WO2012175035A1 - 接入网环网监控方法、接入设备及网络系统 - Google Patents
接入网环网监控方法、接入设备及网络系统 Download PDFInfo
- Publication number
- WO2012175035A1 WO2012175035A1 PCT/CN2012/077345 CN2012077345W WO2012175035A1 WO 2012175035 A1 WO2012175035 A1 WO 2012175035A1 CN 2012077345 W CN2012077345 W CN 2012077345W WO 2012175035 A1 WO2012175035 A1 WO 2012175035A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ethernet frame
- side port
- user
- broadcast
- access device
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
Definitions
- the present invention relates to the field of communications technologies, and more particularly to an access network ring network monitoring method, an access device, and a network system. Background technique
- the access device performs data communication with the user equipment through the user side port, and performs data communication with the network device such as a switch through the network side port.
- the network device such as a switch through the network side port.
- the STP protocol is used to detect the ring network of the access device and the ring network is broken.
- some user-side ports on the access device do not support the STP protocol.
- the user-side port is ADSL or PON. Ring network monitoring and cancellation are not possible for these user side ports. Summary of the invention
- the embodiments of the present invention provide an access network ring network monitoring method, an access device, and a network system to solve the above problems.
- the embodiment of the present invention provides the following technical solutions:
- a ring network monitoring method includes: listening to each user side port;
- an access device is provided, where the access device includes:
- a first sending unit configured to send, by using each user-side port on the access device, a first broadcast Ethernet frame to each user equipment
- a monitoring unit configured to monitor the respective user side ports
- a first ring network determining unit configured to determine, if the first broadcast Ethernet frame is received, determining that the user equipment under the user side port that receives the first broadcast Ethernet frame exists in a ring network.
- a network system includes: an access device and a user equipment, where the access device provides a user-side port, and the access device passes the a user side port is connected to the user equipment, where
- the access device is configured to send a first broadcast Ethernet frame to each user equipment by using the user side port; and listen to the user side port; if the first broadcast Ethernet frame is received, determine to receive the The user equipment under the user side port of the first broadcast Ethernet frame exists in the ring network;
- the user equipment is configured to receive a first broadcast Ethernet frame delivered by the access device, and forward the packet. It can be seen from the above technical solution that after the broadcast device transmits the Ethernet frame through the access device, if the ring network exists in the access network, the broadcast Ethernet frame will be received by the access device in the ring network. Therefore, once an access device listens to a broadcast Ethernet frame, it can be determined that a ring network exists in the access network.
- FIG. 1 is a schematic structural diagram of a tree network of a broadband network according to an embodiment of the present disclosure
- FIG. 2 is a flowchart of a method for monitoring an access network ring network according to an embodiment of the present invention
- FIG. 3 is another flowchart of a method for monitoring an access network ring network according to an embodiment of the present disclosure
- FIG. 4 is still another flowchart of a method for monitoring an access network ring network according to an embodiment of the present invention
- FIG. 5 is still another flowchart of an access network ring network monitoring method according to an embodiment of the present invention.
- FIG. 6 is a schematic diagram of a second broadcast Ethernet frame orientation according to an embodiment of the present invention
- FIG. 6 is still another flowchart of an access network ring network monitoring method according to an embodiment of the present invention
- 8a-8c are schematic diagrams of a ring network between user terminals according to an embodiment of the present invention
- FIG. 8 is a schematic diagram of a ring network of a user terminal and a network terminal according to an embodiment of the present invention; Schematic diagram of the first broadcast Ethernet frame structure;
- FIG. 9b is another schematic structural diagram of a first broadcast Ethernet frame according to an embodiment of the present disclosure.
- FIG. 10 is a schematic structural diagram of an access device according to an embodiment of the present disclosure.
- FIG. 11 is another schematic structural diagram of an access device according to an embodiment of the present disclosure.
- FIG. 12 is still another schematic structural diagram of an access device according to an embodiment of the present disclosure.
- FIG. 13 is still another schematic structural diagram of an access device according to an embodiment of the present disclosure.
- FIG. 14 is a schematic structural diagram of a network system according to an embodiment of the present invention. detailed description
- FIG. 1 a tree structure diagram of a user equipment accessing a broadband network through an access device is shown in FIG. 1 .
- the access device provides a network side port and a user side port, and the access device communicates with the network device through the network side port, for example, an aggregation switch, and communicates with the user equipment through the user side port.
- the access device has a plurality of user-side ports, and each user-side port is connected to at least one user device, and the user device may be a PC, an optical network unit, or an optical network terminal.
- the access device can carry data services based on different access technologies: for example, Ethernet, ADSL (Asymmetric Digital Subscriber Loop), ADSL2+ (ADSL2+ protocol), SHDSL (Symmetric High bit rate Digital Subscriber Line, Single-pair high-speed digital subscriber line), VDSL (Very-high-bit-rate Digital Subscriber loop), ISDN (Integrated Services Digital Network), EPON (Ethernet Passive Optical Network) Ethernet passive optical network), GPON (Gigabit-capable Passive Optical Network), E 1 (Europe's 30-channel pulse code modulation referred to as El, rate is 2.048 Mbit/s) Into the technology.
- the above access technology can be used to carry Ethernet frames.
- the embodiment of the present invention provides an access network ring network monitoring method based on the foregoing structural diagram of the networking.
- the method is performed by the access device. Referring to FIG. 2, the method includes at least the following steps:
- the first broadcast Ethernet frame is sent to each user equipment by using each user-side port on the access device.
- the first broadcast Ethernet frame is an Ethernet frame whose destination Media Access Control (MAC) address is a broadcast address, and the value is generally all ones.
- MAC Media Access Control
- the access device includes a network side port and a user side port, and the network side port generally supports the STP protocol group. Therefore, the broadcast Ethernet frame sent by the network side port generally does not form an information storm, and the user side interface generally does not form an information storm.
- the STP protocol family may not be supported. Therefore, in this embodiment, the transmission of the first broadcast Ethernet frame can be sent through the user side port.
- the first broadcast Ethernet frame may be simultaneously sent through the network side port and the user side port, and details are not described herein.
- the sending of the first broadcast Ethernet frame may be sent periodically, or may be manually triggered as needed.
- the first broadcast Ethernet frame may be simultaneously sent by each user-side port on all the access devices, or all the access devices may sequentially send the first broadcast Ethernet frame, that is, the user side of an access device. After the first broadcast of the Ethernet frame is sent, the user-side port of the other access device sends the first broadcast Ethernet frame.
- the first broadcast Ethernet frame may be sent by a part or a specific access device, and may be set by a person skilled in the art according to actual needs: For example, according to previous experience, the user side port of one or some access devices is easy to be combined with other If the device or port generates a ring network, the frequency of sending the first broadcast Ethernet frame can be increased to discover the ring network in time.
- step S201 may further include:
- S301 Send, by using a user-side port of a virtual local area network (VLAN), a first broadcast Ethernet frame carrying a corresponding VLAN tag to a VLAN to which the port belongs;
- VLAN virtual local area network
- S302 Send a (untag) first broadcast Ethernet frame that does not carry a VLAN tag by using a user-side port that does not support the VLAN.
- the above VLAN tag includes a VLAN value that can be used to identify different VLANs. Assume that a user-side port belongs to five VLANs, and the user-side port needs to send the first broadcast Ethernet frame carrying different VLAN tags to the five VLANs.
- the first broadcast Ethernet frame is divided into two types: one is carrying a VLAN tag, and the other is not Carry the VLAN tag.
- the structure of the first broadcast Ethernet frame will be described in detail later in the present invention.
- the user side port and the network side port can also be monitored at the same time.
- the order of steps S201 and S202 can be interchanged, but when the listening action is performed first, the listening action is always performed at the time.
- the specific implementation manner of determining that the user equipment of the user side port of the first broadcast Ethernet frame is present in the ring network may be implemented.
- the access device after the access device sends the first broadcast Ethernet frame, if the ring network exists in the access network, the first broadcast Ethernet frame will be received by the access device in the ring network. Therefore, once an access device listens to the first broadcast Ethernet frame, it can be determined that a ring network exists in the access network. Therefore, data analysis or processing can be performed based on the detected ring network.
- the ring network breaking measure can also be performed.
- the action enforcement point may select either the receiving end of the first broadcast Ethernet frame or the transmitting end thereof.
- the method in all the above embodiments may further include the following steps after step S203:
- the method in all the embodiments further needs to include the following steps:
- Step S505 Send a second broadcast Ethernet frame by using a user-side port, where the user-side port is a user-side port that receives the first broadcast Ethernet frame.
- Step S505 is mainly used to determine the transmitting end of the first broadcast Ethernet frame. See Figure 6: Using a device The accessing device A accesses the access device A through the user-side interface A1 to the user-side interface An. The access device A accesses the aggregation switch through the network-side interface, and then accesses various networks through the aggregation switch.
- the user equipments B1 to Bn access the access device B through the user-side interface B1 to the user-side interface B1, respectively, and access the aggregation switch through the access device B to access various networks, where the access device may be a digital device.
- the user equipment can be a variety of user terminals, such as an Optical Network Unit (ONU), such as a Digital Subscriber Line Access Multiplexer (DSLAM) or an Optical Line Terminal (OLT). )Wait.
- ONU Optical Network Unit
- DSLAM Digital Subscriber Line Access Multiplexer
- OLT Optical Line Terminal
- the access device A sends the first broadcast Ethernet frame Efl to the user equipment Al-An through the user-side ports A1 to An
- the user equipment B1 can receive the first broadcast Ethernet frame Efl, and the access device B can receive the above.
- the first broadcast Ethernet frame Efl If the user equipment B1 sends the second broadcast Ethernet frame EG in reverse, the second broadcast Ethernet frame E will return to the user equipment An and to the access device A along the original path. Thus, the transmitting end An of the first broadcast Ethernet frame Efl is found.
- step S505 may include:
- the second broadcast Ethernet frame carrying the same VLAN tag is sent through the user-side port;
- the second broadcast Ethernet frame that does not carry the VLAN tag is sent through the user side port.
- the user-side port that receives the first broadcast Ethernet frame carrying the VLAN tag may also send the corresponding VLAN tag to the multiple VLANs, as in step S301, because the user-side port may belong to a different VLAN.
- the second broadcast Ethernet frame Since the second broadcast Ethernet frame is sent to the VLAN that does not exist in the ring network, the access network device does not receive the second broadcast Ethernet frame from the VLAN that does not exist in the ring network.
- step S505 the following steps may be further included:
- step S706 listening to each user side port; it should be noted that if the monitoring action of step S202 If it is always and momentarily, step S706 can be omitted.
- FIG. 8a-8c are ring network application scenarios between user equipments
- FIG. 8d- 8e is a ring network of user equipment and network equipment.
- FIG. 8a shows a user equipment connected to an access device through a user-side port of the access device, where the user equipment itself generates a ring network scenario
- FIG. 8b shows that at least two devices respectively pass through the access device.
- Each of the user-side ports is connected to an access device, and the ring network is generated between the at least two user devices.
- the user-side port in the figure is a unified interface, and specifically includes at least two user-side ports.
- FIG. 8c is the user equipment 1 connected to the access device 1 through the user-side port 1 of the access device 1
- the user equipment 2 is connected to the access device 2 through the user-side port 2 of the access device 2, wherein the user equipment 1 and the user equipment 2 have an application scenario of the ring network
- FIG. 8d is the user equipment and the access device. A scenario in which a ring network application exists
- FIG. 8e is a ring network between the user equipment 1 and the access device 2, between the access device 1 and the user equipment 2 In scenarios ring.
- the ring network monitoring method provided in the above embodiments can perform ring network monitoring in the above various application scenarios, thereby automatically detecting which devices exist in the ring network and how to break the ring network.
- the network side port can generally be monitored by the STP protocol for the ring network and the ring network is broken. Therefore, the present invention focuses on how to perform ring network monitoring and ring network breaking on the user side port, but all the above embodiments The monitoring, the sending of the broadcast Ethernet frame, and the ring network removal measures can be applied to the network side port.
- the first broadcast Ethernet frame may also be received.
- the network side port delivers the second broadcast Ethernet frame to achieve the purpose of finding the sender of the first broadcast Ethernet frame Efl.
- the execution point is broken.
- the specific implementation methods of the ring network breaking measures are similar, which will be discussed in detail below.
- Ring network break mode 1 It is forbidden to send or receive Ethernet frames.
- the prohibition of receiving an Ethernet frame here and below refers to discarding an Ethernet frame after it has been received.
- the method for prohibiting the reception and transmission of the Ethernet frame is different according to different types of user-side ports, for example, the manner in which the Ethernet port can be closed, the manner in which the ADSL port can be deactivated, etc.
- the technician can flexibly design the type of the visible port, and will not be described here.
- the specific implementation manner of the step S404 includes:
- the ring network In the ring network mode 2, when the received first and/or second broadcast Ethernet frame carries the VLAN tag, the ring network can be determined according to the VLAN tag and the virtual local area network corresponding to the VLAN tag is generated, and therefore, the virtual network is prohibited.
- the local area network sends or receives an Ethernet frame.
- the prohibition of receiving an Ethernet frame from the virtual local area network here and below means that when the port receives the Ethernet frame carrying the VLAN tag, the port first checks whether the VLAN value is received by the port. The VLAN value corresponding to the first broadcast Ethernet frame or the second broadcast Ethernet frame matches, and if so, the received Ethernet frame is discarded.
- the user-side port belongs to five VLANs (VLAN VLAN 5 ).
- the user-side port sends the first or second broadcast Ethernet frame carrying the VLAN tag EF-EF1 5 to the VLAN VLAN 5 (EFl i-EF1 5 and secondary VLAN - VLAN 5 corresponds) If, after a listening on port access device to carry the first or second broadcast Ethernet frame has the EF, is prohibited at the port of the Ethernet frame carrying the EF1 i received And send.
- the Ethernet frame that is prohibited from being transmitted or received may include: a first broadcast Ethernet frame, and/or a second broadcast Ethernet frame or the like for monitoring an Ethernet frame of the ring network, and may also include an Ethernet frame for data communication.
- the first broadcast Ethernet frame is introduced below.
- the untag first broadcast Ethernet frame includes an encapsulation header and a payload, where the encapsulation header includes:
- Destination MAC address (DMAC) 901 The destination MAC address is all 1, which is the broadcast place. Address.
- Source MAC Address (SMAC) 902 The source MAC address can be any legal MAC address. Usually filled in is the bridge MAC address of the access device that sent the Ethernet frame, or other legitimate MAC address of the access device that sent the Ethernet frame. Filled in this embodiment is the bridge MAC address of the access device.
- Ring check ETYPE 903 Ringcheck ETYPE is used to identify whether it is used for ring detection. In addition, it is also used to indicate which Ethernet frame 904 is parsed in the Ethernet frame format. Since the user side port of the access device transmits the above-mentioned first broadcast Ethernet frame, it is also possible to transmit other broadcast Ethernet frames. Therefore, in order to distinguish from other broadcast Ethernet frames, the following payload 904 is prevented from being processed as a well-known protocol format. In this embodiment, Ethernet type 0x8300 (which will be introduced later in this document) is used as its ring network detection Ethernet. Type, of course, those skilled in the art may also select other non-known Ethertypes as the ring network detection Ether type of the first broadcast Ethernet frame.
- Payload 904 The payload must contain at least the sender tag information of the first broadcast Ethernet frame.
- the sender marking information includes a bridge MAC address of the access device that sends the first broadcast Ethernet frame, a port type of the sender, a port number of the sender, and VLAN information of the sender. It can be understood by those skilled in the art that when the first broadcast Ethernet frame carries the VLAN tag, the payload tag information included in the payload is filled with the corresponding VLAN information, and the first broadcast Ethernet frame does not carry the VLAN. When tagging, the VLAN information contained in its payload can be empty.
- the bridge MAC of the access device (which carries the VLAN tag and the VLAN value in the VLAN domain) has been filled in the source MAC address field in the encapsulation header of the first broadcast Ethernet frame, it is valid. This information is again provided in the payload so that the access device can easily extract the sender tag information when processing the payload of the Ethernet frame according to the protocol layering principle.
- the structure may be the same as or different from the first broadcast Ethernet frame described above. As long as it can be identified, it is not mistaken for other well-known Ethernet frames or first broadcast Ethernet frames.
- the second broadcast Ethernet frame structure is the same as the first broadcast Ethernet frame, it is also required to insert a positive and negative identifier in the payload area, and the positive and negative identifiers can be used to identify whether the Ethernet frame is the first broadcast Ethernet frame or the reverse direction.
- the second broadcast Ethernet frame sent. In the specific implementation, "0", "1" or other clarification can be used. A distinct number or character is used to characterize whether the Ethernet frame is a first broadcast Ethernet frame or a second broadcast Ethernet frame, respectively.
- the access device may listen to many types of Ethernet frames.
- the Ethernet address may be detected according to the pre-agreed ring network according to the destination MAC address being all 1 broadcast address and/or the Ethernet frame type.
- the embodiment is 0x8300), and the first or second broadcast Ethernet frame is identified from the intercepted Ethernet frame.
- step S203 or S707 may specifically be:
- Identifying the intercepted Ethernet frame When the MAC address of the Ethernet frame is a broadcast address of all 1s and/or the Ethernet type is used to identify the ring detection type of the ring network detection, the user side port is determined. The user equipment exists in the ring network.
- the first and/or second broadcast Ethernet frames can carry VLAN tags, and one or more VLAN tags can be inserted as needed.
- Each VLAN tag contains a VLAN value.
- VLAN value can be called a VLAN tag, or VLAN ID.
- Figure 9b shows a structure of a broadcast Ethernet frame carrying two layers of VLAN tags, which in turn includes: DMAC901, SMAC902, 0x88a8/0x8100, two bytes (content is 802.1p tag + DEI bit + VLAN tag), 0x8100 , two bytes (content is 802. lp tag + DEI bit + VLAN tag), Ringcheck ETYPE903
- 0x8100, 0x88a8, and 0x8300 are all of the Ether type.
- 0x88a8 is an Ethernet type of an outer VLAN defined by IEEE 802.1 AD
- 0x8100 is an Ethernet type of a VLAN defined by IEEE 802.1 Q.
- the aforementioned 0x8300 there is currently no international standard definition, and thus is used by the embodiment of the present invention for marking Whether the identification is used for ring network detection.
- this embodiment refers to the first VLAN tag encountered during parsing as the first layer VLAN tag, and so on. Then, when there is a Layer 3 VLAN tag, the Layer 3 VLAN tag is closest to the payload, and the Layer 1 VLAN tag is the farthest from the payload. Of course, no matter how many VLAN tags exist, the first layer of VLAN tags is always the one farthest from the payload.
- the ring network breaking mode 2 can be further refined into: 1. It is forbidden to receive and send Ethernet frames carrying the first layer of VLAN tags.
- the above describes how to perform a ring break when a port receives an Ethernet frame with a first or second ring that carries a VLAN tag.
- the following describes how to receive the untag first or second broadcast Ethernet frame on a port that supports VLANs, and how to perform ring network removal.
- the above untag first or second broadcast Ethernet frame may come from a normal LAN or a default VLAN.
- the port supporting the VLAN associates the untag broadcast Ethernet frame with a VLAN (the VLAN is actually the above untag first broadcast).
- the ring network is broken on the port that receives the untag broadcast Ethernet frame, which can prohibit the port from receiving and transmitting all the untag Ethernet frames, and can also prohibit the port from receiving the Ethernet or the Ethernet corresponding to the untag broadcast Ethernet frame. Frame and prohibit sending Ethernet frames to the above VLAN or LAN.
- the embodiment of the present invention further provides an access device that can implement the foregoing method, and FIG. 10 shows a structure of the access device 100, including:
- the first sending unit 101 is configured to send a first broadcast Ethernet frame to each user equipment by using each user side port on the access device;
- the monitoring unit 102 is configured to monitor the respective user side ports
- a first ring network determining unit 103 configured to determine, if the first broadcast Ethernet frame is received, The user equipment under the user side port that receives the first broadcast Ethernet frame exists in a ring network.
- the access device in all the foregoing embodiments may further include a first breaking unit 111, where the first breaking unit 111 is configured to implement a ring network breaking measure,
- the ring network breaking measure specifically includes prohibiting sending or receiving the broadcast Ethernet frame to the user equipment by using the user side port.
- the first breaking unit 111 can also be independent of the access device as long as it can perform the ring network breaking measure.
- the foregoing access device may further include:
- the second sending unit 121 is configured to: after the listening unit 102 listens to the first broadcast Ethernet frame, send the second broadcast Ethernet frame by receiving the user side port of the first broadcast Ethernet frame.
- the access device in all the foregoing embodiments may further include a second ring network determining unit 131 and a second breaking unit 132, where the second ring network determining unit And the third device is configured to receive the second broadcast, if the second broadcast Ethernet frame is received, the user equipment in the user side port that receives the second broadcast Ethernet frame is determined to be in the ring.
- the Ethernet frame user side port performs ring network removal measures.
- the ring network breaking measure specifically includes: prohibiting sending or receiving an Ethernet frame to the user equipment by receiving the second broadcast Ethernet frame user side port.
- the second breaking unit 131 described above can also be independent of the access device.
- the second breaking unit 131 and the first breaking unit 111 may alternatively exist or may coexist.
- the access device has two ring network monitoring modes, and the second broadcast Ethernet frame is not sent in the mode 1, and the first breaking unit 111 works in the mode. . While mode 2 transmits the second broadcast Ethernet frame, the second breaking unit 131 operates in mode 2.
- the embodiment of the present invention further provides a network system that can implement the foregoing method.
- the system includes an access device 141 and a user equipment 142.
- the access device 141 passes through the user side port and the user equipment 142. Connection, where:
- the access device 141 is configured to send the first broadcast Ethernet frame to each user equipment 142 through the user-side port; and listen to the user-side port; if the first broadcast Ethernet frame is received, determine to receive the first broadcast Ethernet The user equipment under the user-side port of the frame exists in the ring network;
- the user equipment 142 is configured to receive the first broadcast Ethernet frame delivered by the access device 141 and forward the frame.
- the access device 141 in the foregoing system may be further configured to prohibit sending or receiving an Ethernet frame to the user equipment 142 through the user-side port.
- the access device 142 in all the foregoing embodiments may be further configured to send the second broadcast Ethernet frame by receiving the user side port of the first broadcast Ethernet frame.
- the access device 142 in all the foregoing embodiments may be further configured to: if the second broadcast Ethernet frame is received, determine that the user equipment under the user side port that receives the second broadcast Ethernet frame exists. a ring network; and, prohibiting transmission or reception of an Ethernet frame to the user equipment by receiving the second broadcast Ethernet frame user side port.
- the disclosed systems, devices, and The method can be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solution of the embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software function unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
- a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a Read-Only Memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
本发明实施例提供接入网环网监控方法、接入设备及网络系统,以解决某些用户侧端口则无法进行环网监测的问题。上述环网监测方法包括:监听各个用户侧端口;通过接入设备上的各个用户侧端口下发第一广播以太帧给各个用户设备;如果接收到所述第一广播以太帧,则确定接收到所述第一广播以太帧的用户侧端口下的用户设备存在环网。从上述的技术方案可以看出,本实施例通过接入设备发送广播以太帧后,如果接入网中存在环网,广播以太帧将被环网中的接入设备接收。因此,一旦有接入设备监听到广播以太帧时,即可确定接入网中存在环网。
Description
接入网环网监控方法、 接入设备及网络系统
本申请要求于 2011 年 6 月 21 日提交中国专利局、 申请号为 201110167897.3、 发明名称为"接入网环网监控方法、 接入设备及网络系统 "的 中国专利申请的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信技术领域, 更具体地说, 涉及接入网环网监控方法、 接 入设备及网络系统。 背景技术
目前, 接入设备通过用户侧端口与用户设备进行数据通信, 通过网络侧 端口与网络设备例如交换机等设备进行数据通信。 当某一接入设备下的用户 设备之间, 或者某接入设备下的用户设备与其他接入设备下的用户设备之间 存在环网时, 任何广播 ·艮文在环网中进行转发时, 就会形成广播风暴, 导致 当前的网络资源耗尽。
现有技术通过 STP协议对接入设备的端口进行环网监测和环网破除, 但 是, 目前接入设备上的用户侧端口有些是不支持 STP协议的, 例如用户侧端口 为 ADSL、 PON等, 对于这些用户侧端口则无法进行环网监测和破除。 发明内容
有鉴于此, 本发明实施例目的在于提供接入网环网监控方法、 接入设备 及网络系统, 以解决上述问题。
为实现上述目的, 本发明实施例提供如下技术方案:
根据本发明实施例的一个方面, 提供一种环网监测方法, 所述方法包括: 监听各个用户侧端口;
通过接入设备上的各个用户侧端口下发第一广播以太帧给各个用户设 备;
如果接收到所述第一广播以太帧, 则确定接收到所述第一广播以太帧的 用户侧端口下的用户设备存在环网。
根据本发明实施例的另一个方面, 提供一种接入设备, 所述接入设备包 括:
第一发送单元, 用于通过接入设备上的各个用户侧端口下发第一广播以 太帧给各个用户设备;
监听单元, 用于监听所述各个用户侧端口;
第一环网确定单元, 用于如果接收到所述第一广播以太帧, 则确定接收 到所述第一广播以太帧的用户侧端口下的用户设备存在环网。
根据本发明实施例的再一个方面, 提供一种网络系统, 其特征在于, 所 述系统包括: 接入设备和用户设备, 所述接入设备提供用户侧端口, 所述接 入设备通过所述用户侧端口与所述用户设备连接, 其中,
所述接入设备, 用于通过所述用户侧端口下发第一广播以太帧给各个用 户设备; 并监听所述用户侧端口; 如果接收到所述第一广播以太帧, 则确定 接收到所述第一广播以太帧的用户侧端口下的用户设备存在环网;
所述用户设备, 用于接收接入设备下发的第一广播以太帧, 并转发。 从上述的技术方案可以看出, 本实施例通过接入设备发送广播以太帧后, 如果接入网中存在环网, 广播以太帧将被环网中的接入设备接收。 因此, 一 旦有接入设备监听到广播以太帧时, 即可确定接入网中存在环网。 附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实 施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面 描述中的附图仅仅是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附图。
图 1为本发明实施例提供的宽带网络的树形组网结构示意图;
图 2为本发明实施例提供的接入网环网监控方法流程图;
图 3为本发明实施例提供的接入网环网监控方法另一流程图;
图 4为本发明实施例提供的接入网环网监控方法又一流程图;
图 5为本发明实施例提供的接入网环网监控方法又一流程图;
图 6为本发明实施例提供的通过第二广播以太帧定向的示意图; 图 Ί为本发明实施例提供的接入网环网监控方法又一流程图;
图 8a-8c为本发明实施例提供的用户终端之间的环网示意图; 图 8d-8e为本发明实施例提供的用户终端与网络终端的环网示意图; 图 9a为本发明实施例提供的第一广播以太帧结构示意图;
图 9b为本发明实施例提供的第一广播以太帧另一结构示意图;
图 10为本发明实施例提供的接入设备结构示意图;
图 11为本发明实施例提供的接入设备另一结构示意图;
图 12为本发明实施例提供的接入设备又一结构示意图;
图 13为本发明实施例提供的接入设备又一结构示意图;
图 14为本发明实施例提供的网络系统结构示意图。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而 不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作 出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
通常, 用户设备通过接入设备接入宽带网络的树形组网结构图如图 1 所 示。 接入设备提供网络侧端口和用户侧端口, 接入设备通过网络侧端口与网 络设备进行通信, 例如汇聚交换机, 通过用户侧端口与用户设备进行通信。 其中, 所述接入设备有多个用户侧端口, 每个用户侧端口下连接至少一个用 户设备, 所述用户设备可以为 PC机、 光网络单元或者光网络终端等。
接入设备可基于不同的接入技术来承载数据业务: 例如, Ethernet, ADSL ( Asymmetric Digital Subscriber Loop , 非对称数字用户环路)、 ADSL2+ ( ADSL2+协议)、 SHDSL(Symmetric High bit rate Digital Subscriber Line, 单 对线高速数字用户线)、 VDSL(Very-high-bit-rate Digital Subscriber loop,甚高速 数字用户环路)、 ISDN ( Integrated Services Digital Network,综合业务数字网)、 EPON (Ethernet Passive Optical Network , 以 太网 无源光网 络)、 GPON(Gigabit-capable Passive Optical Network , 千兆比特无源光网络)、 E 1 (欧 洲的 30路脉码调制简称 El , 速率是 2.048Mbit/s)等多种接入技术。 上述接入 技术可以用来承载以太帧。
基于上述组网的结构示意图, 本发明实施例提供一种接入网环网监控方
法, 该方法的执行主体为接入设备, 参见图 2, 该方法至少包括如下步骤:
S201、 通过接入设备上的各个用户侧端口下发第一广播以太帧给各个用 户设备。
其中, 上述第一广播以太帧是目的媒体接入控制 (Media Access Control , MAC)地址为广播地址的以太帧, 一般该值为全 1。
前已述及, 接入设备包括网络侧端口和用户侧端口, 其网络侧端口一般 支持上述 STP协议族, 因此由网络侧端口发送的广播以太帧一般不会形成信 息风暴, 而用户侧接口则可能不支持 STP协议族。 因此, 本实施例中可以通 过用户侧端口发送第一广播以太帧的发送。 当然, 在本发明其他实施例中, 也可通过网络侧端口和用户侧端口同时发送第一广播以太帧, 在此不作贅述。
对上述第一广播以太帧的发送可以是定时发送, 也可以按需要手工触发 发送。 在具体实现时, 可令所有接入设备上的各个用户侧端口同时下发第一 广播以太帧, 或令所有接入设备依次发送上述第一广播以太帧, 也即一接入 设备的用户侧端口下发第一广播以太帧发送完成后, 另一接入设备的用户侧 端口再下发第一广播以太帧。
当然也可以令部分或特定接入设备下发上述第一广播以太帧, 本领域技 术人员可视实际需要设定: 例如根据以往经验, 某一或某些接入设备的用户 侧端口易与其他设备或端口产生环网, 则可增加其发送第一广播以太帧的频 率, 以便及时发现环网。
在本发明其他实施例中, 参见图 3 , 步骤 S201具体还可包括:
S301、 通过支持 VLAN ( Virtual Local Area Network, 虚拟局域网 ) 的用 户侧端口, 向该端口所属的 VLAN发送携带有相应 VLAN标签的第一广播以 太帧;
S302、通过不支持 VLAN的用户侧端口,发送未携带 VLAN标签的( untag ) 第一广播以太帧。
上述 VLAN标签包括 VLAN值, 可用于识别不同的 VLAN。 假设, 某一 用户侧端口属于 5个 VLAN, 则该用户侧端口需要向这 5个 VLAN分别发送 携带有不同 VLAN标签的第一广播以太帧。
这样第一广播以太帧就分为两种: 一种是携带 VLAN标签的, 一种是不
携带 VLAN标签的。 本发明后续将对第一广播以太帧的结构进行详细描述。
5202、 监听各个用户侧端口。
当然在其他实施例中, 也可以同时监听用户侧端口和网络侧端口。 另夕卜, 步骤 S201与 S202的顺序可以互换, 但当先执行监听动作时, 监听动作是始 终、 时刻都在执行的。
5203、 如果接收到所述广播以太帧, 则确定接收到所述广播以太帧的用 户侧端口下的用户设备存在环网。
意即无论是监听到携带有 VLAN标签的第一广播以太帧还是监听到 untag 第一广播以太帧, 均确定存在环网。
在本发明其他实施例中, 当监听到携带有 VLAN标签的第一广播以太帧 时, 上述确定接收到所述第一广播以太帧的用户侧端口下的用户设备存在环 网的具体实施方式可包括:
根据所述第一广播以太帧的虚拟局域网标签, 确定与所述第一虚拟局域 网标签对应的虚拟局域网发生环网。
可以看出, 在本实施例中, 接入设备在发送第一广播以太帧后, 如果接 入网中存在环网, 第一广播以太帧将被环网中的接入设备接收。 因此, 一旦 有接入设备监听到第一广播以太帧时, 即可确定接入网中存在环网。 从而可 根据检测出的环网进行数据分析或进行处理。
在本发明其他实施例中, 在确定存在环网后, 还可执行环网破除措施。 而在执行环网破除措施时, 则需要选取破除环网的动作实施点。 该动作实施 点既可选择上述第一广播以太帧的接收端, 也可选择其发送端。
当选择上述第一广播以太帧的接收端作为动作实施点时, 参见图 4, 以上 所有实施例中的方法, 在步骤 S203后还可包括如下步骤:
S404、 对监听到上述第一广播以太帧的端口进行环网破除措施。
而当选择上述第一广播以太帧的发送端作为动作实施点时, 参见图 5 , 以 上所有实施例中的方法还需要包括以下步骤:
S505、 通过用户侧端口发送第二广播以太帧, 该用户侧端口为接收所述 第一广播以太帧的用户侧端口。 步骤 S505主要用于确定第一广播以太帧的发送端。 参见图 6: 用个设备
Al到 An分别通过用户侧接口 A1到用户侧接口 An接入接入设备 A, 所述接 入设备 A通过网络侧接口接入汇聚交换机, 通过所述汇聚交换机进而接入各 种网络。用户设备 B1到 Bn分别通过用户侧接口 B1到用户侧接口 Bn接入接 入设备 B, 通过所述接入设备 B接入汇聚交换机进而接入各种网络, 其中所 述接入设备可以为数字用户线访问多路复用器( Digital Subscriber Line Access Multiplexer, DSLAM )或者光线路终端 (Optical Line Terminal, OLT )等, 用户设备可以为各种用户终端, 例如: 光网络单元(Optical Network Unit, ONU )等。 下面基于上述的组网结构图具体讲解其中一个应用场景: 接入设备 A的 用户侧端口 A1至 An分别连接用户设备 A1至 An,而接入设备 B的用户侧端 口 B1至 Bn分别连接用户设备 B1至 Bn, 并且用户设备 An与用户设备 B1 形成环网。
当接入设备 A通过用户侧端口 A1至 An向其用户设备 Al-An发送第一 广播以太帧 Efl时, 用户设备 B1可接收上述第一广播以太帧 Efl , 进而接入 设备 B可接收到上述第一广播以太帧 Efl。 而如果用户设备 B1反向发送第二 广播以太帧 EG, 则第二广播以太帧 E 将沿原路返回至用户设备 An上及至 接入设备 A上。 这样, 即找到了第一广播以太帧 Efl的发送端 An。
在本发明其他实施例中, 步骤 S505的具体方式可包括:
当用户侧端口接到到的第一广播以太帧携带有 VLAN标签时, 通过该用 户侧端口发送携带同样 VLAN标签的第二广播以太帧;
当用户侧端口接到到的第一广播以太帧未携带有 VLAN标签时, 通过该 用户侧端口发送未携带 VLAN标签的第二广播以太帧。
当然, 由于一个用户侧端口可能属于不同的 VLAN, 上述接收到携带有 VLAN 标签的第一广播以太帧的用户侧端口也可如步骤 S301 —样, 向多个 VLAN分别发送携带有相应 VLAN标签的第二广播以太帧。 因为向未存在环 网的 VLAN发送第二广播以太帧, 接入网设备不会接到来自未存在环网的 VLAN的第二广播以太帧。
在本发明其他实施例中, 参见图 7, 在步骤 S505后还可包括如下步骤:
S706, 监听各个用户侧端口; 需要说明的是, 如果步骤 S202的监听动作
为始终、 时刻进行的, 则步骤 S706可省略。
5707、 如果接收到上述第二广播以太帧, 则确定接收到上述第二广播以 太帧的用户侧端口下的用户设备存在环网。
5708、 对监听到上述第二广播以太帧的端口进行环网破除措施。
上述所有实施例的提供的环网监测方法可以应用到下面各种应用场景 中, 请参见图 8a至图 8e, 其中, 图 8a-8c为用户设备之间的环网应用场景, 而图 8d-8e为用户设备与网络设备的环网。 具体为: 图 8a为一个用户设备通 过接入设备的用户侧端口与一个接入设备相连接, 其中所述用户设备自身产 生环网的场景; 图 8b为至少两个设备分别通过接入设备上的各用户侧端口与 一个接入设备相连接, 其中所述至少两个用户设备之间产生的环网 (另, 图 中的用户侧端口为统一接口, 具体可以包括至少两个用户侧端口, 使得用户 设备分别通过各自对应的用户侧端口连接到接入设备上, 这里就没有具体画 出); 图 8c为用户设备 1通过接入设备 1的用户侧端口 1与接入设备 1相连 接, 用户设备 2通过接入设备 2的用户侧端口 2与接入设备 2相连接, 其中 所述用户设备 1和用户设备 2之间存在环网的应用场景; 图 8d为用户设备与 接入设备之间存在环网的应用的场景; 图 8e为用户设备 1与接入设备 2之间 存在环网、 接入设备 1与用户设备 2之间存在环网的应用场景。 可以通过上 述实施例提供的环网监测方法对上述各种应用场景中进行环网监测, 进而可 以自动监测出哪些设备存在环网, 以及如何破除环网。 另, 前已述及, 网络侧端口一般可通过 STP协议来环网监测和环网破除, 因此本发明着重关注的是对用户侧端口如何进行环网监测和环网破除, 但上 述所有实施例中的监听、 下发广播以太帧、 环网破除措施等都可应用在网络 侧端口上。
尤其是下发第二广播以太帧时, 由于当有用户侧到网络侧的环网时, 会 在网络侧端口上监听到第一广播以太帧, 因此也可通过接收到第一广播以太 帧的网络侧端口下发第二广播以太帧, 以达到找出第一广播以太帧 Efl 的发 送端的目的。
无论是以第一广播以太帧的接收端还是以其发送端为环网破除执行点,
其环网破除措施的具体实现方式均类似, 下面将对其进行详细论述。
环网破除方式一: 禁止发送或者接收以太帧。 此处及下文提及的禁止接 收以太帧, 是指在接收到以太帧后将其丟弃。
需要注意的是, 禁止以太帧的接收和发送的方法依不同类型的用户侧端 口而不同, 例如对以太端口可以采取关闭端口的方式, 对 ADSL端口可以采 取去激活端口的方式等等, 本领域技术人员可视端口的类型进行灵活设计, 在此不作贅述。
当以第一广播以太帧的接收端为环网破除执行点时, 在确定接收到第一 广播以太帧的用户侧端口下的用户设备存在环网后, 上述 S404步骤的具体实 施方式包括:
禁止通过上述用户侧端口向其下的用户设备发送或者接收以太帧。
环网破除方式二, 当接收到的第一和 /或第二广播以太帧携带 VLAN标签 时,由此可根据 VLAN标签确定与该 VLAN标签对应的虚拟局域网发生环网, 因此, 禁止向该虚拟局域网发送或者接收以太帧; 此处及下文所提及的禁止 向该虚拟局域网接收以太帧是指, 端口在接收到携带有 VLAN标签的以太帧 时, 先检查其 VLAN值是否与该端口接收到的第一广播以太帧或第二广播以 太帧对应的 VLAN值相符, 如果相符则将所接收到的以太帧丟弃。
以用户侧端口属于 5个 VLAN ( VLAN VLAN5 )为例, 在用户侧端口向 VLAN VLAN5分别发送携带有 VLAN标签 EF - EF15的第一或第二广播以 太帧 (EFl i- EF15 顺次与 VLAN - VLAN5相对应 )后, 如果在某一接入设备 的端口上监听到携带有 EF 的第一或第二广播以太帧, 则在该端口上禁止携 带 EF1 i的以太帧的接收和发送。
另外, 所述禁止发送或者接收的以太帧可以包括: 第一广播以太帧, 和 / 或第二广播以太帧等用来监测环网的以太帧, 还可以包括用来数据通信的以 太帧。
下面对第一广播以太帧进行介绍。
参见图 9a, 在本实施例中, untag第一广播以太帧包括封装头部和有效载 荷, 其中, 封装头部包括:
1 , 目的 MAC地址 ( DMAC ) 901 : 目的 MAC地址为全 1 , 即为广播地
址。
2, 源 MAC地址 ( SMAC ) 902: 源 MAC地址可以是任意合法的 MAC 地址。通常填写的是发出该以太帧的接入设备的桥 MAC地址, 或者发出该以 太帧的接入设备的其他合法 MAC地址。在本实施例中填写的是接入设备的桥 MAC地址。
3 , 环网检测以太类型 ( Ringcheck ETYPE ) 903: Ringcheck ETYPE既用 于标识是否用于环网检测, 另外, 也用于指示下述有效载荷 904 以何种以太 帧格式进行解析。 由于接入设备的用户侧端口在发送上述第一广播以太帧的 同时, 还可能发送其他广播以太帧。 因此, 为了与其他广播以太帧相区别, 防止下述有效载荷 904被当作知名的协议格式被处理, 本实施例选择以太类 型一 0x8300 (本文后续将对 0x8300进行介绍)作为其环网检测以太类型, 当 然, 本领域技术人员也可以选择其他非知名的以太类型作为第一广播以太帧 的环网检测以太类型。
4, 有效载荷 904: 有效载荷至少需要包含第一广播以太帧的发送端标记 信息。 在本实施例中, 上述发送端标记信息包括发送该第一广播以太帧的接 入设备的桥 MAC地址,发送端的端口类型,发送端的端口编号以及发送端的 VLAN信息。本领域技术人员可以理解的是, 当第一广播以太帧携带有 VLAN 标签时, 其有效载荷所包含的发送端标记信息中填写有相应的 VLAN信息, 而当第一广播以太帧未携带有 VLAN标签时, 其有效载荷所包含的 VLAN信 息可为空。
另外, 虽然在第一广播以太帧的封装头部, 已经在源 MAC地址域中填写 了接入设备的桥 MAC (携带有 VLAN标签的 ,在 VLAN域中还填写了 VLAN 值), 但在有效载荷中再次提供这些信息, 以便接入设备在按照协议分层原则 处理以太帧的有效载荷时, 能方便地提取发送端标记信息。
至于第二广播以太帧, 其结构既可与上述第一广播以太帧相同, 也可不 同。 只要其可被识别, 并不被误认为其他知名以太帧或第一广播以太帧即可。 在第二广播以太帧结构与第一广播以太帧相同的情况下, 还需要在有效载荷 区中插入正反标识, 该正反标识可用于标识该以太帧为第一广播以太帧, 还 是反向发送的第二广播以太帧。 在具体实施时, 可用 "0"、 " 1 " 或其他有明
显区别的数字或字符来分别表征该以太帧为第一广播以太帧还是第二广播以 太帧。
在实际应用中, 接入设备有可能监听到很多种类型的以太帧, 此时, 可 以根据目的 MAC地址是全 1的广播地址和 /或以太帧类型是预先约定的环网 检测以太类型(本实施例是 0x8300 ), 而从监听到的以太帧中识别出第一或第 二广播以太帧。
因此, 上述步骤 S203或 S707具体可为:
对监听到的以太帧进行识别,当该以太帧的 MAC地址是全 1的广播地址 和 /或以太类型为预设的用于标识环网检测的环网检测以太类型时, 判定用户 侧端口下的用户设备存在环网。
除了 Untag外, 第一和 /或第二广播以太帧均可携带 VLAN标签, 并可根 据需要插入一层或多层 VLAN标签,每一层 VLAN标签中均包含有 VLAN值
( VLAN值可称为 VLAN tag,或称 VLAN ID )。 图 9b示出了携带两层 VLAN 标签的广播以太帧的一种结构, 其依次包括: DMAC901、 SMAC902 , 0x88a8/0x8100、 两个字节 (内容为 802.1p标记 +DEI位 +VLAN tag )、 0x8100、 两个字节 (内容为 802. lp 标记 +DEI位 +VLAN tag ), Ringcheck ETYPE903
( 0x8300 )、 有效载荷 904。 当然也可根据需要插入其他层数 VLAN标签, 在 此不再赘述。
上述 0x8100、 0x88a8和 0x8300都为以太类型。 其中, 0x88a8是 IEEE 802.1 AD定义的外层 VLAN的以太类型, 0x8100是 IEEE 802.1 Q定义的 VLAN 的以太类型, 至于前述提及的 0x8300目前没有国际标准定义, 因此被本发明 的实施例用于标示标识是否用于环网检测。
因为解析报文是从封装头部开始的, 因此本实施例将在解析时遇到的第 一个 VLAN标签称为第一层 VLAN标签, 并依此类推。 那么, 在具有三层 VLAN标签时 , 第三层 VLAN标签距有效载荷最近, 而第一层 VLAN标签距 有效载荷最远。 当然, 无论 VLAN标签存在多少个, 第一层 VLAN标签总是 距有效载荷最远的那个。
在环网广播以太帧携带第一层至第 N ( N>2 )层 VLAN标签时, 上述环 网破除方式二可进一步细化为:
1 , 禁止对携带有第一层 VLAN标签的以太帧进行接收和发送。
2, 禁止对携带有第一层 VLAN标签和第二层 VLAN标签的以太帧进行 接收和发送;
3 , 禁止对携带有第一层 VLAN标签至第三层 VLAN标签的以太帧进行 接收和发送;
4, 禁止对携带有第一层 VLAN标签至第 M ( N>M> 1 )层 VLAN标签 的以太帧进行接收和发送。
上述论及了端口在接收到携带有 VLAN标签的第一或第二环网广播以太 帧时, 如何进行环网破除措施。
下面将介绍在支持 VLAN的端口接收到 untag第一或第二广播以太帧, 如何进行环网破除措施。
上述 untag第一或第二广播以太帧可能来自于普通 LAN或默认的 VLAN。 当然, 在具体实现时, 即使上述 untag 第一或第二广播以太帧并非来自 VLAN, 支持 VLAN的端口也会将该 untag广播以太帧与某一 VLAN相关联 (该 VLAN其实就是上述 untag第一广播以太帧对应的 LAN )。
在对接收到 untag广播以太帧的端口进行环网破除,既可禁止该端口对所 有 untag以太帧的接收和发送, 也可以禁止该端口接收来自上述 untag广播以 太帧所对应的 VLAN或 LAN的以太帧 ,并禁止向上述 VLAN或 LAN发送以 太帧。
类似的, 此处所提及的禁止接收来自上述 VLAN或 LAN的以太帧是指, 端口在接收到 untag以太帧时, 先检查其对应的 VLAN或 LAN是否是上述 VLAN或 LAN, 如果是则将所接收到的以太帧丟弃。 与之相对应, 本发明实施例还提供了一种可实施上述方法的接入设备, 图 10示出了该接入设备 100的一种结构, 包括:
第一发送单元 101 ,用于通过接入设备上的各个用户侧端口下发第一广播 以太帧给各个用户设备;
监听单元 102, 用于监听所述各个用户侧端口;
第一环网确定单元 103 , 用于如果接收到所述第一广播以太帧, 则确定接
收到所述第一广播以太帧的用户侧端口下的用户设备存在环网。
相对应的, 参见图 11 , 在本发明其他实施例中, 上述所有实施例中的接 入设备还可包括第一破除单元 111 , 该第一破除单元 111用于实施环网破除措 施, 在本实施例中, 上述环网破除措施具体包括禁止通过所述用户侧端口向 所述用户设备发送或者接收所述广播以太帧。
当然, 上述第一破除单元 111 也可独立于接入设备之外, 只要其可进行 环网破除措施即可。
在本发明其他实施例中, 参见图 12, 上述接入设备还可包括:
第二发送单元 121 , 用于在监听单元 102监听到上述第一广播以太帧后, 通过接收到上述第一广播以太帧的用户侧端口发送第二广播以太帧。 当然, 第一发送单元 101和第二发送单元 121可合并为一个单元。 相对应的, 参见图 13 , 在本发明其他实施例中, 上述所有实施例中的接 入设备还可包括第二环网确定单元 131和第二破除单元 132, 其中, 第二环网 确定单元 131 用于如果接收到上述第二广播以太帧, 则确定接收到上述第二 广播以太帧的用户侧端口下的用户设备存在环网; 第二破除单元 132, 用于对 接收到上述第二广播以太帧用户侧端口执行环网破除措施。 在本实施例中, 上述环网破除措施具体包括: 禁止通过接收到上述第二广播以太帧用户侧端 口向上述用户设备发送或者接收以太帧。 当然, 上述第二破除单元 131 也可 独立于接入设备之外。
需要说明的是, 第二破除单元 131和第一破除单元 111可择一存在, 也 可并存。
第二破除单元 131和第一破除单元 111并存时, 可理解为, 接入设备具 有两种环网监控模式, 模式一中并不发送第二广播以太帧, 第一破除单元 111 在模式一下工作。 而模式二发送第二广播以太帧, 第二破除单元 131 在模式 二下工作。
与之相对应, 本发明实施例还提供了一种可实施上述方法的网络系统, 参见图 14, 该系统包括接入设备 141和用户设备 142, 接入设备 141通过用 户侧端口与用户设备 142连接, 其中:
接入设备 141 ,用于通过上述用户侧端口下发第一广播以太帧给各个用户 设备 142; 并监听上述用户侧端口; 如果接收到上述第一广播以太帧, 则确定 接收到第一广播以太帧的用户侧端口下的用户设备存在环网;
用户设备 142, 用于接收接入设备 141下发的第一广播以太帧, 并转发。 在本发明其他实施例中, 上述系统中的接入设备 141 ,还可用于禁止通过 上述用户侧端口向上述用户设备 142发送或者接收以太帧。
在本发明其他实施例中, 上述所有实施例中的接入设备 142还可用于通 过接收上述第一广播以太帧的用户侧端口发送第二广播以太帧。
在本发明其他实施例中, 上述所有实施例中的接入设备 142还可用于如 果接收到上述第二广播以太帧, 则确定接收到上述第二广播以太帧的用户侧 端口下的用户设备存在环网; 以及, 禁止通过接收到上述第二广播以太帧用 户侧端口向所述用户设备发送或者接收以太帧。
上述装置及系统中所涉及的监听、 下发广播以太帧、 确定环网, 环网破 除措施可参照上述方法所披露的内容, 在此不作贅述。
需要指出的是, 上述实施例只是本发明所介绍的优选实施例, 本领域技 术人员在此基石出上, 完全可以设计出更多的实施例, 在此不作贅述。
本说明书中各个实施例采用递进的方式描述, 每个实施例重点说明的都 是与其他实施例的不同之处, 各个实施例之间相同相似部分互相参见即可。
本领域普通技术人员可以意识到, 结合本文中所公开的实施例描述的各 示例的单元及算法步骤, 能够以电子硬件、 计算机软件或者二者的结合来实 现, 为了清楚地说明硬件和软件的可互换性, 在上述说明中已经按照功能一 般性地描述了各示例的组成及步骤。 这些功能究竟以硬件还是软件方式来执 行, 取决于技术方案的特定应用和设计约束条件。 专业技术人员可以对每个 特定的应用来使用不同方法来实现所描述的功能, 但是这种实现不应认为超 出本发明的范围。
所属领域的技术人员可以清楚地了解到, 为描述的方便和简洁, 上述描 述的系统、 装置和单元的具体工作过程, 可以参考前述方法实施例中的对应 过程, 在此不再贅述。
在本申请所提供的几个实施例中, 应该理解到, 所揭露的系统、 装置和
方法, 可以通过其它的方式实现。 例如, 以上所描述的装置实施例仅仅是示 意性的, 例如, 所述单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可 以有另外的划分方式, 例如多个单元或组件可以结合或者可以集成到另一个 系统, 或一些特征可以忽略, 或不执行。 另一点, 所显示或讨论的相互之间 的耦合或直接耦合或通信连接可以是通过一些接口, 装置或单元的间接耦合 或通信连接, 可以是电性, 机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的, 作 为单元显示的部件可以是或者也可以不是物理单元, 即可以位于一个地方, 或者也可以分布到多个网络单元上。 可以根据实际的需要选择其中的部分或 者全部单元来实现本实施例方案的目的。
另外, 在本发明各个实施例中的各功能单元可以集成在一个处理单元中 , 也可以是各个单元单独物理存在, 也可以两个或两个以上单元集成在一个单 元中。 上述集成的单元既可以采用硬件的形式实现, 也可以采用软件功能单 元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售 或使用时, 可以存储在一个计算机可读取存储介质中。 基于这样的理解, 本 发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的 全部或部分可以以软件产品的形式体现出来, 该计算机软件产品存储在一个 存储介质中, 包括若干指令用以使得一台计算机设备(可以是个人计算机, 服务器, 或者网络设备等)执行本发明各个实施例所述方法的全部或部分步 骤。 而前述的存储介质包括: U盘、移动硬盘、只读存储器(ROM, Read-Only Memory ), 随机存取存储器(RAM, Random Access Memory )、 磁碟或者光盘 等各种可以存储程序代码的介质。 对所公开的实施例的上述说明, 使本领域专业技术人员能够实现或使用 本发明。 对这些实施例的多种修改对本领域的专业技术人员来说将是显而易 见的, 本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,
在其它实施例中实现。 因此, 本发明将不会被限制于本文所示的这些实施例, 而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。
Claims
1、 一种环网监测方法, 其特征在于, 所述方法包括:
监听各个用户侧端口;
通过接入设备上的各个用户侧端口下发第一广播以太帧给各个用户设备; 如果接收到所述第一广播以太帧, 则确定接收到所述第一广播以太帧的用 户侧端口下的用户设备存在环网。
2、 根据权利要求 1所述的方法, 其特征在于, 在确定接收到所述第一广播 以太帧的用户侧端口下的用户设备存在环网后, 所述方法还包括:
禁止通过所述用户侧端口向所述用户设备发送或者接收以太帧。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 所述第一广播以太帧为 携带虚拟局域网标签的广播以太帧。
4、 如权利要求 3所述的方法, 其特征在于, 所述确定接收到所述第一广播 以太帧的用户侧端口下的用户设备存在环网的具体实施方式包括:
根据所述第一广播以太帧的虚拟局域网标签, 确定与所述第一虚拟局域网 标签对应的虚拟局域网发生环网。
5、 如权利要求 4所述的方法, 其特征在于, 在确定与所述虚拟局域网标签 对应的虚拟局域网发生环网后, 所述禁止通过所述用户侧端口向所述用户设备 发送或者接收以太帧的具体实施方式包括:
禁止向所述虚拟局域网发送或者接收以太帧。
6、根据权利要求 1-5任意一项所述的方法, 其特征在于, 所述方法还包括: 通过用户侧端口发送第二广播以太帧, 所述用户侧端口为接收所述第一广播以 太帧的用户侧端口。
7、 根据权利要求 6所述的方法, 其特征在于, 所述方法还包括:
如果接收到所述第二广播以太帧, 则确定接收到所述第二广播以太帧的用 户侧端口下的用户设备存在环网;
禁止通过接收到所述第二广播以太帧用户侧端口向所述用户设备发送或者 接收以太帧。
8、 一种接入设备, 其特征在于, 所述接入设备包括:
第一发送单元, 用于通过接入设备上的各个用户侧端口下发第一广播以太 帧给各个用户设备;
监听单元, 用于监听所述各个用户侧端口;
第一环网确定单元, 用于如果接收到所述第一广播以太帧, 则确定接收到 所述第一广播以太帧的用户侧端口下的用户设备存在环网。
9、 根据权利要求 8所述的设备, 其特征在于, 还包括:
第一破除单元, 用于禁止通过所述用户侧端口向所述用户设备发送或者接 收所述广播以太帧。
10、 根据权利要求 9或 8所述的设备, 其特征在于, 还包括:
第二发送单元, 用于通过用户侧端口发送第二广播以太帧, 所述用户侧端 口为接收所述第一广播以太帧的用户侧端口。
11、 如权利要求 10所述的设备, 其特征在于, 还包括:
第二环网确定单元, 用于如果接收到所述第二广播以太帧, 则确定接收到 所述第二广播以太帧的用户侧端口下的用户设备存在环网;
第二破除单元, 用于禁止通过接收到所述第二广播以太帧用户侧端口向所 述用户设备发送或者接收以太帧。
12、 一种网络系统, 其特征在于, 所述系统包括: 接入设备和用户设备, 所述接入设备提供用户侧端口, 所述接入设备通过所述用户侧端口与所述用户 设备连接, 其中,
所述接入设备, 用于通过所述用户侧端口下发第一广播以太帧给各个用户 设备; 并监听所述用户侧端口; 如果接收到所述第一广播以太帧, 则确定接收 到所述第一广播以太帧的用户侧端口下的用户设备存在环网;
所述用户设备, 用于接收接入设备下发的第一广播以太帧, 并转发。
13、 根据权利要求 12所述的系统, 其特征在于, 所述接入设备, 还用于禁 止通过所述用户侧端口向所述用户设备发送或者接收以太帧。
14、 根据权利要求 12或 13所述的系统, 其特征在于, 所述接入设备还用 于通过用户侧端口发送第二广播以太帧, 所述用户侧端口为接收所述第一广播 以太帧的用户侧端口。
15、 根据权利要求 14所述的系统, 其特征在于, 所述接入设备还用于如果 接收到所述第二广播以太帧, 则确定接收到所述第二广播以太帧的用户侧端口 下的用户设备存在环网; 以及, 禁止通过接收到所述第二广播以太帧用户侧端 口向所述用户设备发送或者接收以太帧。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110167897.3 | 2011-06-21 | ||
CN201110167897.3A CN102263658B (zh) | 2011-06-21 | 2011-06-21 | 接入网环网监控方法、接入设备及网络系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012175035A1 true WO2012175035A1 (zh) | 2012-12-27 |
Family
ID=45010127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/077345 WO2012175035A1 (zh) | 2011-06-21 | 2012-06-21 | 接入网环网监控方法、接入设备及网络系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102263658B (zh) |
WO (1) | WO2012175035A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102263658B (zh) * | 2011-06-21 | 2014-04-16 | 华为技术有限公司 | 接入网环网监控方法、接入设备及网络系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1747443A (zh) * | 2004-09-10 | 2006-03-15 | 华为技术有限公司 | 提高宽带接入设备用户接入容量的方法 |
CN1848751A (zh) * | 2005-04-04 | 2006-10-18 | 华为技术有限公司 | 在数字用户线集中器上防止用户侧环网的方法 |
CN101184013A (zh) * | 2007-12-13 | 2008-05-21 | 杭州华三通信技术有限公司 | 一种避免产生环路的方法、主节点和系统 |
CN102263658A (zh) * | 2011-06-21 | 2011-11-30 | 华为技术有限公司 | 接入网环网监控方法、接入设备及网络系统 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7283524B2 (en) * | 2004-01-23 | 2007-10-16 | Metro Packet Systems Inc. | Method of sending a packet through a node |
US7706258B2 (en) * | 2004-12-22 | 2010-04-27 | Alcatel Lucent | System and method for detecting loops in a customer-provider bridge domain |
CN101170462A (zh) * | 2007-12-07 | 2008-04-30 | 杭州华三通信技术有限公司 | 树型网络下行环路检测方法及装置 |
CN101562552B (zh) * | 2009-05-27 | 2011-09-14 | 华为技术有限公司 | 一种虚拟专用局域网环路检测的方法、系统和设备 |
-
2011
- 2011-06-21 CN CN201110167897.3A patent/CN102263658B/zh active Active
-
2012
- 2012-06-21 WO PCT/CN2012/077345 patent/WO2012175035A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1747443A (zh) * | 2004-09-10 | 2006-03-15 | 华为技术有限公司 | 提高宽带接入设备用户接入容量的方法 |
CN1848751A (zh) * | 2005-04-04 | 2006-10-18 | 华为技术有限公司 | 在数字用户线集中器上防止用户侧环网的方法 |
CN101184013A (zh) * | 2007-12-13 | 2008-05-21 | 杭州华三通信技术有限公司 | 一种避免产生环路的方法、主节点和系统 |
CN102263658A (zh) * | 2011-06-21 | 2011-11-30 | 华为技术有限公司 | 接入网环网监控方法、接入设备及网络系统 |
Also Published As
Publication number | Publication date |
---|---|
CN102263658B (zh) | 2014-04-16 |
CN102263658A (zh) | 2011-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100733020B1 (ko) | 사용자 mac 프레임 전송방법, 에지 브리지 및 프로그램을 기록한 기록 매체 | |
CN101816168B (zh) | Vrrp和学习网桥cpe | |
CN101047618B (zh) | 获取网络路径信息的方法和系统 | |
KR101357457B1 (ko) | 브리징된 네트워크에서의 포인트-투-멀티포인트 기능 | |
KR101548034B1 (ko) | 프로바이더 네트워크에서의 cc 메시지 송신의 감소 | |
WO2011069419A1 (zh) | 一种IPv6报文的处理方法、设备和系统 | |
US8861371B2 (en) | Service status signaling in Ethernet networks | |
US20220060344A1 (en) | Method for indicating multicast forwarding entry and device | |
WO2009127128A1 (zh) | 一种防止以太无源光网络中下行数据洪泛的方法 | |
WO2006114053A1 (fr) | Procede, systeme et appareil visant a empecher la contrefacon d’une adresse mac | |
US9270480B1 (en) | Systems and methods for Ethernet-based management of optical networks using OMCI | |
WO2007124679A1 (fr) | Procédé et système de communication en réseau | |
WO2011032321A1 (zh) | 一种数据转发方法、数据处理方法、系统以及相关设备 | |
CN101902397B (zh) | 一种报文的转发方法及交换芯片 | |
WO2011147348A1 (zh) | 接入节点的业务控制方法和装置 | |
WO2010028578A1 (zh) | 一种光网络设备上感知服务提供商的方法、设备和系统 | |
CN102281165A (zh) | 一种基于服务质量的故障检测方法、系统和装置 | |
WO2009135422A1 (zh) | 一种QinQ内广播的实现方法和装置 | |
WO2014101185A1 (zh) | 组播通道的性能检测方法、装置和系统 | |
WO2012175035A1 (zh) | 接入网环网监控方法、接入设备及网络系统 | |
WO2011057544A1 (zh) | 一种基于802.3ah协议实现点到多点OAM的方法及系统 | |
US9094313B2 (en) | Data and media access controller (MAC) throughputs | |
CN105307059B (zh) | 一种在pon内实现qinq语音业务互通的系统及方法 | |
JP4297437B2 (ja) | ブリッジ装置のループ検出方法とプログラムおよびブリッジ装置 | |
WO2012016471A1 (zh) | 一种拓扑收敛方法和服务提供商边缘设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12803252 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12803252 Country of ref document: EP Kind code of ref document: A1 |