WO2013082819A1 - 一种二层网络环路处理的方法、装置及网络设备 - Google Patents

一种二层网络环路处理的方法、装置及网络设备 Download PDF

Info

Publication number
WO2013082819A1
WO2013082819A1 PCT/CN2011/083791 CN2011083791W WO2013082819A1 WO 2013082819 A1 WO2013082819 A1 WO 2013082819A1 CN 2011083791 W CN2011083791 W CN 2011083791W WO 2013082819 A1 WO2013082819 A1 WO 2013082819A1
Authority
WO
WIPO (PCT)
Prior art keywords
port
mac address
source mac
packet
loop
Prior art date
Application number
PCT/CN2011/083791
Other languages
English (en)
French (fr)
Inventor
张夏
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN2011800031659A priority Critical patent/CN102625986A/zh
Priority to PCT/CN2011/083791 priority patent/WO2013082819A1/zh
Priority to EP12787626.6A priority patent/EP2627031A4/en
Priority to PCT/CN2012/073995 priority patent/WO2013082907A1/zh
Priority to CN2012800011490A priority patent/CN103125100A/zh
Priority to JP2014531076A priority patent/JP2014530548A/ja
Priority to KR1020147006136A priority patent/KR20140045578A/ko
Priority to US13/772,142 priority patent/US20130163596A1/en
Publication of WO2013082819A1 publication Critical patent/WO2013082819A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations

Definitions

  • the embodiments of the present invention relate to the field of communications technologies, and in particular, to a method, an apparatus, and a network device for processing a Layer 2 network loop.
  • the network is a widely used metropolitan area network solution.
  • each network device has a globally unique Medium Access Control (MAC) address, which often occurs during network equipment work.
  • the MAC address jumps.
  • MAC Medium Access Control
  • the network device learns the correspondence between the MAC address and the port of the packet. Before the MAC address is aged, the same source MAC address is obtained.
  • the address of the network device is unique.
  • the MAC address of each network device is usually unique. Therefore, the possibility of a MAC address hopping due to the repetition of the MAC address of the network device is small.
  • One of the main reasons for MAC address hopping is that the network forms a loop.
  • a network device of a user sends a packet, if the packet is sent to different ports of the same network device through two paths, the network forms a loop.
  • the MAC address flapping caused by the network loop can cause network storms and cause network congestion.
  • the Layer 2 network loop can be processed by the MAC address flapping MAC-F l ing processing method.
  • the method is based on MAC learning, and detects the transition of the corresponding port of a MAC address in the MAC forwarding table.
  • the current Mac-F ling method cannot accurately block the ports generated by the real loop, but all the participating transitions are The ports are blocked together or blocked in batches. As a result, some outbound ports that do not generate loops may be blocked. Users connected to these interfaces will not be able to continue. News.
  • the embodiments of the present invention provide a method, a device, and a network device for processing a Layer 2 network loop, which can accurately determine a port in which a loop occurs, and effectively solve the problem of a Layer 2 network loop.
  • the present invention provides a method for processing a Layer 2 network loop, including: receiving a packet sent by a user, and obtaining a source MAC address of the packet;
  • the receiving port of the packet is a port participating in the source MAC address hopping
  • the port that receives the probe packet is a port that generates a loop, and the port that generates the loop is blocked.
  • An embodiment of the present invention provides a device for processing a Layer 2 network loop, where the device includes: a receiving unit, configured to receive a packet sent by a user, obtain a source MAC address of the packet, and determine a unit, when the MAC If the latest port in the port associated with the source MAC address is inconsistent with the receiving port of the packet, it is determined that the source MAC address is hopped once, the port associated with the source MAC address, and the packet are The receiving port of the text is a port participating in the megacast of the source MAC address;
  • a detecting unit configured to: when the number of hops of the source MAC address reaches a preset hopping threshold, send a probe packet by using the port that participates in the hopping of the source MAC address;
  • the processing unit is configured to: when the probe packet is received, determine that the port that receives the probe packet is a port that generates a loop, and blocks the loop generating port.
  • the embodiment of the invention provides a network device for processing a layer 2 network loop, and the network device includes the device provided by the embodiment of the invention.
  • the embodiments of the present invention provide a method, a device, and a network device for processing a Layer 2 network loop, which can accurately determine a port in which a loop occurs, effectively solve the problem of a Layer 2 network loop, and ensure network operation. Reliability.
  • FIG. 1 is a flow chart of a method for processing a Layer 2 network loop according to a first embodiment of the present invention
  • FIG. 2 is a schematic diagram of a method for processing a Layer 2 network loop according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a Layer 2 network loop processing apparatus according to a second embodiment of the present invention
  • FIG. 4 is a schematic diagram of another layer 2 network loop processing apparatus according to a second embodiment of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • FIG. 1 is a flowchart of a method according to an embodiment of the present invention, including:
  • the MAC address learning mechanism of the network device is: When the port receives an unknown source MAC address, the MAC address is added to the port that receives the text, so that subsequent packets destined for the MAC address can be forwarded. Directly forwarding, at the same time, the MAC address is added to the MAC address table saved by the network device.
  • the MAC address table is a collection of source MAC addresses received by the network device, and each MAC address entry includes a MAC address and The port with the MAC address associated with the MAC address is received from the port, and the port associated with the MAC address may include multiple ports.
  • both the port A and the port B are associated with the MAC.
  • the last port that receives the MAC packet as the source MAC address is the latest port associated with the MAC. If the MAC address is received from the port C, the port C is the same as the port C. The MAC has the latest end of the relationship Port B is no longer affiliated with the newest port of the MAC.
  • the network device After receiving the packet sent by the user, the network device obtains the source MAC address of the packet by using the source MAC address and searches the MAC table saved by the network device to find the MAC address table.
  • the source MAC address already exists, and the latest port in the port associated with the source MAC address is not the port on which the network device receives the packet sent by the user, and the source MAC address is considered to have a transition.
  • the port associated with the MAC address and the receiving port of the packet in the MAC address table of the network device are considered to be the ports participating in the hopping of the source MAC address, and all participating in the source MAC address hopping
  • the port may have a loop, and the probe packet needs to be sent through the port that is involved in the source MAC address hopping.
  • some MAC addresses may occasionally jump due to network device administrator operations. However, this does not affect the normal network function. To avoid sending such probe packets frequently, you can set a preset hop threshold in advance. By default, the preset hop threshold is set to 1, when the source MAC address hops.
  • the network When the number of times exceeds the preset hopping threshold, the network considers that a loop occurs, and the probe packet is sent by the port participating in the source MAC address hopping. For example, when the preset hop threshold is preset. At 3 o'clock, the network device receives the packet whose source MAC address is the MAC address N. In 1 second, the port that receives the packet with the MAC address N as the source MAC address changes from port A to port B, and then from port B to port B. Port A, and then from port C to port D, it is considered that the port A, port B, port C, and port D participating in the source MAC address N mega-transformation may have a loop, and then through port A, port B, port C, port D points Do not send probe packets.
  • the number of MAC address hops also includes multiple hops between several ports. For example, the port that receives the packet with the MAC address N as the source MAC address changes from port A to port B. Then, from port B to port A, and then from port A to port B, three MAC address mega-generations have occurred.
  • the embodiment of the present invention before sending the probe packet by the port participating in the hopping of the source MAC address, the embodiment of the present invention further performs grouping according to the priority of the port participating in the hopping of the source MAC address. For the high-priority group and the low-priority group, the port that belongs to the low-priority group sends the probe packet preferentially, and sends the probe packet to the port of the high-priority group. This prevents high-priority.
  • the impact of the service is because, in the actual live network application, the port connecting the user is likely to be looped. Therefore, the low-priority port preferentially sends the probe packet. When the loop is found, the packet is preferentially blocked. , so as to minimize the impact on high priority port services.
  • the probe packet may be a data packet of the Ether type. For a specific packet encapsulation format, refer to RFC 894. 108. When the probe packet is received, it is determined that the port that receives the probe packet is a port that generates a loop, and the port that generates the loop is blocked.
  • the user equipment or the server that is connected to the port that is involved in the hopping of the source MAC address is directly discarded in the normal case, only when the user equipment or the server has a loop.
  • the probe packet is directly transparently transmitted and returned along the detection packet sending path. If the network device receives the probe packet from any port participating in the source MAC address hopping, the network device considers that the probe packet is received.
  • the port of the probe packet is a port that generates a loop, and the port that generates the loop is blocked to stop its working capability, thereby solving the problem that the loop port affects the network.
  • the low-priority group sends the probe packet preferentially according to the step 106.
  • the packet is preferentially blocked, and the impact on the high-priority service can be avoided as much as possible.
  • a preset unblocking time threshold is set in advance, and when the outbound port of the loop is blocked to reach the preset unblocking time threshold, the outbound port of the loop is unblocked. , make it work properly. In actual applications, some ports with loops can be repaired by themselves. Therefore, if the unblocked port does not participate in the MAC address hopping, it will not be blocked again. If it participates in the MAC address hopping, Corresponding processing is performed according to the solution provided by the embodiment of the present invention.
  • port 1 and port 2 are connected to common users, and port 3 is connected to the server.
  • port 1 and port 2 of the common user are set to lower priority
  • port 3 of the server is set to high priority
  • preset preset threshold is set to 1
  • the preset unblocking time threshold is set to 60.
  • the network device receives the user from port 2, the network device obtains the address source MAC address as the address A.
  • the network device finds the port associated with the MAC address A in the MAC table as port 3 by using the MAC table.
  • the port 2 received by the user packet is inconsistent.
  • the port 2 and port 3 are involved in the MAC address A hopping.
  • the network device passes the port 2. 3 separately send probe packets, and further, group according to port priority, port 2 is assigned to the low-priority group.
  • the port 3 is assigned to the high-priority group.
  • the port 2 of the low-priority group sends the probe packet preferentially.
  • the port 1 does not need to send the probe packet when it does not participate in the MAC address-A transition.
  • the preset time is preset. When the unblocking time threshold is 60 seconds, the port 2 is unblocked and allowed to work normally.
  • the method provided by the embodiment can accurately determine the port where the loop occurs, effectively solve the problem of the layer 2 network loop, and ensure the reliability of the network operation, in particular, when there are multiple network devices.
  • the method of the embodiment of the present invention determines the port that participates in the MAC address hopping, and then sends the probe packet through the port that participates in the MAC address hopping. It can reduce the impact on the network device CPU occupation.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • FIG. 3 is a schematic diagram of a device according to an embodiment of the present invention.
  • the device includes a receiving unit 302, a determining unit 304, a detecting unit 306, and a processing unit 308. .
  • the receiving unit 302 is configured to receive a packet sent by the user, and obtain a source MAC address of the packet.
  • the determining unit 304 when the latest port in the port associated with the source MAC address in the MAC table is inconsistent with the receiving port of the _3 ⁇ 4 text, determining that the source MAC address has a hop, the source MAC address
  • the associated port and the receiving port of the message are ports participating in the source MAC address hopping;
  • the detecting unit 306 is configured to: when the number of hops of the source MAC address reaches a preset hopping threshold, send a probe packet by using the port that participates in the hopping of the source MAC address;
  • the correctness of MAC address learning determines whether users can communicate correctly.
  • Network equipment The MAC address learning mechanism is as follows: When a port receives an unknown source MAC address, it adds the MAC address to the port that receives the text, so that subsequent packets destined for the MAC address can be directly forwarded. At the same time, the MAC address is added to the MAC address table saved by the network device.
  • the MAC address table is a set of source MAC addresses received by the network device, and each MAC address entry includes a MAC address and the MAC address.
  • a port having an association relationship, where the association relationship is that the packet with the MAC address as the source MAC address is received from the port, and the port associated with the MAC address may include multiple ports, such as a network device.
  • the port A receives the packet with the MAC as the source MAC address, and then receives the packet with the MAC as the source MAC address from port B. Then, port A and port B are the ports associated with the MAC. Finally, the port B that receives the MAC packet as the source MAC address is the latest port associated with the MAC. If the MAC address is received from the port C, the port C is associated with the MAC. The latest port of the relationship, port B Longer affiliated with the MAC's latest port.
  • the network device receiving unit 302 obtains the source MAC address of the packet by parsing the packet sent by the user, and the determining unit 304 searches the MAC table saved by the network device according to the source MAC address.
  • the source MAC address is found in the MAC address table, and the latest port in the port associated with the source MAC address is not the port on which the network device receives the packet sent by the user, and the source MAC address is considered as the source MAC address.
  • the detection unit 306 can preset a preset threshold.
  • the preset hopping threshold is set to 1.
  • the network When the number of hops of the source MAC address exceeds the preset hopping threshold, the network is considered to be in a loop, and then the hopping by the source MAC address is performed.
  • the port sends a probe message, for example, when the preset is set.
  • the preset hop threshold is 3
  • the network device receives the packet whose source MAC address is the MAC address N.
  • the port that receives the packet with the MAC address N as the source MAC address changes from port A to port B.
  • port B After port B is changed to port C and then changed from port C to port D, the port A, port B, port C, and port D participating in the source MAC address N hopping may be looped.
  • A, port B, port C, and port D send probe packets.
  • the number of MAC address hops also includes multiple hops between several ports. For example, receiving a packet with MAC address N as the source MAC address. The port changed from port A to port B, port B to port A, and then port A to port B. Three MAC address hops also occurred.
  • the apparatus for processing a layer 2 network loop may further include a priority grouping unit 310, as shown in FIG. Before the detecting unit 310 sends the probe packet, the priority grouping unit 310 performs grouping according to the priority of the port participating in the source MAC address hopping, and is divided into a high priority group and a low priority group.
  • the detecting unit 306 preferentially sends a probe packet to the port belonging to the low priority group according to the grouping situation of the grouping unit 310, and sends a probe packet to the port of the high priority group, so as to avoid
  • the impact of the high-priority service is because, in the actual network application, the port connecting the user is likely to be looped. Therefore, the low-priority port preferentially sends the probe packet. When the loop is found, the priority is given. Blocking to minimize the impact on high-priority port traffic.
  • the probe packet may be a data packet of a type of Ethernet. For a specific packet encapsulation format, refer to RFC 894.
  • the processing unit 308 is configured to: when receiving the probe packet, determine that the port that receives the probe packet is a port that generates a loop, and blocks the port that generates the loop.
  • the user equipment or the server that is connected to the port that is involved in the hopping of the source MAC address is directly discarded in the normal case, only when the user equipment or the server has a loop.
  • the probe packet is directly transparently transmitted and sent along the probe packet. If the network device processing unit 308 receives the probe packet from any of the ports participating in the source MAC address hopping, the port that receives the probe packet is the port that generates the loop. Block the loop-producing port and stop its working capacity, thus solving the problem that the loop port affects the network.
  • the low-priority group sends the probe packet preferentially. If the low-priority port fails, the packet is preferentially blocked. The impact on the high-priority service can be avoided as much as possible.
  • the processing unit 308 may preset a preset unblocking time threshold. When the outbound port of the loop is blocked to reach the preset unblocking time threshold, the loop is generated. The port is unblocked to make it work properly. In actual applications, some ports with loops can be repaired by themselves. Therefore, if the unblocked port does not participate in the MAC address hopping, it will not be blocked again. If it participates in the MAC address hopping, Corresponding processing is performed according to the solution provided by the embodiment of the present invention.
  • the device provided by the embodiment can accurately determine the port where the loop occurs, effectively solve the problem of the layer 2 network loop, and ensure the reliability of the network operation, in particular, when there are multiple network devices.
  • the method of the embodiment of the present invention determines the port that participates in the MAC address hopping, and then sends the probe packet through the port that participates in the MAC address hopping. It can reduce the impact on the network device CPU usage.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • the embodiment of the present invention provides a network device for processing a Layer 2 network loop, where the network device includes the device provided by Embodiment 2 of the present invention, and the network device may be a switching device supporting a Layer 2 network, such as a router or a switch.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明实施例提供了一种二层网络环路处理的方法,包括:接收用户发来的报文,获得所述报文的源MAC地址;当MAC表中的与所述源MAC地址关联的端口中最新的端口与所述报文的接收端口不一致,则判断所述源MAC地址发生一次跳变;当所述源MAC地址的跳变次数达到预设跳变阈值时,通过所述参与所述源MAC地址跳变的端口分别发送探测报文;当收到所述探测报文时,则确定收到所述探测报文的端口为产生环路的端口,阻断所述产生环路的端口。本发明还提供了一种二层网络环路处理的装置及网络设备。通过本发明实施例提供的方法、装置及网络设备,能够有效的解决二层网络出现环路问题,保障了网络运行的可靠性。

Description

一种二层网络环路处理的方法、 装置及网络设备
技术领域
本发明实施例涉及通信技术领域, 尤其涉及一种二层网络环路处理的 方法、 装置及网络设备。
背景技术
网络是一种应用广泛的城域网解决方案, 在实际网络应用中, 每一台网络 设备都拥有一个全球唯一的媒体访问控制 ( Medium Access Control, MAC ) 地址,在网络设备工作过程经常会出现 MAC地址跳变问题。当某个源 MAC 地址的报文从网络设备的一个端口接入时, 网络设备就会学习到这个报文 的 MAC地址与端口的对应关系,在这个 MAC地址没有老化前, 又有相同源 MAC地址的报文从网络设备的另外一个端口接入,也就是 MAC地址从一个端 口移动到了另一个端口时, 就发生了 MAC地址跳变, 实际网络应用中, 各 网络设备的 MAC地址通常是唯一的, 所以由于网络设备 MAC地址重复而导 致 MAC地址跳变的可能性很小。 出现 MAC地址跳变的一个主要原因就是网 络形成环路。 当某一用户的网络设备发送出一个报文, 若报文经过两条路 径发送到同一网络设备的不同端口, 则网络形成环路。 由于网络环路导致 的 MAC地址跳变会引起网络风暴, 导致网络拥塞等问题。
现有技术中可以通过 MAC地址漂移 MAC-F lapp ing处理方法对二层网络 环路进行处理,该方法以 MAC学习为基础, 当感知到 MAC转发表中某一 MAC 地址对应出端口的跳变时, 会把这些参与跳变的出端口按一定原则一起阻 断或者分批阻断, 当前 Mac-F lapp ing方法不能精确阻断真正环路产生的端 口, 而是把参与跳变的所有出端口一起阻断或分批阻断, 这样, 可能导致 一些没有产生环路的出端口也被阻断, 这些接口连接的用户将无法继续通 讯。
发明内容
本发明实施例提供了一种二层网络环路处理的方法、 装置及网络设备, 可以精确的确定发生环路的端口, 有效地解决二层网络环路的问题, 为达 到上述目的, 本发明实施例提供了一种二层网络环路处理的方法, 包括: 接收用户发来的报文, 获得所述报文的源 MAC地址;
当 MAC表中的与所述源 MAC地址关联的端口中最新的端口与所述报 文的接收端口不一致,则判断所述源 MAC地址发生一次跳变,所述源 MAC 地址关联的端口和所述报文的接收端口为参与所述源 MAC地址跳变的端 口;
当所述源 MAC地址的跳变次数达到预设跳变阈值时,通过所述参与所 述源 MAC地址跳变的端口分别发送探测报文;
当收到所述探测报文时, 则确定收到所述探测报文的端口为产生环路 的端口, 阻断所述产生环路的端口。
本发明实施例提供了一种二层网络环路处理的装置, 所述装置包括: 接收单元, 用于接收用户发来的报文, 获得所述报文的源 MAC地址; 判断单元, 当 MAC表中的与所述源 MAC地址关联的端口中最新的端 口与所述报文的接收端口不一致, 则判断所述源 MAC地址发生一次跳变, 所述源 MAC地址关联的端口和所述报文的接收端口为参与所述源 MAC地 址兆变的端口;
检测单元, 用于当所述源 MAC地址的跳变次数达到预设跳变阈值时, 通过所述参与所述源 MAC地址跳变的端口分别发送探测报文;
处理单元, 用于当收到所述探测报文时, 则确定收到所述探测报文的 端口为产生环路的端口, 阻断所述产生环路的端口。
本发明实施例提供了一种二层网络环路处理的网络设备, 所述网络设 备包括本发明实施例提供的装置。 综上, 本发明实施例提供了一种二层网络环路处理的方法、 装置及网 络设备, 能够精确的确定发生环路的端口, 有效地解决二层网络环路的问 题, 保证了网络运行的可靠性。
附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对 实施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附图。
图 1 是本发明第一实施例提供的一种二层网络环路处理方法的流程 图;
图 2是本发明实施例提供的一种二层网络环路处理方法的示意图; 图 3 是本发明第二实施例提供的一种二层网络环路处理装置的示意 图;
图 4是本发明第二实施例提供的另一种二层网络环路处理装置的示意 图。
具体实施方式 为使本发明实施例的目的、 技术方案和优点更加清楚, 下面将结合本 发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描 述, 显然, 所描述的实施例是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有做出创造性劳动前提 下所获得的所有其他实施例, 都属于本发明保护的范围。
实施例一:
本发明实施例提供了一种二层网络环路处理的方法, 参见图 1 , 图 1 为本发明实施例的方法流程图, 包括:
102, 接收用户发来的报文, 获得所述报文的源 MAC地址;
104, 当 MAC表中的与所述源 MAC地址关联的端口中最新的端口与 所述报文的接收端口不一致, 则判断所述源 MAC地址发生一次跳变, 所述 源 MAC地址关联的端口和所述报文的接收端口为参与所述源 MAC地址跳 变的端口;
106, 当所述源 MAC地址的跳变次数达到预设跳变阈值时, 通过所述 参与所述源 MAC地址跳变的端口分别发送探测报文;
二层网络互通时,报文的转发直接通过查找 MAC地址来实现的, MAC 地址学习的正确与否决定着用户之间是否能够正确的互通。 网络设备的 MAC地址学习机制为: 当端口收到一个未知源 MAC地址的才艮文, 会将这 个 MAC地址添加到接收该 文的端口上, 以便后续以该 MAC地址为目的 地的报文能够直接转发, 同时, 会把该 MAC地址添加到网络设备保存的 MAC地址表中 , MAC地址表是网络设备收到报文的源 MAC地址的集合 , 每个 MAC地址表项包含一个 MAC地址和与该 MAC地址有关联关系的端 口, 所述的关联关系是指以该 MAC地址为源 MAC的报文是从该端口接收 上来的, 所述与该 MAC地址有关联关系的端口可能包含多个,如网络设备 首先从端口 A收到以该 MAC为源 MAC的报文, 后来又从端口 B收到以 该 MAC为源 MAC的报文,则端口 A和端口 B都是与该 MAC有关联关系 的端口, 最后接收到以该 MAC为源 MAC报文的端口 B为与该 MAC有关 联关系的最新端口 , 如果此后又从端口 C收到以该 MAC为源 MAC报文 , 则端口 C为与该 MAC有关联关系的最新端口,端口 B则不再为与该 MAC 有关联关系的最新端口。 本发明实施例实现时, 网络设备接收到用户发来 的报文后, 通过解析获得所述报文的源 MAC地址, 根据该源 MAC地址到 网络设备保存的 MAC表查找, 发现 MAC地址表中已经存在了该源 MAC 地址,并且与该源 MAC地址关联的端口中最新的端口并非是所述网络设备 接收到用户发来的报文的端口, 则认为该源 MAC地址发生了一次跳变, 网 络设备 MAC地址表中与该 MAC地址关联的端口和所述报文的接收端口都 认为是参与所述源 MAC地址跳变的端口, 所有参与所述源 MAC地址跳变 的端口都有出现环路的可能,需要通过所述参与所述源 MAC地址跳变的端 口发送探测报文, 进一步, 由于网络设备管理人员操作等原因会导致某些 MAC地址偶尔出现跳变, 但这并不影响正常网络功能, 为避免此类情况频 发发送探测报文, 可以预先设置一个预设跳变阈值, 默认情况该预设跳变 阈值设置为 1 , 当该源 MAC地址跳变次数超过该预设跳变阈值时, 才认为 网络是出现环路,进而通过所述参与所述源 MAC地址跳变的端口发送探测 报文, 例如, 当预先设置所述预设跳变阈值为 3时, 网络设备接收源 MAC 为 MAC地址 N的报文,在 1秒中内,接收以 MAC地址 N为源 MAC的报 文的端口从端口 A变为端口 B, 又从端口 B又变为端口 C, 然后又从端口 C变为端口 D, 则认为参与该源 MAC地址 N 兆变的端口 A、 端口 B、 端口 C、 端口 D都可能出现环路, 则通过端口 A、 端口 B、 端口 C、 端口 D分 别发送探测报文, 此外, MAC地址跳变次数也包含几个端口之间的多次跳 变的情况, 如, 接收以 MAC地址 N为源 MAC的报文的端口从端口 A变 为端口 B, 又从端口 B变为端口 A, 然后又从端口 A变为端口 B, 也是发 生了 3次 MAC地址兆变。
在网络设备上网络管理人员经常会根据网络设备端口所承担的业务重 要性把端口设置上优先级, 例如, 连接服务器的端口设置高优先级, 连接 普通用户的端口设置低优先级。 相应地, 本发明实施例在通过所述参与所 述源 MAC地址跳变的端口分别发送探测报文之前, 进一步,根据所述参与 所述源 MAC地址跳变的端口的优先级进行分组 ,分为高优先级组和低优先 级组, 针对属于所述低优先级组的端口优先发送探测报文, 属于所述高优 先级组的端口后发送探测报文, 这样可以尽量避免对高优先级业务的影响, 因为, 在实际现网应用中, 一般是连接用户的端口容易出现环路, 因此, 对于所述低优先级的端口优先发送探测报文, 当发现环路时, 优先进行阻 断, 从而尽可能的减少对高优先级端口业务的影响。 所述探测报文可以是 以太类型的数据报文, 具体报文封装格式可以参见 RFC 894。 108, 当收到所述探测报文时, 则确定收到所述探测报文的端口为产生 环路的端口, 阻断所述产生环路的端口。
由于连接所述参与所述源 MAC 地址跳变的端口的用户设备或服务器 对于收到的所述探测报文, 在正常情况下会直接丟弃, 只有当该用户设备 或服务器出现环路时, 会将该探测报文直接透传, 并沿该探测报文发送路 径返回,如果网络设备从任一所述参与所述源 MAC地址跳变的端口收到所 述探测报文, 则认为收到所述探测报文的端口为产生环路的端口, 将该产 生环路的端口进行阻断, 停止其工作能力, 从而解决出现环路端口对网络 的影响问题。 相应地, 根据步骤 106所述低优先级的组优先发送探测报文, 如果低优先级的端口出现故障, 则优先阻断, 可以尽量避免对高优先级业 务的影响。 进一步, 预先设置一个预设解除阻断时间阈值, 当所述产生环 路的出端口被阻断时间达到所述预设解除阻断时间阈值时, 对所述产生环 路的出端口解除阻断, 使其正常工作。 在实际应用中, 有些出现环路的端 口可以自行修复,因此,如果解除阻断后的端口没有再参与 MAC地址跳变, 将不会再被阻断,如果又参与了 MAC地址跳变, 则按照本发明实施例提供 的方案进行相应的处理。
为使本发明实施例更便于理解、 清楚, 现举例进行描述, 如图 2, 网络 设备上有三个出端口端口 1、 端口 2、 端口 3 , 端口 1、 端口 2连接普通用 户, 端口 3连接服务器, 根据业务优先级, 连接普通用户的端口 1、 端口 2 设置低优先级, 连接服务器的端口 3设置高优先级, 预先设置预设跳变阈 值为 1 , 设置预设解除阻断时间阈值为 60秒。 当网络设备从端口 2收到用 户才艮文时, 通过解析获得 4艮文源 MAC为地址 A, 网络设备通过查找 MAC 表, 发现 MAC表中与 MAC地址 A关联的端口为端口 3 , 与该用户报文接 收的端口 2不一致, 出现一次 MAC地址跳变, 达到预先设置的预设跳变阈 值 1 , 则认为端口 2、 端口 3都参与了 MAC地址 A跳变, 网络设备通过端 口 2、 端口 3分别发送探测报文, 进一步, 根据端口优先级进行分组, 端口 2分到低优先级组, 端口 3分到高优先级组,低优先级组的端口 2优先发送 探测报文, 由于端口 1没有参与 MAC地址 A跳变不需要发送探测报文, 当网络设备从端口 2收到该探测报文后, 判断端口 2为发生环路的端口, 对端口 2进行阻断, 避免其对网络的影响, 进一步, 当端口 2被阻断的时 间达到预先设置预设解除阻断时间阈值为 60秒时, 对端口 2解除阻断, 允 许其正常工作。
可见, 通过本发明是实施例提供的方法, 能够精确的确定发生环路的 端口, 有效地解决二层网络环路的问题, 保证了网络运行的可靠性, 特别 地, 当网络设备存在多个端口时, 通过本发明实施例提供的方法, 先确定 参与 MAC地址跳变的端口, 然后通过参与 MAC地址跳变的端口发送探测 报文, 不需要网络设备实时通过所有端口发送探测报文, 从而能够减小对 网络设备 CUP占用的影响。
实施例二:
本发明实施例提供了一种二层网络环路处理的装置, 参见图 3 , 图 3 为本发明实施例的装置示意图, 该装置包括接收单元 302, 判断单元 304, 检测单元 306, 处理单元 308。
接收单元 302, 用于接收用户发来的报文, 获得所述报文的源 MAC地 址;
判断单元 304 , 当 MAC表中的与所述源 MAC地址关联的端口中最新 的端口与所述_¾文的接收端口不一致,则判断所述源 MAC地址发生一次跳 变, 所述源 MAC 地址关联的端口和所述^艮文的接收端口为参与所述源 MAC地址跳变的端口;
检测单元 306, 用于当所述源 MAC地址的跳变次数达到预设跳变阈值 时, 通过所述参与所述源 MAC地址跳变的端口分别发送探测报文;
二层网络互通时,报文的转发直接通过查找 MAC地址来实现的, MAC 地址学习的正确与否决定着用户之间是否能够正确的互通。 网络设备的 MAC地址学习机制为: 当端口收到一个未知源 MAC地址的才艮文, 会将这 个 MAC地址添加到接收该 文的端口上, 以便后续以该 MAC地址为目的 地的报文能够直接转发, 同时, 会把该 MAC地址添加到网络设备保存的 MAC地址表中 , MAC地址表是网络设备收到报文的源 MAC地址的集合 , 每个 MAC地址表项包含一个 MAC地址和与该 MAC地址有关联关系的端 口, 所述的关联关系是指以该 MAC地址为源 MAC的报文是从该端口接收 上来的, 所述与该 MAC地址有关联关系的端口可能包含多个,如网络设备 首先从端口 A收到以该 MAC为源 MAC的报文, 后来又从端口 B收到以 该 MAC为源 MAC的报文,则端口 A和端口 B都是与该 MAC有关联关系 的端口, 最后接收到以该 MAC为源 MAC报文的端口 B为与该 MAC有关 联关系的最新端口 ,如果此后又从端口 C收到以该 MAC为源 MAC报文则 端口 C为与该 MAC有关联关系的最新端口, 端口 B则不再为与该 MAC 有关联关系的最新端口。 本发明实施例实现时, 网络设备接收单元 302接 收到用户发来的报文后,通过解析获得所述报文的源 MAC地址, 判断单元 304根据该源 MAC地址到网络设备保存的 MAC表查找, 发现 MAC地址 表中已经存在了该源 MAC地址, 并且与该源 MAC地址关联的端口中最新 的端口并非是所述网络设备接收到用户发来的报文的端口, 则认为该源 MAC地址发生了一次跳变 , 网络设备 MAC地址表中与该 MAC地址关联 的端口和所述报文的接收端口都认为是参与所述源 MAC地址跳变的端口, 所有参与所述源 MAC地址跳变的端口都有出现环路的可能,需要通过所述 参与所述源 MAC地址跳变的端口发送探测报文, 进一步, 由于网络设备管 理人员操作等原因会导致某些 MAC地址偶尔出现跳变,但这并不影响正常 网络功能, 为避免此类情况频发发送探测报文, 检测单元 306 可以预先设 定一个预设跳变阈值, 默认情况该预设跳变阈值设置为 1 , 当该源 MAC地 址跳变次数超过该预设跳变阈值时, 才认为网络是出现环路, 进而通过所 述参与所述源 MAC地址跳变的端口发送探测报文, 例如, 当预先设置所述 预设跳变阈值为 3时, 网络设备接收源 MAC为 MAC地址 N的报文, 在 1 秒中内,接收以 MAC地址 N为源 MAC的报文的端口从端口 A变为端口 B, 又从端口 B又变为端口 C, 然后又从端口 C变为端口 D, 则认为参与该源 MAC地址 N跳变的端口 A、 端口 B、 端口 C、 端口 D都可能出现环路, 则 通过端口 A、 端口 B、 端口 C、 端口 D发送探测报文, 此外, MAC地址跳 变次数也包含几个端口之间的多次跳变的情况, 如, 接收以 MAC地址 N 为源 MAC的报文的端口从端口 A变为端口 B, 又从端口 B变为端口 A, 然后又从端口 A变为端口 B, 也是发生了 3次 MAC地址跳变。
在网络设备上网络管理人员经常会根据网络设备端口所承担的业务重 要性把端口设置上优先级, 例如, 连接服务器的端口设置高优先级, 连接 普通用户的端口设置低优先级。 相应地, 本发明实施例提供一种二层网络 环路处理的装置进一步还可以包括优先级分组单元 310,如图 4所示。在所 述检测单元 310发送探测报文之前, 所述优先级分组单元 310根据所述参 与所述源 MAC地址跳变的端口的优先级进行分组,分为高优先级组和低优 先级组, 所述检测单元 306根据所述分组单元 310的分组情况针对属于所 述低优先级组的端口优先发送探测报文, 属于所述高优先级组的端口后发 送探测报文, 这样可以尽量避免对高优先级业务的影响, 因为, 在实际现 网应用中, 一般是连接用户的端口容易出现环路, 因此, 对于所述低优先 级的端口优先发送探测报文, 当发现环路时, 优先进行阻断, 从而尽可能 的减少对高优先级端口业务的影响。 所述探测报文可以是以太类型的数据 报文, 具体报文封装格式可以参见 RFC 894。
处理单元 308, 用于当收到所述探测报文时, 则确定收到所述探测报文 的端口为产生环路的端口, 阻断所述产生环路的端口。
由于连接所述参与所述源 MAC 地址跳变的端口的用户设备或服务器 对于收到的所述探测报文, 在正常情况下会直接丟弃, 只有当该用户设备 或服务器出现环路时, 会将该探测报文直接透传, 并沿该探测报文发送路 径返回,如果网络设备处理单元 308从任一所述参与所述源 MAC地址跳变 的端口收到所述探测报文, 则认为收到所述探测报文的端口为产生环路的 端口, 将该产生环路的端口进行阻断, 停止其工作能力, 从而解决出现环 路端口对网络的影响问题。 相应地, 根据所述低优先级的组优先发送探测 报文, 如果低优先级的端口出现故障, 则优先阻断, 可以尽量避免对高优 先级业务的影响。 进一步, 处理单元 308 可以预先设置一个预设解除阻断 时间阈值, 当所述产生环路的出端口被阻断时间达到所述预设解除阻断时 间阈值时, 对所述产生环路的出端口解除阻断, 使其正常工作。 在实际应 用中, 有些出现环路的端口可以自行修复, 因此, 如果解除阻断后的端口 没有再参与 MAC地址跳变, 将不会再被阻断, 如果又参与了 MAC地址跳 变, 则按照本发明实施例提供的方案进行相应的处理。
可见, 通过本发明是实施例提供的装置, 能够精确的确定发生环路的 端口, 有效地解决二层网络环路的问题, 保证了网络运行的可靠性, 特别 地, 当网络设备存在多个端口时, 通过本发明实施例提供的方法, 先确定 参与 MAC地址跳变的端口, 然后通过参与 MAC地址跳变的端口发送探测 报文, 不需要网络设备实时通过所有端口发送探测报文, 从而能够减少对 网络设备 CUP占用的影响。
实施例三:
本发明实施例提供了一种二层网络环路处理的网络设备, 所述网络设 备包括本发明实施例二提供的装置, 所述网络设备可以为路由器、 交换机 等支持二层网络的交换设备。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分步 骤可以通过程序指令相关的硬件来完成, 前述程序可以存储于一计算机可 读取存储介质中, 该程序在执行时, 执行包括上述方法实施例的步骤; 而 前述的存储介质包括: ROM、 RAM, 磁碟或者光盘等各种可以存储程序代 码的介质。 最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对 其限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普 通技术人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行 修改, 或者对其中部分技术特征进行等同替换; 而这些修改或者替换, 并 不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims

权利要求书
1、 一种二层网络环路处理的方法, 其特征在于, 包括:
接收用户发来的报文, 获得所述报文的源 MAC地址;
当 MAC表中的与所述源 MAC地址关联的端口中最新的端口与所述报 文的接收端口不一致,则判断所述源 MAC地址发生一次跳变,所述源 MAC 地址关联的端口和所述报文的接收端口为参与所述源 MAC地址跳变的端 口;
当所述源 MAC地址的跳变次数达到预设跳变阈值时,通过所述参与所 述源 MAC地址跳变的端口分别发送探测报文;
当收到所述探测报文时, 则确定收到所述探测报文的端口为产生环路 的端口, 阻断所述产生环路的端口。
2、 根据权利要求 1所述的方法, 其特征在于, 所述预设跳变阈值默认 为 1。
3、 根据权利要求 1所述的方法, 其特征在于, 所述通过所述参与所述 源 MAC地址跳变的端口分别发送探测报文之前, 进一步包括:
根据所述参与所述源 MAC地址跳变的端口的优先级进行分组,分为高 优先级组和低优先级组, 根据所述优先级分组, 对于所述低优先级组的端 口优先发送探测报文, 所述高优先级组的端口后发送探测报文。
4、 根据权利要求 1-3任一权利要求所述的方法, 其特征在于, 进一步 包括:
当所述产生环路的出端口被阻断时间达到预设解除阻断时间阈值时, 对所述产生环路的出端口解除阻断。
5、 一种二层网络环路处理的装置, 其特征在于, 包括:
接收单元, 用于接收用户发来的报文, 获得所述报文的源 MAC地址; 判断单元, 当 MAC表中的与所述源 MAC地址关联的端口中最新的端 口与所述报文的接收端口不一致, 则判断所述源 MAC地址发生一次跳变, 所述源 MAC地址关联的端口和所述报文的接收端口为参与所述源 MAC地 址兆变的端口;
检测单元, 用于当所述源 MAC地址的跳变次数达到预设跳变阈值时, 通过所述参与所述源 MAC地址跳变的端口分别发送探测报文;
处理单元, 用于当收到所述探测报文时, 则确定收到所述探测报文的 端口为产生环路的端口, 阻断所述产生环路的端口。
6、 根据权利要求 5所述的装置, 其特征在于, 所述装置进一步包括: 优先级分组单元, 用于在所述检测单元发送探测报文之前, 根据所述 参与所述源 MAC地址跳变的端口的优先级进行分组,分为高优先级组和低 优先级组, 相应地, 所述检测单元根据所述优先级分组单元的分组情况, 对所述低优先级组的端口优先发送探测报文, 所述高优先级组的端口后发 送探测报文。
7、 根据权利要求 5-6所述的装置, 其特征在于, 所述处理单元进一步 包括:
当所述产生环路的出端口被阻断时间达到预设解除阻断时间阈值时, 对所述产生环路的出端口解除阻断。
8、 一种二层网络环路处理的网络设备, 其特征在于, 所述网络设备包 括权利要求 5或 6或 7所述的装置。
PCT/CN2011/083791 2011-12-09 2011-12-09 一种二层网络环路处理的方法、装置及网络设备 WO2013082819A1 (zh)

Priority Applications (8)

Application Number Priority Date Filing Date Title
CN2011800031659A CN102625986A (zh) 2011-12-09 2011-12-09 一种二层网络环路处理的方法、装置及网络设备
PCT/CN2011/083791 WO2013082819A1 (zh) 2011-12-09 2011-12-09 一种二层网络环路处理的方法、装置及网络设备
EP12787626.6A EP2627031A4 (en) 2011-12-09 2012-04-13 LAYER 2 NETWORK GRINDING PROCESSING METHOD AND DEVICE AND NETWORK DEVICE THEREFOR
PCT/CN2012/073995 WO2013082907A1 (zh) 2011-12-09 2012-04-13 一种二层网络环路处理的方法、装置及网络设备
CN2012800011490A CN103125100A (zh) 2011-12-09 2012-04-13 一种二层网络环路处理的方法、装置及网络设备
JP2014531076A JP2014530548A (ja) 2011-12-09 2012-04-13 レイヤ2ネットワーク・ループを処理するための方法、装置、およびネットワーク装置
KR1020147006136A KR20140045578A (ko) 2011-12-09 2012-04-13 계층 2 네트워크 루프의 처리 방법, 장치 및 네트워크 장치
US13/772,142 US20130163596A1 (en) 2011-12-09 2013-02-20 Method, apparatus, and network device for processing layer 2 network loop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/083791 WO2013082819A1 (zh) 2011-12-09 2011-12-09 一种二层网络环路处理的方法、装置及网络设备

Publications (1)

Publication Number Publication Date
WO2013082819A1 true WO2013082819A1 (zh) 2013-06-13

Family

ID=46565259

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2011/083791 WO2013082819A1 (zh) 2011-12-09 2011-12-09 一种二层网络环路处理的方法、装置及网络设备
PCT/CN2012/073995 WO2013082907A1 (zh) 2011-12-09 2012-04-13 一种二层网络环路处理的方法、装置及网络设备

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/073995 WO2013082907A1 (zh) 2011-12-09 2012-04-13 一种二层网络环路处理的方法、装置及网络设备

Country Status (6)

Country Link
US (1) US20130163596A1 (zh)
EP (1) EP2627031A4 (zh)
JP (1) JP2014530548A (zh)
KR (1) KR20140045578A (zh)
CN (1) CN102625986A (zh)
WO (2) WO2013082819A1 (zh)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9014023B2 (en) 2011-09-15 2015-04-21 International Business Machines Corporation Mobile network services in a mobile data network
US9197429B1 (en) * 2013-05-22 2015-11-24 Google Inc. Reducing size of multicast retry transactions
CN103391244B (zh) * 2013-07-30 2018-01-02 上海斐讯数据通信技术有限公司 一种大流量数据包的转发方法
US9419909B2 (en) * 2014-01-14 2016-08-16 Verizon Patent And Licensing Inc. Determining when to relearn a relationship between a network address and a port
CN104980526A (zh) * 2014-04-04 2015-10-14 中兴通讯股份有限公司 Mac地址漂移的控制方法、装置及网络设备
JP6046664B2 (ja) * 2014-06-02 2016-12-21 Kddi株式会社 通信システム、検出装置、及び検出方法
CN104052673B (zh) * 2014-06-26 2018-03-06 华为技术有限公司 一种广播抑制方法及装置
JP2016116029A (ja) * 2014-12-12 2016-06-23 富士通株式会社 ネットワーク監視方法、中継装置、および、ネットワーク監視システム
CN106549821B (zh) * 2015-09-23 2021-01-01 华为技术有限公司 一种网络环路检测方法及控制器
US10050804B2 (en) * 2016-06-01 2018-08-14 Pluribus Networks, Inc. Loop-free fabric utilizing distributed address and port tables
US10630590B2 (en) * 2016-07-14 2020-04-21 Mellanox Technologies Tlv Ltd. Credit loop deadlock detection and recovery in arbitrary topology networks
US10469361B1 (en) * 2016-09-20 2019-11-05 Juniper Networks, Inc. Loop prevention for EVPN and PBB-EVPN
US10237088B2 (en) * 2016-10-07 2019-03-19 Ciena Corporation Systems and methods for avoiding inadvertent loops in a layer 2 switched network
CN108243100A (zh) * 2016-12-27 2018-07-03 北京华为数字技术有限公司 检测报文环路的方法和装置
CN108270670B (zh) * 2016-12-30 2021-08-03 北京华为数字技术有限公司 一种环路检测方法及相关装置
US10397095B2 (en) * 2017-01-03 2019-08-27 Cisco Technology, Inc. Detecting and mitigating loops
CN107171952B (zh) * 2017-04-06 2019-10-11 烽火通信科技股份有限公司 一种在vpls中实现防环的方法及设备
US11277407B2 (en) * 2017-09-15 2022-03-15 Hewlett Packard Enterprise Development Lp Disabling MAC address aging time for an internet of things (IoT) device on a network switch
CN109714182B (zh) * 2017-10-25 2022-01-25 中兴通讯股份有限公司 一种网络控制方法、装置和计算机可读存储介质
US10516599B1 (en) 2018-08-31 2019-12-24 Hewlett Packard Enterprise Development Lp Link priority for loop-protect
US20210306252A1 (en) * 2020-03-25 2021-09-30 Hewlett Packard Enterprise Development Lp Loop avoidance protocol
CN111901234B (zh) * 2020-08-12 2023-03-14 深圳市信锐网科技术有限公司 网络环路处理方法、系统及相关设备
US11502988B2 (en) * 2021-01-21 2022-11-15 Cisco Technology, Inc. Stable MAC address change process
CN115442259A (zh) * 2022-08-30 2022-12-06 奇安信网神信息技术(北京)股份有限公司 系统识别方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060280118A1 (en) * 2005-06-13 2006-12-14 Fujitsu Limited Communication control method and communication apparatus employing the same
CN101227400A (zh) * 2008-02-01 2008-07-23 中兴通讯股份有限公司 用于以太网的数据包处理方法和装置
CN102232279A (zh) * 2011-06-17 2011-11-02 华为技术有限公司 以太网中环路位置检测的方法及以太网交换设备

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7515530B2 (en) * 2004-03-25 2009-04-07 Alcatel-Lucent Usa Inc. Detecting loops between network devices by monitoring MAC moves
JP4667849B2 (ja) * 2004-12-13 2011-04-13 富士通株式会社 ループ検出方法及び装置
CN101405976A (zh) * 2005-12-07 2009-04-08 卢森特技术有限公司 通过监视mac移动来检测网络设备之间的环路
US7453818B2 (en) * 2006-05-01 2008-11-18 Cisco Technology, Inc. Detection of potential forwarding loops in bridged networks
CN101102236A (zh) * 2007-08-27 2008-01-09 杭州华三通信技术有限公司 探测环路的方法及装置
JP5065941B2 (ja) * 2008-02-29 2012-11-07 アラクサラネットワークス株式会社 スイッチ装置およびネットワークシステム
IL194412A (en) * 2008-09-28 2012-04-30 Eci Telecom Ltd Technique for combating loops in communication network
US8885486B2 (en) * 2009-03-31 2014-11-11 Cisco Technology, Inc. Detecting and mitigating data plane bridging loops
TWI424713B (zh) * 2009-12-02 2014-01-21 Realtek Semiconductor Corp 迴圈偵測方法及應用其之網路裝置
CN102123064B (zh) * 2010-01-12 2013-11-06 华为技术有限公司 环路处理方法和装置
US8451715B1 (en) * 2010-03-26 2013-05-28 Juniper Networks, Inc. Avoiding data loss in a multi-homed layer two bridging network
CN101909016A (zh) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 一种防止虚拟专用网中环路的方法及装置
US8755383B2 (en) * 2011-03-21 2014-06-17 Avaya, Inc. Usage of masked ethernet addresses between transparent interconnect of lots of links (TRILL) routing bridges
US9497073B2 (en) * 2011-06-17 2016-11-15 International Business Machines Corporation Distributed link aggregation group (LAG) for a layer 2 fabric

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060280118A1 (en) * 2005-06-13 2006-12-14 Fujitsu Limited Communication control method and communication apparatus employing the same
CN101227400A (zh) * 2008-02-01 2008-07-23 中兴通讯股份有限公司 用于以太网的数据包处理方法和装置
CN102232279A (zh) * 2011-06-17 2011-11-02 华为技术有限公司 以太网中环路位置检测的方法及以太网交换设备

Also Published As

Publication number Publication date
US20130163596A1 (en) 2013-06-27
WO2013082907A1 (zh) 2013-06-13
EP2627031A1 (en) 2013-08-14
EP2627031A4 (en) 2013-11-06
KR20140045578A (ko) 2014-04-16
CN102625986A (zh) 2012-08-01
JP2014530548A (ja) 2014-11-17

Similar Documents

Publication Publication Date Title
WO2013082819A1 (zh) 一种二层网络环路处理的方法、装置及网络设备
US11902139B2 (en) Diagnosing and resolving issues in a network using probe packets
US9832111B2 (en) OFS in-band communication method and OFS
US8599685B2 (en) Snooping of on-path IP reservation protocols for layer 2 nodes
US9276898B2 (en) Method and device for link fault detecting and recovering based on ARP interaction
US9571383B2 (en) Rerouting technique
US10110482B2 (en) Technique for network service availability
KR102007548B1 (ko) 네트워크 측정 트리거들을 사용하는 서비스 보장
US9160616B2 (en) Multicast packet transmission method, related device and system
US20160301571A1 (en) Method and Device for Monitoring OAM Performance
US9948434B2 (en) Method for bit error rate detection, and network device
WO2007073649A1 (fr) Procede et systeme pour obtenir une unite de transfert maximale de voie dans un reseau
EP3813306A1 (en) Message processing method, and gateway device
WO2014019348A1 (zh) 操作、管理和维护oam配置的方法、设备及系统
EP3029883A1 (en) Network protection method and apparatus, next-ring node, and system
JP2008118281A (ja) 通信装置
WO2021109997A1 (zh) 分段路由隧道的防断纤方法、装置,入口节点及存储介质
CN113366804A (zh) 防止网络拓扑改变期间的微环路的方法和系统
WO2015024523A1 (zh) 确定ip承载网故障的方法和系统
CN107528929B (zh) Arp条目的处理方法及装置
WO2018177003A1 (zh) 一种计费方法、相关设备和系统
WO2015051696A1 (zh) 一种传输oam报文的方法及装置
TWI821882B (zh) 丟包率的檢測方法、通信裝置及通信系統
WO2023103504A1 (zh) 链路检测方法、公网节点和存储介质
CN118283539A (zh) 一种组播切换方法、装置、电子设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180003165.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11877008

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11877008

Country of ref document: EP

Kind code of ref document: A1