WO2010022576A1 - 基于以太多环网的控制报文的传输方法和装置 - Google Patents

基于以太多环网的控制报文的传输方法和装置 Download PDF

Info

Publication number
WO2010022576A1
WO2010022576A1 PCT/CN2008/073830 CN2008073830W WO2010022576A1 WO 2010022576 A1 WO2010022576 A1 WO 2010022576A1 CN 2008073830 W CN2008073830 W CN 2008073830W WO 2010022576 A1 WO2010022576 A1 WO 2010022576A1
Authority
WO
WIPO (PCT)
Prior art keywords
ring
sub
control
node
primary
Prior art date
Application number
PCT/CN2008/073830
Other languages
English (en)
French (fr)
Inventor
王斌
吴少勇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US13/060,678 priority Critical patent/US8462795B2/en
Priority to CA2735276A priority patent/CA2735276C/en
Priority to EP20080876819 priority patent/EP2320610B1/en
Publication of WO2010022576A1 publication Critical patent/WO2010022576A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery

Definitions

  • the present invention relates to communication networks or, more particularly, to a transmission method and apparatus based on control of too many ring networks.
  • BACKGROUND In the practical application of Ethernet, various protection technologies are widely used, and these protection technologies are mainly used to implement redundancy backup between the primary path and the alternate path.
  • the primary path and the alternate path are intact, the protected data forwarding function of the alternate path is blocked, and the protection data between the networks is transmitted on the primary path; when the primary path fails, the protected data forwarding function of the alternate path is opened, and the network The protection data between will be switched to the alternate path for transmission.
  • the foregoing protection process can prevent the protection data from being repeatedly received and form a broadcast storm under the normal state of the network.
  • FIG. 1 is a schematic diagram of a topology with too many ring networks in relation to four techniques.
  • nodes S1 to S6 are both Ethernet switches, node S1 has ports 11 and 12, and node S2 has ports.
  • node S3 corresponds to port 31
  • node S5 corresponds to port 51
  • node S6 corresponds There are port 61 and port 62, network B and node S2 are connected, and network A and node S5 are connected.
  • Network A and network B There are four physical paths between network A and network B for communication, that is, the first one: network A ⁇ -> node S5 ⁇ -> node S3 ⁇ -> node S2 ⁇ -> network B, second: network A ⁇ —> Node S5 ⁇ "">Node S3 ⁇ —> Node S4 ⁇ —> Node S l ⁇ —> Node S2 ⁇ —> Network B; Third: Network A ⁇ —> Node S5 ⁇ -> Node S6 ⁇ — > Node S4 ⁇ —> Node S3 ⁇ -> Node S2 Network B, Article 4: Network A ⁇ -> Node S5 ⁇ " ⁇ > Node S6 ⁇ -> Node S4 ⁇ -> Node S1 Node S2 Network B.
  • FIG. 2 is a schematic diagram of the communication path topology when the link in too many ring networks is intact according to the related art, as shown in FIG.
  • the ring network i or contains a primary ring and a sub-ring.
  • the primary ring contains nodes S1, S2, S3, and S4.
  • the included link has a link between node S1 and node S2, node S2, and node S3. It The link between the link, the node S3 and the node S4 and the link between the node S4 and the node S1.
  • the sub-ring contains nodes S3, S5, S6 and S4, and the links included are the link between node S3 and node S5, the link between node S5 and node S6, and the chain between node S6 and node S4. road.
  • a ring protection link and a master node also referred to as a control node
  • a master port and a slave port of the master node wherein the slave port direct link of the master node is a ring protection chain. road.
  • the primary node of the primary ring is S1, corresponding to the primary port 12 and the secondary port 1 1
  • the primary node of the secondary ring is S6, corresponding to the primary port 61 and the secondary port 62; when there are too many ring networks of the ring i or the chain
  • the primary node of the primary ring and the sub-ring block the protection data forwarding function of the slave port
  • the node S1 blocks the protection data forwarding function of the slave port 11
  • the node S6 blocks the protection data forwarding function of the slave port 62
  • the network B The communication path with A is: network B ⁇ -> node S2 ⁇ ->S3 ⁇ ->S5 ⁇ -> network A.
  • node S1 is a master node
  • port 12 of node S 1 is a master port
  • Port 11 is a slave port
  • the link directly connected to port 11 is the ring protection link of the primary ring.
  • the node S6 is the master node
  • the port 61 of the node S6 is the master port
  • the port 62 is the slave port
  • the link directly connected to the port 62 is a ring protection link of the sub-ring.
  • the primary node of the primary ring and the sub-ring block the protection data forwarding function of the secondary port to prevent the protection data from being transmitted on the protection link, preventing the protection data from being repeatedly forwarded and forming a wide storm.
  • the master node turns on the protection data forwarding function of the slave port, and each node also needs to refresh the address forwarding table, and the network Inter-communication is transmitted in accordance with the new path. As shown in FIG.
  • the node S2 blocks the data forwarding function of the port 22, and notifies other nodes that the link has occurred.
  • the node S1 opens the protection data forwarding function of the port 1 after receiving the fault notification.
  • each node in the ring domain needs to refresh the address forwarding table.
  • the new communication paths of the network B and A are: Network B ⁇ -> Node S2 ⁇ -> Node Sl ⁇ -> Node S4 ⁇ ""> Node S3 ⁇ -> Node S5 ⁇ 1> Network.
  • VLAN Virtual Local Area Network
  • the control packet of the primary ring is in the primary control VLAN.
  • Propagation, sub-loop control messages are propagated in the sub-control VLAN.
  • 4 is a schematic diagram of controlling a VLAN with too many ring primary rings and sub-rings according to the related art. As shown in FIG.
  • the primary control VLAN is VLAN 3
  • the child control VLAN is VLAN 4
  • the ring network port of the primary ring belongs to VLAN 3. It also belongs to VLAN 4; the ring network port of the subring belongs to VLAN 4.
  • the control packets of the primary ring can only be forwarded within the primary ring, and the control of the secondary ring can be transparently transmitted through the primary ring.
  • the transmission mode of the primary ring based on the sub-ring control can simplify the operation of the system, but this mechanism has the following two problems. Problem 1: The processing of the protocol packet (ie, control packet) of the sub-ring by the primary ring node requires additional processing time.
  • the primary ring is a loop including Sl, S2 to Sn nodes, the primary node is S1, and its slave port is 12 ports, and the link directly connected to the port is the ring protection of the primary ring. link.
  • the subring is a loop that includes M1, M2, S2, and S3 nodes.
  • the primary node of the subring is M1, and its slave port is port 12 of the M1 node.
  • the link directly connected to the port is the ring protection chain of the subring. road.
  • FIG. 5 is a first schematic diagram of control packet forwarding analysis when a protection switching of a sub-ring link according to the related art occurs.
  • the link between the nodes M2 and S2 fails, the neighboring nodes M2 and S2 detect the fault, and the 21 port of the M2 node and the 23 port of the S2 node are blocked.
  • the data forwarding function of the protected VLAN, the nodes M2 and S2 send the LINK-DOW control message to the master node M1 of the sub-ring.
  • the processing time of the control message LINK-DOW on the primary ring node is 2 ⁇ ( ⁇ is the time at which a single node processes the control message).
  • FIG. 6 is a second schematic diagram of control packet forwarding analysis when a sub-ring link is protected and switched according to the related art.
  • the master node M1 After the master node M1 receives the LINK-DOWN control packet, the master node M1 opens.
  • the protected VLAN data forwarding function of the port sends a FLUSH-DOWN control message to each node to update the MAC address.
  • Each node updates the MAC address, and the failover is completed.
  • the processing time of the sub-ring control message FLUSH-DOWN on the primary ring node is ⁇ (n is the number of nodes on the primary ring, and ⁇ is the time at which a single node processes the control message).
  • FIG. 7 is a first schematic diagram of control packet forwarding analysis when a sub-ring link resumes switching according to the related art. As shown in FIG. 7, when the link is restored, the link failure between nodes S2 and ⁇ 2 disappears.
  • the adjacent nodes S2 and ⁇ 2 detect that the fault disappears, and the HELLO sent by the master node M1 of the sub-ring
  • the control packet passes the fault disappearing link, and the master node M1 detects the HELLO 4 message sent by the slave port at 12, and at this time, the data of the protected VLAN can still pass the M1 master node slave port, and the Ethernet loop protects.
  • the protocol does not switch, and no frame loss occurs.
  • the processing time of the sub-ring control HELLO on the primary ring node is 2 ⁇ ( ⁇ is the time at which a single node processes the control message); when the primary node M1 Start switching after receiving the HELLO message.
  • FIG. 8 is a second schematic diagram of control packet forwarding analysis when a sub-ring link resumes switching according to the related art.
  • the master node M1 blocks the protected VLAN data forwarding function of the slave port, and sends a FLUSH-UP report.
  • the system notifies each node to perform the recovery switchover.
  • the link with the lost link will open the data forwarding function of the protected VLAN corresponding to the port, and each node updates its MAC address to resume the handover.
  • the processing time of the sub-ring control message FLUSH-UP on the primary ring node is ⁇ (n is the number of nodes on the primary ring, and ⁇ is the time at which a single node processes the control message).
  • FIG. 9 is a schematic diagram of a sub-ring control packet forming a loop in the primary ring according to the related art. As shown in Fig.
  • nodes S1, S2, S3, S4, S5, and S6 form a primary ring
  • nodes S2, S3, S7, and S8 form a subring.
  • the primary node S1 on the primary ring has 12 slaves. The port is blocked for the data VLAN (but it is not blocked for the control), preventing the protection data from forming a wide storm; the 72 slave port of the master node S7 on the sub-ring is also blocked for the data VLAN (but for the control 4 ⁇ ) Text is not blocked), to prevent protection data from forming a broad storm
  • the primary node S7 of the subring sends a HELLO message from its 71 primary port to detect whether the loop is recovered.
  • the node S7 can receive the HELLO message on its slave port within the specified time.
  • the loop is restored.
  • the sub-ring HELLO control message is sent from the primary node of the sub-ring, it is transmitted according to the following two paths: Article 1, the primary port of node S7 - node S8 -> node S2 - > Node S3 -> Slave port of node S7; Article 2, main port of node S7 - node S8 -> node S2 -> node S l -> node S6 -> node S5 -> node S4 -> node S3 - >Node S2.
  • the HELLO control message of the sub-ring forms a data loop in the primary ring.
  • the 12 slave port of the master node S1 of the primary ring is only in the normal case, only the datagram.
  • the message is blocked, and the control packet is not blocked.
  • the S1 master node determines whether the HELLO 4 message is the primary ring. If the result of the judgment is no, the packet is forwarded from the primary port. This will cause the HELLO 4 of the sub-ring to be repeatedly forwarded in the primary ring, which wastes the bandwidth of the primary ring. It will cause the sub-ring to control the wide storm on the main ring.
  • the control of the sub-ring by the primary ring node requires additional processing time, and the sub-ring control 4 uploads on the main ring "causes Controlling the loop problem of the message.
  • an effective solution has not been proposed so far for the long processing time of the control message of the primary ring node to the sub-ring and the loop transmission of the control message.
  • the primary ring node needs additional processing time for the control message processing of the sub-ring, and the sub-ring control 4 ⁇ text is uploaded on the main ring.
  • a transmission method based on a control message with too many ring networks is provided.
  • the main ring having multiple primary ring nodes and the sub-rings having multiple sub-ring nodes with too many ring networks, and multiple main links
  • the point includes a primary ring control node, and the plurality of sub-ring nodes include a sub-ring control node.
  • the foregoing method includes: configuring a control virtual local area network of the primary ring and controlling the virtual local area network of the sub-ring, specifically, configuring the control virtual network of the primary ring In the main ring, the sub-ring control virtual local area network is configured in the sub-ring, and/or the virtual channel provided in the main ring between the interconnection points for the sub-ring protocol
  • the Interconnection Node is a common node between the Ethernet rings; the primary ring node receives the sub-ring control message from the sub-ring and is in the other primary ring node in the primary ring
  • the forwarding sub-ring controls the message the data plane is forwarded, and the sub-ring control and the data in the data plane are blocked or released synchronously.
  • the main configuration is configured.
  • the virtual local area network specifically includes: configuring the control ring of the primary ring to include all the ports on the primary ring; configuring all the ports and the primary on the tongue ring of the virtual ring i or the network packet of the sub-ring All the ports on the ring.
  • the foregoing method further includes: determining whether all links of the primary ring are normal.
  • the method further includes: if the primary ring node that receives the sub-ring control message is the primary ring control node, the slave port of the primary ring control node blocks the forwarding of the data packet and the sub-ring Controlling packet forwarding; If the primary ring node that receives the sub-ring control packet is not the primary ring control node, the primary ring node controls the secondary ring through the data plane forwarding sub-ring.
  • the method further includes: if the primary ring node that receives the sub-ring control message is the primary ring control node, the slave port of the primary ring control node opens the forwarding and subring of the data packet.
  • the method further includes: determining whether the sub-ring control message requires control plane processing; and if the determination result is yes, sending the sub-ring control message to the control plane.
  • a transmission apparatus based on a control message with too many ring networks is provided.
  • a transmission apparatus based on a control scheme with too many ring networks a primary ring having a plurality of primary ring nodes and a subring having a plurality of subring nodes, and a plurality of primary ring nodes in a too many ring network packets
  • the device includes a primary ring control node, and the plurality of sub-ring nodes includes a sub-ring control node.
  • the device includes: a configuration module, configured to control a virtual local area network of the control ring of the primary ring and a sub-ring; and a receiving module, configured to receive from the The sub-ring control packet of the sub-ring; the forwarding module is configured to forward the data through the data plane when forwarding the sub-ring control to the other primary ring nodes in the primary ring.
  • the configuration module specifically includes: A configuration submodule, the control virtual local area network for configuring the primary ring includes all the ports on the primary ring, and the second configuration submodule, configured to configure the sub-rings to control all ports on the tongue ring of the virtual local area network packet and the primary ring.
  • the device further includes: a first determining module, configured to determine whether all links of the primary ring are normal; and a blocking module, configured to block Forwarding of the data packet and the forwarding of the sub-ring control packet.
  • the foregoing apparatus further includes: a second determining module, configured to determine whether the sub-ring control packet needs control plane processing; and a sending module, configured to send the sub-ring control report The text is sent to the control plane.
  • the primary ring node forwards the sub-ring control message through the data plane to prevent the control plane from processing the sub-ring control message waiting, and solves the control report of the primary ring node to the sub-ring in the current control message transmission process.
  • FIG. 1 is a schematic diagram of a topology with too many ring networks according to the related art
  • FIG. 2 is a schematic diagram of a communication path topology when links in too many ring networks are intact according to the related art
  • FIG. 3 is based on FIG. 4 is a schematic diagram of controlling a VLAN with too many ring primary rings and sub-rings according to the related art
  • FIG. 5 is a sub-ring chain according to the related art.
  • the first schematic diagram of the control packet forwarding analysis when the protection switchover occurs is a second schematic diagram of the control packet forwarding analysis when the sub-ring link is protected according to the related art
  • FIG. 7 is a sub- The first schematic diagram of the control packet forwarding analysis when the ring link recovers the handover;
  • FIG. 8 is a second schematic diagram of the control packet forwarding analysis when the sub-ring link resumes switching according to the related art
  • FIG. 9 is a related art according to the related art.
  • FIG. 10 is a flowchart of a method for transmitting a control message based on a too many ring networks according to an embodiment of the present invention
  • FIG. 11 is an embodiment of the present invention is based on a control message transmitted to the ring Ethernet method
  • 12 is a first schematic diagram of a topology with too many ring networks according to Embodiment 1 of the present invention
  • FIG. 13 is a second schematic diagram of a topology with too many ring networks according to Embodiment 1 of the present invention
  • Figure 14 is a third schematic diagram of a topology with too many ring networks according to the first embodiment of the present invention
  • Figure 15 is a first schematic diagram of a topology with too many ring networks according to an embodiment of the present invention
  • Figure 16 2 is a second schematic diagram of a topology with too many ring networks according to an embodiment of the present invention
  • FIG. 17 is a third schematic diagram of a topology with too many ring networks according to an embodiment of the present invention
  • FIG. 18 is based on A block diagram of a transmission apparatus based on a control message with too many ring networks according to an embodiment of the present invention
  • FIG. 18 is based on A block diagram of a transmission apparatus based on a control message with too many ring networks according to an embodiment of the present invention
  • the present invention proposes a mechanism for controlling the propagation of packets in a primary ring by using a subring of too many ring networks.
  • a subring control message is propagated in the primary ring, the forwarding of the subring control message is performed by The data plane of the node on the primary ring is responsible, independent of the control plane.
  • the primary ring protection link can block the sub-ring control. That is to say, the sub-control VLAN corresponding to the sub-ring has the characteristics of the data VLAN in the main ring.
  • the method for transmitting the sub-ring control packet in the primary ring of the present invention can reduce the processing time of the control packet by the primary ring node, accelerate the convergence speed of the link switching, and prevent the sub-ring control packet from being in the primary ring. Form a loop.
  • a ring with too many ring networks a primary ring having a plurality of primary ring nodes and a subring having a plurality of subring nodes, and a plurality of primary ring nodes including a primary ring control node (ie, a primary node)
  • the method includes: Step S1002: configuring control of a primary ring to control VL AN and subrings VL AN;
  • the control VLAN of the primary ring is configured to include all ports on the primary ring, and the control VLAN of the configuration sub-ring includes all ports on the sub-ring and all ports on the primary ring;
  • Step S1004 the primary ring node receives the sub-ring The sub-ring controls the message, and when forwarding the sub-ring control to the other primary ring nodes in the primary ring, it forwards through the data plane, and synchronously implements the sub-ring control and the data in the data plane.
  • control packet is sent to the control plane through the data plane, and waits for the control plane to process the sub-ring control packet, and then forwards the sub-ring control packet, where the control virtual office i of the primary ring or the control virtual of the network and sub-ring is configured.
  • the interconnection point is a common node between the Ethernet rings.
  • the primary ring node directly forwards the sub-ring control through the data plane, without waiting for the control plane to process the sub-ring control.
  • FIG. 11 is an ether based based on the first embodiment of the present invention. A detailed flowchart of a method of controlling packet transmission ring network, as shown in FIG.
  • FIG. 12 is a first schematic diagram of a topology with too many ring networks according to the first embodiment of the present invention. As shown in FIG. 12, the primary control VLAN is VLAN 3, the child control VLAN is VLAN 4, and the node included in VLAN 3 has S1.
  • VLAN 4 includes nodes of S1 node, S2 node, S3 node, S4 node, S5 node, S6 node, S7 node, and S8 node;
  • S 1 node The primary node of the primary ring, the link directly connected to the 12-port of the S1 node is the ring protection link of the primary ring; the S7 node is the primary node of the sub-ring, and the link directly connected to the 72-port of the S7 node is the ring of the sub-ring
  • Step S1 104 determining whether the link of the primary ring has failed, and if the determination result is yes, proceed to step S1106, and if the determination result is no, proceed to the step S11 16;
  • Step S1 106 a single point of failure occurs on the link of the primary ring, and each node on the primary ring determines whether the packet is a sub-ring control message through the
  • FIG. 13 is a second schematic diagram of the topology of too many ring networks according to the first embodiment of the present invention. As shown in FIG. 13, the master node S1 on the primary ring opens 12 slave ports.
  • Step S1 110 the node that receives the sub-ring control message on the primary ring is a transit node, and further determines whether the node that receives the sub-ring control message on the primary ring is a transit node adjacent to the fault link, and the judgment result is yes. In this case, proceed to step S1 1 12, and if the determination result is no, proceed to step SI 1 14; step S 1 112, the transit node adjacent to the fault link blocks the protection data VLAN and the sub-ring control
  • Step S1 114 The control protocol packet of the transmission node to the sub-ring that is not connected to the fault on the primary ring is forwarded by the hardware in the data plane; as shown in FIG. 13, the primary ring is not connected to the faulty link.
  • the node has a node S6, a node S2, and a node S3, which transmit the control information on the VLAN 4 in a manner of hardware forwarding in the data plane; in step S1 116, there is no single point of failure on the link of the primary ring, the primary ring
  • Each node on the node determines whether the packet is a control packet of the sub-ring through the corresponding domain sub-segment in the four-header. If it is a control packet of the sub-ring, it is determined whether the node that receives the sub-ring control packet is the main ring.
  • FIG. 14 is a third schematic diagram of a topology of too many ring networks according to the first embodiment of the present invention. As shown in FIG. 14, the slave node of the master node S1 on the master ring blocks the protection data.
  • VLAN and subring control VLAN 4 forwarding The control packet of the sub-ring is not forwarded; in step S1 120, the transmission node on the primary ring controls the sub-ring to forward to the hardware in the data plane; as shown in FIG. 14, nodes S2, S3, and S4, S5 and S6 are the transit nodes on the primary ring. They transmit the control packets on the sub-ring control VLAN 4 in the data plane by means of hardware forwarding. This reduces the processing of the sub-ring control in the primary ring node. Delay.
  • Embodiment 2 The following is a detailed description of a transmission method in which a sub-ring control of the present invention is applied in a primary ring in a protection switching with too many ring network protection protocols.
  • 15 is a first schematic diagram of a topology with too many ring networks according to a second embodiment of the present invention, as shown in FIG.
  • the S1 node is the master node on the primary ring, and the link connected to the port 12 of the S1 node is the ring protection link on the primary ring;
  • the S7 node is the primary node of the sub-ring, and is connected to the port 72 of the S7 node.
  • the link is a ring protection link of the sub-ring;
  • VLAN 4 is a very special control VLAN, VLAN 4 is a sub-ring control VLAN, and sub-ring control packets are transmitted in VLAN 4;
  • the S2 node, the S3 node, the S4 node, the S5 node, and the S6 node transmit the sub-ring control by means of data forwarding.
  • FIG. 16 is a second schematic diagram of a topology with too many ring networks according to Embodiment 2 of the present invention.
  • node S8 and node S2 detect After the link is faulty, the data forwarding function of port 81 and port 23 is blocked, and the LINK-DOWN control packet is sent from port 82 of node S8 and port 22 of node S2 respectively.
  • the primary ring node forwards the control packet from the sub-ring as a data packet, and in the case that the primary ring has no faulty link, the primary node S1 of the primary ring is from the port to the sub-ring.
  • FIG. 17 is a third schematic diagram of a topology with too many ring networks according to Embodiment 2 of the present invention. As shown in FIG.
  • the primary node S7 of the sub-ring After the primary node of the sub-ring receives the LINK-DOWN control message, the primary node S7 of the sub-ring The data forwarding function of the slave port is opened, and the FLUSH-DOWN control packet is sent out to update the Media Access Control (MAC) table of each node.
  • the primary ring node will The FLUSH-DOWN control packet from the sub-ring is treated as data 4; in the case that the primary ring has no faulty link, the primary node S1 of the primary ring S1 receives the FLUSH-DOWN control message from the port to the sub-ring.
  • the blocking is performed to prevent the FLUSH-DOW control packet from the sub-ring from forming a data loop in the primary ring.
  • the FLUSH-DOWN control packet is sent to the sub-ring by the S2 node, the S3 node, the S4 node, the S5 node, and the S6 node.
  • First copy a copy to the control plane of the node, and then perform hardware forwarding on the node's data plane; this mechanism speeds up the forwarding speed of the FLUSH-DOWN sub-ring control message in the primary ring, making the primary ring node more Early updated MAC table.
  • the primary ring node directly forwards the sub-ring control packet through the data plane, and does not have to wait for the control plane to process the sub-ring control packet, which can effectively speed up the processing of the sub-ring control packet by the primary ring node.
  • a transmission apparatus based on a control message with too many ring networks wherein the too many ring networks can be encapsulated: a main ring having a plurality of primary ring nodes and having A subring of a plurality of subring nodes, and a plurality of primary ring nodes include a primary ring control node, and the plurality of subring nodes includes a subring control node.
  • FIG. 18 is a structural block diagram of a transmission apparatus based on a control message with too many ring networks according to an embodiment of the present invention.
  • the apparatus includes a configuration module 1802, a receiving module 1804, and a forwarding module 1806.
  • a configuration module 1802 is configured to configure a control VLAN of a primary ring and a control VLAN of a sub-ring
  • a receiving module 1804 is connected to the configuration module 1802, and configured to receive a sub-ring control message from the sub-ring
  • the forwarding module 1806 is connected to the receiving module 1804, and is configured to forward the data through the data plane when forwarding the sub-ring control packet to other primary ring nodes in the primary ring.
  • FIG. 19 is a block diagram showing a specific structure of a transmission apparatus based on a control message with too many ring networks according to an embodiment of the present invention.
  • the foregoing apparatus has the following structure: a first configuration submodule 1902, a second The configuration sub-module 1904, the first judging module 1906, the blocking module 1908, the second judging module 1910, and the sending module 1912 are described in detail below.
  • the configuration module 1802 specifically includes: a first configuration sub-module 1902, where the control VLAN for configuring the primary ring includes all ports on the primary ring, and the second configuration sub-module 1904 is configured to configure the control VLAN of the sub-ring 4 on the tongue ring All ports and all ports on the primary ring.
  • the first determining module 1906 is connected to the configuration module 1802 and the forwarding module 1806, for determining whether all links of the primary ring are normal.
  • the blocking module 1908 is connected to the first determining module 1906 and the receiving module 1804 for blocking data.
  • the second determining module 1910 is connected to the receiving module 1804, and is configured to determine whether the sub-ring control needs to control the plane processing;
  • the sending module 1912 is connected to the second determining module 1910, It is used to send the sub-ring control to the control plane.
  • the first determining module 1906 determines whether all links of the primary ring are normal, and if the first determining module 1906 determines that the link is normal.
  • the blocking module 1908 blocks the forwarding of the slave port data of the primary ring control node and the forwarding function of the sub-ring control; if the receiver If the primary ring node of the ring control message is not the primary ring control node, the forwarding module 1806 controls the sub-ring control by the data plane; if the first determining module 1906 determines that the link is abnormal, if the sub-ring control report is received The primary ring node of the text is the primary ring control node. Then, the slave port of the primary ring control node opens the forwarding of the data and the forwarding of the sub-ring control.
  • the receiving sub-ring control packet is further determined. Whether the primary ring node is a neighboring node of the faulty link; if the judgment result is yes, the blocking module 1908 forwards the data packet of the port of the adjacent node of the faulty link and the forwarding function of the sub-ring control packet If the result of the determination is no, the forwarding module 1806 forwards the sub-ring through the data plane.
  • the second determining module 1910 determines whether the sub-ring control message needs control plane processing; if the second determining module 1910 determines that the result is yes, the sending module 1912 The sub-ring control packet is sent to the control plane.
  • the various modules or steps of the present invention described above can be implemented by a general-purpose computing device, which can be centralized on a single computing device or distributed across multiple computing devices.
  • they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into respective integrated circuit modules. Or a plurality of modules or steps among them are fabricated as a single integrated circuit module.
  • the present invention is limited to any specific hardware and software combination.
  • the above is only a preferred embodiment of the present invention and is not intended to limit the present invention.
  • the present invention may have various modifications and Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Small-Scale Networks (AREA)

Description

基于以太多环网的控制 ^艮文的传输方法和装置 技术领域 本发明涉及通信领 i或, 具体而言, 涉及一种基于以太多环网的控制 4艮文 的传输方法和装置。 背景技术 在以太网的实际应用中, 广泛采用了各种保护技术, 这些保护技术主要 用于实现主用路径和备用路径之间的冗余备份。 当主用路径和备用路径都完 好时, 阻塞备用路径的保护数据转发功能, 网络之间的保护数据在主用路径 上传输; 当主用路径发生故障时, 会打开备用路径的保护数据转发功能, 网 络之间的保护数据将被切换到备用路径上传输。 上述的保护处理过程在网络 正常状态下能够防止保护数据被重复接收和形成广播风暴, 在网络的主用路 径出现故障时, 启用备用路径传输保护数据, 能够提高以太网的抗故障能力, 并且满足切换时的收敛时间小于 50ms的高实时性要求。 下面将举例说明上述以太网多环保护 4支术的实现过程。图 1是 居相关 4支术的以太多环网的拓朴的示意图, 如图 1所示, 节点 S1至 S6都为以太网 交换机, 节点 S1对应有端口 11和端口 12 , 节点 S2对应有端口 21、 端口 22 和端口 23 , 节点 S3对应有端口 31、 端口 32和端口 33 , 节点 S4对应有端口 41、 端口 42和端口 43 , 节点 S5对应有端口 51、 端口 52和端口 53 , 节点 S6对应有端口 61和端口 62 , 网络 B和节点 S2相连接, 网络 A和节点 S5 相连接。 网络 A和网络 B之间有四条物理路径进行通信, 即, 第一条: 网络 A<—>节点 S5<—>节点 S3<—>节点 S2<—>网络 B , 第二条: 网络 A<—>节 点 S5<"">节点 S3<—>节点 S4<—>节点 S l<—>节点 S2<—>网络 B;第三条: 网络 A<—>节点 S5<—>节点 S6<—>节点 S4<—>节点 S3<—>节点 S2 网络 B , 第四条: 网络 A<—>节点 S5<"~>节点 S6<—>节点 S4<—>节点 S 1 节点 S2 网络 B。 在应用以太网多环保护 4支术的过程中, 需要首先定义环网域的概念, 图 2 是根据相关技术的以太多环网中链路完好时的通信路径拓朴示意图, 如图 2所示, 环网 i或中包含一个主环和一个子环, 主环包含的节点有 Sl、 S2、 S3 和 S4, 包含的链路有节点 S1和节点 S2之间的链路、 节点 S2和节点 S3之 间的链路、节点 S3和节点 S4之间的链路以及节点 S4和节点 S1之间的链路。 子环包含的节点有 S3、 S5、 S6和 S4, 包含的链路有节点 S3和节点 S5之间 的链路、 节点 S5和节点 S6之间的链路以及节点 S6和节点 S4之间的链路。 另外还定义了环保护链路、 环保护链路所属的主节点 (也可称为控制节点;), 主节点的主端口和从端口, 其中主节点的从端口直连链路为环保护链路。 主 环的主节点为 S1 , 对应有主端口 12和从端口 1 1 , 子环的主节点为 S6 , 对应 有主端口 61和从端口 62; 当以太多环网的环网 i或中的链路都为完好时, 主 环和子环的主节点阻塞从端口的保护数据转发功能, 节点 S1 阻塞了从端口 11的保护数据转发功能, 节点 S6阻塞了从端口 62的保护数据转发功能, 网 络 B和 A的通信路径为: 网络 B<—>节点 S2<—>S3<—>S5<—>网络 A。 图 3 是根据相关技术的以太多环网中链路故障时的通信路径拓朴的示 意图, 如图 3所示, 在主环中, 节点 S1 为主节点, 节点 S 1 的端口 12为主 端口, 端口 11为从端口, 与端口 11直连链路为主环的环保护链路。 在子环 中, 节点 S6为主节点, 节点 S6的端口 61为主端口, 端口 62为从端口, 与 端口 62 直连链路为子环的环保护链路。 在正常情况下, 主环和子环的主节 点阻塞它们从端口的保护数据转发功能, 避免保护数据在保护链路上传输, 防止保护数据被重复转发和形成广 风暴。 当以太多环网的环网域中的链路 出现故障时, 如果故障链路不是保护链路, 则主节点打开从端口的保护数据 转发功能, 并且各个节点还要刷新地址转发表, 网络之间通信按照新的路径 传输。如图 3所示,在主环上的节点 S2和 S3之间的链路发生故障的情况下, 节点 S2检测到链路故障后, 阻塞端口 22的数据转发功能, 通知其他节点链 路发生了故障, 节点 S1收到故障通知后,打开端口 1 1的保护数据转发功能, 另外, 环网域内的各个节点还需要刷新地址转发表, 网络 B和 A新的通信路 径为: 网络 B<—>节点 S2<—>节点 Sl<—>节点 S4<"">节点 S3<—>节点 S5〈一〉网络 。 当以太多环网的环网域中的链路恢复时, 需要进行恢复切换, 使网络传 输恢复到正常状态时的传输路径, 由于路径改变, 因此节点也需要进行地址 转发表的刷新。 在以太多环网进行维护和保护切换时, 需要传播大量的控制报文, 这些 控制 4艮文是在环网域中的控制虛拟局域网 (Virtual Local Area Network, 简称 为 VLAN )中传播的。控制 VLAN有两类,一类对应主环,称为主控制 VLAN, 另一类是对应子环, 称为子控制 VLAN。 主环的控制报文在主控制 VLAN中 传播, 子环的控制报文在子控制 VLAN中传播。 图 4是根据相关技术的以太 多环网主环和子环控制 VLAN的示意图,如图 4所示,主控制 VLAN是 VLAN 3 ,子控制 VLAN是 VLAN 4;主环的环网端口既属于 VLAN 3 ,也属于 VLAN 4; 子环的环网端口只属于 VLAN 4。 在这种机制下, 主环的控制报文只能在 主环内部转发, 而子环的控制 4艮文可以通过主环透传。 基于子环控制 4艮文透 传主环的传输方式可以简化系统的操作, 但是这种机制存在以下两个方面的 问题。 问题一: 主环节点对子环的协议报文(即, 控制报文)处理需要额外的 处理时间。 这与以太多环网要求网络切换的收敛时间小于 50ms 的高实时性 要求相矛盾。 下面结合图 5和图 6对问题一进行描述。 在图 5和图 6中, 主 环是一个包括 Sl、 S2至 Sn节点的环路, 主节点是 S1 , 它的从端口是 12端 口, 与该端口直接相连的链路是主环的环保护链路。 子环是一个包括 Ml、 M2、 S2和 S3节点的环路, 子环主节点是 Ml , 它的从端口是 Ml节点的 12 端口, 与该端口直接相连的链路是子环的环保护链路。 图 5 是根据相关技术的子环链路发生保护切换时的控制报文转发分析 的第一示意图。 如图 5所示, 当子环的环路发生故障时, 节点 M2和 S2之间 的链路发生故障, 相邻节点 M2和 S2检测到故障, 阻塞 M2节点的 21端口 和 S2 节点的 23端口的保护 VLAN的数据转发功能, 节点 M2和 S2发送 LINK-DOW 控制报文给子环的主节点 Ml。 在这个阶段中, 控制报文 LINK-DOW 在主环节点上的处理时间是 2δ ( δ是单个节点处理控制报文的 时间)。 图 6 是根据相关技术的子环链路发生保护切换时的控制报文转发分析 的第二示意图, 如图 6所示, 当主节点 Ml收到 LINK-DOWN控制报文后, 主节点 Ml打开从端口的保护 VLAN数据转发功能,发送 FLUSH-DOWN控 制 4艮文通知各个节点更新 MAC地址, 各个节点更新 MAC地址, 故障切换 完成。 在这个阶段中, 子环的控制报文 FLUSH-DOWN在主环节点上的处理 时间是 ηδ ( n是主环上节点的数目, δ是单个节点处理控制报文的时间)。 因 此, 在以太多环网进行保护切换时, 子环的控制报文在主环中被节点处理的 时间是 (η+2)δ。 图 7 是根据相关技术的子环链路发生恢复切换时的控制报文转发分析 的第一示意图, 如图 7所示, 当链路恢复时, 节点 S2和 Μ2之间的链路故障 消失,相邻节点 S2和 Μ2检测到故障消失,子环的主节点 Ml发送的 HELLO 控制报文通过故障消失链路, 主节点 Ml 在 12 从端口检测到自己发送的 HELLO 4艮文, 此时, 保护 VLAN的数据 4艮文仍然可以通过 Ml主节点从端 口, 以太网环路保护协议没有切换, 且不会产生帧丢失, 在这个阶段中, 子 环的控制 4艮文 HELLO在主环节点上的处理时间是 2δ ( δ是单个节点处理控 制报文的时间); 当主节点 Ml收到 HELLO报文后开始切换。 图 8 是根据相关技术的子环链路发生恢复切换时的控制报文转发分析 的第二示意图, 如图 8所示, 主节点 Ml 阻塞从端口的保护 VLAN数据转发 功能, 发送 FLUSH-UP报文通知各个节点进行恢复切换, 故障消失的链路将 对应端口打开保护 VLAN的数据转发功能, 各个节点更新其 MAC地址, 恢 复切换完成。 在这个阶段中, 子环的控制报文 FLUSH-UP在主环节点上的处 理时间是 ηδ ( n是主环上节点的数目, δ是单个节点处理控制报文的时间)。 因此, 可以得出, 在以太多环网进^"恢复切换时, 子环的控制 4艮文在主环中 被节点处理的时间是 (η+2)δ。 从对以上实例的分析可以看出, 主环节点对子环控制 4艮文的处理时间 δ 对以太多环网切换时间的影响是非常大的, 提出主环节点对子环控制报文新 的处理方式对提高以太多环网的性能是非常有意义的。 问题二: 子环控制报文容易在主环上形成数据环路。 图 9是根据相关技 术的子环控制报文在主环中形成环路的示意图, 如图 9所示, 节点 Sl、 S2、 S3、 S4、 S5和 S6组成了主环, 节点 S2、 S3、 S7和 S8组成了子环。 在正常 情况下, 主环上的主节点 S 1的 12从端口对数据 VLAN是阻塞的(但是对控 制 4艮文是不阻塞的), 防止保护数据形成广 风暴; 子环上的主节点 S7的 72 从端口对数据 VLAN也是阻塞的 (但是对控制 4艮文是不阻塞的), 防止保护 数据形成广 风暴。 在子环发生故障之后, 子环的主节点 S7从它的 71主端 口发送 HELLO报文来检测环路是否恢复,如果节点 S7能够在规定的时间内 在它的从端口上接收到 HELLO 4艮文, 就认为环路已经恢复。 子环的 HELLO 控制报文从子环的主节点发送之后, 按照以下两条路径进行传输: 第 1条, 节点 S7的主端口一 >节点 S8—>节点 S2—>节点 S3—>节点 S7的从端口; 第 2条,节点 S7的主端口一 >节点 S8—>节点 S2—>节点 S l—>节点 S6—>节点 S5—>节点 S4—>节点 S3—>节点 S2。 在第 2条路径中, 子环的 HELLO控 制报文在主环中形成了数据环路, 这是因为主环的主节点 S1的 12从端口在 正常情况下, 只对数据报文进行阻塞, 对控制报文不进行阻塞, S1主节点在 12从端口接收到子环的 HELLO 4艮文后, 判断该 HELLO 4艮文是否为主环的 控制报文, 在判断结果为否的情况下, 立刻从主端口转发出去, 这样会导致 子环的 HELLO 4艮文在主环中重复转发, 浪费了主环的带宽, 在情况严重时 甚至还会造成子环控制 4艮文在主环上的广 风暴。 从以上描述可以看出, 在目前的控制报文的传输过程中, 主环节点对子 环的控制 4艮文处理需要额外的处理时间, 并且子环控制 4艮文在主环上传 "会 造成控制报文的环路问题。 然而, 针对这种主环节点对子环的控制报文的处 理时间长、 以及控制报文的出现环路传输的问题, 至今尚未提出有效的解决 方案。 发明内容 针对目前的控制报文的传输过程中,主环节点对子环的控制报文处理需 要额外的处理时间, 并且子环控制 4艮文在主环上传 "会造成控制 4艮文的环路 问题而提出本发明, 为此, 本发明旨在提供一种基于以太多环网的控制 4艮文 的传输方法和装置, 以解决至少上述问题中的至少之一。 根据本发明的一个方面,提供了一种基于以太多环网的控制报文的传输 方法。 才艮据本发明的基于以太多环网的控制 4艮文的传^方法, 以太多环网包 具有多个主环节点的主环和具有多个子环节点的子环, 且多个主环节点 中包括一个主环控制节点, 多个子环节点中包括一个子环控制节点, 上述方 法包括: 配置主环的控制虛拟局域网和子环的控制虛拟局域网, 具体地, 将 主环的控制虛拟局域网配置在主环内, 将子环的控制虛拟局域网配置在子环 内, 和 /或配置在所述主环在互连点之间为子环协议 4艮文提供的虛拟通道
( Virtual Channel ) 内,, 其中, 互连点 ( Interconnection Node ) 是以太环之 间的公共节点; 主环节点接收来自子环的子环控制报文, 并且在向主环中的 其他主环节点转发子环控制 4艮文时, 通过数据平面进^"转发, 并同步实现所 述子环控制 4艮文与所述数据平面中的数据 4艮文的阻塞或放开。 优选地 , 配置主环的控制虛拟局域网和子环的控制虛拟局域网具体包 括: 配置主环的控制虛拟局域网包括主环上的所有端口; 配置子环的控制虛 拟局 i或网包 4舌子环上的所有端口和主环上的所有端口。 优选地, 在配置主环的控制虛拟局域网和子环的控制虛拟局域网之后 , 上述方法进一步包括: 判断主环的所有链路是否正常。 优选地, 在判断链路正常的情况下, 上述方法进一步包括: 如果接收子 环控制报文的主环节点是主环控制节点, 则主环控制节点的从端口阻塞数据 报文的转发和子环控制报文的转发; 如果接收子环控制报文的主环节点不是 主环控制节点, 则主环节点通过数据平面转发子环控制 4艮文。 优选地, 在判断链路异常的情况下, 上述方法进一步包括: 如果接收子 环控制报文的主环节点是主环控制节点, 则主环控制节点的从端口打开数据 报文的转发和子环控制报文的转发; 如果接收子环控制报文的主环节点不是 主环控制节点, 则进一步判断接收子环控制报文的主环节点是否为故障链路 的相邻节点; 在判断结果为是的情况下, 故障链路的相邻节点的端口阻塞数 据报文的转发和子环控制报文的转发; 在判断结果为否的情况下, 主环节点 通过数据平面转发子环控制 4艮文。 优选地, 在转发子环控制报文之前, 上述方法进一步包括: 判断子环控 制报文是否需要控制平面处理; 在判断结果为是的情况下, 将子环控制报文 发送给控制平面。 根据本发明的另一个方面,提供了一种基于以太多环网的控制报文的传 输装置。 才艮据本发明的基于以太多环网的控制 4艮文的传输装置, 以太多环网包 具有多个主环节点的主环和具有多个子环节点的子环, 且多个主环节点 中包括一个主环控制节点, 多个子环节点中包括一个子环控制节点, 上述装 置包括: 配置模块, 用于配置主环的控制虛拟局域网和子环的控制虛拟局域 网; 接收模块, 用于接收来自子环的子环控制报文; 转发模块, 用于在向主 环中的其他主环节点转发子环控制 4艮文时, 通过数据平面进^"转发。 优选地, 配置模块具体包括: 第一配置子模块, 用于配置主环的控制虛 拟局域网包括主环上的所有端口; 第二配置子模块, 用于配置子环的控制虛 拟局域网包 4舌子环上的所有端口和主环上的所有端口。 优选地, 上述装置进一步包括: 第一判断模块, 用于判断主环的所有链 路是否正常; 阻塞模块, 用于阻塞数据报文的转发和子环控制报文的转发。 优选地, 上述装置进一步包括: 第二判断模块, 用于判断子环控制报文 是否需要控制平面处理; 发送模块, 用于将子环控制报文发送给控制平面。 通过本发明,采用主环节点通过数据平面转发子环控制报文来避免控制 平面处理子环控制报文的等待, 解决了目前的控制报文的传输过程中主环节 点对子环的控制报文处理时间长的问题, 避免了子环控制报文在主环上传播 导致的控制报文的环路现象, 提高了网络的性能。 附图说明 此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是根据相关技术的以太多环网的拓朴的示意图; 图 2 是根据相关技术的以太多环网中链路完好时的通信路径拓朴的示 意图; 图 3 是根据相关技术的以太多环网中链路故障时的通信路径拓朴的示 意图; 图 4是根据相关技术的以太多环网主环和子环控制 VLAN的示意图; 图 5 是根据相关技术的子环链路发生保护切换时的控制报文转发分析 的第一示意图; 图 6 是根据相关技术的子环链路发生保护切换时的控制报文转发分析 的第二示意图; 图 7 是根据相关技术的子环链路发生恢复切换时的控制报文转发分析 的第一示意图; 图 8 是根据相关技术的子环链路发生恢复切换时的控制报文转发分析 的第二示意图; 图 9是根据相关技术的子环控制报文在主环中形成环路的示意图; 图 10是根据本发明实施例的基于以太多环网的控制报文的传输方法的 流程图; 图 11是根据本发明实施例一的基于以太多环网的控制报文的传输方法 的详细流程图; 图 12是 ^据本发明实施例一的以太多环网的拓朴的第一示意图; 图 13是 ^据本发明实施例一的以太多环网的拓朴的第二示意图; 图 14是 ^据本发明实施例一的以太多环网的拓朴的第三示意图; 图 15是 ^据本发明实施例.二的以太多环网的拓朴的第一示意图; 图 16是 ^据本发明实施例.二的以太多环网的拓朴的第二示意图; 图 17是 ^据本发明实施例.二的以太多环网的拓朴的第三示意图; 图 18是根据本发明实施例的基于以太多环网的控制报文的传输装置的 结构框图; 图 19是根据本发明实施例的基于以太多环网的控制报文的传输装置的 具体结构框图。 具体实施方式 功能概述 本发明提出了一种以太多环网的子环控制报文在主环中的传播机制, 当 子环控制报文在主环中传播时, 子环控制报文的转发由主环上节点的数据平 面负责, 与控制平面无关。 主环保护链路可以对子环控制 4艮文进 4于阻塞。 也 就是说, 子环对应的子控制 VLAN在主环中的部分具有数据 VLAN的特征, 子控制 VLAN的报文到达主环节点时, 有以下两种处理方式, 即: ( 1 )数据 平面进行转发, 同时拷贝给控制平面进行分析; (2 ) 数据平面进行转发, 不 拷贝给控制平面处理。应用本发明的子环控制报文在主环中进行传输的方法, 可以减少主环节点对控制报文的处理时间, 加速链路切换时的收敛速度 , 避 免子环控制报文在主环中形成环路。 下面将参考附图并结合实施例来详细说明本发明。 方法实施例 根据本发明的实施例,提供了一种基于以太多环网的控制报文的传输方 法, 其中, 以太多环网包 4舌: 具有多个主环节点的主环和具有多个子环节点 的子环, 且多个主环节点中包括一个主环控制节点(即, 主节点), 多个子环 节点中包括一个子环控制节点。 图 10是根据本发明实施例的基于以太多环网的控制报文的传输方法的 流程图, 如图 10所示, 该方法包括: 步骤 S 1002 , 配置主环的控制 VL AN和子环的控制 VL AN; 其中, 配 置主环的控制 VLAN 包括主环上的所有端口, 配置子环的控制 VLAN 包括 子环上的所有端口和主环上的所有端口; 步骤 S1004, 主环节点接收来自子环的子环控制报文, 并且在向主环中 的其他主环节点转发子环控制 4艮文时, 通过数据平面进^"转发, 并同步实现 子环控制 4艮文与数据平面中的数据 4艮文的阻塞或放开; 此时, 主环节点通过 数据平面直接将子环控制 4艮文转发给其它主环节点, 与现有 4支术相比, 主环 节点不需要将子环控制报文通过数据平面发送给控制平面, 并等待控制平面 处理该子环控制报文之后, 再转发该子环控制报文。 其中, 配置主环的控制虛拟局 i或网和子环的控制虛拟局 i或网具体包 4舌: 将主环的控制虛拟局域网配置在主环内; 将子环的控制虛拟局域网配置在子 环内、 和 /或配置在主环在互连点之间为子环协议 4艮文提供的虛拟通道内, 其 中, 互连点是以太环之间的公共节点。 优选地, 在转发子环控制报文之前, 可以判断子环控制报文是否需要控 制平面处理; 在判断结果为是的情况下, 将子环控制报文发送给控制平面。 通过该实施例, 采用主环节点通过数据平面直接转发子环控制 4艮文, 而 不必等待控制平面处理子环控制报文的方法, 解决了目前控制报文的传输过 程中主环节点对子环的控制报文处理占用时间长的问题, 并且可以避免子环 控制报文在主环上传播导致的控制报文的环路现象,从而提高了网络的性能。 下面将结合实例对本发明进 4亍详细描述。 实施例一 图 11是根据本发明实施例一的基于以太多环网的控制报文的传输方法 的详细流程图, 如图 1 1所示, 以太多环网子环控制报文在主环中的处理包括 以下步 步骤 S 1 102 , 在以太多环网中配置主环控制 VL AN和子环控制 VLAN , 保证子环的控制报文透穿主环, 主环的控制报文不能进入子环。 图 12 是根 据本发明实施例一的以太多环网的拓朴的第一示意图, 如图 12 所示, 主控 制 VLAN是 VLAN 3 , 子控制 VLAN是 VLAN 4, VLAN 3包括的节点有 S 1 节点、 S2节点、 S3节点、 S4节点、 S5节点和 S6节点; VLAN 4包括的节 点有 S1 节点、 S2节点、 S3节点、 S4节点、 S5节点、 S6节点、 S7节点和 S8节点; S 1 节点是主环的主节点, 与 S1 节点 12端口直连的链路是主环的 环保护链路; S7节点是子环的主节点, 与 S7节点 72端口直连的链路是子环 的环保护链路; 步骤 S1 104, 判断主环的链路是否发生了故障, 在判断结果为是的情况 下, 进^"至步骤 S 1106 , 在判断结果为否的情况下, 进^"至步骤 S11 16; 步骤 S1 106, 主环的链路上出现单点故障, 主环上的各节点通过 4艮头中 相应的域子段判定该报文是否是子环的控制报文, 如果是子环的控制报文, 判断接收子环控制报文的节点是否为主环的主节点, 在判断结果为是的情况 下, 进^"至步骤 S 1108 , 在判断结果为否的情况下, 进^"至步骤 S11 10; 步骤 S1 108 ,主环上的主节点打开从端口的保护数据 VLAN和子环控制 VLAN 的转发功能; 图 13 是根据本发明实施例一的以太多环网的拓朴的第 二示意图, 如图 13所示, 主环上的主节点 S1打开 12从端口的数据 VLAN 和子环控制 VLAN 4的转发功能; 节点 S1对子环控制 VLAN 4的控制报文 在数据平面进 4于硬件转发, 减少主环节点对子环控制 4艮文的处理时间; 步骤 S1 110, 此时, 主环上接收子环控制报文的节点是传输节点, 进一 步判断主环上接收子环控制报文的节点是否为故障链路相邻的传输节点, 在 判断结果为是的情况下, 进行至步骤 S1 1 12 , 在判断结果为否的情况下, 进 4亍至步 SI 1 14; 步骤 S 1 112 ,故障链路相邻的传输节点阻塞保护数据 VLAN和子环控制
VLAN 的转发功能; 如图 13 所示, 主环上与故障链路相邻的两个端口是传 输节点 S4的 42端口和 S5的 52端口, 42和 52端口阻塞保护数据 VLAN和 子环控制 VLAN 4的转发功能; 步骤 S1 114, 主环上不与故障相连的传输节点对子环的控制协议报文在 数据平面进 4于硬件转发; 如图 13 所示, 主环上不与故障链路相邻的传输节 点有节点 S6、 节点 S2和节点 S3 , 它们对 VLAN 4上的控制 4艮文在数据平面 采用硬件转发的方式进行发送; 步骤 S1 116, 主环的链路上没有出现单点故障, 主环上的各节点通过 4艮 头中相应的域子段判定该报文是否是子环的控制报文, 如果是子环的控制报 文, 判断接收子环控制报文的节点是否为主环的主节点, 在判断结果为是的 情况下, 进^"至步骤 S 1118 , 在判断结果为否的情况下, 进^"至步骤 S1 120; 步骤 S 1 118 , 主环上的链路没有发生故障, 主环上的主节点关闭从端口 的保护数据 VLAN和子环控制 VLAN的转发功能, 即, 主环主节点的从端 口阻塞数据 4艮文的转发和子环控制 4艮文的转发; 防止主环上形成环路; 图 14 是 ^据本发明实施例一的以太多环网的拓朴的第三示意图, 如图 14 所示, 主环上的主节点 S1的 12从端口阻塞了保护数据 VLAN和子环控制 VLAN 4 的转发功能, 对子环的控制报文不进行转发; 步骤 S1 120, 主环上的传输节点对子环控制 4艮文在数据平面进 4于硬件转 发; 如图 14所示, 节点 S2、 S3、 S4、 S5和 S6是主环上的传 节点, 它们 对子环控制 VLAN 4 上的控制报文在数据平面采用硬件转发的方式进行发 送, 减少了子环控制 4艮文在主环节点中的处理时延。 实施例二 下面结合实例对在某以太多环网保护协议的保护切换中,应用本发明的 子环控制 4艮文在主环中的传输方法进 4于详细描述。 图 15是根据本发明实施例二的以太多环网的拓朴的第一示意图, 如图
15所示, S1 节点是主环上的主节点, 与 S 1 节点 12端口相连的链路是主环 上的环保护链路; S7节点是子环的主节点, 与 S7节点 72端口相连的链路是 子环的环保护链路; VLAN 4是一种非常特殊的控制 VLAN, VLAN 4是子 环控制 VLAN, 子环的控制报文在 VLAN 4中传输; 主环上的 S 1节点、 S2 节点、 S3节点、 S4节点、 S5节点和 S6节点对子环控制 4艮文采用数据 4艮文转 发的方式进行发送。 图 16是根据本发明实施例二的以太多环网的拓朴的第二示意图, 如图 16所示, 当节点 S8和节点 S2之间的链路出现故障时, 节点 S8和节点 S2 检测到链路故障后, 分别阻塞 81端口和 23端口的数据转发功能, 并分别从 节点 S8的 82端口和节点 S2的 22端口发送 LINK-DOWN的控制报文;根据 本发明提供的方法, 主环节点将子环来的控制报文当成数据报文来转发, 在 主环没有故障链路的情况下, 主环的主节点 S1 的 12 从端口对子环来的 LINK-DOW 控制 4艮文进 4亍阻塞,子环来的 LINK-DOW 控制 4艮文在主环中 只能沿着 S2节点和 S3节点转发,避免了子环来的 LINK-DOWN控制报文在 主环中形成数据环路; 另外, S2节点和 S3节点对子环的 LINK-DOWN控制 4艮文只在数据平面进 4于硬件转发, 加速了该控制 4艮文在主环中的转发速度, 吏故障更早地通知到子环的主节点 S7。 图 17是根据本发明实施例二的以太多环网的拓朴的第三示意图, 如图 17所示, 当子环的主节点收到 LINK-DOWN控制报文后, 子环的主节点 S7 打开 72从端口的数据转发功能, 同时向外发送 FLUSH-DOWN控制报文, 更新各个节点的媒体接入控制 (Media Access Control, 简称为 MAC )表; 根 据本发明提供的方法, 主环节点将子环来的 FLUSH-DOWN控制报文当成数 据 4艮文来处理; 在主环没有故障链路的情况下, 主环的主节点 S1的 12从端 口对子环来的 FLUSH-DOWN 控制报文进行阻塞, 避免了子环来的 FLUSH-DOW 控制报文在主环中形成数据环路; 另外, S2节点、 S3节点、 S4节点、 S5节点和 S6节点对子环的 FLUSH-DOWN控制报文先复制一份拷 贝递交给节点的控制平面, 然后在节点的数据平面对它进行硬件转发; 这种 机制加速了 FLUSH-DOWN子环控制报文在主环中的转发速度, 使主环节点 更早地更新的 MAC表。 通过该实施例的上述处理,采用主环节点通过数据平面直接转发子环控 制报文, 而不必等待控制平面处理子环控制报文的方法, 能够有效加快主环 节点处理子环控制报文的速度, 防止子环控制报文在主环中形成环路, 进而 提高了整个以太多环网保护的切换质量和速度。 装置实施例 根据本发明的实施例,提供了一种基于以太多环网的控制报文的传输装 置, 其中, 该以太多环网可以包 ^舌: 具有多个主环节点的主环和具有多个子 环节点的子环, 且多个主环节点中包括一个主环控制节点, 多个子环节点中 包括一个子环控制节点。 图 18是根据本发明实施例的基于以太多环网的控制报文的传输装置的 结构框图, 如图 18所示, 该装置包^^ 配置模块 1802、 接收模块 1804、 转 发模块 1806, 下面将对上述结构进 4于详细描述。 在图 18所示的装置中: 配置模块 1802 , 用于配置主环的控制 VLAN和子环的控制 VLAN; 接收模块 1804, 连接至配置模块 1802 , 用于接收来自子环的子环控制 报文; 转发模块 1806, 连接至接收模块 1804, 用于在向主环中的其他主环节 点转发子环控制报文时, 通过数据平面进行转发。 图 19是根据本发明实施例的基于以太多环网的控制报文的传输装置的 具体结构框图, 如图 19 所示, 优选地, 上述装置的结构如下: 第一配置子 模块 1902、 第二配置子模块 1904、 第一判断模块 1906、 阻塞模块 1908、 第 二判断模块 1910、 发送模块 1912 , 下面对上述结构进 4于详细描述。 配置模块 1802具体包括: 第一配置子模块 1902, 用于配置主环的控制 VLAN包括主环上的所有端口; 第二配置子模块 1904, 用于配置子环的控制 VLAN包 4舌子环上的所有端口和主环上的所有端口。 第一判断模块 1906, 连接至配置模块 1802和转发模块 1806, 用于判断 主环的所有链路是否正常; 阻塞模块 1908 , 连接至第一判断模块 1906和接收模块 1804, 用于阻塞 数据 4艮文的转发和子环控制 艮文的转发; 第二判断模块 1910, 连接至接收模块 1804, 用于判断子环控制 4艮文是 否需要控制平面处理; 发送模块 1912, 连接至第二判断模块 1910, 用于将子环控制 4艮文发送 给控制平面。 具体地,在第一配置子模块 1902和第二配置子模块 1904完成配置之后, 第一判断模块 1906判断主环的所有链路是否正常, 在第一判断模块 1906判 断链路为正常的情况下,如果接收子环控制报文的主环节点是主环控制节点, 则阻塞模块 1908 将主环控制节点的从端口数据 4艮文的转发和子环控制 4艮文 的转发功能阻塞; 如果接收子环控制报文的主环节点不是主环控制节点, 则 转发模块 1806通过数据平面转发子环控制 4艮文; 在第一判断模块 1906判断 链路为异常的情况下, 如果接收子环控制报文的主环节点是主环控制节点, 则主环控制节点的从端口打开数据 4艮文的转发和子环控制 4艮文的转发; 如果 接收子环控制报文的主环节点不是主环控制节点, 则进一步判断接收子环控 制报文的主环节点是否为故障链路的相邻节点; 在判断结果为是的情况下, 阻塞模块 1908 将故障链路的相邻节点的端口的数据报文的转发和子环控制 报文的转发功能阻塞; 在判断结果为否的情况下, 转发模块 1806 通过数据 平面转发子环控制 4艮文。 并且, 在转发模块 1806 转发子环控制 4艮文之前, 第二判断模块 1910 判断子环控制报文是否需要控制平面处理; 在第二判断模块 1910 判断结果 为是的情况下, 发送模块 1912将子环控制报文发送给控制平面。 通过本发明的上述实施例,通过采用主环节点通过数据平面转发子环控 制报文, 可以避免等待控制平面处理子环控制报文, 从解决目前多种以太多 环网的保护技术中在控制报文的传输时主环节点对子环的控制报文处理需要 额外的处理时间、 以及子环控制 4艮文在主环上传 "导致控制 4艮文出现环路的 问题, 从而提高了网络的性能。 显然, 本领域的 4支术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 或 者将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制 作成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软 件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领 i或的 4支术人员来说, 本发明可以有各种更改和变化。 凡在本发明的 ^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。

Claims

权 利 要 求 书
1. 一种基于以太多环网的控制报文的传输方法, 其中, 所述以太多环网包 括: 具有多个主环节点的主环和具有多个子环节点的子环, 且所述多个 主环节点中包括一个主环控制节点, 所述多个子环节点中包括一个子环 控制节点, 其特征在于, 所述方法包括:
配置主环的控制虛拟局域网和子环的控制虛拟局域网; 主环节点接收来自子环的子环控制 4艮文,并且在向所述主环中的其 他主环节点转发所述子环控制 4艮文时, 通过数据平面进^"转发, 并同步 实现所述子环控制报文与所述数据平面中的数据报文的阻塞或放开。
2. 根据权利要求 1 所述的方法, 其特征在于, 所述配置主环的控制虛拟局 域网和子环的控制虛拟局域网具体包括:
将所述主环的控制虛拟局 i或网配置在所述主环内;
将所述子环的控制虛拟局 i或网配置在所述子环内、 和 /或配置在所 述主环在互连点之间为子环协议 4艮文提供的虛拟通道内, 其中, 所述互 连点是以太环之间的公共节点。
3 根据权利要求 2所述的方法, 其特征在于, 所述配置主环的控制虛拟局 域网和子环的控制虛拟局域网具体包括:
配置所述主环的控制虛拟局 i或网包 4舌所述主环上的所有端口; 配置所述子环的控制虛拟局 i或网包 4舌所述子环上的所有端口和所 述主环上的所有端口。
4. 根据权利要求 3所述的方法, 其特征在于, 在所述配置主环的控制虛拟 局域网和子环的控制虛拟局域网之后, 所述方法进一步包 4舌:
判断所述主环的所有链路是否正常。
5. 居权利要求 4所述的方法, 其特征在于, 在判断链路正常的情况下, 所述方法进一步包括:
如果接收所述子环控制报文的所述主环节点是所述主环控制节点, 则所述主环控制节点的从端口阻塞数据 4艮文的转发和所述子环控制 4艮文 的转发;
如果接收所述子环控制报文的所述主环节点不是所述主环控制节 点 , 则所述主环节点通过数据平面转发所述子环控制 4艮文。
6. 居权利要求 4所述的方法, 其特征在于, 在判断链路异常的情况下, 所述方法进一步包括:
如果接收所述子环控制报文的所述主环节点是所述主环控制节点, 则所述主环控制节点的从端口打开数据 4艮文的转发和所述子环控制 4艮文 的转发;
如果接收所述子环控制报文的所述主环节点不是所述主环控制节 点, 则进一步判断接收所述子环控制报文的所述主环节点是否为故障链 路的相邻节点;
在判断结果为是的情况下,所述故障链路的相邻节点的端口阻塞数 据报文的转发和所述子环控制报文的转发;
在判断结果为否的情况下,所述主环节点通过数据平面转发所述子 环控制 4艮文。
7. 根据权利要求 5或 6所述的方法, 其特征在于, 在转发所述子环控制报 文之前, 所述方法进一步包 4舌:
判断所述子环控制报文是否需要控制平面处理;
在判断结果为是的情况下, 将所述子环控制报文发送给控制平面。
8. 一种基于以太多环网的控制 4艮文的传输装置, 其中, 所述以太多环网包 括: 具有多个主环节点的主环和具有多个子环节点的子环, 且所述多个 主环节点中包括一个主环控制节点, 所述多个子环节点中包括一个子环 控制节点, 其特征在于, 所述装置包括:
配置模块,用于配置主环的控制虛拟局域网和子环的控制虛拟局域 接收模块, 用于接收来自子环的子环控制报文;
转发模块,用于在向所述主环中的其他主环节点转发所述子环控制 4艮文时, 通过数据平面进^"转发。
9. 根据权利要求 8所述的装置, 其特征在于, 所述配置模块具体包括: 第一配置子模块,用于配置所述主环的控制虛拟局域网包括所述主 环上的所有端口;
第二配置子模块,用于配置所述子环的控制虛拟局域网包括所述子 环上的所有端口和所述主环上的所有端口。
10. 根据权利要求 8或 9所述的装置, 其特征在于, 进一步包括:
第一判断模块, 用于判断所述主环的所有链路是否正常; 阻塞模块, 用于阻塞数据报文的转发和所述子环控制报文的转发。
1 1. 根据权利要求 8或 9所述的装置, 其特征在于, 进一步包括:
第二判断模块, 用于判断所述子环控制报文是否需要控制平面处 理;
发送模块, 用于将所述子环控制报文发送给控制平面。
PCT/CN2008/073830 2008-08-28 2008-12-29 基于以太多环网的控制报文的传输方法和装置 WO2010022576A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/060,678 US8462795B2 (en) 2008-08-28 2008-12-29 Method and device for transmitting control message based on multi-ring ethernet
CA2735276A CA2735276C (en) 2008-08-28 2008-12-29 Method and device for transmitting control message based on multi-ring ethernet
EP20080876819 EP2320610B1 (en) 2008-08-28 2008-12-29 A control packet transmission method and apparatus based on multi-ring ethernet

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810213924A CN101662421B (zh) 2008-08-28 2008-08-28 基于以太多环网的控制报文的传输方法和装置
CN200810213924.4 2008-08-28

Publications (1)

Publication Number Publication Date
WO2010022576A1 true WO2010022576A1 (zh) 2010-03-04

Family

ID=41720791

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/073830 WO2010022576A1 (zh) 2008-08-28 2008-12-29 基于以太多环网的控制报文的传输方法和装置

Country Status (5)

Country Link
US (1) US8462795B2 (zh)
EP (1) EP2320610B1 (zh)
CN (1) CN101662421B (zh)
CA (1) CA2735276C (zh)
WO (1) WO2010022576A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130094510A1 (en) * 2011-06-27 2013-04-18 Huawei Technologies Co., Ltd. Medium access control address protection method and switch

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815107B (zh) * 2010-05-13 2013-10-09 华为技术有限公司 一种以太环网中管理地址的方法、系统以及设备
CN101888323B (zh) * 2010-07-19 2012-04-11 南京邮电大学 一种基于以太环网的pbb-te保护方法
CN102437957B (zh) * 2011-12-16 2015-07-08 华为技术有限公司 一种多协议标签交换的相交环处理方法及装置
US9148346B2 (en) 2012-09-05 2015-09-29 Brocade Communications Systems, Inc. Multiple ring identification and configuration protocol
US9559863B2 (en) * 2012-09-05 2017-01-31 Brocade Communications Systems, Inc. MAC flush optimizations for ethernet rings
US9338060B2 (en) 2012-09-05 2016-05-10 Brocade Communications Systems, Inc. Multiple ring identification and configuration protocol
US9264348B2 (en) * 2012-09-14 2016-02-16 Juniper Networks, Inc. Avoiding data traffic loss in an ethernet ring multihomed, in an active-standby manner, to a virtual private LAN service transport network
WO2014199471A1 (ja) * 2013-06-12 2014-12-18 三菱電機株式会社 通信システム、通信装置およびプロテクション方法
CN104219126B (zh) * 2014-08-04 2018-07-13 新华三技术有限公司 一种有虚拟通道方式下子环协议vlan的自动学习方法和设备
CN104486190B (zh) * 2014-12-23 2020-02-18 上海斐讯数据通信技术有限公司 以太网多网切换的方法
US10523506B2 (en) * 2017-08-02 2019-12-31 Nanning Fugui Precision Industrial Co., Ltd. Network configuration method and network device
CN112087342A (zh) * 2020-09-21 2020-12-15 天津飞旋科技有限公司 多环网双向通信拓扑系统、通信方法及电子设备
CN114245285A (zh) * 2022-01-20 2022-03-25 北京小雅星空科技有限公司 一种故障音箱定位方法及音箱管理系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020167900A1 (en) * 2001-05-14 2002-11-14 Mark Barry Ding Ken Packet network providing fast distribution of node related information and a method therefor
CN1714548A (zh) * 2002-11-20 2005-12-28 4198638加拿大公司 具有多个逻辑子系统功能的转发系统
CN1980145A (zh) * 2005-12-01 2007-06-13 杭州华为三康技术有限公司 以太网环保护系统及方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6963575B1 (en) * 2000-06-07 2005-11-08 Yipes Enterprise Services, Inc. Enhanced data switching/routing for multi-regional IP over fiber network
CN1645834A (zh) * 2005-02-02 2005-07-27 周旭扬 Mac桥接网络环路发现、空间重用和保护倒换的方法和装置
US7898942B2 (en) * 2005-03-31 2011-03-01 Nec Corporation Ring network system, failure recovery method, failure detection method, node and program for node
US8179872B2 (en) * 2007-05-09 2012-05-15 Research In Motion Limited Wireless router system and method
CN101094190B (zh) * 2007-08-20 2010-12-08 中兴通讯股份有限公司 以太环网保护控制报文的传输方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020167900A1 (en) * 2001-05-14 2002-11-14 Mark Barry Ding Ken Packet network providing fast distribution of node related information and a method therefor
CN1714548A (zh) * 2002-11-20 2005-12-28 4198638加拿大公司 具有多个逻辑子系统功能的转发系统
CN1980145A (zh) * 2005-12-01 2007-06-13 杭州华为三康技术有限公司 以太网环保护系统及方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130094510A1 (en) * 2011-06-27 2013-04-18 Huawei Technologies Co., Ltd. Medium access control address protection method and switch
US9282025B2 (en) * 2011-06-27 2016-03-08 Huawei Technologies Co., Ltd. Medium access control address protection method and switch

Also Published As

Publication number Publication date
US8462795B2 (en) 2013-06-11
EP2320610A1 (en) 2011-05-11
CA2735276C (en) 2015-03-24
EP2320610B1 (en) 2015-05-20
EP2320610A4 (en) 2014-02-19
CN101662421A (zh) 2010-03-03
CA2735276A1 (en) 2010-03-04
US20110158241A1 (en) 2011-06-30
CN101662421B (zh) 2012-09-05

Similar Documents

Publication Publication Date Title
WO2010022576A1 (zh) 基于以太多环网的控制报文的传输方法和装置
US7355965B2 (en) Apparatus and method for rapid detection of unidirectional breaks in a network ring
JP4899959B2 (ja) Vpn装置
US7339887B2 (en) Multipoint protected switching ring
CN101999224B (zh) 对虚拟专用lan业务的冗余的以太网自动保护切换接入
EP2339791B1 (en) Method for forwarding protocol frames in spanning rings and a shared node of multi-rings in the ethernet
US20120075988A1 (en) Fast flooding based fast convergence to recover from network failures
WO2014026512A1 (zh) 一种快速生成树协议应用于单环网拓扑的处理方法
AU2009295116B2 (en) Control method for protecting failure recovery of Ethernet ring and Ethernet ring nodes
EP1625705A2 (en) Protected switching ring
JP2009189070A (ja) 転送装置
WO2006077001A1 (en) A method of operating a node in a communications network
JP2013519268A (ja) データ転送方法、データ転送装置及びデータ転送システム
WO2016116050A1 (zh) 环保护链路故障保护方法、设备及系统
WO2012162946A1 (zh) 一种报文处理方法及系统
CN113395261B (zh) 一种mlag环境下的生成树协议快速收敛的方法、设备及介质
JP2003258822A (ja) パケットリングネットワーク及びそれに用いるパケットリングネットワーク間の接続方法
WO2009111955A1 (zh) 以太环网节点地址表更新方法
WO2012146097A1 (zh) Vpls网络和以太环网的倒换方法及装置
WO2010099685A1 (zh) 控制以太网地址表刷新次数的方法
WO2013004124A1 (zh) 一种分布式链路聚合系统中业务流转发方法及节点
WO2010094193A1 (zh) 一种以太网保护中协议通道的实现方法
WO2009146580A1 (zh) 一种地址转发表更新方法
WO2011000184A1 (zh) 一种以太环网的单环地址刷新方法及系统
WO2008064585A1 (fr) Procédé, système et périphérique d&#39;anneau de paquets résilients qui permettent d&#39;éviter l&#39;apparence d&#39;une boucle après reprise après défaillance

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08876819

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 13060678

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2735276

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2008876819

Country of ref document: EP