WO2012171216A1 - 以太网中环路位置检测的方法及以太网交换设备 - Google Patents

以太网中环路位置检测的方法及以太网交换设备 Download PDF

Info

Publication number
WO2012171216A1
WO2012171216A1 PCT/CN2011/075860 CN2011075860W WO2012171216A1 WO 2012171216 A1 WO2012171216 A1 WO 2012171216A1 CN 2011075860 W CN2011075860 W CN 2011075860W WO 2012171216 A1 WO2012171216 A1 WO 2012171216A1
Authority
WO
WIPO (PCT)
Prior art keywords
port
switching device
loop
mac address
network
Prior art date
Application number
PCT/CN2011/075860
Other languages
English (en)
French (fr)
Inventor
孙胜涛
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN2011800008205A priority Critical patent/CN102232279B/zh
Priority to PCT/CN2011/075860 priority patent/WO2012171216A1/zh
Priority to EP11867697.2A priority patent/EP2723020B1/en
Publication of WO2012171216A1 publication Critical patent/WO2012171216A1/zh
Priority to US14/109,802 priority patent/US9178795B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery

Definitions

  • the present invention relates to the field of communications, and in particular, to a method for detecting a loop position in an Ethernet and an Ethernet switching device.
  • Ethernet is currently the most common LAN communication standard, and it has gradually become mainstream in the WAN.
  • Ethernet switches Due to the limited transmission distance, large Ethernet networks usually use Ethernet switches to connect multiple Ethernets to each other.
  • Ethernet switch A 1 1 is connected to Ethernet switch B 12 and Ethernet switch C 13 respectively.
  • Ethernet switch B 12 and Ethernet switch C 13 When a connection occurs between Ethernet switch B 12 and Ethernet switch C 13 , the Ethernet switch is connected. A loop is formed between A, B, and C. 4.
  • Set up an Ethernet switch A 1 1 connected network sends out a broadcast message, and Ethernet switch A 1 1 will broadcast to Ethernet switch B 12 and Ethernet switch C 13 .
  • Ethernet Switch B 12 broadcasts the packet to its connected network and Ethernet switch C 13.
  • the Ethernet switch C 13 receives the repeated message.
  • the Ethernet switch C 13 For the packet sent from the Ethernet switch A 1 1 , the Ethernet switch C 13 broadcasts to the network connected to itself and the Ethernet switch A 1 1 ; from the Ethernet switch B 12, the received message is broadcast to Self-connected network and Ethernet switch A 1 1. When this cycle continues, a storm is formed in the network.
  • STP Shorting Tree Protocol
  • All nodes of the entire network establish the topology of the entire network based on the information, and decide which links work according to predefined rules. Redundant or backup status, does not participate in packet forwarding. When it is determined that a link fault has occurred, it is recalculated according to the rules which redundancy or backup link is restored to the working state, and the packet is forwarded.
  • the existing loop detection method mainly sends a special packet on the port of the device, and detects whether the packet can be received from the sent port. Because the device needs to perform related handshake protocol operations, etc., , the detection time is longer. In addition, the existing detection methods can only know that there is a loop in the network, and it is impossible to know which part of the network has a loop.
  • Embodiments of the present invention provide a method for detecting a loop position in an Ethernet network and an Ethernet switching device to solve the problem that the loop position cannot be quickly located when the loop position is detected.
  • a method for detecting a loop position in an Ethernet includes: an Ethernet switching device performing MAC (Media Access Control) address learning; wherein, before performing the MAC address learning, in a MAC table The first MAC address corresponds to the first port; after performing the MAC address learning, the first MAC address corresponds to the second port;
  • MAC Media Access Control
  • the second port does not belong to the same subnet as the first port, calculate a difference between a time learned to the second port and a time when the first port receives or transmits the message according to the first port;
  • an Ethernet switching device including:
  • a MAC address learning unit configured to perform media access control MAC address learning; wherein, before performing the MAC address learning, the first MAC address in the MAC table corresponds to the first port; after performing the MAC address learning, The first MAC address corresponds to the second port;
  • a computing unit when the second port does not belong to the same subnet as the first port And calculating a difference between a time learned to learn the second port and a time when the last port is received or sent according to the first port;
  • the determining unit when the difference is less than a preset host migration determination threshold, is used to determine that the sub-network connected to the second port has a loop.
  • the method for detecting the position of the loop in the Ethernet and the Ethernet switching device provided by the embodiment of the present invention, after the MAC address learning, if the second port of the same MAC address does not belong to the same subnet as the first port, the calculation learns The difference between the time of the second port and the time of the last time the packet was forwarded according to the first port; if the difference is less than the host migration determination threshold, it is determined that the sub-network connected to the second port has a loop. In this way, the loop detection time in the Ethernet can be greatly reduced, and the position of the loop can be quickly determined, so that the influence of the loop on the normal service can be controlled to a minimum.
  • Figure 1 is a schematic diagram of a network loop
  • FIG. 2 is a schematic diagram of networking of an Ethernet switching device
  • FIG. 3 is a schematic flowchart of a method for detecting a loop position in an Ethernet according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of another Ethernet switching device networking
  • FIG. 5 is a schematic structural diagram of an Ethernet switching device according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of an Ethernet switching device according to another embodiment of the present invention
  • 6b is a schematic structural diagram of an Ethernet switching device according to another embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of an Ethernet switching device according to another embodiment of the present invention
  • FIG. 8 is a schematic structural diagram of an Ethernet switching device according to another embodiment of the present invention.
  • FIG. Figure 2 shows the networking diagram of a typical Ethernet switching device.
  • the Ethernet switching device is not limited to a specific product, and may refer to all devices that undertake the Ethernet switching function, including a traditional Ethernet switch, a Layer 3 switch, and a VPLS (Virtual Private Lan Service) device. Wait.
  • the broadcast message sent from the port X may be from another of the Ethernet switching devices.
  • Received on port Y, port X and port Y belong to a "loop port set".
  • a port belongs to a "loop port set", and a loop port set can also contain only one port.
  • the "port” is not limited to the real physical port of the switching device, but also includes a logical interface, such as a VLAN (Virtual Local Area Network) in a physical port, or a PW in a VPLS network (Pseudo Wire) , pseudowire) and so on.
  • port A1, port A2, port A3, and port A4 there are four ports (port A1, port A2, port A3, and port A4), and if the broadcast from the port A2 is received, the port is received from the port A3. , then define port A2 and port A3 to belong to a "loop port set".
  • MAC address learning means that there is a MAC table in the Ethernet switching device, including the correspondence between the MAC address and the switching device port.
  • an Ethernet switching device receives a packet with a MAC address from a port, it records the correspondence between the port and the MAC address. This process is called “MAC address learning.”
  • MAC address learning means that when a packet is forwarded by the Ethernet switching device, if the corresponding port information of the MAC address is not in the MAC table, the Ethernet switching device forwards the message to all ports, when the packet is When the target host returns information from a port, the switching device knows the port corresponding to the MAC address, and then adds the correspondence between the MAC address and the port to the MAC table. This process is also "MAC address learning.”
  • the MAC table After the MAC address learning is performed on the Ethernet switching device, if the correspondence between the MAC address and the port in the MAC table is maintained for a certain period of time, and then the MAC table is forwarded according to the MAC table, the MAC is considered as the MAC address.
  • the table enters the "confidence state”. This must be called “confidence time” for a long time.
  • the port corresponding to the MAC address changes due to MAC address learning. In the above "confidence time”, the MAC table enters the "untrusted state".
  • the Ethernet switching device performs MAC address learning.
  • the first MAC address in the MAC table corresponds to the first port before the MAC address learning is performed. After the MAC address learning, the first MAC address corresponds to the first MAC address. Second port.
  • the second port does not belong to the same subnet as the first port, calculate a difference between a time when the second port is learned and a time when the first port receives or sends a message according to the first port.
  • the difference is less than a preset host migration determination threshold, determine that a loop occurs in the sub-network connected to the second port.
  • the service or communication interruption time is above the second level, that is, the time to learn the second port and the time when the last time the packet was received or sent according to the first port.
  • the difference is above the second level. When a loop occurs, this time difference is usually less than 50ms. Therefore, setting a reasonable host migration judgment threshold can distinguish whether the change of the MAC table is caused by a loop in the network.
  • the "host migration judgment threshold” can be set to 0. At this time, once the MAC address is learned, if the second port does not belong to the same subnet as the first port, it can immediately determine that the subnetwork connected to the second port has a loop.
  • the method for detecting the position of the loop in the Ethernet provided by the embodiment of the present invention, after the MAC address learning, if the second port of the same MAC address does not belong to the same subnet as the first port, the time for learning the second port is calculated.
  • the Ethernet switching device performs MAC address learning.
  • the first MAC address in the MAC table corresponds to the first port before the MAC address learning is performed. After the MAC address learning, the first MAC address corresponds to the first MAC address. Second port.
  • the local network to which Ethernet Switching Device A 41 Port 1 1 and Port 12 are connected is empirically determined to have loops. Therefore, Port 1 1 and Port 12 belong to a "loop port set".
  • the network formed by the connected devices is a "sub-network ⁇ - ⁇ .
  • the port 13 of the Ethernet switching device A 41 is connected to the remote customer network. According to experience, the customer network cannot generate loops with other networks, so the port 13 belongs to a "loop port set"
  • the network to which it is connected is "sub-network A-2.”
  • port 14 belongs to a "loop port set", and the network to which it is connected is "sub-network A-3".
  • port 21 of Ethernet switching device B 42 is a "loop port set", the network to which it belongs belongs to "sub-network B-1"; port 22 belongs to a “loop port set” to which it is connected The network is "sub-network B-2"; port 23 belongs to a “loop port set”, and the network to which it is connected is "sub-network B-3".
  • Port 3 1 of Ethernet switching device C 43 belongs to a "loop port set", the network to which it is connected is "sub-network C-1"; port 32 belongs to a “loop port set”, and the network to which it is connected is "Sub-network C-2"; Port 33 belongs to a “loop port set” and the network to which it is connected is "sub-network C-3".
  • the port is not necessarily a specific port, and may be any logical interface such as a VLAN or a tunnel that implements interconnection between switching devices.
  • the MAC table may contain the contents shown in Table 1:
  • the second port does not belong to the same subnet as the first port, calculate a difference between a time when the second port is learned and a time when the first port is sent or received according to the first port. For example, ⁇ is set at time T3, and the Ethernet switching device A 41 performs MAC address learning, wherein the MAC address "00-25-BB-BB-BB-01" corresponds to the port slave port 13 (first port) When it becomes port 1 1 (second port), the MAC table of the Ethernet switching device A 41 enters the "untrusted state".
  • port 13 (connected sub-network A-2) and port 1 1 (connected sub-network A-1) do not belong to the same sub-network; then calculate the time T3 that the MAC table learned to port 1 1 and the previous time The difference
  • the specific setting of the host migration determination threshold does not do any The limit can be based on the actual network conditions.
  • a method for detecting a loop position in an Ethernet provided by an embodiment of the present invention is being performed.
  • the difference between the time when the second port is learned and the time when the packet is forwarded according to the first port is calculated. If the difference is less than the host migration determination threshold, it is determined that a loop occurs in the sub-network connected to the second port. In this way, the loop detection time in the Ethernet can be greatly reduced, and the position of the loop can be quickly determined, so that the influence of the loop on the normal service can be controlled to a minimum.
  • the Ethernet switching device may further generate an alarm to notify the network administrator.
  • Ethernet switching device A 41 Generate an alarm to inform the network administrator port 1 1
  • the connected sub-network A-1 has a loop.
  • alarms can be issued in various ways, such as sound and light, to help network managers quickly find problems and perform technical troubleshooting.
  • the sub-network connected to the second port may be isolated, and the sub-network connected from the second port is prohibited from being received or sent. Message.
  • this alternative can be used in conjunction with the above-described scheme for generating an alarm so that the impact of the loop on the network can be limited to a minimum.
  • it may also include:
  • the isolation of the sub-network connected to the second port may be released, and the sub-network connected from the second port may be normally received or sent.
  • the recovery command may also be sent, so that the Ethernet switching device that receives the recovery command can perform MAC table recovery.
  • the Ethernet switching device B 42 and the Ethernet switching device C 43 restore the correspondence between the changed MAC address and the port in the MAC table to the foregoing.
  • the corresponding relationship before the loop occurs in the subnet connected to the two ports.
  • the Ethernet switching device A41 may send some incorrect packets to other Ethernet switching devices, causing other Ethernet switching devices to perform incorrect MAC address learning. Therefore, in determining After the loop occurs on the sub-network connected to the second port, the Ethernet switching device A41 sends a recovery command to the other Ethernet switching device to restore the MAC table of the other Ethernet switching device to the corresponding relationship before the loop occurs. To some extent, reduce the impact of loops on the network.
  • the recovery instruction can be sent within the confidence time, so that the MAC table of other Ethernet switching devices can be quickly restored. Moreover, because during the confidence time, it can be inferred from the probability that the change of the correspondence between the MAC address and the port in the MAC table of the other Ethernet switching device is caused by the loop.
  • the transmission recovery command may be broadcasted, or the recovery command may be multicast, or the recovery command may be unicast, which is not limited in the embodiment of the present invention.
  • the recovery command can also be sent after the alarm is isolated or generated.
  • S406 may be executed after S403, or after S404, or after S405.
  • Ethernet switching device A41 can also receive recovery commands sent by other Ethernet switching devices, and recover the MAC, which is not described here.
  • the Ethernet switching device 50 provided by the embodiment of the present invention, as shown in FIG. 5, includes: a MAC address learning unit 501, configured to perform media access control MAC address learning; wherein, before performing MAC address learning, the MAC table is The first MAC address corresponds to the first port; after performing MAC address learning, the first MAC address corresponds to the second port;
  • the calculating unit 502 is configured to calculate a difference between a time when the second port is learned and a time when the second port is received or sent according to the first port, when the second port does not belong to the same subnet;
  • the determining unit 503 is configured to determine that a loop occurs in the sub-network connected to the second port when the difference is less than a preset host migration determination threshold.
  • the time for learning the second port is the last time. And determining, according to the difference of the time for forwarding the packet by the first port; if the difference is smaller than the host migration determination threshold, determining that a loop occurs in the sub-network connected to the second port. In this way, the loop detection time in the Ethernet can be greatly reduced, and the position of the loop can be quickly determined, so that the influence of the loop on the normal service can be controlled to a minimum.
  • the Ethernet switching device 50 may further include: an alarm unit 504, configured to generate an alarm after the loop of the sub-network connected to the second port is determined, and notify the network administrator of the A loop occurs in the subnet of the two-port connection.
  • an alarm unit 504 configured to generate an alarm after the loop of the sub-network connected to the second port is determined, and notify the network administrator of the A loop occurs in the subnet of the two-port connection.
  • the Ethernet switching device 50 may further include: an isolation unit 505, configured to isolate the sub-network connected to the second port after determining that the sub-network connected to the second port has a loop , It is forbidden to receive or send packets from the subnet connected to the second port.
  • an isolation unit 505 configured to isolate the sub-network connected to the second port after determining that the sub-network connected to the second port has a loop , It is forbidden to receive or send packets from the subnet connected to the second port.
  • the Ethernet switching device 50 may further include: a recovery instruction sending unit 506, configured to send a recovery instruction when the sub-network connected to the second port is in a loop, so that the The Ethernet switching device that resumes the command can perform MAC table recovery.
  • a recovery instruction sending unit 506 configured to send a recovery instruction when the sub-network connected to the second port is in a loop, so that the The Ethernet switching device that resumes the command can perform MAC table recovery.
  • the Ethernet switching device 50 may further include: a recovery unit 507, configured to receive a recovery command sent by another Ethernet switching device, and recover the MAC table of the Ethernet switching device 50.
  • a recovery unit 507 configured to receive a recovery command sent by another Ethernet switching device, and recover the MAC table of the Ethernet switching device 50.

Abstract

本发明实施例提供的一种以太网中环路位置检测的方法及以太网交换设备,涉及通信领域,以解决环路位置检测时无法快速定位环路出现位置的问题。其方法包括:以太网交换设备进行媒体接入控制MAC地址学习;其中,在进行所述MAC地址学习之前,MAC表中第一MAC地址对应第一端口;在进行所述MAC地址学习之后,所述第一MAC地址对应第二端口(S301);若所述第二端口与所述第一端口不属于同一子网络,则计算学习到第二端口的时间与最近一次根据第一端口接收或者发送报文的时间的差值(S302);若所述差值小于预设的主机迁移判断阈值,则确定所述第二端口连接的子网络出现环路(S303)。本发明实施例用于环路位置检测定位。

Description

以太网中环路位置检测的方法及以太网交换设备 技术领域
本发明涉及通信领域, 尤其涉及一种以太网中环路位置检测的 方法及以太网交换设备。
背景技术
以太网是目前最为通用的局域网通信标准, 在广域网范围内也 逐渐成为主流。
由于有效的传输距离有限, 大型的以太网络通常要采用以太交 换机 ( Ethernet Switch ) 来将多个以太网互相连接起来。
在广播和组播方式的通讯中, 以太网交换机必须保证报文不会 从接收到的端口再发送出去, 否则就会造成广播风暴。 如图 1 所示, 以太网交换机 A 1 1分别与以太网交换机 B 12和以太网交换机 C 13 连接, 当以太网交换机 B 12和以太网交换机 C 13之间出现连接时, 则在以太网交换机 A、 B、 C之间形成一个环路。 4叚设以太网交换机 A 1 1连接的网络发送出一个广播报文, 以太网交换机 A 1 1将广播到 以太网交换机 B 12和以太网交换机 C 13。 以太网交换机 B 12收到 该报文之后, 会将该报文广播给自身连接的网络和以太网交换机 C 13。 这样以太网交换机 C 13就收到了重复的报文。 对于从以太网交 换机 A 1 1发出的报文, 以太网交换机 C 13会广播给自身连接的网 络和以太网交换机 A 1 1 ;从以太网交换机 B 12会将收到的^艮文会广 播给自身连接的网络和以太网交换机 A 1 1。 如此循环下去, 则在网 络中形成风暴。
因此, 以太网络的环路问题一直是业界重点关注的问题。 为尽 量降低环路发生的风险, 常在网络中部署 STP ( Spanning Tree Protocol , 生成树协议)。 STP 协议的基本思想是在网络上面扩散各 个节点掌握的邻接关系, 整个网络的所有节点根据这些信息建立起 整个网络的拓朴, 并根据预先定义好的规则, 决定哪些链路工作在 冗余或备份状态, 不参与报文转发。 当判断出现了某条链路故障时, 根据规则重新计算哪些冗余或备份链路恢复为工作状态, 恢复报文 的转发。
现有的环路检测方法主要是在设备的端口上发送一种特殊的报 文, 并检测该报文是否能够从发送出去的端口接收回来, 由于设备 间需要进行相关的握手协议等操作, 因此, 检测时间较长。 此外, 现有检测方法只能知道网络存在环路, 无法知道是哪部分网络出现 环路。
发明内容
本发明的实施例提供一种以太网中环路位置检测的方法及以太 网交换设备, 以解决环路位置检测时无法快速定位环路出现位置的 问题。
为达到上述目 的, 本发明的实施例采用如下技术方案:
一方面, 提供一种以太网中环路位置检测的方法, 包括: 以太网交换设备进行 MAC ( Media Access Control , 媒体接入控 制 ) 地址学习; 其中, 在进行所述 MAC地址学习之前, MAC表中 第一 MAC地址对应第一端口; 在进行所述 MAC地址学习之后, 所 述第一 MAC地址对应第二端口;
若所述第二端口与所述第一端口不属于同一子网络, 则计算学 习到第二端口的时间与最近一次根据第一端口接收或者发送报文的 时间的差值;
若所述差值小于预设的主机迁移判断阈值, 则确定所述第二端 口连接的子网络出现环路。
一方面, 提供一种以太网交换设备, 包括:
MAC地址学习单元, 用于进行媒体接入控制 MAC地址学习; 其中, 在进行所述 MAC地址学习之前, MAC表中第一 MAC地址 对应第一端口; 在进行所述 MAC地址学习之后, 所述第一 MAC地 址对应第二端口;
计算单元, 当所述第二端口与所述第一端口不属于同一子网络 时, 用于计算学习到第二端口的时间与最近一次根据第一端口接收 或者发送报文的时间的差值;
判断单元, 当所述差值小于预设的主机迁移判断阈值时, 用于 确定所述第二端口连接的的子网络出现环路。
本发明实施例提供的以太网中环路位置检测的方法及以太网交 换设备, 在进行 MAC地址学习后, 若针对同一 MAC地址的第二端 口与第一端口不属于同一子网络, 则计算学习到第二端口的时间与 此前最近一次根据第一端口转发报文的时间的差值; 若该差值小于 主机迁移判断阈值, 则确定第二端口连接的的子网络出现环路。 这 样, 能够大幅降低以太网中环路检测的时间, 并迅速确定环路的位 置, 因而能够将因环路对正常业务的影响控制在最小范围内。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下 面将对实施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于 本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以 根据这些附图获得其他的附图。
图 1 为网络环路示意图;
图 2为以太网交换设备组网示意图;
图 3 为本发明实施例提供的以太网中环路位置检测的方法流程 示意图;
图 4为另一以太网交换设备组网示意图;
图 5为本发明实施例提供的以太网交换设备的结构示意图; 图 6a 为本发明另一实施例提供的以太网交换设备的结构示意 图;
图 6b 为本发明另一实施例提供的以太网交换设备的结构示意 图;
图 7 为本发明又一实施例提供的以太网交换设备的结构示意 图; 图 8 为本发明又一实施例提供的以太网交换设备的结构示意 图。
具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术 方案进行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明 一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本 领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他 实施例, 都属于本发明保护的范围。
参照图 2对本发明实施例中的一些术语进行说明。 图 2表示的 是一个典型的以太网交换设备的组网示意图。 在实施例中, 以太网 交换设备并不限定为具体的产品, 可以指承担以太交换功能的所有 设备, 包括传统的以太网交换机, 三层交换机, VPLS ( Virtual Private Lan Service , 虚拟专用局域网 ) 设备等。
环路端口集合
从以太网交换设备的视角来看, 对于该以太网交换设备的某一 端口 X , 由于网络环路的存在, 使得从端口 X发出的广播 4艮文有可 能从该以太网交换设备的另一端口 Y上接收到, 则端口 X和端口 Y 属于一个 "环路端口集合"。
一个端口属于一个 "环路端口集合", 环路端口集合也可以只包 含一个端口。 在此, "端口 " 并不限定于交换设备真实的物理端口, 也包含逻辑接口, 比如一个物理端口中的一个 VLAN ( Virtual Local Area Network , 虚拟局域网 ), 或者 VPLS 网络中的一条 PW ( Pseudo Wire , 伪线) 等。
如图 2所示,对于以太网交换设备 A 21 而言,共有四个端口(端 口 Al、 端口 A2、 端口 A3和端口 A4 ) , 如果从端口 A2发出的广播 才艮文从端口 A3 上接收到, 则定义端口 A2、 端口 A3 属于一个 "环 路端口集合"。
子网络
在本发明实施例中, 一个 "环路端口集合" 所连接的所有交换 设备、 主机构成一个 "子网络"。
MAC地址学习
在以太网交换设备中, " MAC 地址学习 " 是指在以太网交换设 备中有一个 MAC表, 包括 MAC地址与交换设备端口的对应关系。 当以太网交换设备从某一端口接收到含有 MAC地址的报文时,记录 该端口和该 MAC地址的对应关系 , 此过程即为 " MAC地址学习 "。 或者, 当有报文经过以太网交换设备进行转发时, 如果 MAC表中没 有这个 MAC地址的对应端口信息,则该以太网交换设备会将该 4艮文 向所有端口转发, 当该报文的目标主机从某个端口返回接收信息时 , 交换设备就知道了这个 MAC地址对应的端口, 于是就将这个 MAC 地址与端口的对应关系加入 MAC表中, 这个过程也为 " MAC地址 学习 "。
置信状态
在本实施例中, 定义以太网交换设备进行 MAC 地址学习后, 如果 MAC表中 MAC地址与端口的对应关系保持了一定长的时间, 之后据此 MAC表进行 ^艮文转发,则认为该 MAC表进入"置信状态"。 该一定长时间称为 "置信时间 "。 MAC地址对应的端口因 MAC地址 学习而发生变化, 在上述 "置信时间" 内, MAC表进入 "非置信状 态,,。
下面, 以图 3 为例, 对本发明实施例提供的以太网中环路位置 检测的方法进行说明。
5301、 以太网交换设备进行 MAC 地址学习; 其中, 在进行所 述 MAC地址学习之前, 该 MAC表中第一 MAC地址对应第一端口; 在进行所述 MAC地址学习之后, 该第一 MAC地址对应第二端口。
5302、 若第二端口与第一端口不属于同一子网络, 则计算学习 到第二端口的时间与最近一次根据第一端口接收或者发送报文的时 间的差值。
5303、 若该差值小于预设的主机迁移判断阈值, 则确定第二端 口连接的子网络出现环路。 在实际网络中, 尤其是非移动网络中, 若主机迁移, 通常业务 或通信的中断时间在秒级以上, 即学习到第二端口的时间与此前最 近一次根据第一端口接收或者发送报文的时间的差值在秒级以上。 而发生环路时, 这个时间差值通常在 50ms 以下。 因此设定一个合理 的主机迁移判断阈值就可以区分出 MAC 表的变化是否网络中的环 路引起。
特别地, 当认为网络中不存在 "主机迁移 " 的情况时, 可以设 置 "主机迁移判断阈值" 为 0。 此时, 一旦进行 MAC地址学习后, 若第二端口与第一端口不属于同一子网络, 即可立即确定第二端口 连接的的子网络出现环路。
本发明实施例提供的以太网中环路位置检测的方法, 在进行 MAC地址学习后, 若针对同一 MAC地址的第二端口与第一端口不 属于同一子网络, 则计算学习到第二端口的时间与此前最近一次根 据第一端口转发报文的时间的差值; 若该差值小于主机迁移判断阈 值, 则确定第二端口连接的的子网络出现环路。 这样, 能够大幅降 低以太网中环路检测的时间, 并迅速确定环路的位置, 因而能够将 因环路对正常业务的影响控制在最小范围内。
以下参照图 4对本发明另一实施例提供的以太网中环路位置检 测的方法进行说明。
S401、 以太网交换设备进行 MAC 地址学习; 其中, 在进行所 述 MAC地址学习之前, 该 MAC表中第一 MAC地址对应第一端口; 在进行所述 MAC地址学习之后, 该第一 MAC地址对应第二端口。
在图 4 中, 以太网交换设备 A 41端口 1 1和端口 12所连接的本 地网络根据经验确定可能会出现环路, 因此, 端口 1 1 和端口 12属 于一个 "环路端口集合", 其所连接的各种设备构成的网络为 "子网 络 Α- Γ,。以太网交换设备 A 41 的端口 13连接的是远端的客户网络, 根据经验客户网络不可能和其他网络产生环路, 因此端口 13属于一 个 "环路端口集合" 其所连接的网络为 "子网络 A-2"。 同样, 端口 14属于一个 "环路端口集合", 其所连接的网络为 "子网络 A-3 "。 类似的, 以太网交换设备 B 42的端口 21 为一个 "环路端口集 合", 其所连接的网络属于 "子网络 B- 1 " ; 端口 22属于一个 "环路 端口集合", 其所连接的网络为 "子网络 B-2" ; 端口 23属于一个 "环 路端口集合", 其所连接的网络为 "子网络 B-3 "。
以太网交换设备 C 43 的端口 3 1属于一个 "环路端口集合", 其 所连接的网络为 "子网络 C- 1 " ; 端口 32属于一个 "环路端口集合", 其所连接的网络为 "子网络 C-2" ; 将端口 33 属于一个 "环路端口 集合", 其所连接的网络为 "子网络 C-3 "。
需要说明的是, 在此, 端口并不一定是具体的端口, 也可以是 任何实现交换设备间互联的 VLAN、 隧道等逻辑接口。
以以太网交换设备 A 41 的 MAC表为例, 处于 "置信状态" 时 该 MAC表可能包含表 1所示内容:
Figure imgf000008_0001
表 1
S402、 若第二端口与第一端口不属于同一子网络, 则计算学习 到第二端口的时间与最近一次根据第一端口发送或者接收报文的时 间的差值。 示例的, ^^设在 T3时刻, 以太网交换设备 A 41进行了 MAC地址学习, 其中, MAC地址 " 00-25-BB-BB-BB-01 " 对应的端 口从端口 13 (第一端口 ) 变为端口 1 1 (第二端口 ), 以太网交换设 备 A 41 的 MAC表进入 "非置信状态"。
在本示例中, 端口 13 (连接子网络 A-2 ) 与端口 1 1 (连接子网 络 A- 1 ) 不属于同一子网络; 则计算 MAC表学习到端口 1 1 的时间 T3与此前最近一次根据端口 13发送或者接收报文的时间 T2的差值 |T3- Τ2|。
S403、 若 S402计算得到的差值小于预设的主机迁移判断阈值, 则确定端口 1 1连接的子网络 A- 1 出现环路。
在本发明的实施例中, 主机迁移判断阈值的具体设置不作任何 限制, 可以根据实际网络的情况而定。
本发明实施例提供的以太网中环路位置检测的方法, 在进行
MAC地址学习后, 若针对同一 MAC地址的第二端口与第一端口不 属于同一子网络, 则计算学习到第二端口的时间与此前最近一次根 据第一端口转发报文的时间的差值; 若该差值小于主机迁移判断阈 值, 则确定第二端口连接的的子网络出现环路。 这样, 能够大幅降 低以太网中环路检测的时间, 并迅速确定环路的位置, 因而能够将 因环路对正常业务的影响控制在最小范围内。
可选的, 在本发明的实施例中, 确定第二端口连接的子网络出 现环路后, 以太网交换设备还可以生成告警, 通知网络的管理者。
例如, 在本示例中, S403之后, 还可以包括:
5404、 以太网交换设备 A 41 生成告警, 通知网络管理者端口 1 1连接的的子网络 A- 1 出现环路。 例如, 可以通过声、 光等各种方 式发出告警, 以便帮助网络管理者快速地发现问题, 进行技术排查。
可选的, 在本发明的实施例中, 确定第二端口连接的子网络出 现环路后, 还可以对第二端口连接的子网络进行隔离, 禁止从第二 端口连接的子网络接收或者发送报文。
当然, 这一可选方案可以与上述生成告警的方案配合使用, 以 便能够将环路对网络的影响限制在最小范围内。 例如, 在本示例中, S403或者 S404之后, 还可以包括:
5405、 禁止从该子网络 A- 1 的端口 1 1、 端口 12接收报文; 以 及禁止向子网络 A- 1 的端口 1 1、 端口 12发送报文。
示例的, 当网络管理者完成故障处理之后, 可以解除对第二端 口连接的子网络的隔离, 恢复从第二端口连接的子网络正常接收或 者发送报文。
可选的, 在本发明的实施例中, 确定第二端口连接的子网络出 现环路后, 还可以发送恢复指令, 以使得接收到该恢复指令的以太 网交换设备能够进行 MAC表恢复。
例如, 在本示例中, 在 S403之后, 还可以包括: S406、 以太网设备 A 41发送恢复指令, 以太网交换设备 B 42 和以太网交换设备 C 43接收到该恢复指令后, 将自身 MAC表中出 现变化的 MAC 地址和端口的对应关系恢复为上述第二端口连接的 子网络出现环路之前的对应关系。
在第二端口连接的子网络出现环路后, 以太网交换设备 A41可 能会向其他以太网交换设备发送一些错误的报文, 使得其他以太网 交换设备进行错误的 MAC地址学习, 因此, 在确定第二端口连接的 子网络出现环路后, 以太网交换设备 A41 主动向其他以太网交换设 备发送恢复指令,使得其他以太网交换设备的 M A C表能够恢复至环 路出现之前的对应关系, 能在一定程度上减少环路出现对网络造成 的影响。
优选的, 在本实施例中, 可以在置信时间内发送该恢复指令, 这样能迅速的恢复其他以太网交换设备的 MAC表。而且因为在置信 时间内, 可以从概率上推断其他以太网交换设备的 MAC表中 MAC 地址和端口的对应关系的变化是由于该环路造成的。
优选的, 在本实施例中, 可以广播发送恢复指令, 也可以组播 发送恢复指令, 还可以单播发送恢复指令, 本发明的实施例对此不 做任何限定。 特别的, 如果环路发生后, 对出现环路的子网络进行 了隔离或者生成告警, 那么也可以在隔离了或者生成告警之后再发 送恢复指令。 例如, 在本示例中, S406 可以在 S403 之后执行, 或 者在 S404之后执行, 或者在 S405之后执行。
当然, 可以理解, 上述以太网交换设备 A41也可以接收其他以 太网交换设备发送的恢复指令, 并对 MAC进行恢复, 此处就不在贅 述了。
本发明实施例提供的以太网交换设备 50 , 如图 5所示, 包括: MAC地址学习单元 501 , 用于进行媒体接入控制 MAC地址学 习; 其中, 在进行 MAC地址学习之前, 该 MAC表中第一 MAC地 址对应第一端口; 在进行 MAC地址学习之后, 该第一 MAC地址对 应第二端口; 计算单元 502 , 当第二端口与第一端口不属于同一子网络时, 用于计算学习到第二端口的时间与最近一次根据第一端口接收或者 发送报文的时间的差值;
判断单元 503 , 当该差值小于预设的主机迁移判断阈值时, 用 于确定该第二端口连接的的子网络出现环路。
本发明实施例提供的以太网交换设备, 在进行 MAC 地址学习 后, 若针对同一 MAC 地址的第二端口与第一端口不属于同一子网 络, 则计算学习到第二端口的时间与此前最近一次根据第一端口转 发报文的时间的差值; 若该差值小于主机迁移判断阈值, 则确定第 二端口连接的的子网络出现环路。 这样, 能够大幅降低以太网中环 路检测的时间, 并迅速确定环路的位置, 因而能够将因环路对正常 业务的影响控制在最小范围内。
可选的, 如图 6a所示, 该以太网交换设备 50还可以包括: 告警单元 504 , 当确定第二端口连接的子网络出现环路后, 用 于生成告警, 通知网络管理者所述第二端口连接的的子网络出现环 路。
可选的, 如图 6b所示, 该以太网交换设备 50还可以包括: 隔离单元 505 , 当确定第二端口连接的子网络出现环路后, 用 于对第二端口连接的子网络进行隔离, 禁止从第二端口连接的子网 络接收或者发送报文。
可选的, 如图 7所示, 该以太网交换设备 50还可以包括: 恢复指令发送单元 506 , 确定第二端口连接的子网络出现环路 时, 用于发送恢复指令, 以使得接收到该恢复指令的以太网交换设 备能够进行 MAC表恢复。
可选的, 如图 8所示, 该以太网交换设备 50还可以包括: 恢复单元 507 , 用于接收其他以太网交换设备发送的恢复指令, 对该以太网交换设备 50的 MAC表进行恢复。 本领域普通技术人员 可以理解: 实现上述方法实施例的全部或部分步骤可以通过程序指 令相关的硬件来完成, 前述的程序可以存储于一计算机可读取存储 介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而前 述的存储介质包括: ROM、 RAM , 磁碟或者光盘等各种可以存储程 序代码的介质。
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围 并不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技 术范围内, 可轻易想到变化或替换, 都应涵盖在本发明的保护范围 之内。 因此, 本发明的保护范围应以所述权利要求的保护范围为准。

Claims

权 利 要 求 书
1、 一种以太网中环路位置检测的方法, 其特征在于, 包括: 以太网交换设备进行媒体接入控制 MAC地址学习; 其中, 在进 行所述 MAC地址学习之前, MAC表中第一 MAC地址对应第一端口; 在进行所述 MAC地址学习之后, 所述第一 MAC地址对应第二端口; 若所述第二端口与所述第一端口不属于同一子网络,则计算学习 到第二端口的时间与最近一次根据第一端口接收或者发送报文的时 间的差值;
若所述差值小于预设的主机迁移判断阈值,则确定所述第二端口 连接的子网络出现环路。
2、 根据权利要求 1 所述的方法, 其特征在于, 确定所述第二端 口连接的的子网络出现环路之后, 所述方法还包括:
生成告警,通知网络管理者所述第二端口连接的的子网络出现环 路。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 确定所述第 二端口连接的的子网络出现环路之后, 所述方法还包括:
对第二端口连接的子网络进行隔离,禁止从第二端口连接的子网 络接收或者发送报文。
4、 根据权利要求 1 至 3 中任一项所述的方法, 其特征在于, 确 定所述第二端口连接的子网络出现环路之后, 所述方法还包括:
发送恢复指令,以使得接收到该恢复指令的以太网交换设备能够 进行 MAC表恢复。
5、 一种以太网中环路位置检测的以太网交换设备, 其特征在于, 包括:
媒体接入控制 MAC地址学习单元, 用于进行 MAC地址学习; 其中, 在进行所述 MAC地址学习之前, MAC表中第一 MAC地址对 应第一端口; 在进行所述 MAC地址学习之后, 所述第一 MAC地址 对应第二端口;
计算单元, 当所述第二端口与所述第一端口不属于同一子网络 时, 用于计算学习到第二端口的时间与最近一次根据第一端口接收或 者发送报文的时间的差值;
判断单元, 当所述差值小于预设的主机迁移判断阈值时, 用于确 定所述第二端口连接的的子网络出现环路。
6、 根据权利要求 5所述的以太网交换设备, 其特征在于, 所述 以太网交换设备还包括:
告警单元, 当确定第二端口连接的子网络出现环路后, 用于生成 告警, 通知网络管理者所述第二端口连接的的子网络出现环路。
7、 根据权利要求 5或 6所述的以太网交换设备, 其特征在于, 所述以太网交换设备还包括:
隔离单元, 当确定第二端口连接的子网络出现环路后, 用于对第 二端口连接的子网络进行隔离, 禁止从第二端口连接的子网络接收或 者发送报文。
8、 根据权利要求 5至 7 中任一项所述的以太网交换设备, 其特 征在于, 所述以太网交换设备还包括:
恢复指令发送单元, 当确定第二端口连接的子网络出现环路时, 用于发送恢复指令, 以使得接收到该恢复指令的以太网交换设备能够 进行 MAC表恢复。
9、 根据权利要求 5至 8中任一项所述的以太网交换设备, 其特 征在于, 所述以太网交换设备还包括:
恢复单元, 用于接收其他以太网交换设备发送的恢复指令, 对所 述以太网中环路位置检测的以太网交换设备的 MAC表进行恢复。
PCT/CN2011/075860 2011-06-17 2011-06-17 以太网中环路位置检测的方法及以太网交换设备 WO2012171216A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN2011800008205A CN102232279B (zh) 2011-06-17 2011-06-17 以太网中环路位置检测的方法及以太网交换设备
PCT/CN2011/075860 WO2012171216A1 (zh) 2011-06-17 2011-06-17 以太网中环路位置检测的方法及以太网交换设备
EP11867697.2A EP2723020B1 (en) 2011-06-17 2011-06-17 Method and ethernet switching device for detecting loop position in ethernet
US14/109,802 US9178795B2 (en) 2011-06-17 2013-12-17 Method and ethernet switching device for detecting loop position in ethernet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/075860 WO2012171216A1 (zh) 2011-06-17 2011-06-17 以太网中环路位置检测的方法及以太网交换设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/109,802 Continuation US9178795B2 (en) 2011-06-17 2013-12-17 Method and ethernet switching device for detecting loop position in ethernet

Publications (1)

Publication Number Publication Date
WO2012171216A1 true WO2012171216A1 (zh) 2012-12-20

Family

ID=44844478

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/075860 WO2012171216A1 (zh) 2011-06-17 2011-06-17 以太网中环路位置检测的方法及以太网交换设备

Country Status (4)

Country Link
US (1) US9178795B2 (zh)
EP (1) EP2723020B1 (zh)
CN (1) CN102232279B (zh)
WO (1) WO2012171216A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016023518A1 (en) * 2014-08-14 2016-02-18 Hangzhou H3C Technologies Co., Ltd. Migration of hosts

Families Citing this family (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8665886B2 (en) 2009-03-26 2014-03-04 Brocade Communications Systems, Inc. Redundant host connection in a routed network
US8369335B2 (en) 2010-03-24 2013-02-05 Brocade Communications Systems, Inc. Method and system for extending routing domain to non-routing end stations
US9716672B2 (en) 2010-05-28 2017-07-25 Brocade Communications Systems, Inc. Distributed configuration management for virtual cluster switching
US9461840B2 (en) 2010-06-02 2016-10-04 Brocade Communications Systems, Inc. Port profile management for virtual cluster switching
US9769016B2 (en) 2010-06-07 2017-09-19 Brocade Communications Systems, Inc. Advanced link tracking for virtual cluster switching
US8989186B2 (en) 2010-06-08 2015-03-24 Brocade Communication Systems, Inc. Virtual port grouping for virtual cluster switching
US9001824B2 (en) 2010-05-18 2015-04-07 Brocade Communication Systems, Inc. Fabric formation for virtual cluster switching
US9270486B2 (en) 2010-06-07 2016-02-23 Brocade Communications Systems, Inc. Name services for virtual cluster switching
US8867552B2 (en) 2010-05-03 2014-10-21 Brocade Communications Systems, Inc. Virtual cluster switching
US9231890B2 (en) 2010-06-08 2016-01-05 Brocade Communications Systems, Inc. Traffic management for virtual cluster switching
US8885488B2 (en) 2010-06-02 2014-11-11 Brocade Communication Systems, Inc. Reachability detection in trill networks
US9608833B2 (en) 2010-06-08 2017-03-28 Brocade Communications Systems, Inc. Supporting multiple multicast trees in trill networks
US9806906B2 (en) 2010-06-08 2017-10-31 Brocade Communications Systems, Inc. Flooding packets on a per-virtual-network basis
US8446914B2 (en) 2010-06-08 2013-05-21 Brocade Communications Systems, Inc. Method and system for link aggregation across multiple switches
US9246703B2 (en) 2010-06-08 2016-01-26 Brocade Communications Systems, Inc. Remote port mirroring
US9628293B2 (en) 2010-06-08 2017-04-18 Brocade Communications Systems, Inc. Network layer multicasting in trill networks
US9807031B2 (en) 2010-07-16 2017-10-31 Brocade Communications Systems, Inc. System and method for network configuration
US9270572B2 (en) 2011-05-02 2016-02-23 Brocade Communications Systems Inc. Layer-3 support in TRILL networks
US8879549B2 (en) 2011-06-28 2014-11-04 Brocade Communications Systems, Inc. Clearing forwarding entries dynamically and ensuring consistency of tables across ethernet fabric switch
US9407533B2 (en) 2011-06-28 2016-08-02 Brocade Communications Systems, Inc. Multicast in a trill network
US9401861B2 (en) 2011-06-28 2016-07-26 Brocade Communications Systems, Inc. Scalable MAC address distribution in an Ethernet fabric switch
US8948056B2 (en) 2011-06-28 2015-02-03 Brocade Communication Systems, Inc. Spanning-tree based loop detection for an ethernet fabric switch
US9007958B2 (en) * 2011-06-29 2015-04-14 Brocade Communication Systems, Inc. External loop detection for an ethernet fabric switch
US8885641B2 (en) 2011-06-30 2014-11-11 Brocade Communication Systems, Inc. Efficient trill forwarding
US9736085B2 (en) 2011-08-29 2017-08-15 Brocade Communications Systems, Inc. End-to end lossless Ethernet in Ethernet fabric
US9699117B2 (en) 2011-11-08 2017-07-04 Brocade Communications Systems, Inc. Integrated fibre channel support in an ethernet fabric switch
US9450870B2 (en) 2011-11-10 2016-09-20 Brocade Communications Systems, Inc. System and method for flow management in software-defined networks
WO2013082819A1 (zh) * 2011-12-09 2013-06-13 华为技术有限公司 一种二层网络环路处理的方法、装置及网络设备
US8995272B2 (en) 2012-01-26 2015-03-31 Brocade Communication Systems, Inc. Link aggregation in software-defined networks
US9742693B2 (en) 2012-02-27 2017-08-22 Brocade Communications Systems, Inc. Dynamic service insertion in a fabric switch
US9154416B2 (en) 2012-03-22 2015-10-06 Brocade Communications Systems, Inc. Overlay tunnel in a fabric switch
US9374301B2 (en) 2012-05-18 2016-06-21 Brocade Communications Systems, Inc. Network feedback in software-defined networks
US10277464B2 (en) 2012-05-22 2019-04-30 Arris Enterprises Llc Client auto-configuration in a multi-switch link aggregation
CN104272668B (zh) 2012-05-23 2018-05-22 博科通讯系统有限公司 层3覆盖网关
US9602430B2 (en) 2012-08-21 2017-03-21 Brocade Communications Systems, Inc. Global VLANs for fabric switches
US9401872B2 (en) 2012-11-16 2016-07-26 Brocade Communications Systems, Inc. Virtual link aggregations across multiple fabric switches
US9548926B2 (en) 2013-01-11 2017-01-17 Brocade Communications Systems, Inc. Multicast traffic load balancing over virtual link aggregation
US9350680B2 (en) 2013-01-11 2016-05-24 Brocade Communications Systems, Inc. Protection switching over a virtual link aggregation
US9413691B2 (en) 2013-01-11 2016-08-09 Brocade Communications Systems, Inc. MAC address synchronization in a fabric switch
US9565113B2 (en) 2013-01-15 2017-02-07 Brocade Communications Systems, Inc. Adaptive link aggregation and virtual link aggregation
CN103117928B (zh) * 2013-01-21 2017-02-08 深圳市迪浦电子有限公司 提高芯片转发性能的方法及装置
US9565099B2 (en) 2013-03-01 2017-02-07 Brocade Communications Systems, Inc. Spanning tree in fabric switches
US9401818B2 (en) 2013-03-15 2016-07-26 Brocade Communications Systems, Inc. Scalable gateways for a fabric switch
US9565028B2 (en) 2013-06-10 2017-02-07 Brocade Communications Systems, Inc. Ingress switch multicast distribution in a fabric switch
US9699001B2 (en) 2013-06-10 2017-07-04 Brocade Communications Systems, Inc. Scalable and segregated network virtualization
US9806949B2 (en) 2013-09-06 2017-10-31 Brocade Communications Systems, Inc. Transparent interconnection of Ethernet fabric switches
US9548960B2 (en) 2013-10-06 2017-01-17 Mellanox Technologies Ltd. Simplified packet routing
US9912612B2 (en) 2013-10-28 2018-03-06 Brocade Communications Systems LLC Extended ethernet fabric switches
US9548873B2 (en) 2014-02-10 2017-01-17 Brocade Communications Systems, Inc. Virtual extensible LAN tunnel keepalives
US10581758B2 (en) 2014-03-19 2020-03-03 Avago Technologies International Sales Pte. Limited Distributed hot standby links for vLAG
US10476698B2 (en) 2014-03-20 2019-11-12 Avago Technologies International Sales Pte. Limited Redundent virtual link aggregation group
US10063473B2 (en) 2014-04-30 2018-08-28 Brocade Communications Systems LLC Method and system for facilitating switch virtualization in a network of interconnected switches
US9800471B2 (en) 2014-05-13 2017-10-24 Brocade Communications Systems, Inc. Network extension groups of global VLANs in a fabric switch
US10616108B2 (en) 2014-07-29 2020-04-07 Avago Technologies International Sales Pte. Limited Scalable MAC address virtualization
US9544219B2 (en) 2014-07-31 2017-01-10 Brocade Communications Systems, Inc. Global VLAN services
US9807007B2 (en) 2014-08-11 2017-10-31 Brocade Communications Systems, Inc. Progressive MAC address learning
US9524173B2 (en) 2014-10-09 2016-12-20 Brocade Communications Systems, Inc. Fast reboot for a switch
US9699029B2 (en) 2014-10-10 2017-07-04 Brocade Communications Systems, Inc. Distributed configuration management in a switch group
US9628407B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Multiple software versions in a switch group
US9626255B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Online restoration of a switch snapshot
US9942097B2 (en) 2015-01-05 2018-04-10 Brocade Communications Systems LLC Power management in a network of interconnected switches
US10003552B2 (en) 2015-01-05 2018-06-19 Brocade Communications Systems, Llc. Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches
US10038592B2 (en) 2015-03-17 2018-07-31 Brocade Communications Systems LLC Identifier assignment to a new switch in a switch group
US9807005B2 (en) 2015-03-17 2017-10-31 Brocade Communications Systems, Inc. Multi-fabric manager
US10579406B2 (en) 2015-04-08 2020-03-03 Avago Technologies International Sales Pte. Limited Dynamic orchestration of overlay tunnels
US10439929B2 (en) 2015-07-31 2019-10-08 Avago Technologies International Sales Pte. Limited Graceful recovery of a multicast-enabled switch
US10171303B2 (en) 2015-09-16 2019-01-01 Avago Technologies International Sales Pte. Limited IP-based interconnection of switches with a logical chassis
CN106549821B (zh) * 2015-09-23 2021-01-01 华为技术有限公司 一种网络环路检测方法及控制器
US9912614B2 (en) 2015-12-07 2018-03-06 Brocade Communications Systems LLC Interconnection of switches based on hierarchical overlay tunneling
US10819621B2 (en) * 2016-02-23 2020-10-27 Mellanox Technologies Tlv Ltd. Unicast forwarding of adaptive-routing notifications
CN106059810B (zh) * 2016-05-31 2020-10-20 新华三技术有限公司 一种消息通知方法及系统
US10110469B2 (en) * 2016-07-21 2018-10-23 Cisco Technology, Inc. Detecting and preventing network loops
CN107786380B (zh) * 2016-08-29 2022-08-23 中兴通讯股份有限公司 控制器网络环路的检测方法、装置及控制器
US10237090B2 (en) 2016-10-28 2019-03-19 Avago Technologies International Sales Pte. Limited Rule-based network identifier mapping
US11005724B1 (en) 2019-01-06 2021-05-11 Mellanox Technologies, Ltd. Network topology having minimal number of long connections among groups of network elements
CN113014466B (zh) * 2019-12-19 2022-08-16 西安诺瓦星云科技股份有限公司 网口环路检测方法和系统
CN112003783B (zh) * 2020-08-21 2022-07-22 烽火通信科技股份有限公司 一种以太网二层防环的方法及装置
US11575594B2 (en) 2020-09-10 2023-02-07 Mellanox Technologies, Ltd. Deadlock-free rerouting for resolving local link failures using detour paths
US11411911B2 (en) 2020-10-26 2022-08-09 Mellanox Technologies, Ltd. Routing across multiple subnetworks using address mapping
US11870682B2 (en) 2021-06-22 2024-01-09 Mellanox Technologies, Ltd. Deadlock-free local rerouting for handling multiple local link failures in hierarchical network topologies
RU210386U1 (ru) * 2021-10-08 2022-04-14 Общество с ограниченной ответственностью "Газпром трансгаз Ухта" Управляемый разъединитель сети ethernet
US11765103B2 (en) 2021-12-01 2023-09-19 Mellanox Technologies, Ltd. Large-scale network with high port utilization

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005412A (zh) * 2007-01-29 2007-07-25 中兴通讯股份有限公司 一种防止端口环路检测报文攻击的实现方法及系统
CN101405976A (zh) * 2005-12-07 2009-04-08 卢森特技术有限公司 通过监视mac移动来检测网络设备之间的环路
CN101432721A (zh) * 2006-05-01 2009-05-13 思科技术公司 桥接网络中的潜在转发环路的检测
US20090207742A1 (en) * 2008-02-15 2009-08-20 Fujitsu Limited Frame transmission device and loop judging method
US7843854B2 (en) * 2006-02-01 2010-11-30 Hewlett-Packard Development Company, L.P. Network loop detection using known static addresses

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7515530B2 (en) 2004-03-25 2009-04-07 Alcatel-Lucent Usa Inc. Detecting loops between network devices by monitoring MAC moves
US7564779B2 (en) * 2005-07-07 2009-07-21 Alcatel Lucent Ring rapid spanning tree protocol
EP1976195B1 (en) * 2007-03-30 2014-05-07 Alcatel-Lucent Method and apparatus for Mac address learning
CN101102236A (zh) * 2007-08-27 2008-01-09 杭州华三通信技术有限公司 探测环路的方法及装置
CN101212366B (zh) * 2007-12-21 2011-12-21 杭州华三通信技术有限公司 以太环网中的故障检测方法、系统及主节点
JP2009239902A (ja) * 2008-03-07 2009-10-15 Buffalo Inc ネットワーク集線装置、ネットワークシステム、ネットワーク集線装置の設置位置特定方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101405976A (zh) * 2005-12-07 2009-04-08 卢森特技术有限公司 通过监视mac移动来检测网络设备之间的环路
US7843854B2 (en) * 2006-02-01 2010-11-30 Hewlett-Packard Development Company, L.P. Network loop detection using known static addresses
CN101432721A (zh) * 2006-05-01 2009-05-13 思科技术公司 桥接网络中的潜在转发环路的检测
CN101005412A (zh) * 2007-01-29 2007-07-25 中兴通讯股份有限公司 一种防止端口环路检测报文攻击的实现方法及系统
US20090207742A1 (en) * 2008-02-15 2009-08-20 Fujitsu Limited Frame transmission device and loop judging method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016023518A1 (en) * 2014-08-14 2016-02-18 Hangzhou H3C Technologies Co., Ltd. Migration of hosts
US10158705B2 (en) 2014-08-14 2018-12-18 Hewlett Packard Enterprise Development Lp Migration of hosts

Also Published As

Publication number Publication date
CN102232279B (zh) 2013-09-11
CN102232279A (zh) 2011-11-02
EP2723020A4 (en) 2014-09-03
EP2723020B1 (en) 2019-11-06
EP2723020A1 (en) 2014-04-23
US20140105034A1 (en) 2014-04-17
US9178795B2 (en) 2015-11-03

Similar Documents

Publication Publication Date Title
WO2012171216A1 (zh) 以太网中环路位置检测的方法及以太网交换设备
EP3525405B1 (en) Packet sending method and network device
WO2018054156A1 (zh) 一种vxlan报文的转发方法、设备及系统
US8102760B2 (en) Method for reconvergence after failure in a dual-homing network environment
EP2117176B1 (en) Method for implementing intersecting ring network with arbitrary topology, node and intersecting ring network
CN102638389B (zh) 一种trill网络的冗余备份方法及系统
WO2012028029A1 (zh) 一种切换方法及系统
WO2016023436A1 (zh) 一种虚拟路由器冗余协议故障检测的方法及路由设备
EP3340550B1 (en) Service message multicast method and device
US9641396B2 (en) Packet processing method and system
WO2007115493A1 (fr) Procédé, dispositif et système pour réaliser la commutation dans le réseau à double anneau de réseau vpls
JP2013542662A5 (zh)
WO2009039698A1 (fr) Système de réseau en anneau ethernet, noeud principal de celui-ci et procédé d'initialisation de ce noeud
CN109218177B (zh) 域外链路检测方法及装置、存储介质和计算机设备
EP3249853B1 (en) Ethernet ring protection switching method and node
CN103607317A (zh) 二层环路检测方法和装置及通信系统
CN102316014B (zh) 分层虚拟专用局域网服务环境下的负载分担方法及路由器
WO2006065795A2 (en) Ring rapid spanning tree protocol
JP2003258822A (ja) パケットリングネットワーク及びそれに用いるパケットリングネットワーク間の接続方法
WO2012103708A1 (zh) 媒体访问控制mac地址保护方法和交换机
WO2014139175A1 (zh) 双上行相切环收敛的方法、设备和系统
WO2008095360A1 (fr) Méthode et système de commutation rapide en cas de défaillance d'une liaison d'un réseau privé virtuel
US20190253276A1 (en) Centralized management of authoritative edge devices
US10489236B2 (en) Method and system for managing a communication network
WO2012068866A1 (zh) 一种以太环网中刷新mac的方法及系统

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180000820.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11867697

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE