットワークシステム
US11343599B2 (en) System and method for topology discovery and fiber continuity verification in network
CN107968751B (zh) 一种信息处理方法及装置
CN110249634A (zh) 包括电力线接口和至少一个射频接口的电表
US7676623B2 (en) Management of proprietary devices connected to infiniband ports
US20070230458A1 (en) Communication Network, Communication Apparatus, Communication Control Method and Communication Control Program
WO2014071811A1 (zh) Trill网络构建方法、节点及系统
WO2008138867A2 (en) Method for managing network components, and a network component
CN109120520A (zh) 一种故障处理方法和设备
CN101800682A (zh) 一种双向转发检测方法及装置
CN113746659B (zh) 一种网络拓扑发现的方法、设备及系统
US7764630B2 (en) Method for automatically discovering a bus system in a multipoint transport network, multipoint transport network and network node
CN107547330A (zh) 一种传输业务数据的方法和节点设备

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08750206

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 08750206

Country of ref document: EP

Kind code of ref document: A2