WO2012167474A1 - Procédé, dispositif et système pour détecter une boucle de réseau - Google Patents
Procédé, dispositif et système pour détecter une boucle de réseau Download PDFInfo
- Publication number
- WO2012167474A1 WO2012167474A1 PCT/CN2011/077078 CN2011077078W WO2012167474A1 WO 2012167474 A1 WO2012167474 A1 WO 2012167474A1 CN 2011077078 W CN2011077078 W CN 2011077078W WO 2012167474 A1 WO2012167474 A1 WO 2012167474A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- information
- network
- packet
- detection
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/18—Loop-free operations
Definitions
- the present invention relates to network communication technologies, and in particular, to a network loop detection method, device, and system. Background technique
- the (Media Access Control, MAC) address identifies that the Ethernet switch learns to record the correspondence between the MAC address and the port to ensure that the unicast can be correctly forwarded to the corresponding port.
- the switch can be cascaded, treed, star-shaped or hybrid. In these networking modes, if packet forwarding occurs, packets forwarded by one switch are forwarded to other switches or themselves, which affects forwarding efficiency. For broadcast packets, the switch forwards all the ports to ensure that all connected hosts receive the packets. Therefore, loop forwarding of broadcast packets will cause network broadcast storms, resulting in network unavailability.
- a spanning tree protocol or a fast spanning tree protocol can be used to avoid an Ethernet loop.
- the switch in the LAN After the switch in the LAN performs the spanning tree algorithm, it will form a spanning tree dynamic topology structure, so that there is no loop between any two switches in the LAN.
- the switch maintains and updates the MAC forwarding table based on the state information of the spanning tree dynamic topology.
- this method is to avoid loops, the occurrence of loops is currently not completely avoided.
- this method cannot be processed. Summary of the invention
- Embodiments of the present invention provide a network loop detection method, device, and system, which are used to determine the occurrence of a network loop and determine a loop position.
- the embodiment of the invention provides a network loop detection method, including:
- the detecting device receives the detecting message, and the detecting message includes a sending and receiving record table, and the detecting message is used by the node for recording information to identify the node itself for recording information when the node for recording information passes.
- the information of the ingress port and the information of the egress port are recorded in the transceiving record table; if the detecting device is a node for determining the location of the network loop, the detecting device acquires the Transmitting and receiving a record table, and determining a network loop position according to the send and receive record table.
- the embodiment of the invention further provides a network loop detection method, including:
- the initiating device determines whether a network broadcast storm occurs
- the initiating device sends a detection packet for detecting the network loop, where the detection packet includes a transceiver record table, and the detection packet is used when the node for recording information is used.
- the node that records the information records the identity of the node for recording the information, the information of the ingress port, and the information of the egress port in the transceiving record table.
- the embodiment of the invention further provides a detecting device, comprising:
- a receiving unit configured to receive a detection packet, where the detection message includes a transceiver record table, where the detection message is used by the node for recording information to record information when passing through a node for recording information
- the self identification, the information of the ingress port, and the information of the egress port are recorded in the transceiving record table;
- a processing unit configured to: when the network loop position needs to be determined, obtain the sending and receiving record table by parsing the detection message received by the receiving unit, and determine a network ring position according to the sending and receiving record table.
- the embodiment of the invention further provides an initiating device, including:
- a determining unit configured to determine whether a network broadcast storm occurs
- a sending unit configured to send a detection packet for detecting a network loop when a network broadcast storm occurs, where the detection message includes a sending and receiving record table, where the detecting message is passed by a node for recording information
- the node used to record information will be used to record the information of the node's own identity, the input end
- the information of the port and the information of the outgoing port are recorded in the transmission and reception record table.
- the embodiment of the invention further provides a network loop detection system, comprising: the above two devices.
- the technical solution provided by the embodiment of the present invention may determine whether a network broadcast storm occurs, and when a network broadcast storm occurs, the corresponding information is recorded in the detection packet by the node, and may be recorded according to the detection message. Information locates the network loop location to achieve network loop location.
- FIG. 1 is a schematic diagram of a scenario 1 for generating a network broadcast storm according to an embodiment of the present invention
- FIG. 2 is a schematic diagram of a scenario 2 of generating a network broadcast storm according to an embodiment of the present invention
- FIG. 3 is a schematic flow chart of a method according to a first embodiment of the present invention.
- FIG. 4 is a schematic flow chart of a method according to a second embodiment of the present invention.
- FIG. 5 is a schematic flowchart of a method according to a third embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of a network loop according to an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of another network loop according to an embodiment of the present invention.
- FIG. 8 is a schematic flow chart of a method according to a fourth embodiment of the present invention.
- FIG. 9 is a schematic structural diagram of a device according to a fifth embodiment of the present invention.
- FIG. 10 is a schematic structural diagram of a device according to a sixth embodiment of the present invention. detailed description
- FIG. 1 is a schematic diagram of a scenario 1 of generating a network broadcast storm according to an embodiment of the present invention.
- a network broadcast storm caused by a loop between ports of a single switch SWITCH, SW
- SW single switch
- the port SW1-2 and port SW1-3 of a switch in the Ethernet are directly connected to each other to form a network loop.
- a broadcast message enters from SW1-1, and copies multiple copies and distributes them to all other ports, including port SW1-2, port SW1-3, and port SWl-4.
- This forwarding path is indicated by a solid line in FIG.
- the broadcast packet sent by the port SW1-2 enters the port SW1-3 again.
- the port SW1-3 sends the broadcast packet to all other ports, causing another broadcast. Forwarding, this process is indicated by a dashed line in Figure 1.
- port SW1-2 forwards the broadcast message to port SW1-3
- port SW1-3 copies the broadcast message to all other ports.
- a broadcast message will form an infinite number of copies and be continuously forwarded from the various ports of the switch.
- the switch continuously forwards broadcast packets to generate broadcast storms. As long as the loop is not disconnected, the broadcast storm will continue and will not terminate. Therefore, the network is occupied by the duplicate version of the broadcast message until the network is full of broadcast packets, and all switches are not capable of buffer forwarding.
- FIG. 2 is a schematic diagram of scenario 2 of generating a network broadcast storm in the embodiment of the present invention.
- This embodiment takes a network broadcast storm caused by a loop between two switch ports as an example.
- the Ethernet includes a first SW (SW1 in the figure) and a second SW (SW2 in the figure), a port SW1-2 of the first SW, a port SW1-3, and a port SW2-1 of the second SW. Connect to SW2-4 to form a loop.
- the solid line indicates the first round of forwarding and the dashed line indicates the second round of forwarding.
- the broadcast packet will continuously generate new broadcast packets in the following loops, eventually forming a network broadcast storm: SWl-2 ⁇ SW2- 1 ⁇ SW2-4 ⁇ SWl-3 ⁇ SWl-2
- the technical solution of the embodiment of the present invention may include the following processes: 1) Pre-configured
- a quality control center can be configured.
- the switches and terminal nodes (or terminals, for short) in the system can pre-configure the MAC address of the maintenance control center.
- a multicast MAC address can be defined, and the multicast MAC address is used for detecting the packet, so that the switch or the terminal node determines whether the received packet is a detection packet.
- This process is a process of determining the location of the network loop, and the process may further include:
- the initiating device sends a detection packet
- a node for determining a location of the network loop determines a network loop location
- the TTL increment can also reduce the network burden caused by excessive broadcast traffic.
- FIG. 3 is a schematic flowchart of a method according to a first embodiment of the present invention, including:
- Step 31 The initiating device determines whether a network storm occurs. If yes, go to step 32. Otherwise, repeat step 31 and subsequent steps.
- the initiating device may be a node that knows the network storm or a node that knows the network storm. For a node that knows the network storm, it can be a pre-configured terminal node or switch. Or, for a node that is not aware of the network storm, the node that initiates the detection packet may be a quality control center or a pre-configured terminal node or a switch, and the node that knows the network storm detects the network storm when it detects the occurrence of the network storm. Node of the text (such as the quality control center or pre-configured The terminal node or the switch sends a fault packet, and the fault packet carries information indicating that a network broadcast storm occurs.
- the node that knows the network storm needs to be configured with the information of the node that initiates the detection of the packet, so that the faulty packet can be sent to the node that initiates the detection packet.
- the node that knows the network storm can be configured with the address of the dimension measurement control center and send the fault packet to the measurement and control center in unicast mode.
- the node that initiates the detection packet is a pre-configured terminal node or switch
- the node that knows the network storm can be sent to the pre-configured terminal node or switch in multicast mode.
- the address of the pre-configured terminal node or switch It is a multicast address
- the multicast address is the same as the destination address of the faulty packet.
- the above-mentioned terminal node may be a host in a high speed Ethernet system, for example, a base station, a base station controller, or the like.
- the above-mentioned node that knows the network storm can determine that a network storm occurs when at least one of the following occurs:
- the received broadcast packet frequency exceeds the threshold
- the source address of the received broadcast packet is its own address.
- Step 32 The initiating device sends a detection packet for detecting a network loop, where the detection packet includes a transceiver record table, and the detection packet is used by the node for recording information when passing through a node for recording information.
- the self identification of the node for recording information, the information of the ingress port, and the information of the egress port are recorded in the transceiving record table.
- the timer can be pre-configured. After the network storm is detected and the timer expires, the detection packet is sent. For example, set the timer time to T1, after determining that a network storm has occurred.
- the detection packet is sent after the T1 time.
- the detection packet is a multicast packet
- the destination address of the multicast packet is a preset address.
- the preset address is a MAC address
- the MAC address is: HEX 01 : xx: xx: xx: xx: Xx.
- the detection packet may include the domain shown in Table 1:
- Source ID 8B Name field which identifies who initiated this message, or can choose to maintain
- Time to live (the count field of the Time IB hop count, padding the configurable initial value, such as 10 To Live, TTL)
- the initial value is 0, that is, the first receiving node starts to fill in the sending and receiving records at the first byte in the back of the message header; after filling, the pointer is moved back to the next position that can be filled; the next node fills in the sending and receiving records.
- the location of the pointer is marked, the variable length and space list of the transmission and reception record table is filled, and the length exceeds the hop count.
- the value of the TTL field of the transmission and reception record can be determined to determine the location of the endpoint of the detection packet. .
- any broadcast packet becomes a part of the storm. That is, the detection packet in the embodiment of the present invention also becomes a part of the network storm.
- the value of the TTL is large, the larger the number of copies of the detected message is, the greater the burden on the system is again. However, when the value of TTL is small, it is likely that the detection message will be terminated without covering the loop position.
- a scheme of gradually increasing the TTL value may be adopted, that is, it may further include:
- the initiating device When the initiating device cannot know the network loop position according to the current value of the TTL domain, the initiating device adds the value of the TTL field and resends the detection packet until the network loop location is determined.
- the initial value of TTL can be selected as 1.
- the initiating device when the initiating device is a node for determining a network loop location, the initiating device may According to the result of the determination, it is known whether the network loop position can be determined. When the initiating device is not a node for determining a network loop location, the node for determining the network loop location may notify the initiating device of the determination result, so that the initiating device knows whether the network loop location can be determined.
- the initiating device may record its own identifier and the egress port information in the transceiving record table. For example, if SW1 sends a detection packet from port SW1-2, the first item of the transceiving record table is SW1-2 (out).
- the detection packet is sent by the subsequently received node for recording information, and then the information may be passed.
- the padded information determines the network loop location.
- different ways can be used to determine whether a network broadcast storm occurs. Further, by gradually increasing the value of the TTL field, the network loop position can be determined while minimizing the network load.
- FIG. 4 is a schematic flow chart of a method according to a second embodiment of the present invention, including:
- Step 41 The detecting device receives the detecting message, where the detecting message includes a sending and receiving record table, and the detecting message is used by the node for recording information to record information when passing through the node for recording information.
- the self identification, the information of the ingress port, and the information of the egress port are recorded in the transceiving record table.
- the node can determine whether the received packet is received according to whether the destination address of the received packet is a preset multicast address. To detect the message.
- Step 42 If the detecting device is a node for determining a network loop position, the detecting device acquires the sending and receiving record table by parsing the detecting message, and determining a network loop position according to the sending and receiving record table. . And the detecting device forwards the detection packet to the source node, where the source node is configured to determine a network loop location according to the transceiver record table.
- the detecting device If the detecting device is a node for recording information, the detecting device records the self identification, the information of the ingress port, and the information of the egress port in the transceiving record table. Optionally, the detecting device determines whether the source address of the detection packet is a self address, and if yes, determines that the node is a node for determining a network loop position; or
- the detecting device determines whether it is an endpoint and whether it is pre-configured to have a reporting function. If it is an endpoint and pre-configured with a reporting function, it determines that it is a node for determining a network loop position; or, if the detecting device is a terminal node, determining whether it is pre-configured to have a reporting function, and if it is pre-configured to have a reporting function, determining that it is used to determine a network loop position Node.
- the detecting device determines whether it is an endpoint and whether it is pre-configured to have a reporting function when the source address of the detection packet is not its own address. If it is an endpoint, it is not pre-configured by itself.
- the reporting function determines that it is a node for forwarding the detection message to the source node; or
- the detecting device is a terminal node, it is determined whether it is pre-configured to have a reporting function. If it does not have a pre-configured reporting function, it determines that it is a node for forwarding the detection packet to the source node.
- the detecting device determines whether it is an endpoint when the source address of the detection packet is not its own address, and if the detecting device is not an endpoint and is not a terminal node, determining that it is used for The node that recorded the information.
- the source address of the detection packet is the address of the node that sends the detection packet (that is, the above-mentioned initiator device). Addresses can be configured for each switch and endpoint in advance.
- the TTL value can be used to determine whether it is an endpoint.
- the endpoint is the node that terminates the detection packet. After the detection packet arrives at the endpoint, the endpoint does not send the detection packet. For example, after receiving the detection packet, the detecting device reduces the value in the TTL field by one, and determines whether the value of the reduced TTL field is 0. If not, it determines that it is not an endpoint.
- the above self-identification may be a pre-configured character or a number, or may be a MAC address or the like.
- each switch can be assigned a dimension priority, for example, integers 0 to 7, with level 0 being the highest and level 7 being the lowest.
- the higher the priority the greater the authority, for example, the more control the ability of other switches, or the more likely it is to connect to the measurement center.
- the detection packet includes a filling start point pointer.
- the information of the ingress port and the ingress port of the detection packet are outputted according to the current value of the filling start point pointer.
- the value of the filling start point pointer is updated to the next filling position.
- the current value of the start point pointer is 0, the first byte after the message header begins to be filled. If the padding content occupies 5 bytes, the updated pointer value is 5, that is, the 6th byte of the next node header begins to be filled.
- the minimum loop formed by the path including the same node in the transceiver record table may be determined as the network loop location
- the network loop location can be reported to the measurement control center.
- the transceiving record table in this embodiment includes the information of the ingress port of the node for recording information and the detection packet, and the information of the egress port, and the network loop position is determined according to the transceiving record table.
- the network loop position can be located under the premise of reducing the network load. Further, the accurate positioning of the network loop can be ensured by positioning the minimum loop as the network loop position and updating the starting point pointer.
- FIG. 5 is a schematic flowchart of a method according to a third embodiment of the present invention.
- a detection report is received.
- the node of the text includes:
- Step 501 The node receives the detection packet.
- the node that receives the detection packet may be a terminal node or a switch.
- the terminal node may be a host in the Ethernet, and may be a base station, a base station controller, or the like.
- Step 502 The node that receives the detection packet determines whether the source address of the detection packet is its own address. If yes, go to step 508; otherwise, go to step 503.
- the MAC address is filled in with the source ID
- Step 503 The node that receives the detection packet fills the detection packet with its own tag and the port information.
- the message enters from port SW1-1, and SW1 fills in the information characterizing SW1-1 (in).
- Step 504 The node that receives the detection packet reduces the TTL by 1 and determines whether the reduced TTL is equal to 0. If yes, go to step 506; otherwise, go to step 505.
- Step 505 If the node that receives the detection packet is not the terminal node, the detection packet is filled with the self-marking and the outgoing port information, and the pointer is changed and then forwarded.
- the nodes in the system may include a terminal node and a switch, and the terminal node no longer forwards the packet.
- fill in the information that characterizes SW1-2 (out).
- location of the fill pointer indicates the location of the next node fill information.
- Step 506 If the node that receives the detection message is a terminal node or an endpoint, determine whether it has a function of pre-configuring the location of the loopback of the network. If yes, go to step 508, otherwise go to step 507.
- the function of reporting can refer to the function of reporting the location of the network loop to the measurement and control center, which can be pre-configured.
- Step 507 Forward the detection packet to the node corresponding to the source address of the detection packet.
- the node corresponding to the source address may obtain a transceiver record table from the detection packet, determine a minimum loop composed of paths including the same node in the transceiver record table, and determine the network loop position; and set the network loop position Report to the measurement control center.
- Step 508 Parse the detection message.
- Step 509 Determine whether the network loop position can be determined. If yes, go to step 510, otherwise go to step 511.
- the transceiver record table in the detection packet is obtained, and according to the transceiver record table, it is determined whether the network loop position can be determined. Determining the network loop position based on the transceiving record table can participate in the following embodiments.
- Step 510 Report the network loop location to the measurement control center.
- the network ring is carried in the fault message and sent to the test control center.
- Step 511 Discard the detection packet.
- the network ring can be determined according to the transceiving record table for subsequent maintenance.
- the location of the network loop can be located under the premise of reducing the network load. Further, the accurate positioning of the network loop can be ensured by updating the starting point pointer.
- the following is an example of determining the location of the network loop based on the transmission and reception record table of the detection packet.
- the source node can also refer to the execution.
- the terminal node may also refer to execution when it has the function of reporting the location of the network loop.
- the endpoint can determine whether there is a loop by sending and receiving the record table.
- the path recorded in the transmission and reception record table is constructed as a forwarding line. If there is a loopback, one node appears twice in the forwarding line, that is, the formation
- the forwarding ring because there may be multiple ring nesting, takes the smallest ring and determines the root cause of the loop, which is determined as the network loop position.
- FIG. 6 is a schematic structural diagram of a network loop according to an embodiment of the present invention, including a terminal, a SW-B, and
- SW-C-P4 (out) - SW-D-P1 (in) - SW-D-P2 (out) - SW-D-P3 (in) ⁇ SW-D-P1 (out) - SW-C- P4 (in) - SW-C-P3 (out) - SW-B-P2 (in).
- SW-B received this packet twice, and its forwarding ring is: SW-B-P2 (out) - SW-C-P3 (in) - SW-C-P4 (out) —SW-D-P1 (in) ⁇ SW-D-P2 (out) ⁇ SW-D-P3 (in) ⁇ SW-D-P1 (out) ⁇ SW-C-P4 (in) ⁇ SW-C- P3 (out) ⁇ SW-B-P2 (in).
- forwarding ring also includes two smaller rings:
- SW-C-P4 (out) - SW-D-P1 (in) - SW-D-P2 (out) ⁇ SW-D-P3 (in) ⁇ SW-D-P1 (out) ⁇ SW-C-P4 (in)
- the last forwarding ring is the smallest ring, then it can be determined that there is a connection between P2-P3 of SW-D. Therefore, it can be determined that the network loop position is between P2-P3 of S W-D.
- FIG. 7 is a schematic structural diagram of another network loop according to an embodiment of the present invention, including a terminal eight, 8 ⁇ -:6,
- SW-B-P2 (out) - SW-C-P3 (in) - SW-C-P4 (out) - SW-D-P1 (in) ⁇ SW-D-P3 (out) ⁇ SW-B-P3 (in)
- the network loop is: B-C-D is a loop.
- the network loop location can be located through the above-mentioned process termination point, and then maintenance can be performed according to the network loop location, such as tearing down the loop.
- the TTL is used to determine the termination point.
- the smaller the TTL the faster the detection packet is terminated.
- the pressure on the network is smaller.
- the detection message may be terminated without covering the loop. In order to be able to cover the loop position and minimize the stress on the network, the following embodiments can be employed.
- FIG. 8 is a schematic flowchart of a method according to a fourth embodiment of the present invention, including:
- Step 82 Initiating the device to initiate the network wind
- Step 83 The initiating device determines whether the network loop can be determined. If yes, go to step 86. Otherwise, go to step 84.
- the initiating device may itself determine whether a network loop can be determined; if the initiating device is not a node for determining a network loop location, it is used to determine a network loop location.
- the node may notify the originating device of the result of determining the location of the network loop.
- Step 85 The initiating device determines whether the value of the added TTL is greater than M. If yes, go to step 86. Otherwise, go to step 82 and subsequent steps.
- Step 86 The initiating device stops detecting.
- the network load can be minimized when determining the location of the network loop.
- the device is a detecting device, and the detecting device includes a receiving unit 91 and a processing unit 92.
- the receiving unit 91 is configured to receive a detecting packet, where the detecting packet includes a sending and receiving record table, where When the detection message passes through the node for recording information, the node for recording the information records the self identification of the node for recording the information, the information of the ingress port, and the information of the egress port in the transceiving record table;
- the 92 is configured to obtain the transceiver record table by parsing the detection packet received by the receiving unit when determining a network loop location, and determine a network loop location according to the transceiver record table.
- the processing unit 92 is further configured to: when the detection packet needs to be forwarded to the source node, forward the detection packet to the source node, where the source node is configured to determine a network loop location according to the transceiver record table. .
- the processing unit 92 is further configured to: record, when the information needs to be recorded, the identity of the detecting device, the information of the ingress port, and the information of the egress port in the transceiving record table.
- the above self-identification may be a pre-configured character or a number, or may be a MAC address or the like.
- the device further includes: a first determining unit, configured to determine whether a source address of the detection packet is a self address of the detection device, and if yes, determine that a network loop location needs to be determined.
- the device further includes: a second determining unit, configured to determine, when the first determining unit determines that the source address of the detecting packet is not the address of the detecting device, determining whether the detecting device is an endpoint; a third determining unit, configured to: when the second determining unit determines that the detecting device is an endpoint, or the detecting device is a terminal node, determining whether the detecting device is pre-configured to have a reporting function, if the detecting device is pre-configured The reporting function determines that the network loop location needs to be determined.
- the third determining unit is further configured to: have the reporting function not configured in the detecting device When it is possible, it is determined that the detection packet needs to be forwarded to the source node.
- the second determining unit is further configured to: when the detecting device is not an endpoint, if the detecting device is not a terminal node, determine that information needs to be recorded.
- the detection packet includes a time-to-live TTL field
- the second determining unit is specifically configured to: reduce the value in the TTL field by 1, and determine whether the value of the reduced TTL field is 0, If not, it is determined that the detecting device is not an end point.
- the processing unit 92 is specifically configured to: when the location of the network loop needs to be determined, obtain the sending and receiving record table by parsing the detection packet received by the receiving unit, and form a path including the same node in the sending and receiving record table.
- the minimum loop is determined as the network loop location.
- processing unit 92 is further configured to report the network loop location to the metrology control center after determining the location of the network loop.
- the detecting message further includes a filling start point pointer
- the processing unit 92 is specifically configured to: when the information needs to be recorded, according to the current value of the filling start point pointer, the detecting device's own identifier and the detecting
- the information of the ingress port of the packet and the information of the egress port are filled in the transceiving record table, and after filling in the identity of the detecting device, the information of the ingress port, and the information of the egress port, the value of the filling start point pointer is updated.
- Next fill in the location For example, filling in the starting point pointer current value is 0, then the first byte after the message header begins to fill. If the padding content occupies 5 bytes, the updated pointer value is 5, that is, the next node is filled from the 6th byte of the >3 ⁇ 4 header.
- the receiving unit 91 is specifically configured to: when the destination address of the received packet is a preset multicast address, determine that the received packet is a detection packet, and the preset multicast address indicates the corresponding packet.
- the text is for detecting messages.
- the transceiving record table in this embodiment includes the information of the ingress port and the ingress port of the node for recording and detecting the information, and the network loop position is determined according to the transceiving record table.
- the detecting device performs different operations when different functions are performed to ensure that the detection message is correctly processed to correctly determine the network loop position.
- the device is an initiating device, and the initiating device includes a determining unit 101 and a sending unit 102.
- the determining unit 101 is configured to determine whether a network broadcast storm occurs.
- the sending unit 102 is configured to When a network broadcast storm occurs, a detection packet for detecting a network loop is sent, and the detection packet includes a transmission and reception record table, and the detection message is used by the node for recording information when passing through the node for recording information.
- the self identification of the node that records the information, the information of the ingress port, and the information of the egress port are recorded in the transceiving record table.
- the determining unit 101 is specifically configured to perform at least one of the following items: determining whether the frequency of the received broadcast message exceeds a threshold, and if yes, generating a network broadcast storm; determining the received broadcast message Whether the source address is the own address, if yes, the network broadcast storm occurs. It is determined whether the received broadcast message with the same source address originates from a different port. If yes, a network broadcast storm occurs.
- the detection packet includes a time-to-live TTL field
- the sending unit 102 is further configured to: when it is determined that the network loop position cannot be determined according to the current value of the TTL domain, increase the value of the TTL domain and resend the detection. The message until the location of the network loop is determined.
- the device can be specifically an initiating device.
- the initiating device may be a node that knows the network storm or a node that knows the network storm. For a node that knows the network storm, it can be a pre-configured terminal node or switch. Or, for a node that is not aware of the network storm, the node that initiates the detection packet may be a quality control center or a pre-configured terminal node or a switch, and the node that knows the network storm detects the network storm when it detects the occurrence of the network storm.
- the node of the text (such as the quality control center or the pre-configured terminal node or the switch) sends a fault message, which carries information indicating that a network broadcast storm occurs.
- the node that knows the network storm needs to be configured with the information of the node that initiates the detection of the packet, so that the faulty packet can be sent to the node that initiates the detection and detection.
- the node that knows the network storm can be configured with the address of the dimension measurement control center and send the fault packet to the measurement and control center in unicast mode.
- the node that initiates the detection packet is a pre-configured terminal node or switch
- the node that knows the network storm can adopt the multicast mode.
- the address of the pre-configured terminal node or switch is a multicast address, and the multicast address is consistent with the destination address of the fault packet.
- the above-mentioned terminal node may be a host in a high speed Ethernet system, for example, a base station, a base station controller, or the like.
- the timer can be pre-configured. After the network storm is detected and the timer expires, the detection packet is sent. For example, set the timer time to T1, after determining that a network storm has occurred.
- the detection packet is sent after the T1 time.
- the detection packet is a multicast packet
- the destination address of the multicast packet is a preset address.
- the preset address is a MAC address
- the MAC address is: HEX 01 : xx: xx: xx: Xx: xx.
- the detection message may include a field as shown in Table 1 above.
- the initiating device when the initiating device is a node for determining a network loop location, the initiating device can learn whether the network loop location can be determined according to the result of the self determination.
- the originating device is not the node for determining the location of the network loop, then the node for determining the location of the network loop may inform the initiating device of the determination result, so that the initiating device knows whether the network loop location can be determined.
- the initiating device may record its own identifier and the egress port information in the transceiving record table. For example, if SW1 sends a detection packet from port SW1-2, the first item of the transceiving record table is SW1-2 (out).
- the detection packet is sent by the subsequently received node for recording information, and then the information may be passed.
- the padded information determines the network loop location.
- different ways can be used to determine whether a network broadcast storm occurs. Further, by gradually increasing the value of the TTL field, the network loop position can be determined while minimizing the network load.
- the embodiment of the present invention further provides a network loop detection system, which may include the device shown in FIG. 9 and the device shown in FIG.
- the network broadcast storm can be determined by the system. After the network broadcast storm occurs, the detection packet is sent by the node for recording information, which can be determined by the padding information. Network loop location. In addition, different ways can be used to determine whether a network broadcast storm occurs. Further, by gradually increasing the value of the TTL domain, Determine the network loop location while minimizing the network load.
- the foregoing program may be stored in a computer readable storage medium, and when executed, the program includes The foregoing steps of the method embodiment; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
L'invention concerne un procédé, un dispositif et un système pour détecter une boucle de réseau. Le procédé comprend les étapes suivantes : un dispositif de détection reçoit des paquets de détection ; le paquet de détection comprend un journal de réception et de transmission, lorsque le paquet de détection traverse le nœud qui est utilisé pour enregistrer les informations, le nœud stocke son propre identifiant, les informations de port d'entrée et les informations de port de sortie dans le journal de réception et de transmission ; si le dispositif de détection est un nœud qui est utilisé pour déterminer la position de boucle de réseau, le dispositif de détection obtient le journal de réception et de transmission par l'analyse du paquet de détection, et détermine la position de boucle de réseau selon le journal de réception et de transmission. La détermination de la génération de la boucle de réseau et la détermination de la position de boucle peuvent être réalisées par le mode de réalisation de l'invention.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2011/077078 WO2012167474A1 (fr) | 2011-07-12 | 2011-07-12 | Procédé, dispositif et système pour détecter une boucle de réseau |
CN201180001256.9A CN103004141B (zh) | 2011-07-12 | 2011-07-12 | 网络环路检测方法、设备及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2011/077078 WO2012167474A1 (fr) | 2011-07-12 | 2011-07-12 | Procédé, dispositif et système pour détecter une boucle de réseau |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012167474A1 true WO2012167474A1 (fr) | 2012-12-13 |
Family
ID=47295364
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/077078 WO2012167474A1 (fr) | 2011-07-12 | 2011-07-12 | Procédé, dispositif et système pour détecter une boucle de réseau |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103004141B (fr) |
WO (1) | WO2012167474A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104038386A (zh) * | 2014-05-30 | 2014-09-10 | 华为技术有限公司 | 用于业务环网检测的方法、节点和网管 |
CN104113442A (zh) * | 2013-04-18 | 2014-10-22 | 上海斐讯数据通信技术有限公司 | 以太网的环路检测系统及方法 |
CN105099907A (zh) * | 2014-04-25 | 2015-11-25 | 华为技术有限公司 | 路径检测方法、宿节点设备及通信系统 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107204885A (zh) * | 2016-03-16 | 2017-09-26 | 华为技术有限公司 | 通信方法和设备 |
CN107786380B (zh) * | 2016-08-29 | 2022-08-23 | 中兴通讯股份有限公司 | 控制器网络环路的检测方法、装置及控制器 |
CN106789625B (zh) * | 2016-12-26 | 2021-02-23 | 北京华为数字技术有限公司 | 一种环路检测方法及装置 |
CN111130813B (zh) * | 2019-12-05 | 2021-08-17 | 联想(北京)有限公司 | 一种基于网络的信息处理方法及电子设备 |
CN112260922B (zh) * | 2020-10-16 | 2022-08-19 | 嘉环科技股份有限公司 | 网络环路问题快速定位方法与系统 |
CN115941534A (zh) * | 2022-12-08 | 2023-04-07 | 贵州电网有限责任公司 | 一种针对电力系统局域网的网络风暴源溯源方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170462A (zh) * | 2007-12-07 | 2008-04-30 | 杭州华三通信技术有限公司 | 树型网络下行环路检测方法及装置 |
CN101534226A (zh) * | 2009-04-14 | 2009-09-16 | 杭州华三通信技术有限公司 | 一种基于vlan的全网环路检测方法和环路检测设备 |
CN101610193A (zh) * | 2009-07-27 | 2009-12-23 | 武汉烽火网络有限责任公司 | 以太环网自动发现及生成环的方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6950870B2 (en) * | 2002-02-06 | 2005-09-27 | Harris Corporation | Method and apparatus for loop detection and dissolution in a communication network |
-
2011
- 2011-07-12 CN CN201180001256.9A patent/CN103004141B/zh active Active
- 2011-07-12 WO PCT/CN2011/077078 patent/WO2012167474A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170462A (zh) * | 2007-12-07 | 2008-04-30 | 杭州华三通信技术有限公司 | 树型网络下行环路检测方法及装置 |
CN101534226A (zh) * | 2009-04-14 | 2009-09-16 | 杭州华三通信技术有限公司 | 一种基于vlan的全网环路检测方法和环路检测设备 |
CN101610193A (zh) * | 2009-07-27 | 2009-12-23 | 武汉烽火网络有限责任公司 | 以太环网自动发现及生成环的方法 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113442A (zh) * | 2013-04-18 | 2014-10-22 | 上海斐讯数据通信技术有限公司 | 以太网的环路检测系统及方法 |
CN105099907A (zh) * | 2014-04-25 | 2015-11-25 | 华为技术有限公司 | 路径检测方法、宿节点设备及通信系统 |
US10205652B2 (en) | 2014-04-25 | 2019-02-12 | Huawei Technologies Co., Ltd. | Path checking method, sink node device, and communications system |
CN105099907B (zh) * | 2014-04-25 | 2019-12-17 | 华为技术有限公司 | 路径检测方法、宿节点设备及通信系统 |
CN104038386A (zh) * | 2014-05-30 | 2014-09-10 | 华为技术有限公司 | 用于业务环网检测的方法、节点和网管 |
Also Published As
Publication number | Publication date |
---|---|
CN103004141A (zh) | 2013-03-27 |
CN103004141B (zh) | 2016-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012167474A1 (fr) | Procédé, dispositif et système pour détecter une boucle de réseau | |
US8811190B2 (en) | Maximum transmission unit (MTU) size discovery mechanism and method for data-link layers | |
EP2748987B1 (fr) | Acheminement multi-trajets dynamique pour un réseau de communication multimédia partagé | |
JP4080599B2 (ja) | 通信制御装置およびマルチキャスト対応lanに適用される通信制御方法 | |
KR100871622B1 (ko) | 노이지 매체의 자기 구성 소스 인식 브리징 방법 | |
EP2589189B1 (fr) | Procede et apparail pour la distribution des informations entre des routeurs | |
US20130272111A1 (en) | Method and device for link fault detecting and recovering based on arp interaction | |
CN102186261B (zh) | 一种WLAN中IPv6邻居发现协议的实现方法和装置 | |
WO2013082819A1 (fr) | Procédé de gestion de boucle de réseau de couche 2, et appareil et dispositif de réseau correspondants | |
JP2002158675A (ja) | 多重ノードネットワークにおいて各固有接続を最大データ率に適合するための方法及びプロトコル | |
WO2012068996A1 (fr) | Procédé et dispositif de détection d'état de liaisons | |
WO2021135419A1 (fr) | Procédé et appareil de mise à jour d'informations de routage, dispositif informatique, et support de stockage | |
CN109547339B (zh) | 一种无线路由器组网时防止网络形成环路的方法及系统 | |
CN108737142B (zh) | 一种调整节点检测参数的方法、节点和网状网络 | |
CN108173757B (zh) | 端口状态设置方法及装置 | |
EP2636191A1 (fr) | Tunnellisation de paquet de protocole de transport en temps réel | |
WO2013044827A1 (fr) | Procédé de test pour déterminer le chemin suivi par un paquet (traceroute) et système, appareil et dispositif correspondants | |
US8312339B2 (en) | Apparatuses and methods for controlling automatic repeat request (ARQ) reset in broadband wireless communication system | |
WO2012079405A2 (fr) | Procédé et système de traitement de trace de liaison | |
WO2009026824A1 (fr) | Procédé, dispositif et système pour transférer des messages multiplex | |
EP2736204B1 (fr) | Méthode et appareil pour la convergence d'un point de Rendez-vous. | |
CN109873763B (zh) | 一种通信方法及设备 | |
WO2008089680A1 (fr) | Procédé et routeur pour l'établissement d'une communication | |
US10278233B2 (en) | Communication apparatus and communication method | |
CN106034078B (zh) | 一种减少pim协议dr变化的方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11867203 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11867203 Country of ref document: EP Kind code of ref document: A1 |