WO2017059715A1 - Data configuration method and device for protecting ring network - Google Patents

Data configuration method and device for protecting ring network Download PDF

Info

Publication number
WO2017059715A1
WO2017059715A1 PCT/CN2016/089809 CN2016089809W WO2017059715A1 WO 2017059715 A1 WO2017059715 A1 WO 2017059715A1 CN 2016089809 W CN2016089809 W CN 2016089809W WO 2017059715 A1 WO2017059715 A1 WO 2017059715A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
ring network
packet
target
port
Prior art date
Application number
PCT/CN2016/089809
Other languages
French (fr)
Chinese (zh)
Inventor
刘星
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017059715A1 publication Critical patent/WO2017059715A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks

Definitions

  • the present application relates to, but is not limited to, the field of communications, and in particular, to a data configuration method and apparatus for ring network protection.
  • a ring network protection protocol for example, Ethernet Ring Protection Switching (ERPS) described in the G.8032 standard, which blocks a ring protection link (Ring Protection Link, RPL link for short) when the network is normal. ), after detecting a link fault, blocking the faulty link and opening the RPL link to implement service protection and fast handover.
  • ERPS Ethernet Ring Protection Switching
  • each device When the ring network protection function is deployed, multiple devices are generally set up in the ring network. Each device needs to be configured with complex configuration commands related to the protection protocol. On the one hand, the repetitive operation of configuring each device greatly increases the workload, thereby reducing the ease of use; on the other hand, a large number of complex configurations are easy to introduce errors, affecting the smooth deployment and use of functions.
  • the embodiment of the invention provides a data configuration method and device for ring network protection, which solves the technical problem that the data configuration efficiency of the ring network protection is low in the related art.
  • a data configuration method for a ring network protection comprising: a first node of a plurality of nodes of a ring network acquiring configuration data, wherein the configuration data is configuration data related to performing ring network protection; and the first node sends the configuration data carrying the configuration data.
  • the first packet is sent to the node other than the first node in the ring network, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet.
  • the method further includes: after the first node sends the first packet carrying the configuration data to other nodes in the ring network except the first node, the first node and other nodes are completed. After configuring the configuration of the data, perform the deployment of the ring network protection.
  • the first node and the other nodes perform the deployment of the ring network protection, including: determining a target node from multiple nodes of the ring network, where the target node is configured to send the second packet, The second packet is used to indicate that the node other than the target node in the ring network initiates the ring network protection function.
  • the first packet carries the node identifier of the first node
  • determining the target node from the multiple nodes of the ring network includes: each other node separately generates a third packet, where the third packet Carrying the node identifier of the node; and each other node respectively sends the generated third packet to a node other than itself in the ring network; the first node and other nodes determine the target node according to the acquired node identifier.
  • the node identifier includes a media access control MAC address of the node; the preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
  • the method further includes: after determining the target node from the first node and the other node, the target node generates and sends a fourth packet, where the fourth packet carries a time-to-live TTL;
  • the node other than the node performs preset change processing on the TTL in the received fourth packet, and forwards the processed fourth packet;
  • the node other than the target node in the ring network receives the fourth packet according to the received packet.
  • the TTL determines its position in the ring network.
  • the first packet and the third packet further carry port count information, port count information.
  • the port includes the total number of times the port is the target port and the neighbor port.
  • the target port is the port used by the target node to send the initial TTL
  • the neighbor port is the port that receives the initial TTL
  • the multiple sub-ring networks include the first sub-ring network.
  • Determining the target node according to the obtained node identifier further includes: the first sub-ring network determines the port with the least total number according to the port count information of the other sub-ring networks; and the first sub-ring network is based on the port with the least total number of times Determining a target port of the first sub-ring network; first The sub-ring network determines the target node based on the target port.
  • the determining, by the first sub-ring network, the target port of the first sub-ring network according to the port with the least total number of times the port of the node with the largest MAC address of the port with the least total number of times selected by the first sub-ring network is used as the target port. .
  • the method further includes: when the target node receives the third packet, the target node resets the first timer; the target node detects whether the first timer expires; and if the first timer expires, Then the target node sends a second packet.
  • the method further includes: when the first node and the other node receive the third packet, the first node and the other node respectively detect whether the corresponding second timer expires; if the corresponding second timer is detected When the timeout occurs, the first node and other nodes determine the target node according to the acquired node identifier.
  • the second packet further carries a TTL.
  • the method further includes: in the case of adding a node in the ring network, the node other than the target node in the ring network performs preset change processing on the TTL in the received second packet, and forwards the processed second The packet; the node other than the target node in the ring network determines its position in the ring network according to the TTL of the received second message.
  • the second packet further carries a TTL.
  • the method further includes: in the case of adding a node in the ring network, the node other than the target node in the ring network detects whether the second message is received within the preset time period; if it is detected within the preset time period Receiving the second packet, the node other than the target node in the ring network performs preset change processing on the TTL in the received second packet, and forwards the processed second packet, and the ring network.
  • the node other than the target node determines its location in the ring network according to the TTL of the received second packet; if it detects that the second packet is not received within the preset time period, the ring network is The node other than the target node deletes the node identification information of the target node in the acquired node identifier, and re-determines the target node.
  • a data configuration device for ring network protection includes: an acquisition module and a transmission module.
  • the obtaining module is configured to obtain configuration data of the first node of the plurality of nodes of the ring network, wherein the configuration data is configuration data related to performing ring network protection.
  • the sending module is configured to enable the first node to send the first packet carrying the configuration data to the node other than the first node in the ring network, where the first packet is used to indicate that the other node is in the first packet according to the first packet.
  • the configuration data performs data configuration.
  • the apparatus further includes: an execution module.
  • An execution module configured to: after the sending module sends the first packet carrying the configuration data to other nodes in the ring network except the first node, the first node and other nodes are configured After the data is configured, the deployment of the ring network protection is performed.
  • the performing, by the first node, and the other nodes, the performing module performing the deployment of the ring network protection includes:
  • a target node is determined from a plurality of nodes of the ring network.
  • the target node is configured to send a second packet, where the second packet is used to indicate that other nodes in the ring network except the target node initiate a ring network protection function.
  • the first packet carries the node identifier of the first node.
  • Determining the target node from the plurality of nodes of the ring network by the execution module includes:
  • each of the other nodes To generate a third packet, where the third packet carries a node identifier of the node; and each of the other nodes respectively sends the generated third packet to the ring A node in the network other than itself.
  • the executing module is configured to determine, by the first node and the other node, the target node according to the obtained node identifier, including:
  • the first node and the other nodes respectively determine whether the relationship between the node identifier of the node itself and the acquired node identifier meets a preset rule, and determines whether the node is the target node according to the determination result.
  • the node identifier includes a media access control MAC address of the node.
  • the preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
  • the device further includes a generating module, a processing module, and a determining module.
  • the generating module is configured to: after determining the target node from the first node and the other nodes, causing the target node to generate and send a fourth packet, where the fourth packet carries a lifetime TTL.
  • the processing module is configured to enable a node other than the target node in the ring network to perform preset change processing on the received TTL in the fourth packet, and forward the processed fourth packet .
  • the determining module is configured to enable a node other than the target node in the ring network to determine its location in the ring network according to the received TTL of the fourth packet.
  • the first packet and the third packet further carry a port.
  • the port count information includes a total number of times that the port is the target port and the neighbor port
  • the target port is a port used by the target node to send an initial TTL
  • the neighbor port is a port that receives the initial TTL
  • the plurality of sub-ring networks include a first sub-ring network.
  • Determining, by the execution module, that the first node and the other node determine the target node according to the obtained node identifier further includes:
  • the executing module is configured to determine, by the first sub-ring network, the target port of the first sub-ring network according to the port with the least total number of times:
  • the device further includes a reset module and a detection module.
  • the reset module is configured to enable the target node to reset the first timer when the target node receives the third packet.
  • the detecting module is configured to enable the target node to detect whether the first timer expires.
  • the sending module is further configured to send the second packet if the first timer is detected to be timed out.
  • the detecting module is further configured to: when the first node and the other node receive the third packet, let the first node and the other node respectively detect whether the corresponding second timer expires .
  • the determining module is further configured to: if it is detected that the corresponding second timer expires, let the first node and the other node determine the target node according to the acquired node identifier.
  • the second packet further carries a TTL.
  • the execution module is further configured to:
  • the node other than the target node in the ring network performs preset change processing on the received TTL in the second packet, and performs forwarding processing. After the second message.
  • the second packet further carries a TTL.
  • the detecting module is further configured to: when a node is added to the ring network, cause a node other than the target node in the ring network to detect whether the second is received within a preset time period Message.
  • the execution module is further configured to: if it is detected that the second message is received within a preset time period, let the node in the ring network other than the target node receive the second The TTL in the packet performs the preset change processing, and forwards the processed second packet, and causes the node other than the target node in the ring network to determine the TTL according to the received second packet. The location of itself in the ring network.
  • the execution module is further configured to: if it is detected that the second packet is not received within the preset time period, let the node in the ring network that is acquired by the node other than the target node The node identification information of the target node is deleted, and the target node is re-determined.
  • a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the data configuration method of the ring network protection.
  • the configuration data is obtained by the first node of the plurality of nodes of the ring network, wherein the configuration data is configured to perform configuration related to the ring network protection; the first node sends the first packet carrying the configuration data. And other nodes in the ring network except the first node, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet, which solves the data configuration efficiency of the ring network protection in the related art. Low technical problems have achieved the effect of improving the data configuration efficiency of the ring network protection.
  • FIG. 1 is a flowchart of a data configuration method for ring network protection according to a first embodiment of the present invention
  • FIG. 2 is a schematic diagram showing an initial state of a data configuration method for ring network protection according to a second embodiment of the present invention
  • FIG. 3 is a schematic diagram of a syntax state of a data configuration method for ring network protection according to a second embodiment of the present invention
  • FIG. 4 is a schematic diagram of a learning state of a data configuration method for ring network protection according to a second embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a newly added node in a data configuration method for ring network protection according to a second embodiment of the present invention
  • FIG. 6 is a structural block diagram of a data configuration apparatus for ring network protection according to an embodiment of the present invention.
  • FIG. 1 A flowchart of a data configuration method for ring network protection according to the first embodiment of the present invention is shown in FIG. 1, and the process includes steps S101-S102:
  • Step S101 The first node of the plurality of nodes of the ring network acquires configuration data, where the configuration data is configuration data related to performing ring network protection.
  • the first node can be any selected one of the nodes in the ring network.
  • the configuration data is data required for the ring network to implement the ring network protection function.
  • the configuration data may be configuration data related to Ethernet Multi-ring Protection (ERPS) data and ring network protection protocol.
  • ERPS Ethernet Multi-ring Protection
  • the ring network protection function can be implemented only after the data configuration of each node is completed.
  • the configuration data includes: an ERPS instance number, an associated virtual local area network VLAN (protocol VLAN, service VLAN), and two ring network ports (one of which is blocked by default to prevent looping).
  • Other protocol related data can be configured by default or manually, including: associated MSTP instance (default is the same as ERPS instance number), ERPS timer parameter, switching mode (default is recoverable mode), Ringid (default is instance number) )Wait.
  • the role of each port in the ring network can be automatically learned.
  • the first node sends the first packet carrying the configuration data to the node other than the first node in the ring network, where the first packet is used to indicate that the other node is configured according to the configuration data in the first packet. Perform data configuration.
  • the first node may send the first message to other nodes in the ring network in a bidirectional manner.
  • the sending mode is a forwarding mode.
  • the ring network includes a total of five nodes from the first to the fifth, wherein the first node is the first node, and the 1-2-3-4-5-1 forms a ring network. .
  • the first node sends a first message to the second node and the fifth node, and the second node sends the received first message to the third node, and the fifth node receives the first message.
  • the message is sent to the 4th message.
  • each node obtains the information of the configuration data contained therein, and performs corresponding data configuration according to the information of the configuration data. That is, in the processing of the first packet, the first node (the sending node) may perform the sending to the two ring network ports, and the received packets are discarded; the other nodes receive the message, and after corresponding processing, Forward to another ring port.
  • the configuration data is configured in the first node to activate the synchronization function of the entire ring network.
  • the first node sends the first packet to the two ring ports (for example, carrying the ERPS) Parameter information, and includes the ring port of all ERPS instances on the node as the count of the RPL port).
  • the other node determines the ERPS instance number, associated VLAN, and other parameters according to the content of the packet.
  • the receiving port serves as the ring network port.
  • the first message may adopt a structure similar to the standard ERPS protocol.
  • the destination media access control MAC address is 01-19-a8-00-00-[instance id], the Ethernet type is 8902, the version, opcode, and ERPS standard protocol packets are the same, and the packet payload part is customized. Including: packet type (for example, 01 for the first packet), lifetime TTL value, ERPS parameter information, port information, and so on.
  • the configuration data is acquired by the first node of the plurality of nodes of the ring network, wherein the configuration data is configured to perform configuration related to the ring network protection; the first node sends the configuration
  • the first packet of the data is sent to the node other than the first node in the ring network, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet, and the ring in the related art is solved.
  • the technical problem of low efficiency of data protection of network protection and then obtaining configuration data through the first node, and sending the configuration data to other nodes in the ring network, avoiding corresponding complex data of each node in the ring network.
  • the configuration can achieve the deployment of the ring network protection function, resulting in low data configuration efficiency.
  • the effect of improving the data configuration efficiency of the ring network protection is achieved by this embodiment.
  • the method further includes: after the first node sends the first packet carrying the configuration data to other nodes in the ring network except the first node, the first node and other nodes complete the configuration of the configuration data. After that, the deployment of ring network protection is performed.
  • the ring network protection function of the entire ring network can be deployed. To achieve business protection and fast switching functions.
  • the first node and the other nodes perform the deployment of the ring network protection, including: determining a target node from the first node and other nodes, where the target node is configured to send the second packet, The second packet is used to indicate that the node other than the target node in the ring network initiates the ring network protection function.
  • Determining the target node from the first node and other nodes may include: artificially specifying, for example, one of the first node and the other node may be designated as the target node (and the section is specified) Any port of the point is used as the target port; or, a node may be determined as a target node from the first node and other nodes according to a preset rule (and any port of the node is designated as the target port).
  • the artificial designation is simple and easy; determining the target node by the preset rule can fully consider the load balancing and the like (for example, in the case where a plurality of ring links are included in the ring network).
  • the second message may adopt a structure similar to the standard ERPS protocol.
  • the destination media access control MAC address is 01-19-a8-00-00-[instance id], the Ethernet type is 8902, the version, opcode, and ERPS standard protocol packets are the same, and the packet payload part is customized. Including: packet type (for example, 02 for the second message), lifetime TTL value, ERPS parameter information, port information, and so on.
  • the second packet is used to notify other nodes in the ring network that the protocol initiates a pending state, that is, a waiting phase for performing ring network protection.
  • the ERPS protocol configured in each node enters the pending state, it can run according to the G.8032 standard.
  • the target node sends the second packet to the other node.
  • the non-target node enters the ring network protection preparation state.
  • the timer can be used to determine when to perform the ring network protection. When the timer expires.
  • Each node initiates a ring network protection function.
  • the first packet carries the node identifier of the first node
  • determining the target node from the first node and the other nodes includes: each other node generates a third packet, where the third packet carries The node identifier of the node; and each other node respectively sends the generated third packet to a node other than itself in the ring network; the first node and other nodes determine the target node according to the obtained node identifier.
  • the node may be triggered to generate a third packet, and the third packet is sent to other nodes of the ring network.
  • the third packet carries the node identifier of the sending node, and the node identifier is similar to the ID of each node, and is also the identifier information that is distinguished from different nodes in the ring network.
  • the identification information can be the MAC address of each node.
  • the third message also includes other information, for example, the port of the ring network node is counted as an RPL port (ie, port count information) in all ERPS instances.
  • the third message can adopt a structure similar to the standard ERPS protocol.
  • the destination media access control MAC address is 01-19-a8-00-00-[instance id], the Ethernet type is 8902, the version, opcode, and ERPS standard protocol packets are the same, and the packet payload part is customized.
  • message type for example, 03 for the third message
  • lifetime TTL value for example, 03 for the third message
  • ERPS parameter information for example, port letter Interest and so on.
  • Determining the target node according to the acquired node identifier may include: (1) the first node and other nodes determine, according to the acquired node identifier, whether the target node is a target node (one of the ports has a target port) (2) Selecting one of the first node and other nodes to judge the target node.
  • each node judges according to all the obtained node identifiers, and if the judgment result conforms to the preset rule, the node may determine that it is the target node.
  • Each node only judges whether it is the target node. If the judgment result does not meet the preset rules, no other processing is performed.
  • each node since each node obtains the identification information of each node in the ring network, one of the nodes may be specified for judgment, and if it is determined that it is the target node, the other nodes may not be notified.
  • the subsequent processing is directly performed (for example, triggering ring network protection); if it is determined that another node is the target node, a message is sent to notify the node, and the node performs subsequent processing.
  • each node only determines whether the relationship between the node identifier of the node and the acquired node identifier satisfies the preset rule, and the relationship between the node identifiers of other nodes is not determined. For example, if the node identifier is a MAC address, it is only necessary to determine the size relationship between the MAC address of the node itself and the MAC address of other nodes. When the size relationship satisfies the preset rule, the node may be determined as the target node. The target port of the node may also be determined according to the judgment result, including: if it is determined that the node is the target node, any one of the target nodes may be the target port by default.
  • the node identifier includes a media access control MAC address of the node; the preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
  • the media access control MAC address is used as the node identifier; the node identifier of the node itself is greater than the obtained node identifier as a preset rule. For example, in the case of only one ERPS instance in the ring network, after each node receives the MAC addresses of all other nodes, the node with the largest MAC address can be used as the target node, and any port of the node is used as the target port.
  • the method further includes: The target node generates and sends a fourth packet, where the fourth packet carries a lifetime TTL; the node other than the target node in the ring network performs preset change processing on the TTL in the received fourth packet, and Forwarding the processed fourth packet; the node other than the target node in the ring network determines its position in the ring network according to the TTL of the received fourth packet.
  • the fourth message can adopt a structure similar to the standard ERPS protocol.
  • the destination media access control MAC address is 01-19-a8-00-00-[instance id], the Ethernet type is 8902, the version, opcode, and ERPS standard protocol packets are the same, and the packet payload part is customized. Including: message type (for example, 04 for the fourth message), lifetime TTL value, ERPS parameter information, port information, and so on.
  • message type for example, 04 for the fourth message
  • lifetime TTL value for example, ERPS parameter information
  • port information port information
  • the first to fourth messages described above are similar in structure. When a node receives a certain packet, it determines what content should be obtained according to the packet type.
  • the target node After the target node is determined, the target node sends a fourth packet carrying a TTL (for example, a value of 255) through the target port. After each node receives the message, the TTL performs a preset change process (for example, performs a minus 1 process) and forwards the processed message. If the TTL value of the received packet is the initial TTL (for example, 255), it can be determined that the receiving port is adjacent to the target port, and the node is a node adjacent to the target node. If the received packet has a TTL value, For the initial TTL, it can be determined that the receiving port is not adjacent to the target port, that is, the node is not a node adjacent to the target node. That is, the position information of the nodes of the entire ring network can be determined by this embodiment.
  • a preset change process for example, performs a minus 1 process
  • the initial value of the TTL is 255. It should be noted that if the TTL value of a node is 1, the TTL of the TTL is reduced to 1 and the packet carrying the TTL is not forwarded.
  • the first packet and the third packet further carry port count information, port count information.
  • the port includes the total number of times the port is the target port and the neighbor port.
  • the target port is the port used by the target node to send the initial TTL.
  • the neighbor port is the port that receives the initial TTL.
  • the multiple sub-ring networks include the first sub-ring network, and the first node.
  • the first sub-ring network determines the port with the least total number according to the port count information of the other sub-ring networks; and the first sub-ring network determines the first sub-port according to the port with the least total number of times.
  • the target port of the ring network; the first sub-ring network determines the target node according to the target port.
  • the first sub-ring network determines the first sub-ring network according to the port with the least total number of times.
  • the target port includes: the port of the node with the largest MAC address corresponding to the port with the least total number of times selected by the first sub-ring network as the target port.
  • a sequential activation mode is adopted, that is, a ring network after deployment after a ring network is deployed.
  • the previous ring network has been deployed and a full and effective port count has been generated.
  • the target node of each logical sub-ring network may be sequentially Determining a target node of each logical sub-ring network, wherein the determination of the target node of the next sub-ring network is based on a sub-ring network that has previously determined the target node, and the port count information of the sub-ring network that has previously determined the target node is provided before The total number of times that the port of the sub-ring network of the target node has been used as the target port and the neighbor port (port count information) has been determined, where the target port is the port that sends the initial TTL, and the neighbor port is the port that receives the initial TTL.
  • the first sub-ring network may determine the target node of the first sub-ring network according to the port with the least total number of times.
  • the port of the node with the largest MAC address among the nodes corresponding to the port with the least total number of ports may be selected as the target port of the first sub-ring network, and the node corresponding to the target port is used as the target node.
  • the method further includes: the target node resets the first timer; the target node detects whether the first timer expires; and if the first timer expires, Then the target node sends a second packet.
  • the target node After each node in the ring network confirms its location, each node will no longer send a third message.
  • the target node resets the first timer every time it receives the third message. If the third packet is not received within a certain period of time, the first timer expires. At this time, the target node can send the second packet through the two ring ports to notify other nodes to activate the ring network protection function. After each node receives the second packet, the ring protection protocol starts to enter the pending state.
  • Each non-target node including a neighboring node and a non-neighboring node, wherein the neighboring node is a node where the neighboring port is located, that is, the node that receives the initial TTL, and the non-neighboring node is a node other than the target node and the neighboring node
  • the third timer start timeout timer
  • the method further includes: the first node and the other node respectively detecting whether the corresponding second timer expires; if the corresponding second timer is detected When the timeout occurs, the first node and other nodes determine the target node according to the acquired node identifier.
  • each node it is determined by the second timer whether each node is triggered to determine the target node.
  • Each node sends a third packet sent by another node or a node identifier (such as a MAC address) included in the first packet sent by other nodes and a port of the packet sending node during the duration of the second timer.
  • the count of RPL ports as all ERPS instances is kept locally.
  • the first node and other nodes determine the target node according to the obtained node identifier and the like.
  • the second packet further carries a TTL
  • the method further includes: when the node is added in the ring network, the TTL in the second packet received by the node other than the target node in the ring network The preset change process is performed, and the processed second message is forwarded; the node other than the target node in the ring network determines its position in the ring network according to the TTL of the received second message.
  • the target node For the newly added nodes in the ring, the target node can be kept unchanged, and the protocol data is obtained by synchronizing the second packet periodically sent by the target node, and the node other than the target node in the ring network according to the TTL of the received second packet Determine your location in the ring network. According to this manner, the execution efficiency of the ring network protection can be effectively improved while ensuring that the program that the ring network has executed is not interfered.
  • the second packet further carries a TTL.
  • the method further includes: when a node is added to the ring network, the node other than the target node in the ring network detects whether the node is received in the preset time period. If the second packet is received within the preset time period, the node other than the target node in the ring network performs preset change processing on the TTL in the received second packet, and performs forwarding processing.
  • the second message, and the node other than the target node in the ring network determines its position in the ring network according to the TTL of the received second message; if the second message is not received within the preset time period Then, the node other than the target node in the ring network deletes the node identification information of the target node in the acquired node identifier, and re-determines the target node.
  • the other nodes re-learn the role according to the TTL value in the second packet to determine each The location of the nodes in the ring network; if the target node is deleted, each node cannot receive the second message within the preset time period, that is, the location in the ring network cannot be determined, then each node can determine The deleted node is the target node, and the node identifier of the target node (including the RPL port count entry) can be deleted, and the third packet is resent (each node blocks a port to prevent looping), and the above determined target node is repeatedly executed. (port) steps.
  • the third timer can be used to determine whether the target node is deleted. After the target node is deleted, the other node does not receive the second packet sent by the target node, and the third timer expires. At this time, the target node can be reselected.
  • a data configuration method for ring network protection according to a second embodiment of the present invention is provided below. This embodiment can be used as a preferred embodiment of the embodiment shown in FIG.
  • FIG. 2 is a schematic diagram showing an initial state of a data configuration method for ring network protection according to a second embodiment of the present invention.
  • a plurality of devices form a ring network, wherein the network element 1 is a configuration node (same as the first node), and the configuration node is configured with configuration data necessary for running the ERPS protocol: instance number 1, associated VLAN (protocol VLAN 100, Service VLAN 101-200), ring network port, etc. Other devices have only the corresponding port and VLAN configuration.
  • the network elements 2 to 7 are sequentially connected to form a ring network link.
  • the network element 1 has two ports: port1 and port2, where port1 is in a blocked state.
  • FIG. 3 is a schematic diagram of a syndata state of a data configuration method for ring network protection according to a second embodiment of the present invention.
  • the synchronization function is activated.
  • the configuration node sends a syndata packet to the two ring ports (the same as the first packet).
  • the destination MAC address is 01-19-a8-00-00-01, VLAN 100, and the payload part is 01.
  • the packet type is 01. Service VLAN information 101-200. Other parameters use default values.
  • the ring port of all the ERPS instances on the node is used as the count of the RPL port. Since there is only one ERPS instance and the deployment is not completed, the count of the ERPS instance 1 ring network port of the network element 1 is 0.
  • the syndata packet is transmitted from the two ports of the configuration node to the opposite direction of the ring, and is received and forwarded by other nodes.
  • the other node After receiving the syndata packet sent by the configuration node, the other node obtains the configuration data of the ERPS from the packet, determines the ERPS instance number 1, the associated VLAN (protocol VLAN 100, service VLAN 100-200), and other parameters, and the receiving port is used as the receiving port. Ring network port.
  • the ring network port of all ERPS instances of the configuration node is stored as the RPL port count and the configuration node MAC address locally.
  • the receiving node starts to send the finding owner message (same as the first
  • the third packet includes the ring port of all ERPS instances on the node as the RPL port count, and the finding owner timer (same as the second timer) is enabled.
  • the other node After receiving the packet, the other node records the MAC address of the node and the ring network port of all ERPS instances on the node as the count of the RPL port.
  • the configuration node enables the finding owner timer after receiving the final owner message sent by other nodes.
  • each node During the timing of the matching owner timer, each node locally updates the MAC address of all nodes in the ring network and the ring ports of all ERPS instances on the node as the count table of the RPL port (including the target port and the neighbor port).
  • Table 1 shows the MAC address and RPL port count table in the state of the finding owner. Since there is only one ERPS instance 1 in the current network and it has not been deployed yet, there is no RPL port, that is, the RPL count of each port in Table 1 is 0.
  • the node with the largest MAC address is selected as the Rpl-owner node. Assuming that the MAC address of node 4 is the largest, then node 4 is determined to be the Rpl-owner node (same target node). Since the two ports have the same count, port 1 can be selected as the Rpl-owner port.
  • FIG. 4 is a schematic diagram of a learning state of a data configuration method for ring network protection according to a second embodiment of the present invention.
  • node 4 goes to the Rpl-owner side.
  • the port (port 1) sends a learning packet with the TTL of 255 (same as the fourth packet).
  • each node reduces the TTL by 1 and forwards it.
  • Port 2 of node 5 receives the learning packet with the TTL value of 255.
  • the port acts as the Rpl-neighbor port (the port of the neighboring node), and the node is the Rpl-neighbor node (same neighbor node).
  • a port with a TTL other value is received as a Common port (a port that is not a neighboring node). After the node confirms the role, the receiving owner packet is not sent.
  • the Rpl-owner node resets the learning timer (same timer) for each receiving parent message.
  • Table 2 shows the MAC address and RPL port count table in the learning state.
  • the learning timer of the node 4 When the node in the ring determines the role and does not send the matching owner packet, the learning timer of the node 4 times out, enters the pending state, and sends a start packet (same second packet) to the ring network port to notify the ring network.
  • the other node ERPS protocol starts and enters the pending state.
  • the non-Rpl-owner node After the non-Rpl-owner node receives the start message, it starts and resets the start timeout timer (same as the third timer). At this point, the automatic deployment of a single ERPS instance is complete.
  • FIG. 5 is a schematic diagram of a newly added node in a data configuration method for ring network protection according to a second embodiment of the present invention.
  • a node 8 is newly added between the node 4 and the node 5 to enter the ring network.
  • the node 8 obtains the protocol data through the start message sent by the Rpl-owner and enters the learning state (that is, determines the state of the neighboring node and the non-adjacent node in the ring network).
  • the port 2 of the node 8 receives the packet with the TTL of 255, the port is determined to be the Rpl-neighbor port (the port of the adjacent node), and the other ports are correspondingly based.
  • the TTL value updates the role, and node 5 becomes a common node (same non-adjacent node). If the location of the joining node is not between Rpl-owner and Rpl-neighbor, it will be determined that the node is a common node.
  • each node 5 is deleted from the ring network and each ring network port is restored to UP, the port that receives the start packet with the TTL of 255 is the port 2 of the node 6, and the port is determined to be Rpl-neighbor. port. If node 4 is deleted and the ring network is restored, each node will not receive the start message. When the start timeout timer expires, each node deletes the MAC address and RPL port count entry of node 4 from the table and resends it. Find the owner packet to determine the Rpl-owner port.
  • each Rpl link should be evenly distributed in the ring network.
  • the port with the largest MAC address of the node can be selected as the Rpl-owner port from the port with the smallest RPL count of the ring port.
  • Others are the same as in the case of a single ERPS instance and will not be described here.
  • the automatic deployment of the ring network protection function simplifies configuration complexity, reduces deployment workload, and improves ease of use and flexibility.
  • the user only needs to select a certain node (configuration node or first node) in the ring network to configure the necessary configuration data of the ERPS.
  • the synchronization function is activated.
  • the node sends a synchronization packet (syndata packet or first packet) to the ring network.
  • each node After receiving the synchronization packet, each node obtains the corresponding configuration information and forwards the packet.
  • each node sends a Finding Owner packet (the third packet) to the ring network, and determines the Rpl- by comparing the MAC address of each node.
  • Owner node and Rpl-owner port target node and target port.
  • the Rpl-owner node sends a Learning packet with a TTL of 255 through the Rpl-owner port.
  • the other node receives the TTL minus 1 and forwards it.
  • the port with the TTL of 254 is determined to be the Rpl-neighbor port (adjacent node).
  • the other ports are determined to be common ports (non-adjacent nodes).
  • each node stops sending the Finding owner message.
  • the Rpl-owner node After receiving the Learning message for a period of time, the Rpl-owner node sends a Start message (the second packet) to notify each node in the ring network.
  • Start the ERPS protocol the ERPS-related configuration can be configured on one device in the ring network to deploy the protocol function on the entire ring network, reducing the workload, reducing the maintenance difficulty, and improving the ease of use and deployment efficiency of the ring network protection.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course It can be done through hardware, but in many cases the former is a better implementation.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium (such as ROM/RAM, disk).
  • a storage medium such as ROM/RAM, disk.
  • an optical disc comprising a plurality of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method described in various embodiments of the present invention.
  • a data configuration device for the protection of the ring network is also provided.
  • the device is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 6 is a structural block diagram of a data configuration apparatus for ring network protection according to an embodiment of the present invention. As shown in FIG. 6, the apparatus includes: an acquisition module 21 and a transmission module 22.
  • the obtaining module 21 is configured to acquire configuration data by using a first node of the plurality of nodes of the ring network, where the configuration data is configuration data related to performing ring network protection.
  • the sending module 22 is configured to send, by the first node, the first packet carrying the configuration data to the node other than the first node in the ring network, where the first packet is used to indicate that the other node is in the first packet according to the first packet.
  • the configuration data performs data configuration.
  • the obtaining module 20 acquires configuration data by using a first node of the plurality of nodes of the ring network, wherein the configuration data is configuration data related to performing ring network protection, and the sending module 22 passes The first node sends the first packet carrying the configuration data to the node other than the first node in the ring network, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet.
  • the device further includes: an executing module, configured to: after the sending module sends the first packet carrying the configuration data to other nodes in the ring network other than the first node, After the configuration of the configuration data is completed, the first node and other nodes perform the deployment of the ring network protection.
  • an executing module configured to: after the sending module sends the first packet carrying the configuration data to other nodes in the ring network other than the first node, After the configuration of the configuration data is completed, the first node and other nodes perform the deployment of the ring network protection.
  • the performing, by the first node, and the other nodes, the performing module performing the deployment of the ring network protection includes:
  • a target node is determined from a plurality of nodes of the ring network.
  • the target node is configured to send a second packet, where the second packet is used to indicate that other nodes in the ring network except the target node initiate a ring network protection function.
  • the first packet carries the node identifier of the first node.
  • Determining the target node from the plurality of nodes of the ring network by the execution module includes:
  • each of the other nodes To generate a third packet, where the third packet carries a node identifier of the node; and each of the other nodes respectively sends the generated third packet to the ring A node in the network other than itself.
  • the executing module is configured to determine, by the first node and the other node, the target node according to the obtained node identifier, including:
  • the first node and the other nodes respectively determine whether the relationship between the node identifier of the node itself and the acquired node identifier meets a preset rule, and determines whether the node is the target node according to the determination result.
  • the node identifier includes a media access control MAC address of the node.
  • the preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
  • the device further includes a generating module, a processing module, and a determining module.
  • the generating module is configured to: after determining the target node from the first node and the other nodes, causing the target node to generate and send a fourth packet, where the fourth packet carries a lifetime TTL.
  • the processing module is configured to enable a node other than the target node in the ring network to perform preset change processing on the received TTL in the fourth packet, and forward the processed fourth packet .
  • the determining module is configured to enable a node other than the target node in the ring network to determine its location in the ring network according to the received TTL of the fourth packet.
  • the first packet and the third packet further carry a port.
  • the port count information includes a total number of times that the port is the target port and the neighbor port
  • the target port is a port used by the target node to send an initial TTL
  • the neighbor port is a port that receives the initial TTL
  • the plurality of sub-ring networks include a first sub-ring network.
  • Determining, by the execution module, that the first node and the other node determine the target node according to the obtained node identifier further includes:
  • the executing module is configured to determine, by the first sub-ring network, the target port of the first sub-ring network according to the port with the least total number of times:
  • the device further includes a reset module and a detection module.
  • the reset module is configured to enable the target node to reset the first timer when the target node receives the third packet.
  • the detecting module is configured to enable the target node to detect whether the first timer expires.
  • the sending module is further configured to send the second packet if the first timer is detected to be timed out.
  • the detecting module is further configured to: when the first node and the other node receive the third packet, let the first node and the other node respectively detect whether the corresponding second timer is time out.
  • the determining module is further configured to: if it is detected that the corresponding second timer expires, let the first node and the other node determine the target node according to the acquired node identifier.
  • the second packet further carries a TTL.
  • the execution module is further configured to:
  • the node other than the target node in the ring network performs preset change processing on the received TTL in the second packet, and performs forwarding processing. After the second message.
  • the second packet further carries a TTL.
  • the detecting module is further configured to: when a node is added to the ring network, cause a node other than the target node in the ring network to detect whether the second is received within a preset time period Message.
  • the execution module is further configured to: if it is detected that the second message is received within a preset time period, let the node in the ring network other than the target node receive the second The TTL in the packet performs the preset change processing, and forwards the processed second packet, and causes the node other than the target node in the ring network to determine the TTL according to the received second packet. The location of itself in the ring network.
  • the execution module is further configured to: if it is detected that the second packet is not received within the preset time period, let the node in the ring network that is acquired by the node other than the target node The node identification information of the target node is deleted, and the target node is re-determined.
  • a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the data configuration method of the ring network protection.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • the device/function module/functional unit in the above embodiment When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the configuration data is obtained by the first node of the plurality of nodes of the ring network, wherein the configuration data is configured to perform configuration related to the ring network protection; the first node sends the first packet carrying the configuration data. And other nodes in the ring network except the first node, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet, which solves the data configuration efficiency of the ring network protection in the related art. Low technical problems have achieved the effect of improving the data configuration efficiency of the ring network protection.

Abstract

The present application provides a data configuration method and device for protecting a ring network. The method comprises: a first node of multiple nodes in a ring network acquires configuration data, wherein the configuration data is used to protect the ring network; and the first node sends to other nodes in the ring network except for the first node a first packet carrying the configuration data, wherein the first packet is used to instruct the other nodes to perform data configuration according to the configuration data in the first packet.

Description

一种环形网络保护的数据配置方法及装置Data configuration method and device for ring network protection 技术领域Technical field
本申请涉及但不限于通信领域,尤其涉及一种环形网络保护的数据配置方法及装置。The present application relates to, but is not limited to, the field of communications, and in particular, to a data configuration method and apparatus for ring network protection.
背景技术Background technique
环形网络保护协议,例如,G.8032标准描述的以太网多环保护技术(Ethernet Ring Protection Switching,简称为ERPS),在网络正常时阻塞环形网络保护链路(Ring Protection Link,简称为RPL链路),在检测到链路故障后阻塞故障链路,打开RPL链路,以实现业务保护和快速切换的功能。A ring network protection protocol, for example, Ethernet Ring Protection Switching (ERPS) described in the G.8032 standard, which blocks a ring protection link (Ring Protection Link, RPL link for short) when the network is normal. ), after detecting a link fault, blocking the faulty link and opening the RPL link to implement service protection and fast handover.
在部署环形网络保护功能时,一般会在环形网络内设置多台设备,其中,每台设备都需要保护协议相关的复杂的配置命令。一方面,为每台设备均进行配置的重复性操作会大大增加工作量,从而降低易用性;另一方面,大量的复杂配置容易引入差错,影响功能的顺利部署和使用。When the ring network protection function is deployed, multiple devices are generally set up in the ring network. Each device needs to be configured with complex configuration commands related to the protection protocol. On the one hand, the repetitive operation of configuring each device greatly increases the workload, thereby reducing the ease of use; on the other hand, a large number of complex configurations are easy to introduce errors, affecting the smooth deployment and use of functions.
针对相关技术中环形网络保护的数据配置效率低的技术问题,目前尚未提出有效的解决方案。In view of the technical problem of low data allocation efficiency of the ring network protection in the related art, an effective solution has not been proposed yet.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
本发明实施例提供了一种环形网络保护的数据配置方法及装置,解决了相关技术中环形网络保护的数据配置效率低的技术问题。The embodiment of the invention provides a data configuration method and device for ring network protection, which solves the technical problem that the data configuration efficiency of the ring network protection is low in the related art.
一种环形网络保护的数据配置方法,包括:环形网络的多个节点中的第一节点获取配置数据,其中,配置数据为执行环形网络保护相关的配置数据;第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点,其中,第一报文用于指示其他节点根据第一报文中的配置数据执行数据配置。A data configuration method for a ring network protection, comprising: a first node of a plurality of nodes of a ring network acquiring configuration data, wherein the configuration data is configuration data related to performing ring network protection; and the first node sends the configuration data carrying the configuration data. The first packet is sent to the node other than the first node in the ring network, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet.
可选地,该方法还包括:在第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点之后,第一节点以及其他节点在完成 配置数据的配置后,执行环形网络保护的部署。Optionally, the method further includes: after the first node sends the first packet carrying the configuration data to other nodes in the ring network except the first node, the first node and other nodes are completed. After configuring the configuration of the data, perform the deployment of the ring network protection.
可选地,第一节点以及其他节点在完成配置数据的配置后,执行环形网络保护的部署包括:从环形网络的多个节点中确定目标节点,其中,目标节点用于发送第二报文,第二报文用于指示环形网络中除目标节点之外的其他节点启动环形网络保护功能。Optionally, after the configuration of the configuration data is completed, the first node and the other nodes perform the deployment of the ring network protection, including: determining a target node from multiple nodes of the ring network, where the target node is configured to send the second packet, The second packet is used to indicate that the node other than the target node in the ring network initiates the ring network protection function.
可选地,第一报文中携带有第一节点的节点标识,从所述环形网络的多个节点中确定目标节点包括:每个其他节点分别生成第三报文,其中,第三报文携带有该节点的节点标识;以及每个其他节点分别将生成的第三报文发送至环形网络中除自身之外的节点;第一节点和其他节点根据获取到的节点标识确定目标节点。Optionally, the first packet carries the node identifier of the first node, and determining the target node from the multiple nodes of the ring network includes: each other node separately generates a third packet, where the third packet Carrying the node identifier of the node; and each other node respectively sends the generated third packet to a node other than itself in the ring network; the first node and other nodes determine the target node according to the acquired node identifier.
可选地,第一节点和其他节点根据获取到的节点标识确定目标节点包括:第一节点和其他节点分别判断节点自身的节点标识与获取到的节点标识之间的关系是否满足预设规则,并根据判断结果确定该节点是否为目标节点。Optionally, determining, by the first node and the other node, the target node according to the obtained node identifier, the first node and the other node respectively determining whether a relationship between the node identifier of the node itself and the acquired node identifier meets a preset rule. And determining whether the node is a target node according to the judgment result.
可选地,节点标识包括该节点的媒体接入控制MAC地址;预设规则为节点自身的节点标识大于获取到的节点标识。Optionally, the node identifier includes a media access control MAC address of the node; the preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
可选地,该方法还包括:在从第一节点和其他节点中确定目标节点之后,目标节点生成并发送第四报文,其中,第四报文携带有生存时间TTL;环形网络中除目标节点之外的节点对接收到的第四报文中的TTL执行预设变化处理,并转发处理后的第四报文;环形网络中除目标节点之外的节点根据接收到的第四报文的TTL确定自身在环形网络中的位置。Optionally, the method further includes: after determining the target node from the first node and the other node, the target node generates and sends a fourth packet, where the fourth packet carries a time-to-live TTL; The node other than the node performs preset change processing on the TTL in the received fourth packet, and forwards the processed fourth packet; the node other than the target node in the ring network receives the fourth packet according to the received packet. The TTL determines its position in the ring network.
可选地,在环形网络中包括多个子环形网络的情况下,其中,每个子环形网络包括第一节点和其他节点,第一报文和第三报文还携带有端口计数信息,端口计数信息中包括端口作为目标端口和邻居端口的总次数,目标端口为目标节点用于发送初始TTL的端口,邻居端口为接收初始TTL的端口,多个子环形网络包括第一子环形网络。Optionally, in the case that the ring network includes multiple sub-ring networks, where each sub-ring network includes the first node and other nodes, the first packet and the third packet further carry port count information, port count information. The port includes the total number of times the port is the target port and the neighbor port. The target port is the port used by the target node to send the initial TTL, the neighbor port is the port that receives the initial TTL, and the multiple sub-ring networks include the first sub-ring network.
第一节点和其他节点根据获取到的节点标识确定目标节点还包括:第一子环形网络根据其他子环形网络的端口计数信息确定总次数最少的端口;第一子环形网络根据总次数最少的端口确定第一子环形网络的目标端口;第一 子环形网络根据目标端口确定目标节点。Determining the target node according to the obtained node identifier further includes: the first sub-ring network determines the port with the least total number according to the port count information of the other sub-ring networks; and the first sub-ring network is based on the port with the least total number of times Determining a target port of the first sub-ring network; first The sub-ring network determines the target node based on the target port.
可选地,第一子环形网络根据总次数最少的端口确定第一子环形网络的目标端口包括:第一子环形网络选择总次数最少的端口中对应的MAC地址最大的节点的端口作为目标端口。Optionally, the determining, by the first sub-ring network, the target port of the first sub-ring network according to the port with the least total number of times: the port of the node with the largest MAC address of the port with the least total number of times selected by the first sub-ring network is used as the target port. .
可选地,该方法还包括:目标节点在接收到第三报文时,目标节点重置第一定时器;目标节点检测第一定时器的是否超时;以及如果检测到第一定时器超时,则目标节点发送第二报文。Optionally, the method further includes: when the target node receives the third packet, the target node resets the first timer; the target node detects whether the first timer expires; and if the first timer expires, Then the target node sends a second packet.
可选地,该方法还包括:在第一节点和其他节点接收到第三报文时,第一节点和其他节点分别检测对应的第二定时器是否超时;如果检测到对应的第二定时器超时,则第一节点和其他节点根据获取到的节点标识确定目标节点。Optionally, the method further includes: when the first node and the other node receive the third packet, the first node and the other node respectively detect whether the corresponding second timer expires; if the corresponding second timer is detected When the timeout occurs, the first node and other nodes determine the target node according to the acquired node identifier.
可选地,第二报文还携带有TTL。Optionally, the second packet further carries a TTL.
该方法还包括:在环形网络中新增节点的情况下,环形网络中除目标节点之外的节点对接收到的第二报文中的TTL执行预设变化处理,并转发处理后的第二报文;环形网络中除目标节点之外的节点根据接收到的第二报文的TTL确定自身在环形网络中的位置。The method further includes: in the case of adding a node in the ring network, the node other than the target node in the ring network performs preset change processing on the TTL in the received second packet, and forwards the processed second The packet; the node other than the target node in the ring network determines its position in the ring network according to the TTL of the received second message.
可选地,第二报文还携带有TTL。Optionally, the second packet further carries a TTL.
该方法还包括:在环形网络中新增节点的情况下,环形网络中除目标节点之外的节点检测在预设时间段内是否接收到第二报文;如果检测到在预设时间段内接收到所述第二报文,则环形网络中除目标节点之外的节点对接收到的第二报文中的TTL执行预设变化处理,并转发处理后的第二报文,以及环形网络中除目标节点之外的节点根据接收到的第二报文的TTL确定自身在环形网络中的位置;如果检测到在预设时间段内未接收到所述第二报文,则环形网络中除目标节点之外的节点将获取到的节点标识中目标节点的节点标识信息删除,并重新确定目标节点。The method further includes: in the case of adding a node in the ring network, the node other than the target node in the ring network detects whether the second message is received within the preset time period; if it is detected within the preset time period Receiving the second packet, the node other than the target node in the ring network performs preset change processing on the TTL in the received second packet, and forwards the processed second packet, and the ring network. The node other than the target node determines its location in the ring network according to the TTL of the received second packet; if it detects that the second packet is not received within the preset time period, the ring network is The node other than the target node deletes the node identification information of the target node in the acquired node identifier, and re-determines the target node.
一种环形网络保护的数据配置装置,包括:获取模块和发送模块。A data configuration device for ring network protection includes: an acquisition module and a transmission module.
获取模块,设置为令环形网络的多个节点中的第一节点获取配置数据,其中,配置数据为执行环形网络保护相关的配置数据。 The obtaining module is configured to obtain configuration data of the first node of the plurality of nodes of the ring network, wherein the configuration data is configuration data related to performing ring network protection.
发送模块,设置为令第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点,其中,第一报文用于指示其他节点根据第一报文中的配置数据执行数据配置。The sending module is configured to enable the first node to send the first packet carrying the configuration data to the node other than the first node in the ring network, where the first packet is used to indicate that the other node is in the first packet according to the first packet. The configuration data performs data configuration.
可选地,该装置还包括:执行模块。Optionally, the apparatus further includes: an execution module.
执行模块,设置为在所述发送模块发送携带有所述配置数据的第一报文至所述环形网络中除所述第一节点之外的其他节点之后,第一节点以及其他节点在完成配置数据的配置后,执行环形网络保护的部署。An execution module, configured to: after the sending module sends the first packet carrying the configuration data to other nodes in the ring network except the first node, the first node and other nodes are configured After the data is configured, the deployment of the ring network protection is performed.
可选地,所述第一节点以及所述其他节点在完成所述配置数据的配置后,所述执行模块执行环形网络保护的部署包括:Optionally, after the configuration of the configuration data is completed, the performing, by the first node, and the other nodes, the performing module performing the deployment of the ring network protection includes:
从所述环形网络的多个节点中确定目标节点。A target node is determined from a plurality of nodes of the ring network.
其中,所述目标节点用于发送第二报文,所述第二报文用于指示所述环形网络中除所述目标节点之外的其他节点启动环形网络保护功能。The target node is configured to send a second packet, where the second packet is used to indicate that other nodes in the ring network except the target node initiate a ring network protection function.
可选地,所述第一报文中携带有所述第一节点的节点标识。Optionally, the first packet carries the node identifier of the first node.
所述执行模块从所述环形网络的多个节点中确定目标节点包括:Determining the target node from the plurality of nodes of the ring network by the execution module includes:
令每个所述其他节点分别生成第三报文,其中,所述第三报文携带有该节点的节点标识;以及每个所述其他节点分别将生成的第三报文发送至所述环形网络中除自身之外的节点。And causing each of the other nodes to generate a third packet, where the third packet carries a node identifier of the node; and each of the other nodes respectively sends the generated third packet to the ring A node in the network other than itself.
令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点。And causing the first node and the other node to determine the target node according to the acquired node identifier.
可选地,所述执行模块令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点包括:Optionally, the executing module is configured to determine, by the first node and the other node, the target node according to the obtained node identifier, including:
令所述第一节点和所述其他节点分别判断节点自身的节点标识与获取到的节点标识之间的关系是否满足预设规则,并根据判断结果确定该节点是否为所述目标节点。The first node and the other nodes respectively determine whether the relationship between the node identifier of the node itself and the acquired node identifier meets a preset rule, and determines whether the node is the target node according to the determination result.
可选地,Optionally,
所述节点标识包括该节点的媒体接入控制MAC地址。The node identifier includes a media access control MAC address of the node.
所述预设规则为节点自身的节点标识大于获取到的节点标识。 The preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
可选地,所述装置还包括生成模块、处理模块和确定模块。Optionally, the device further includes a generating module, a processing module, and a determining module.
所述生成模块,设置为在从所述第一节点和所述其他节点中确定目标节点之后,令所述目标节点生成并发送第四报文,其中,所述第四报文携带有生存时间TTL。The generating module is configured to: after determining the target node from the first node and the other nodes, causing the target node to generate and send a fourth packet, where the fourth packet carries a lifetime TTL.
所述处理模块,设置为令所述环形网络中除所述目标节点之外的节点对接收到的所述第四报文中的TTL执行预设变化处理,并转发处理后的第四报文。The processing module is configured to enable a node other than the target node in the ring network to perform preset change processing on the received TTL in the fourth packet, and forward the processed fourth packet .
所述确定模块,设置为令所述环形网络中除所述目标节点之外的节点根据接收到的所述第四报文的TTL确定自身在所述环形网络中的位置。The determining module is configured to enable a node other than the target node in the ring network to determine its location in the ring network according to the received TTL of the fourth packet.
可选地,在所述环形网络中包括多个子环形网络的情况下,其中,每个子环形网络包括第一节点和其他节点,所述第一报文和所述第三报文还携带有端口计数信息,所述端口计数信息中包括端口作为目标端口和邻居端口的总次数,所述目标端口为所述目标节点用于发送初始TTL的端口,所述邻居端口为接收所述初始TTL的端口,所述多个子环形网络包括第一子环形网络。Optionally, in the case that the ring network includes multiple sub-ring networks, where each sub-ring network includes a first node and other nodes, the first packet and the third packet further carry a port. Counting information, the port count information includes a total number of times that the port is the target port and the neighbor port, the target port is a port used by the target node to send an initial TTL, and the neighbor port is a port that receives the initial TTL The plurality of sub-ring networks include a first sub-ring network.
所述执行模块令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点还包括:Determining, by the execution module, that the first node and the other node determine the target node according to the obtained node identifier further includes:
令所述第一子环形网络根据其他子环形网络的端口计数信息确定所述总次数最少的端口。And causing the first sub-ring network to determine the port with the least total number of times according to port count information of other sub-ring networks.
令所述第一子环形网络根据所述总次数最少的端口确定所述第一子环形网络的目标端口。And causing the first sub-ring network to determine a target port of the first sub-ring network according to the port with the least total number of times.
令所述第一子环形网络根据所述目标端口确定所述目标节点。And causing the first sub-ring network to determine the target node according to the target port.
可选地,所述执行模块令所述第一子环形网络根据所述总次数最少的端口确定所述第一子环形网络的目标端口包括:Optionally, the executing module is configured to determine, by the first sub-ring network, the target port of the first sub-ring network according to the port with the least total number of times:
令所述第一子环形网络选择所述总次数最少的端口中对应的MAC地址最大的节点的端口作为所述目标端口。And causing the first sub-ring network to select, as the target port, a port of a node with a corresponding least MAC address among the ports with the least total number of times.
可选地,所述装置还包括重置模块和检测模块。Optionally, the device further includes a reset module and a detection module.
所述重置模块,设置为令所述目标节点在接收到所述第三报文时,所述目标节点重置第一定时器。 The reset module is configured to enable the target node to reset the first timer when the target node receives the third packet.
所述检测模块,设置为令所述目标节点检测所述第一定时器的是否超时。The detecting module is configured to enable the target node to detect whether the first timer expires.
所述发送模块,还设置为如果检测到所述第一定时器超时,则发送所述第二报文。The sending module is further configured to send the second packet if the first timer is detected to be timed out.
可选地,Optionally,
所述检测模块还设置为,在所述第一节点和所述其他节点接收到所述第三报文时,令所述第一节点和所述其他节点分别检测对应的第二定时器是否超时。The detecting module is further configured to: when the first node and the other node receive the third packet, let the first node and the other node respectively detect whether the corresponding second timer expires .
所述确定模块还设置为,如果检测到所述对应的第二定时器超时,则令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点。The determining module is further configured to: if it is detected that the corresponding second timer expires, let the first node and the other node determine the target node according to the acquired node identifier.
可选地,所述第二报文还携带有TTL。Optionally, the second packet further carries a TTL.
所述执行模块还设置为:The execution module is further configured to:
在所述环形网络中新增节点的情况下,令所述环形网络中除所述目标节点之外的节点对接收到的所述第二报文中的TTL执行预设变化处理,并转发处理后的第二报文。In a case where a node is added to the ring network, the node other than the target node in the ring network performs preset change processing on the received TTL in the second packet, and performs forwarding processing. After the second message.
令所述环形网络中除所述目标节点之外的节点根据接收到的所述第二报文的TTL确定自身在所述环形网络中的位置。And determining, by the node other than the target node, the location of the second packet in the ring network according to the received TTL of the second packet.
可选地,所述第二报文还携带有TTL。Optionally, the second packet further carries a TTL.
所述检测模块还设置为:在所述环形网络中新增节点的情况下,令所述环形网络中除所述目标节点之外的节点检测在预设时间段内是否接收到所述第二报文。The detecting module is further configured to: when a node is added to the ring network, cause a node other than the target node in the ring network to detect whether the second is received within a preset time period Message.
所述执行模块还设置为:如果检测到在预设时间段内接收到所述第二报文,则令所述环形网络中除所述目标节点之外的节点对接收到的所述第二报文中的TTL执行预设变化处理,并转发处理后的第二报文,以及令所述环形网络中除所述目标节点之外的节点根据接收到的所述第二报文的TTL确定自身在所述环形网络中的位置。The execution module is further configured to: if it is detected that the second message is received within a preset time period, let the node in the ring network other than the target node receive the second The TTL in the packet performs the preset change processing, and forwards the processed second packet, and causes the node other than the target node in the ring network to determine the TTL according to the received second packet. The location of itself in the ring network.
所述执行模块还设置为:如果检测到在预设时间段内未接收到所述第二报文,则令所述环形网络中除所述目标节点之外的节点将获取到的节点标识中所述目标节点的节点标识信息删除,并重新确定所述目标节点。 The execution module is further configured to: if it is detected that the second packet is not received within the preset time period, let the node in the ring network that is acquired by the node other than the target node The node identification information of the target node is deleted, and the target node is re-determined.
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述的环形网络保护的数据配置方法。A computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the data configuration method of the ring network protection.
根据本发明实施例方案,通过环形网络的多个节点中的第一节点获取配置数据,其中,配置数据为执行环形网络保护相关的配置数据;第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点,其中,第一报文用于指示其他节点根据第一报文中的配置数据执行数据配置,解决了相关技术中环形网络保护的数据配置效率低的技术问题,达到了提高环形网络保护的数据配置效率的效果。According to the embodiment of the present invention, the configuration data is obtained by the first node of the plurality of nodes of the ring network, wherein the configuration data is configured to perform configuration related to the ring network protection; the first node sends the first packet carrying the configuration data. And other nodes in the ring network except the first node, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet, which solves the data configuration efficiency of the ring network protection in the related art. Low technical problems have achieved the effect of improving the data configuration efficiency of the ring network protection.
附图概述BRIEF abstract
图1是根据本发明第一实施例的环形网络保护的数据配置方法的流程图;1 is a flowchart of a data configuration method for ring network protection according to a first embodiment of the present invention;
图2是根据本发明第二实施例的环形网络保护的数据配置方法的初始状态示意图;2 is a schematic diagram showing an initial state of a data configuration method for ring network protection according to a second embodiment of the present invention;
图3是根据本发明第二实施例的环形网络保护的数据配置方法的syndata状态示意图;3 is a schematic diagram of a syntax state of a data configuration method for ring network protection according to a second embodiment of the present invention;
图4是根据本发明第二实施例的环形网络保护的数据配置方法的learning状态示意图;4 is a schematic diagram of a learning state of a data configuration method for ring network protection according to a second embodiment of the present invention;
图5是根据本发明第二实施例的环形网络保护的数据配置方法中新增节点情况的示意图;5 is a schematic diagram of a newly added node in a data configuration method for ring network protection according to a second embodiment of the present invention;
图6是根据本发明实施例的环形网络保护的数据配置装置的结构框图。FIG. 6 is a structural block diagram of a data configuration apparatus for ring network protection according to an embodiment of the present invention.
本发明的实施方式Embodiments of the invention
下文中将结合附图对本发明的实施例进行详细说明需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。The embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that the features of the embodiments and the embodiments in the present application can be combined with each other without conflict.
需要说明的是,本发明实施例的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It should be noted that the terms "first", "second" and the like in the specification and claims of the embodiments of the present invention and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. order.
在本实施例中提供了一种环形网络保护的数据配置方法,图1是根据本 发明第一实施例的环形网络保护的数据配置方法的流程图,如图1所示,该流程包括步骤S101-S102:In this embodiment, a data configuration method for ring network protection is provided, and FIG. 1 is based on the present invention. A flowchart of a data configuration method for ring network protection according to the first embodiment of the present invention is shown in FIG. 1, and the process includes steps S101-S102:
步骤S101,环形网络的多个节点中的第一节点获取配置数据,其中,配置数据为执行环形网络保护相关的配置数据。Step S101: The first node of the plurality of nodes of the ring network acquires configuration data, where the configuration data is configuration data related to performing ring network protection.
第一节点可以为环形网络中的任意选定的一个节点。配置数据为环形网络为实现环形网络保护功能所需配置的数据,例如,该配置数据可以为以太网多环保护技术(ERPS)数据、环形网络保护协议相关的配置数据。其中,需要在每个节点的数据配置均完成后,才可实现环形网络保护功能。The first node can be any selected one of the nodes in the ring network. The configuration data is data required for the ring network to implement the ring network protection function. For example, the configuration data may be configuration data related to Ethernet Multi-ring Protection (ERPS) data and ring network protection protocol. The ring network protection function can be implemented only after the data configuration of each node is completed.
下面以ERPS为例进行说明。其中,配置数据包括:ERPS实例号,关联虚拟局域网VLAN(协议VLAN,业务VLAN),两个环网端口(默认阻塞其中一个,以防止成环)。其他协议相关数据可采用默认配置,也可以手动配置,包括:关联的MSTP实例(默认与ERPS实例号相同),ERPS定时器参数,切换模式(默认是可恢复模式),Ringid(默认是实例号)等。对于环形网络中每个端口的角色(相对连接关系)可采用自动学习方式。The following takes ERPS as an example for explanation. The configuration data includes: an ERPS instance number, an associated virtual local area network VLAN (protocol VLAN, service VLAN), and two ring network ports (one of which is blocked by default to prevent looping). Other protocol related data can be configured by default or manually, including: associated MSTP instance (default is the same as ERPS instance number), ERPS timer parameter, switching mode (default is recoverable mode), Ringid (default is instance number) )Wait. The role of each port in the ring network (relative connection relationship) can be automatically learned.
步骤S102,第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点,其中,第一报文用于指示其他节点根据第一报文中的配置数据执行数据配置。In the step S102, the first node sends the first packet carrying the configuration data to the node other than the first node in the ring network, where the first packet is used to indicate that the other node is configured according to the configuration data in the first packet. Perform data configuration.
为了提高发送效率,第一节点向环形网络中的其他节点发送第一报文可以采用双向发送的方式。发送方式为转发的方式,例如,环形网络中包括第1至第5共5个节点,其中,第1个节点为上述的第一节点,1-2-3-4-5-1组成环形网络。第1个节点分别向第2个节点和第5个节点发送第一报文,第2个节点将接收到的第一报文发送至第3个节点,第5个节点将接收到的第一报文发送至第4个报文。其中,每个节点在接收到第一报文之后,获取其中包含的配置数据的信息,并根据配置数据的信息执行相应的数据配置。也即,上述对第一报文的处理,第一节点(发送节点)可以向两个环网端口执行发送,收到自己发送的报文丢弃;其他节点收到该报文,经过相应处理后向另一个环网端口转发。In order to improve the transmission efficiency, the first node may send the first message to other nodes in the ring network in a bidirectional manner. The sending mode is a forwarding mode. For example, the ring network includes a total of five nodes from the first to the fifth, wherein the first node is the first node, and the 1-2-3-4-5-1 forms a ring network. . The first node sends a first message to the second node and the fifth node, and the second node sends the received first message to the third node, and the fifth node receives the first message. The message is sent to the 4th message. After receiving the first packet, each node obtains the information of the configuration data contained therein, and performs corresponding data configuration according to the information of the configuration data. That is, in the processing of the first packet, the first node (the sending node) may perform the sending to the two ring network ports, and the received packets are discarded; the other nodes receive the message, and after corresponding processing, Forward to another ring port.
需要说明的是,第一节点中配置了配置数据,激活整个环形网络的同步功能。激活后,第一节点向2个环网端口发送第一报文(例如,携带ERPS 参数信息,并包含节点上所有ERPS实例的环网端口作为RPL端口的计数)。其他节点收到该报文后,根据报文内容确定ERPS实例号,关联VLAN,以及其他参数,其中,收包端口作为环网端口。It should be noted that the configuration data is configured in the first node to activate the synchronization function of the entire ring network. After activation, the first node sends the first packet to the two ring ports (for example, carrying the ERPS) Parameter information, and includes the ring port of all ERPS instances on the node as the count of the RPL port). After receiving the packet, the other node determines the ERPS instance number, associated VLAN, and other parameters according to the content of the packet. The receiving port serves as the ring network port.
其中,第一报文可采用与标准ERPS协议相类似的结构。目的媒体接入控制MAC地址为01-19-a8-00-00-[instance id],以太网类型8902,version、opcode与ERPS标准协议报文一致,报文载荷部分自定义。包括:报文类型(例如,以01代表第一报文),生存时间TTL值,ERPS参数信息,端口信息等。The first message may adopt a structure similar to the standard ERPS protocol. The destination media access control MAC address is 01-19-a8-00-00-[instance id], the Ethernet type is 8902, the version, opcode, and ERPS standard protocol packets are the same, and the packet payload part is customized. Including: packet type (for example, 01 for the first packet), lifetime TTL value, ERPS parameter information, port information, and so on.
根据该实施例的环形网络保护的数据配置方法,通过环形网络的多个节点中的第一节点获取配置数据,其中,配置数据为执行环形网络保护相关的配置数据;第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点,其中,第一报文用于指示其他节点根据第一报文中的配置数据执行数据配置,解决了相关技术中环形网络保护的数据配置效率低的技术问题,进而通过第一节点获取配置数据,并将配置数据发送至环形网络中的其他节点,避免了将环形网络中的每个节点均进行相应的复杂的数据配置,才能实现环网保护功能的部署,而导致的数据配置效率低的问题。通过该实施例达到了提高环形网络保护的数据配置效率的效果。According to the data configuration method of the ring network protection according to the embodiment, the configuration data is acquired by the first node of the plurality of nodes of the ring network, wherein the configuration data is configured to perform configuration related to the ring network protection; the first node sends the configuration The first packet of the data is sent to the node other than the first node in the ring network, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet, and the ring in the related art is solved. The technical problem of low efficiency of data protection of network protection, and then obtaining configuration data through the first node, and sending the configuration data to other nodes in the ring network, avoiding corresponding complex data of each node in the ring network. The configuration can achieve the deployment of the ring network protection function, resulting in low data configuration efficiency. The effect of improving the data configuration efficiency of the ring network protection is achieved by this embodiment.
可选地,该方法还包括:在第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点之后,第一节点以及其他节点在完成配置数据的配置后,执行环形网络保护的部署。Optionally, the method further includes: after the first node sends the first packet carrying the configuration data to other nodes in the ring network except the first node, the first node and other nodes complete the configuration of the configuration data. After that, the deployment of ring network protection is performed.
需要说明的是,在对环形网络中的每个节点均进行了必要的数据配置之后,可进行整个环形网络的环网保护功能的部署。以实现业务保护和快速切换的功能。It should be noted that after the necessary data configuration is performed on each node in the ring network, the ring network protection function of the entire ring network can be deployed. To achieve business protection and fast switching functions.
可选地,第一节点以及其他节点在完成配置数据的配置后,执行环形网络保护的部署包括:从第一节点和其他节点中确定目标节点,其中,目标节点用于发送第二报文,第二报文用于指示环形网络中除目标节点之外的其他节点启动环形网络保护功能。Optionally, after the configuration of the configuration data is completed, the first node and the other nodes perform the deployment of the ring network protection, including: determining a target node from the first node and other nodes, where the target node is configured to send the second packet, The second packet is used to indicate that the node other than the target node in the ring network initiates the ring network protection function.
从第一节点和其他节点中确定目标节点,可以包括:人为指定,例如,可以指定第一节点和其他节点中的任意一个节点作为目标节点(并指定该节 点的任意一个端口作为目标端口);或者,也可以按照预设规则从第一节点和其他节点中确定一个节点作为目标节点(并指定该节点的任意一个端口作为目标端口)。其中,人为指定简便易行;通过预设规则确定目标节点可以充分考虑负载均衡等情况(例如,在环形网络中包括多条环形链路的情况下)。Determining the target node from the first node and other nodes may include: artificially specifying, for example, one of the first node and the other node may be designated as the target node (and the section is specified) Any port of the point is used as the target port; or, a node may be determined as a target node from the first node and other nodes according to a preset rule (and any port of the node is designated as the target port). Among them, the artificial designation is simple and easy; determining the target node by the preset rule can fully consider the load balancing and the like (for example, in the case where a plurality of ring links are included in the ring network).
第二报文可采用与标准ERPS协议相类似的结构。目的媒体接入控制MAC地址为01-19-a8-00-00-[instance id],以太网类型8902,version、opcode与ERPS标准协议报文一致,报文载荷部分自定义。包括:报文类型(例如,以02代表第二报文),生存时间TTL值,ERPS参数信息,端口信息等。The second message may adopt a structure similar to the standard ERPS protocol. The destination media access control MAC address is 01-19-a8-00-00-[instance id], the Ethernet type is 8902, the version, opcode, and ERPS standard protocol packets are the same, and the packet payload part is customized. Including: packet type (for example, 02 for the second message), lifetime TTL value, ERPS parameter information, port information, and so on.
第二报文用于通知环网内其他节点协议启动进入等待(pending)状态,也即执行环形网络保护的等待阶段。例如,每个节点中配置的ERPS协议进入pending状态后,可按照G.8032标准运行。目标节点向其他节点发送第二报文,非目标节点在接收到第二报文后进入环形网络保护准备状态,例如,可以采用定时器的方式判断何时执行环形网络保护,当定时器超时后各个节点启动环形网络保护功能。The second packet is used to notify other nodes in the ring network that the protocol initiates a pending state, that is, a waiting phase for performing ring network protection. For example, after the ERPS protocol configured in each node enters the pending state, it can run according to the G.8032 standard. The target node sends the second packet to the other node. After receiving the second packet, the non-target node enters the ring network protection preparation state. For example, the timer can be used to determine when to perform the ring network protection. When the timer expires. Each node initiates a ring network protection function.
可选地,第一报文中携带有第一节点的节点标识,从第一节点和其他节点中确定目标节点包括:每个其他节点分别生成第三报文,其中,第三报文携带有该节点的节点标识;以及每个其他节点分别将生成的第三报文发送至环形网络中除自身之外的节点;第一节点和其他节点根据获取到的节点标识确定目标节点。Optionally, the first packet carries the node identifier of the first node, and determining the target node from the first node and the other nodes includes: each other node generates a third packet, where the third packet carries The node identifier of the node; and each other node respectively sends the generated third packet to a node other than itself in the ring network; the first node and other nodes determine the target node according to the obtained node identifier.
在其他节点接收到第一节点发送的第一报文之后,可触发该节点生成第三报文,并将第三报文发送给环形网络的其他节点。其中,第三报文携带有发送节点的节点标识,节点标识类似于每个节点的ID,也即将环形网络中的不同节点区别开来的标识信息。例如,该标识信息可以是每个节点的MAC地址。另外,第三报文也包括其他的信息,例如,环形网络节点的端口在所有ERPS实例中作为RPL端口的计数(也即端口计数信息)。After the other node receives the first packet sent by the first node, the node may be triggered to generate a third packet, and the third packet is sent to other nodes of the ring network. The third packet carries the node identifier of the sending node, and the node identifier is similar to the ID of each node, and is also the identifier information that is distinguished from different nodes in the ring network. For example, the identification information can be the MAC address of each node. In addition, the third message also includes other information, for example, the port of the ring network node is counted as an RPL port (ie, port count information) in all ERPS instances.
其中,第三报文可采用与标准ERPS协议相类似的结构。目的媒体接入控制MAC地址为01-19-a8-00-00-[instance id],以太网类型8902,version、opcode与ERPS标准协议报文一致,报文载荷部分自定义。包括:报文类型(例如,以03代表第三报文),生存时间TTL值,ERPS参数信息,端口信 息等。Among them, the third message can adopt a structure similar to the standard ERPS protocol. The destination media access control MAC address is 01-19-a8-00-00-[instance id], the Ethernet type is 8902, the version, opcode, and ERPS standard protocol packets are the same, and the packet payload part is customized. Including: message type (for example, 03 for the third message), lifetime TTL value, ERPS parameter information, port letter Interest and so on.
第一节点和其他节点根据获取到的节点标识确定目标节点可以包括:(1)第一节点和其他节点根据获取到的节点标识判断自身是否为目标节点(其具有的端口之一为目标端口);(2)第一节点和其他节点中选择一个节点对目标节点进行判断。在方式(1)中,每个节点根据获取到的所有的节点标识进行判断,如果判断结果符合预设规则,则该节点可以确定自身为目标节点。每个节点只进行自身是否为目标节点的判断,如果判断结果不符合预设规则,不进行其他任何处理,。在方式(2)中,由于每个节点都获取到了环形网路中的每个节点的标识信息,因此,可以指定其中一个节点进行判断,如果判断出自身为目标节点,则可以不通知其他节点,直接进行后续的处理(例如触发环网保护);如果判断出其他某个节点为目标节点,则发送报文通知该节点,该节点进行后续的处理。Determining the target node according to the acquired node identifier may include: (1) the first node and other nodes determine, according to the acquired node identifier, whether the target node is a target node (one of the ports has a target port) (2) Selecting one of the first node and other nodes to judge the target node. In the mode (1), each node judges according to all the obtained node identifiers, and if the judgment result conforms to the preset rule, the node may determine that it is the target node. Each node only judges whether it is the target node. If the judgment result does not meet the preset rules, no other processing is performed. In the method (2), since each node obtains the identification information of each node in the ring network, one of the nodes may be specified for judgment, and if it is determined that it is the target node, the other nodes may not be notified. The subsequent processing is directly performed (for example, triggering ring network protection); if it is determined that another node is the target node, a message is sent to notify the node, and the node performs subsequent processing.
可选地,第一节点和其他节点根据获取到的节点标识确定目标节点包括:第一节点和其他节点分别判断节点自身的节点标识与获取到的节点标识之间的关系是否满足预设规则,并根据判断结果确定该节点是否为目标节点。Optionally, determining, by the first node and the other node, the target node according to the obtained node identifier, the first node and the other node respectively determining whether a relationship between the node identifier of the node itself and the acquired node identifier meets a preset rule. And determining whether the node is a target node according to the judgment result.
在该实施例中,每个节点仅判断自身的节点标识与获取到的节点标识之间的关系是否满足预设规则,其他节点的节点标识之间的关系不作判断。例如,节点标识为MAC地址,则只需要判断节点自身的MAC地址与其他节点的MAC地址之间的大小关系,当大小关系满足预设规则时,可确定该节点为目标节点。根据判断结果也可确定该节点的目标端口,包括:如果判断出该节点为目标节点,则可以默认目标节点中的任意一个端口为目标端口。In this embodiment, each node only determines whether the relationship between the node identifier of the node and the acquired node identifier satisfies the preset rule, and the relationship between the node identifiers of other nodes is not determined. For example, if the node identifier is a MAC address, it is only necessary to determine the size relationship between the MAC address of the node itself and the MAC address of other nodes. When the size relationship satisfies the preset rule, the node may be determined as the target node. The target port of the node may also be determined according to the judgment result, including: if it is determined that the node is the target node, any one of the target nodes may be the target port by default.
可选地,节点标识包括该节点的媒体接入控制MAC地址;预设规则为节点自身的节点标识大于获取到的节点标识。Optionally, the node identifier includes a media access control MAC address of the node; the preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
在该实施例中,将媒体接入控制MAC地址作为节点标识;节点自身的节点标识大于获取到的节点标识作为预设规则。例如,对于环形网络内只有一个ERPS实例的情况,在每个节点接收到其他所有节点的MAC地址之后,可以将MAC地址最大的节点作为目标节点,将该节点的任意一个端口作为目标端口。In this embodiment, the media access control MAC address is used as the node identifier; the node identifier of the node itself is greater than the obtained node identifier as a preset rule. For example, in the case of only one ERPS instance in the ring network, after each node receives the MAC addresses of all other nodes, the node with the largest MAC address can be used as the target node, and any port of the node is used as the target port.
可选地,在从第一节点和其他节点中确定目标节点之后,该方法还包括: 目标节点生成并发送第四报文,其中,第四报文携带有生存时间TTL;环形网络中除目标节点之外的节点对接收到的第四报文中的TTL执行预设变化处理,并转发处理后的第四报文;环形网络中除目标节点之外的节点根据接收到的第四报文的TTL确定自身在环形网络中的位置。Optionally, after determining the target node from the first node and other nodes, the method further includes: The target node generates and sends a fourth packet, where the fourth packet carries a lifetime TTL; the node other than the target node in the ring network performs preset change processing on the TTL in the received fourth packet, and Forwarding the processed fourth packet; the node other than the target node in the ring network determines its position in the ring network according to the TTL of the received fourth packet.
其中,第四报文可采用与标准ERPS协议相类似的结构。目的媒体接入控制MAC地址为01-19-a8-00-00-[instance id],以太网类型8902,version、opcode与ERPS标准协议报文一致,报文载荷部分自定义。包括:报文类型(例如,以04代表第四报文),生存时间TTL值,ERPS参数信息,端口信息等。需要说明的是,上述的第一至第四报文,结构类似。在节点接收到某一报文时,根据报文类型来确定应该获取报文中的哪些内容。Among them, the fourth message can adopt a structure similar to the standard ERPS protocol. The destination media access control MAC address is 01-19-a8-00-00-[instance id], the Ethernet type is 8902, the version, opcode, and ERPS standard protocol packets are the same, and the packet payload part is customized. Including: message type (for example, 04 for the fourth message), lifetime TTL value, ERPS parameter information, port information, and so on. It should be noted that the first to fourth messages described above are similar in structure. When a node receives a certain packet, it determines what content should be obtained according to the packet type.
在目标节点确定以后,目标节点会通过目标端口发送携带TTL(例如,值为255)的第四报文。每个节点收到该报文后,TTL执行预设变化处理(例如,执行减1处理)并将处理后的报文进行转发。如果收到的报文TTL值为初始TTL(例如255),则可确定收包端口与目标端口相邻,该节点为与目标节点位置上相邻的节点,如果收到的报文TTL值不为初始TTL,则可确定收包端口不与目标端口相邻,也即该节点不是与目标节点位置上相邻的节点。也即,通过该实施例可以确定整个环形网络的节点的位置信息。After the target node is determined, the target node sends a fourth packet carrying a TTL (for example, a value of 255) through the target port. After each node receives the message, the TTL performs a preset change process (for example, performs a minus 1 process) and forwards the processed message. If the TTL value of the received packet is the initial TTL (for example, 255), it can be determined that the receiving port is adjacent to the target port, and the node is a node adjacent to the target node. If the received packet has a TTL value, For the initial TTL, it can be determined that the receiving port is not adjacent to the target port, that is, the node is not a node adjacent to the target node. That is, the position information of the nodes of the entire ring network can be determined by this embodiment.
假设TTL的初始值为255,需要说明的是,如果某个节点收到的TTL值为1,则继续转发的话TTL减1为0,则携带该TTL的报文不再转发,执行丢弃处理。Assume that the initial value of the TTL is 255. It should be noted that if the TTL value of a node is 1, the TTL of the TTL is reduced to 1 and the packet carrying the TTL is not forwarded.
可选地,在环形网络中包括多个子环形网络的情况下,其中,每个子环形网络包括第一节点和其他节点,第一报文和第三报文还携带有端口计数信息,端口计数信息中包括端口作为目标端口和邻居端口的总次数,目标端口为目标节点用于发送初始TTL的端口,邻居端口为接收初始TTL的端口,多个子环形网络包括第一子环形网络,则第一节点和其他节点根据获取到的节点标识确定目标节点包括:第一子环形网络根据其他子环形网络的端口计数信息确定总次数最少的端口;第一子环形网络根据总次数最少的端口确定第一子环形网络的目标端口;第一子环形网络根据目标端口确定目标节点。Optionally, in the case that the ring network includes multiple sub-ring networks, where each sub-ring network includes the first node and other nodes, the first packet and the third packet further carry port count information, port count information. The port includes the total number of times the port is the target port and the neighbor port. The target port is the port used by the target node to send the initial TTL. The neighbor port is the port that receives the initial TTL. The multiple sub-ring networks include the first sub-ring network, and the first node. And determining, by the other node, the target node according to the obtained node identifier: the first sub-ring network determines the port with the least total number according to the port count information of the other sub-ring networks; and the first sub-ring network determines the first sub-port according to the port with the least total number of times. The target port of the ring network; the first sub-ring network determines the target node according to the target port.
可选地,第一子环形网络根据总次数最少的端口确定第一子环形网络的 目标端口包括:第一子环形网络选择总次数最少的端口中对应的MAC地址最大的节点的端口作为目标端口。Optionally, the first sub-ring network determines the first sub-ring network according to the port with the least total number of times. The target port includes: the port of the node with the largest MAC address corresponding to the port with the least total number of times selected by the first sub-ring network as the target port.
在多个环形网络要求部署的情况下,采取先后激活的方式,即在一个环形网络部署好之后再部署之后的环形网络。这样后续的环形网络部署时,前面的环形网络已经部署完成,已存产生完整有效的端口计数。In the case where multiple ring networks are required to be deployed, a sequential activation mode is adopted, that is, a ring network after deployment after a ring network is deployed. In this subsequent ring network deployment, the previous ring network has been deployed and a full and effective port count has been generated.
在该实施例中,在同一环形网络物理链路中存在多个逻辑子环形网络的情况下,考虑到整个网络系统的负载均衡,也即为了一定程度上实现正常工作时的负载分担,可以依次确定每个逻辑子环形网络的目标节点,其中,下一个子环形网络的目标节点的确定基于之前已经确定目标节点的子环形网络,之前已经确定目标节点的子环形网络的端口计数信息提供了之前已经确定目标节点的子环形网络的端口中已作为目标端口和邻居端口的总次数(端口计数信息),其中,目标端口为发送初始TTL的端口,邻居端口为接收初始TTL的端口。第一子环形网络可以根据总次数最少的端口确定第一子环形网络的目标节点。可选地,可以选择总次数最少的端口所对应的节点中MAC地址最大的节点的端口作为第一子环形网络的目标端口,并将该目标端口对应的节点作为目标节点。通过该方法,可以有效地解决多个子环形网络(多个实例)中的负载不均衡问题。In this embodiment, in the case that there are multiple logical sub-ring networks in the physical network link of the same ring network, considering load balancing of the entire network system, that is, to achieve load sharing in normal work to a certain extent, it may be sequentially Determining a target node of each logical sub-ring network, wherein the determination of the target node of the next sub-ring network is based on a sub-ring network that has previously determined the target node, and the port count information of the sub-ring network that has previously determined the target node is provided before The total number of times that the port of the sub-ring network of the target node has been used as the target port and the neighbor port (port count information) has been determined, where the target port is the port that sends the initial TTL, and the neighbor port is the port that receives the initial TTL. The first sub-ring network may determine the target node of the first sub-ring network according to the port with the least total number of times. Optionally, the port of the node with the largest MAC address among the nodes corresponding to the port with the least total number of ports may be selected as the target port of the first sub-ring network, and the node corresponding to the target port is used as the target node. By this method, the load imbalance problem in multiple sub-ring networks (multiple instances) can be effectively solved.
可选地,目标节点在接收到第三报文时,该方法还包括:目标节点重置第一定时器;目标节点检测第一定时器的是否超时;以及如果检测到第一定时器超时,则目标节点发送第二报文。Optionally, when the target node receives the third packet, the method further includes: the target node resets the first timer; the target node detects whether the first timer expires; and if the first timer expires, Then the target node sends a second packet.
在该实施例中,通过第一定时器来判断是否触发每个节点的环形网络保护功能。环形网络中的每个节点确认各自的位置后,每个节点将不再发送第三报文。目标节点每收到第三报文会重置第一定时器。如果在一段时间之内未收到第三报文,则第一定时器超时,此时,目标节点可以通过两个环网端口发送第二报文,以通知其他的节点启动环形网络保护功能。每个节点在接收到第二报文后,环网保护协议启动进入pending状态。每个非目标节点(包括邻节点和非邻节点,其中,邻节点为邻居端口所在的节点,也即接收到初始TTL的节点,非邻节点为除目标节点和邻节点之外的节点)收到第二报文后启动并重置第三定时器(start timeout定时器)。 In this embodiment, it is determined by the first timer whether to trigger the ring network protection function of each node. After each node in the ring network confirms its location, each node will no longer send a third message. The target node resets the first timer every time it receives the third message. If the third packet is not received within a certain period of time, the first timer expires. At this time, the target node can send the second packet through the two ring ports to notify other nodes to activate the ring network protection function. After each node receives the second packet, the ring protection protocol starts to enter the pending state. Each non-target node (including a neighboring node and a non-neighboring node, wherein the neighboring node is a node where the neighboring port is located, that is, the node that receives the initial TTL, and the non-neighboring node is a node other than the target node and the neighboring node) After the second message is started, the third timer (start timeout timer) is reset.
可选地,在第一节点和其他节点接收到第三报文时,该方法还包括:第一节点和其他节点分别检测对应的第二定时器是否超时;如果检测到对应的第二定时器超时,则第一节点和其他节点根据获取到的节点标识确定目标节点。Optionally, when the first node and the other node receive the third packet, the method further includes: the first node and the other node respectively detecting whether the corresponding second timer expires; if the corresponding second timer is detected When the timeout occurs, the first node and other nodes determine the target node according to the acquired node identifier.
在该实施例中,通过第二定时器来判断是否触发每个节点确定目标节点。每个节点在第二定时器持续时间内,将收到的其他节点发送的第三报文或者其他节点发送的第一报文所包含的节点标识(例如MAC地址)及报文发送节点的端口作为所有ERPS实例的RPL端口的计数保存在本地。在第二定时器超时后,第一节点和其他节点根据获取到的节点标识等信息确定目标节点。该实施例通过采用定时器的形式,可以保证确定目标节点的自动执行,减少了工作量,提高了执行效率。In this embodiment, it is determined by the second timer whether each node is triggered to determine the target node. Each node sends a third packet sent by another node or a node identifier (such as a MAC address) included in the first packet sent by other nodes and a port of the packet sending node during the duration of the second timer. The count of RPL ports as all ERPS instances is kept locally. After the second timer expires, the first node and other nodes determine the target node according to the obtained node identifier and the like. By adopting the form of a timer, the embodiment can ensure the automatic execution of the target node, reduce the workload, and improve the execution efficiency.
可选地,第二报文还携带有TTL,该方法还包括:在环形网络中新增节点的情况下,环形网络中除目标节点之外的节点对接收到的第二报文中的TTL执行预设变化处理,并转发处理后的第二报文;环形网络中除目标节点之外的节点根据接收到的第二报文的TTL确定自身在环形网络中的位置。Optionally, the second packet further carries a TTL, and the method further includes: when the node is added in the ring network, the TTL in the second packet received by the node other than the target node in the ring network The preset change process is performed, and the processed second message is forwarded; the node other than the target node in the ring network determines its position in the ring network according to the TTL of the received second message.
对于环内新增的节点,可保持目标节点不变,通过目标节点定时发送的第二报文同步获得协议数据,环形网络中除目标节点之外的节点根据接收到的第二报文的TTL确定自身在环形网络中的位置。根据该方式,可以在确保环形网络已执行的程序不被干扰的情况下,有效提高环网保护的执行效率。For the newly added nodes in the ring, the target node can be kept unchanged, and the protocol data is obtained by synchronizing the second packet periodically sent by the target node, and the node other than the target node in the ring network according to the TTL of the received second packet Determine your location in the ring network. According to this manner, the execution efficiency of the ring network protection can be effectively improved while ensuring that the program that the ring network has executed is not interfered.
可选地,第二报文还携带有TTL,该方法还包括:在环形网络中新增节点的情况下,环形网络中除目标节点之外的节点检测在预设时间段内是否接收到第二报文;如果在预设时间段内接收到第二报文,则环形网络中除目标节点之外的节点对接收到的第二报文中的TTL执行预设变化处理,并转发处理后的第二报文,以及环形网络中除目标节点之外的节点根据接收到的第二报文的TTL确定自身在环形网络中的位置;如果在预设时间段内未接收到第二报文,则环形网络中除目标节点之外的节点将获取到的节点标识中目标节点的节点标识信息删除,并重新确定目标节点。Optionally, the second packet further carries a TTL. The method further includes: when a node is added to the ring network, the node other than the target node in the ring network detects whether the node is received in the preset time period. If the second packet is received within the preset time period, the node other than the target node in the ring network performs preset change processing on the TTL in the received second packet, and performs forwarding processing. The second message, and the node other than the target node in the ring network determines its position in the ring network according to the TTL of the received second message; if the second message is not received within the preset time period Then, the node other than the target node in the ring network deletes the node identification information of the target node in the acquired node identifier, and re-determines the target node.
对于删除节点并环网恢复连通的情况(所有环网端口UP),如果删除的是非目标节点,其他节点根据第二报文中的TTL值重新学习角色,以确定各 个节点在环形网络中的位置;如果删除的是目标节点,每个节点在预设时间段内无法接收到第二报文,也即无法确定在环形网络中的位置,则各节点可确定被删除的节点为目标节点,可删除目标节点的节点标识(包括RPL端口计数条目),并重新发送第三报文(每个节点阻塞一个端口,以防止成环),并重复执行上述确定目标节点(端口)的步骤。其中,可以通过第三定时器来判断目标节点是否被删除。删除目标节点后,其他节点收不到目标节点发送的第二报文,第三定时器超时,这时可重新选则目标节点。If the node is deleted and the ring network is restored (all ring ports UP), if the non-target node is deleted, the other nodes re-learn the role according to the TTL value in the second packet to determine each The location of the nodes in the ring network; if the target node is deleted, each node cannot receive the second message within the preset time period, that is, the location in the ring network cannot be determined, then each node can determine The deleted node is the target node, and the node identifier of the target node (including the RPL port count entry) can be deleted, and the third packet is resent (each node blocks a port to prevent looping), and the above determined target node is repeatedly executed. (port) steps. The third timer can be used to determine whether the target node is deleted. After the target node is deleted, the other node does not receive the second packet sent by the target node, and the third timer expires. At this time, the target node can be reselected.
下面提供了根据本发明第二实施例的环形网络保护的数据配置方法。该实施例可以作为图1所示实施例的一种优选实施方式。A data configuration method for ring network protection according to a second embodiment of the present invention is provided below. This embodiment can be used as a preferred embodiment of the embodiment shown in FIG.
图2是根据本发明第二实施例的环形网络保护的数据配置方法的初始状态示意图。如图2所示,多台设备组成环网,其中网元1为配置节点(同第一节点),该配置节点配置了运行ERPS协议必要的配置数据:实例号1,关联VLAN(协议VLAN100,业务VLAN 101-200),环网端口等。其他设备只有相应的端口、VLAN配置。网元2至7依次相连接,形成环形网络链路。其中,网元1具有两个端口:port1和port2,其中,port1为阻塞状态。2 is a schematic diagram showing an initial state of a data configuration method for ring network protection according to a second embodiment of the present invention. As shown in FIG. 2, a plurality of devices form a ring network, wherein the network element 1 is a configuration node (same as the first node), and the configuration node is configured with configuration data necessary for running the ERPS protocol: instance number 1, associated VLAN (protocol VLAN 100, Service VLAN 101-200), ring network port, etc. Other devices have only the corresponding port and VLAN configuration. The network elements 2 to 7 are sequentially connected to form a ring network link. The network element 1 has two ports: port1 and port2, where port1 is in a blocked state.
图3是根据本发明第二实施例的环形网络保护的数据配置方法的syndata状态示意图。如图3所示,在配置节点(同第一节点)的ERPS协议必要的配置数据完备后,激活同步功能。配置节点向两个环网端口发送syndata报文(同第一报文),目的MAC为01-19-a8-00-00-01,VLAN100,载荷部分:报文类型为01为syndata报文,业务VLAN信息101-200,其他参数采用默认值。并包含节点上所有ERPS实例的环网端口作为RPL端口的计数,由于当前只有一个ERPS实例且尚未部署完成,因此,网元1的ERPS实例1环网端口下的该计数都是0。3 is a schematic diagram of a syndata state of a data configuration method for ring network protection according to a second embodiment of the present invention. As shown in FIG. 3, after the configuration data necessary for the ERPS protocol of the configuration node (same as the first node) is completed, the synchronization function is activated. The configuration node sends a syndata packet to the two ring ports (the same as the first packet). The destination MAC address is 01-19-a8-00-00-01, VLAN 100, and the payload part is 01. The packet type is 01. Service VLAN information 101-200. Other parameters use default values. The ring port of all the ERPS instances on the node is used as the count of the RPL port. Since there is only one ERPS instance and the deployment is not completed, the count of the ERPS instance 1 ring network port of the network element 1 is 0.
其中,syndata报文从配置节点的两个端口分别向环形的相反方向传输,被其他的节点接收并转发。其他节点收到配置节点发送的syndata报文后,从报文中获取ERPS的配置数据,确定ERPS实例号1,关联VLAN(协议VLAN100,业务VLAN 100-200),以及其他参数,收包端口作为环网端口。同时将配置节点的所有ERPS实例的环网端口作为RPL端口的计数与配置节点MAC地址保存在本地。然后收包节点开始发送finding owner报文(同第 三报文),其包含该节点上所有ERPS实例的环网端口作为RPL端口的计数,同时启用finding owner定时器(同第二定时器)。其他节点收到该报文后,记录该节点MAC地址以及该节点上所有ERPS实例的环网端口作为RPL端口的计数。配置节点收到其他节点发送的finding owner报文后启用finding owner定时器。The syndata packet is transmitted from the two ports of the configuration node to the opposite direction of the ring, and is received and forwarded by other nodes. After receiving the syndata packet sent by the configuration node, the other node obtains the configuration data of the ERPS from the packet, determines the ERPS instance number 1, the associated VLAN (protocol VLAN 100, service VLAN 100-200), and other parameters, and the receiving port is used as the receiving port. Ring network port. At the same time, the ring network port of all ERPS instances of the configuration node is stored as the RPL port count and the configuration node MAC address locally. Then the receiving node starts to send the finding owner message (same as the first The third packet includes the ring port of all ERPS instances on the node as the RPL port count, and the finding owner timer (same as the second timer) is enabled. After receiving the packet, the other node records the MAC address of the node and the ring network port of all ERPS instances on the node as the count of the RPL port. The configuration node enables the finding owner timer after receiving the final owner message sent by other nodes.
需要说明的是,为了简化说明,图3中每个节点的两个环网端口均用port1和port2表示,但是实际为不同的端口。It should be noted that, in order to simplify the description, the two ring ports of each node in FIG. 3 are represented by port1 and port2, but are actually different ports.
在finding owner定时器计时期间内,各节点本地不断更新环网内所有节点的MAC地址与节点上所有ERPS实例的环网端口作为RPL端口(包括目标端口和邻居端口)的计数表。表1为finding owner状态下的MAC地址与RPL端口计数表。由于当前网络中只有一个ERPS实例1且尚未部署完成,因此不存在RPL端口,也即表1中各个端口的RPL计数均是0。在finding owner定时器超时后,选择MAC地址最大的节点作为Rpl-owner节点。假设节点4的MAC地址Mac4最大,则节点4被确定为Rpl-owner节点(同目标节点)。由于两个端口计数相同,可选择端口1作为Rpl-owner端口。During the timing of the matching owner timer, each node locally updates the MAC address of all nodes in the ring network and the ring ports of all ERPS instances on the node as the count table of the RPL port (including the target port and the neighbor port). Table 1 shows the MAC address and RPL port count table in the state of the finding owner. Since there is only one ERPS instance 1 in the current network and it has not been deployed yet, there is no RPL port, that is, the RPL count of each port in Table 1 is 0. After the matching owner timer expires, the node with the largest MAC address is selected as the Rpl-owner node. Assuming that the MAC address of node 4 is the largest, then node 4 is determined to be the Rpl-owner node (same target node). Since the two ports have the same count, port 1 can be selected as the Rpl-owner port.
表1Table 1
Figure PCTCN2016089809-appb-000001
Figure PCTCN2016089809-appb-000001
图4是根据本发明第二实施例的环形网络保护的数据配置方法的learning状态示意图。如图4所示,Rpl-owner端口确定以后,节点4向Rpl-owner端 口(端口1)发送TTL为255的learning报文(同第四报文)。各节点收到该报文后,TTL减1并转发。节点5的端口2收到TTL值为255的learning报文,则该端口作为Rpl-neighbor端口(同相邻节点的端口),该节点为Rpl-neighbor节点(同相邻节点)。收到TTL为其他值的端口作为Common端口(同非相邻节点的端口)。每个节点确认角色后不再发送finding owner报文,Rpl-owner节点每收到finding owner报文会重置learning定时器(同第一定时器)。表2为learning状态下MAC地址与RPL端口计数表。4 is a schematic diagram of a learning state of a data configuration method for ring network protection according to a second embodiment of the present invention. As shown in Figure 4, after the Rpl-owner port is determined, node 4 goes to the Rpl-owner side. The port (port 1) sends a learning packet with the TTL of 255 (same as the fourth packet). After receiving the packet, each node reduces the TTL by 1 and forwards it. Port 2 of node 5 receives the learning packet with the TTL value of 255. The port acts as the Rpl-neighbor port (the port of the neighboring node), and the node is the Rpl-neighbor node (same neighbor node). A port with a TTL other value is received as a Common port (a port that is not a neighboring node). After the node confirms the role, the receiving owner packet is not sent. The Rpl-owner node resets the learning timer (same timer) for each receiving parent message. Table 2 shows the MAC address and RPL port count table in the learning state.
表2Table 2
Figure PCTCN2016089809-appb-000002
Figure PCTCN2016089809-appb-000002
当环内节点都确定了角色,不再发送finding owner报文,节点4的learning定时器超时,进入pending状态并向环网端口定时发送start报文(同第二报文),通知环网内其他节点ERPS协议启动,进入pending状态,非Rpl-owner节点收到start报文后启动并重置start timeout定时器(同第三定时器)。至此,单个ERPS实例的自动部署完成。When the node in the ring determines the role and does not send the matching owner packet, the learning timer of the node 4 times out, enters the pending state, and sends a start packet (same second packet) to the ring network port to notify the ring network. The other node ERPS protocol starts and enters the pending state. After the non-Rpl-owner node receives the start message, it starts and resets the start timeout timer (same as the third timer). At this point, the automatic deployment of a single ERPS instance is complete.
图5是根据本发明第二实施例的环形网络保护的数据配置方法中新增节点情况的示意图。如图5所示,在节点4和节点5之间新加入一台节点8进入环网。每个环网端口恢复UP后,节点8通过Rpl-owner定时发送的start报文获得协议数据并进入learning状态(也即确定环形网络中相邻节点和非相邻节点的状态)。此时由于节点8的端口2收到了TTL为255的报文,此端口被确定为Rpl-neighbor端口(同相邻节点的端口),其他端口相应的根据 TTL值更新角色,节点5变为common节点(同非相邻节点)。如果加入节点的位置不在Rpl-owner和Rpl-neighbor之间,将会确定该节点为common节点。FIG. 5 is a schematic diagram of a newly added node in a data configuration method for ring network protection according to a second embodiment of the present invention. As shown in FIG. 5, a node 8 is newly added between the node 4 and the node 5 to enter the ring network. After each ring network port is restored to UP, the node 8 obtains the protocol data through the start message sent by the Rpl-owner and enters the learning state (that is, determines the state of the neighboring node and the non-adjacent node in the ring network). At this time, since the port 2 of the node 8 receives the packet with the TTL of 255, the port is determined to be the Rpl-neighbor port (the port of the adjacent node), and the other ports are correspondingly based. The TTL value updates the role, and node 5 becomes a common node (same non-adjacent node). If the location of the joining node is not between Rpl-owner and Rpl-neighbor, it will be determined that the node is a common node.
另外,如果将节点5从环网内删除,每个环网端口恢复UP后,此时收到TTL为255的start报文的端口是节点6的端口2,则该端口被确定为Rpl-neighbor端口。如果将节点4删除,环网恢复后,每个节点将收不到start报文,待start timeout定时器超时,每个节点将节点4的MAC地址与RPL端口计数条目从表中删除,重新发送finding owner报文以确定Rpl-owner端口。In addition, if the node 5 is deleted from the ring network and each ring network port is restored to UP, the port that receives the start packet with the TTL of 255 is the port 2 of the node 6, and the port is determined to be Rpl-neighbor. port. If node 4 is deleted and the ring network is restored, each node will not receive the start message. When the start timeout timer expires, each node deletes the MAC address and RPL port count entry of node 4 from the table and resends it. Find the owner packet to determine the Rpl-owner port.
另外,对于多个ERPS实例的环网部署,考虑到负载均衡,应尽量将各条Rpl链路均匀地分布在环网内。在finding owner处理过程中,可从环网端口的RPL计数最小的端口内选择出节点MAC地址最大的端口作为Rpl-owner端口。其他与单个ERPS实例的情况相同,这里不再赘述。In addition, for the ring network deployment of multiple ERPS instances, considering the load balancing, each Rpl link should be evenly distributed in the ring network. During the processing of the matching owner, the port with the largest MAC address of the node can be selected as the Rpl-owner port from the port with the smallest RPL count of the ring port. Others are the same as in the case of a single ERPS instance and will not be described here.
在上述实施例中,通过环网保护功能的自动部署,简化了配置复杂度,降低部署工作量,提高易用性和灵活性。用户只需要在环网内选择某一个节点(配置节点或第一节点)配置ERPS的必要配置数据,在保证环网内各节点VLAN配置正确、环网端口Up的情况下,激活同步功能,配置节点向环网内发送同步报文(syndata报文或者第一报文)。每个节点收到同步报文后获取相应配置信息并转发该报文,然后每个节点向环网内发送Finding Owner报文(第三报文),通过比较每个节点的MAC地址确定Rpl-owner节点和Rpl-owner端口(目标节点和目标端口)。Rpl-owner节点通过Rpl-owner端口发送TTL为255的Learning报文,其他节点收到后将TTL减1并转发,收到TTL为254的端口被确定为Rpl-neighbor端口(相邻节点),其他端口被确定为common端口(非相邻节点)。收到Learning报文(第四报文)后各节点停止发送Finding owner报文,一段时间收不到Learning报文后Rpl-owner节点发送Start报文(第二报文)通知环网内各节点启动ERPS协议。该实施例只需在环网内一台设备上配置ERPS相关配置即可在整个环网部署协议功能,减少工作量,降低了维护难度,提高了环网保护的易用性及部署效率。In the above embodiment, the automatic deployment of the ring network protection function simplifies configuration complexity, reduces deployment workload, and improves ease of use and flexibility. The user only needs to select a certain node (configuration node or first node) in the ring network to configure the necessary configuration data of the ERPS. After ensuring that the VLANs of the nodes in the ring network are correctly configured and the ring network port is Up, the synchronization function is activated. The node sends a synchronization packet (syndata packet or first packet) to the ring network. After receiving the synchronization packet, each node obtains the corresponding configuration information and forwards the packet. Then each node sends a Finding Owner packet (the third packet) to the ring network, and determines the Rpl- by comparing the MAC address of each node. Owner node and Rpl-owner port (target node and target port). The Rpl-owner node sends a Learning packet with a TTL of 255 through the Rpl-owner port. After receiving the packet, the other node receives the TTL minus 1 and forwards it. The port with the TTL of 254 is determined to be the Rpl-neighbor port (adjacent node). The other ports are determined to be common ports (non-adjacent nodes). After receiving the Learning message (the fourth packet), each node stops sending the Finding owner message. After receiving the Learning message for a period of time, the Rpl-owner node sends a Start message (the second packet) to notify each node in the ring network. Start the ERPS protocol. In this embodiment, the ERPS-related configuration can be configured on one device in the ring network to deploy the protocol function on the entire ring network, reducing the workload, reducing the maintenance difficulty, and improving the ease of use and deployment efficiency of the ring network protection.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也 可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括多个指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course It can be done through hardware, but in many cases the former is a better implementation. Based on such understanding, the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium (such as ROM/RAM, disk). And an optical disc) comprising a plurality of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method described in various embodiments of the present invention.
在本实施例中还提供了一种环形网络保护的数据配置装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In this embodiment, a data configuration device for the protection of the ring network is also provided. The device is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein. As used below, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
图6是根据本发明实施例的环形网络保护的数据配置装置的结构框图,如图6所示,该装置包括:获取模块21和发送模块22。FIG. 6 is a structural block diagram of a data configuration apparatus for ring network protection according to an embodiment of the present invention. As shown in FIG. 6, the apparatus includes: an acquisition module 21 and a transmission module 22.
获取模块21,设置为环形网络的多个节点中的第一节点获取配置数据,其中,配置数据为执行环形网络保护相关的配置数据。The obtaining module 21 is configured to acquire configuration data by using a first node of the plurality of nodes of the ring network, where the configuration data is configuration data related to performing ring network protection.
发送模块22,设置为第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点,其中,第一报文用于指示其他节点根据第一报文中的配置数据执行数据配置。The sending module 22 is configured to send, by the first node, the first packet carrying the configuration data to the node other than the first node in the ring network, where the first packet is used to indicate that the other node is in the first packet according to the first packet. The configuration data performs data configuration.
根据该实施例的环形网络保护的数据配置装置,获取模块20通过环形网络的多个节点中的第一节点获取配置数据,其中,配置数据为执行环形网络保护相关的配置数据,发送模块22通过第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点,其中,第一报文用于指示其他节点根据第一报文中的配置数据执行数据配置,解决了相关技术中环形网络保护的数据配置效率低的技术问题,达到了提高环形网络保护的数据配置效率的效果。According to the data configuration apparatus of the ring network protection of the embodiment, the obtaining module 20 acquires configuration data by using a first node of the plurality of nodes of the ring network, wherein the configuration data is configuration data related to performing ring network protection, and the sending module 22 passes The first node sends the first packet carrying the configuration data to the node other than the first node in the ring network, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet. The technical problem of low data configuration efficiency of the ring network protection in the related art is solved, and the effect of improving the data configuration efficiency of the ring network protection is achieved.
可选地,该装置还包括:执行模块,设置为在所述发送模块发送携带有所述配置数据的第一报文至所述环形网络中除所述第一节点之外的其他节点之后,第一节点以及其他节点在完成配置数据的配置后,执行环形网络保护的部署。 Optionally, the device further includes: an executing module, configured to: after the sending module sends the first packet carrying the configuration data to other nodes in the ring network other than the first node, After the configuration of the configuration data is completed, the first node and other nodes perform the deployment of the ring network protection.
可选地,所述第一节点以及所述其他节点在完成所述配置数据的配置后,所述执行模块执行环形网络保护的部署包括:Optionally, after the configuration of the configuration data is completed, the performing, by the first node, and the other nodes, the performing module performing the deployment of the ring network protection includes:
从所述环形网络的多个节点中确定目标节点。A target node is determined from a plurality of nodes of the ring network.
其中,所述目标节点用于发送第二报文,所述第二报文用于指示所述环形网络中除所述目标节点之外的其他节点启动环形网络保护功能。The target node is configured to send a second packet, where the second packet is used to indicate that other nodes in the ring network except the target node initiate a ring network protection function.
可选地,所述第一报文中携带有所述第一节点的节点标识。Optionally, the first packet carries the node identifier of the first node.
所述执行模块从所述环形网络的多个节点中确定目标节点包括:Determining the target node from the plurality of nodes of the ring network by the execution module includes:
令每个所述其他节点分别生成第三报文,其中,所述第三报文携带有该节点的节点标识;以及每个所述其他节点分别将生成的第三报文发送至所述环形网络中除自身之外的节点。And causing each of the other nodes to generate a third packet, where the third packet carries a node identifier of the node; and each of the other nodes respectively sends the generated third packet to the ring A node in the network other than itself.
令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点。And causing the first node and the other node to determine the target node according to the acquired node identifier.
可选地,所述执行模块令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点包括:Optionally, the executing module is configured to determine, by the first node and the other node, the target node according to the obtained node identifier, including:
令所述第一节点和所述其他节点分别判断节点自身的节点标识与获取到的节点标识之间的关系是否满足预设规则,并根据判断结果确定该节点是否为所述目标节点。The first node and the other nodes respectively determine whether the relationship between the node identifier of the node itself and the acquired node identifier meets a preset rule, and determines whether the node is the target node according to the determination result.
可选地,Optionally,
所述节点标识包括该节点的媒体接入控制MAC地址。The node identifier includes a media access control MAC address of the node.
所述预设规则为节点自身的节点标识大于获取到的节点标识。The preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
可选地,所述装置还包括生成模块、处理模块和确定模块。Optionally, the device further includes a generating module, a processing module, and a determining module.
所述生成模块,设置为在从所述第一节点和所述其他节点中确定目标节点之后,令所述目标节点生成并发送第四报文,其中,所述第四报文携带有生存时间TTL。The generating module is configured to: after determining the target node from the first node and the other nodes, causing the target node to generate and send a fourth packet, where the fourth packet carries a lifetime TTL.
所述处理模块,设置为令所述环形网络中除所述目标节点之外的节点对接收到的所述第四报文中的TTL执行预设变化处理,并转发处理后的第四报文。 The processing module is configured to enable a node other than the target node in the ring network to perform preset change processing on the received TTL in the fourth packet, and forward the processed fourth packet .
所述确定模块,设置为令所述环形网络中除所述目标节点之外的节点根据接收到的所述第四报文的TTL确定自身在所述环形网络中的位置。The determining module is configured to enable a node other than the target node in the ring network to determine its location in the ring network according to the received TTL of the fourth packet.
可选地,在所述环形网络中包括多个子环形网络的情况下,其中,每个子环形网络包括第一节点和其他节点,所述第一报文和所述第三报文还携带有端口计数信息,所述端口计数信息中包括端口作为目标端口和邻居端口的总次数,所述目标端口为所述目标节点用于发送初始TTL的端口,所述邻居端口为接收所述初始TTL的端口,所述多个子环形网络包括第一子环形网络。Optionally, in the case that the ring network includes multiple sub-ring networks, where each sub-ring network includes a first node and other nodes, the first packet and the third packet further carry a port. Counting information, the port count information includes a total number of times that the port is the target port and the neighbor port, the target port is a port used by the target node to send an initial TTL, and the neighbor port is a port that receives the initial TTL The plurality of sub-ring networks include a first sub-ring network.
所述执行模块令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点还包括:Determining, by the execution module, that the first node and the other node determine the target node according to the obtained node identifier further includes:
令所述第一子环形网络根据其他子环形网络的端口计数信息确定所述总次数最少的端口。And causing the first sub-ring network to determine the port with the least total number of times according to port count information of other sub-ring networks.
令所述第一子环形网络根据所述总次数最少的端口确定所述第一子环形网络的目标端口。And causing the first sub-ring network to determine a target port of the first sub-ring network according to the port with the least total number of times.
令所述第一子环形网络根据所述目标端口确定所述目标节点。And causing the first sub-ring network to determine the target node according to the target port.
可选地,所述执行模块令所述第一子环形网络根据所述总次数最少的端口确定所述第一子环形网络的目标端口包括:Optionally, the executing module is configured to determine, by the first sub-ring network, the target port of the first sub-ring network according to the port with the least total number of times:
令所述第一子环形网络选择所述总次数最少的端口中对应的MAC地址最大的节点的端口作为所述目标端口。And causing the first sub-ring network to select, as the target port, a port of a node with a corresponding least MAC address among the ports with the least total number of times.
可选地,所述装置还包括重置模块和检测模块。Optionally, the device further includes a reset module and a detection module.
所述重置模块,设置为令所述目标节点在接收到所述第三报文时,所述目标节点重置第一定时器。The reset module is configured to enable the target node to reset the first timer when the target node receives the third packet.
所述检测模块,设置为令所述目标节点检测所述第一定时器的是否超时。The detecting module is configured to enable the target node to detect whether the first timer expires.
所述发送模块,还设置为如果检测到所述第一定时器超时,则发送所述第二报文。The sending module is further configured to send the second packet if the first timer is detected to be timed out.
可选地,Optionally,
所述检测模块还设置为,在所述第一节点和所述其他节点接收到所述第三报文时,令所述第一节点和所述其他节点分别检测对应的第二定时器是否 超时。The detecting module is further configured to: when the first node and the other node receive the third packet, let the first node and the other node respectively detect whether the corresponding second timer is time out.
所述确定模块还设置为,如果检测到所述对应的第二定时器超时,则令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点。The determining module is further configured to: if it is detected that the corresponding second timer expires, let the first node and the other node determine the target node according to the acquired node identifier.
可选地,所述第二报文还携带有TTL。Optionally, the second packet further carries a TTL.
所述执行模块还设置为:The execution module is further configured to:
在所述环形网络中新增节点的情况下,令所述环形网络中除所述目标节点之外的节点对接收到的所述第二报文中的TTL执行预设变化处理,并转发处理后的第二报文。In a case where a node is added to the ring network, the node other than the target node in the ring network performs preset change processing on the received TTL in the second packet, and performs forwarding processing. After the second message.
令所述环形网络中除所述目标节点之外的节点根据接收到的所述第二报文的TTL确定自身在所述环形网络中的位置。And determining, by the node other than the target node, the location of the second packet in the ring network according to the received TTL of the second packet.
可选地,所述第二报文还携带有TTL。Optionally, the second packet further carries a TTL.
所述检测模块还设置为:在所述环形网络中新增节点的情况下,令所述环形网络中除所述目标节点之外的节点检测在预设时间段内是否接收到所述第二报文。The detecting module is further configured to: when a node is added to the ring network, cause a node other than the target node in the ring network to detect whether the second is received within a preset time period Message.
所述执行模块还设置为:如果检测到在预设时间段内接收到所述第二报文,则令所述环形网络中除所述目标节点之外的节点对接收到的所述第二报文中的TTL执行预设变化处理,并转发处理后的第二报文,以及令所述环形网络中除所述目标节点之外的节点根据接收到的所述第二报文的TTL确定自身在所述环形网络中的位置。The execution module is further configured to: if it is detected that the second message is received within a preset time period, let the node in the ring network other than the target node receive the second The TTL in the packet performs the preset change processing, and forwards the processed second packet, and causes the node other than the target node in the ring network to determine the TTL according to the received second packet. The location of itself in the ring network.
所述执行模块还设置为:如果检测到在预设时间段内未接收到所述第二报文,则令所述环形网络中除所述目标节点之外的节点将获取到的节点标识中所述目标节点的节点标识信息删除,并重新确定所述目标节点。The execution module is further configured to: if it is detected that the second packet is not received within the preset time period, let the node in the ring network that is acquired by the node other than the target node The node identification information of the target node is deleted, and the target node is re-determined.
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述的环形网络保护的数据配置方法。A computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the data configuration method of the ring network protection.
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一个计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。 One of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described embodiments can be implemented using a computer program flow, which can be stored in a computer readable storage medium, such as on a corresponding hardware platform (eg, The system, device, device, device, etc. are executed, and when executed, include one or a combination of the steps of the method embodiments.
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。Alternatively, all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
上述实施例中的装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。The devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
上述实施例中的装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. The above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
工业实用性Industrial applicability
根据本发明实施例方案,通过环形网络的多个节点中的第一节点获取配置数据,其中,配置数据为执行环形网络保护相关的配置数据;第一节点发送携带有配置数据的第一报文至环形网络中除第一节点之外的其他节点,其中,第一报文用于指示其他节点根据第一报文中的配置数据执行数据配置,解决了相关技术中环形网络保护的数据配置效率低的技术问题,达到了提高环形网络保护的数据配置效率的效果。 According to the embodiment of the present invention, the configuration data is obtained by the first node of the plurality of nodes of the ring network, wherein the configuration data is configured to perform configuration related to the ring network protection; the first node sends the first packet carrying the configuration data. And other nodes in the ring network except the first node, where the first packet is used to instruct other nodes to perform data configuration according to the configuration data in the first packet, which solves the data configuration efficiency of the ring network protection in the related art. Low technical problems have achieved the effect of improving the data configuration efficiency of the ring network protection.

Claims (27)

  1. 一种环形网络保护的数据配置方法,包括:A data configuration method for ring network protection includes:
    环形网络的多个节点中的第一节点获取配置数据,其中,所述配置数据为执行环形网络保护相关的配置数据;The first node of the plurality of nodes of the ring network acquires configuration data, where the configuration data is configuration data related to performing ring network protection;
    所述第一节点发送携带有所述配置数据的第一报文至所述环形网络中除所述第一节点之外的其他节点,其中,所述第一报文用于指示所述其他节点根据所述第一报文中的配置数据执行数据配置。Transmitting, by the first node, the first packet carrying the configuration data to a node other than the first node in the ring network, where the first packet is used to indicate the other node Performing data configuration according to the configuration data in the first packet.
  2. 根据权利要求1所述的环形网络保护的数据配置方法,所述方法还包括:在所述第一节点发送携带有所述配置数据的第一报文至所述环形网络中除所述第一节点之外的其他节点之后,所述第一节点以及所述其他节点在完成所述配置数据的配置后,执行环形网络保护的部署。The data configuration method of the ring network protection according to claim 1, the method further comprising: transmitting, by the first node, a first packet carrying the configuration data to the ring network, except the first After the other nodes except the node, the first node and the other nodes perform the deployment of the ring network protection after completing the configuration of the configuration data.
  3. 根据权利要求2所述的环形网络保护的数据配置方法,其中,所述第一节点以及所述其他节点在完成所述配置数据的配置后,执行环形网络保护的部署包括:The data configuration method of the ring network protection according to claim 2, wherein the performing the configuration of the ring network protection after the first node and the other nodes complete the configuration of the configuration data comprises:
    从所述环形网络的多个节点中确定目标节点;Determining a target node from a plurality of nodes of the ring network;
    其中,所述目标节点用于发送第二报文,所述第二报文用于指示所述环形网络中除所述目标节点之外的其他节点启动环形网络保护功能。The target node is configured to send a second packet, where the second packet is used to indicate that other nodes in the ring network except the target node initiate a ring network protection function.
  4. 根据权利要求3所述的环形网络保护的数据配置方法,其中,所述第一报文中携带有所述第一节点的节点标识;The data configuration method of the ring network protection according to claim 3, wherein the first packet carries a node identifier of the first node;
    所述从所述环形网络的多个节点中确定目标节点包括:Determining the target node from the plurality of nodes of the ring network includes:
    每个所述其他节点分别生成第三报文,其中,所述第三报文携带有该节点的节点标识;以及每个所述其他节点分别将生成的第三报文发送至所述环形网络中除自身之外的节点;Each of the other nodes generates a third packet, where the third packet carries a node identifier of the node, and each of the other nodes separately sends the generated third packet to the ring network. a node other than itself;
    所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点。The first node and the other node determine the target node according to the acquired node identifier.
  5. 根据权利要求4所述的环形网络保护的数据配置方法,其中,所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点包括: The data configuration method of the ring network protection according to claim 4, wherein the determining, by the first node and the other node, the target node according to the acquired node identifier comprises:
    所述第一节点和所述其他节点分别判断节点自身的节点标识与获取到的节点标识之间的关系是否满足预设规则,并根据判断结果确定该节点是否为所述目标节点。The first node and the other nodes respectively determine whether the relationship between the node identifier of the node itself and the acquired node identifier meets a preset rule, and determines whether the node is the target node according to the determination result.
  6. 根据权利要求5所述的环形网络保护的数据配置方法,其中,The data configuration method for ring network protection according to claim 5, wherein
    所述节点标识包括该节点的媒体接入控制MAC地址;The node identifier includes a media access control MAC address of the node;
    所述预设规则为节点自身的节点标识大于获取到的节点标识。The preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
  7. 根据权利要求3所述的环形网络保护的数据配置方法,所述方法还包括:在从所述环形网络的多个节点确定目标节点之后,所述目标节点生成并发送第四报文,其中,所述第四报文携带有生存时间TTL;The data configuration method of the ring network protection according to claim 3, the method further comprising: after determining the target node from the plurality of nodes of the ring network, the target node generates and sends a fourth message, where The fourth packet carries a lifetime TTL;
    所述环形网络中除所述目标节点之外的节点对接收到的所述第四报文中的TTL执行预设变化处理,并转发处理后的第四报文;The node other than the target node in the ring network performs preset change processing on the TTL in the received fourth packet, and forwards the processed fourth packet;
    所述环形网络中除所述目标节点之外的节点根据接收到的所述第四报文的TTL确定自身在所述环形网络中的位置。A node other than the target node in the ring network determines its location in the ring network according to the received TTL of the fourth packet.
  8. 根据权利要求7所述的环形网络保护的数据配置方法,其中,在所述环形网络中包括多个子环形网络的情况下,其中,每个子环形网络包括第一节点和其他节点,所述第一报文和所述第三报文还携带有端口计数信息,所述端口计数信息中包括端口作为目标端口和邻居端口的总次数,所述目标端口为所述目标节点用于发送初始TTL的端口,所述邻居端口为接收所述初始TTL的端口,所述多个子环形网络包括第一子环形网络;The data configuration method for ring network protection according to claim 7, wherein, in the case where the ring network includes a plurality of sub-ring networks, wherein each sub-ring network includes a first node and other nodes, the first The packet and the third packet further carry the port count information, where the port count information includes the total number of times the port is the target port and the neighbor port, and the target port is the port used by the target node to send the initial TTL. The neighboring port is a port that receives the initial TTL, and the multiple sub-ring networks include a first sub-ring network;
    所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点还包括:Determining, by the first node and the other node, the target node according to the obtained node identifier further includes:
    所述第一子环形网络根据其他子环形网络的端口计数信息确定所述总次数最少的端口;Determining, by the first sub-ring network, the port with the least total number of times according to port count information of other sub-ring networks;
    所述第一子环形网络根据所述总次数最少的端口确定所述第一子环形网络的目标端口;Determining, by the first sub-ring network, a target port of the first sub-ring network according to the port with the least total number of times;
    所述第一子环形网络根据所述目标端口确定所述目标节点。The first sub-ring network determines the target node according to the target port.
  9. 根据权利要求8所述的环形网络保护的数据配置方法,其中,所述第一子环形网络根据所述总次数最少的端口确定所述第一子环形网络的目标端 口包括:The data configuration method for ring network protection according to claim 8, wherein the first sub-ring network determines a target end of the first sub-ring network according to the port with the least total number of times The mouth includes:
    所述第一子环形网络选择所述总次数最少的端口中对应的MAC地址最大的节点的端口作为所述目标端口。The first sub-ring network selects, as the target port, a port of a node with the largest MAC address of the port with the smallest total number of times.
  10. 根据权利要求4中所述的环形网络保护的数据配置方法,所述方法还包括:The data configuration method of the ring network protection according to claim 4, the method further comprising:
    所述目标节点在接收到所述第三报文时,所述目标节点重置第一定时器;When the target node receives the third packet, the target node resets the first timer;
    所述目标节点检测所述第一定时器的是否超时;The target node detects whether the first timer expires;
    如果检测到所述第一定时器超时,则所述目标节点发送所述第二报文。If it is detected that the first timer expires, the target node sends the second packet.
  11. 根据权利要求4所述的环形网络保护的数据配置方法,所述方法还包括:The data configuration method for ring network protection according to claim 4, the method further comprising:
    在所述第一节点和所述其他节点接收到所述第三报文时,所述第一节点和所述其他节点分别检测对应的第二定时器是否超时;When the first node and the other node receive the third packet, the first node and the other node respectively detect whether the corresponding second timer expires;
    如果检测到所述对应的第二定时器超时,则所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点。If it is detected that the corresponding second timer expires, the first node and the other node determine the target node according to the acquired node identifier.
  12. 根据权利要求3所述的环形网络保护的数据配置方法,其中,所述第二报文还携带有TTL;The data configuration method of the ring network protection according to claim 3, wherein the second packet further carries a TTL;
    所述方法还包括:The method further includes:
    在所述环形网络中新增节点的情况下,所述环形网络中除所述目标节点之外的节点对接收到的所述第二报文中的TTL执行预设变化处理,并转发处理后的第二报文;If a node is added to the ring network, the node other than the target node in the ring network performs preset change processing on the received TTL in the second packet, and performs forwarding processing. Second message;
    所述环形网络中除所述目标节点之外的节点根据接收到的所述第二报文的TTL确定自身在所述环形网络中的位置。A node other than the target node in the ring network determines its location in the ring network according to the received TTL of the second packet.
  13. 根据权利要求4所述的环形网络保护的数据配置方法,其中,所述第二报文还携带有TTL;The data configuration method of the ring network protection according to claim 4, wherein the second packet further carries a TTL;
    所述方法还包括:The method further includes:
    在所述环形网络中新增节点的情况下,所述环形网络中除所述目标节点之外的节点检测在预设时间段内是否接收到所述第二报文; If a node is added to the ring network, the node other than the target node in the ring network detects whether the second packet is received within a preset time period;
    如果检测到在预设时间段内接收到所述第二报文,则所述环形网络中除所述目标节点之外的节点对接收到的所述第二报文中的TTL执行预设变化处理,并转发处理后的第二报文,以及所述环形网络中除所述目标节点之外的节点根据接收到的所述第二报文的TTL确定自身在所述环形网络中的位置;If it is detected that the second packet is received within a preset time period, the node other than the target node in the ring network performs a preset change on the TTL in the received second packet. Processing, and forwarding the processed second packet, and the node other than the target node in the ring network determines its location in the ring network according to the received TTL of the second packet;
    如果检测到在预设时间段内未接收到所述第二报文,则所述环形网络中除所述目标节点之外的节点将获取到的节点标识中所述目标节点的节点标识信息删除,并重新确定所述目标节点。If it is detected that the second packet is not received within the preset time period, the node other than the target node in the ring network deletes the node identifier information of the target node in the acquired node identifier. And re-determine the target node.
  14. 一种环形网络保护的数据配置装置,其特征在于,包括:获取模块和发送模块;A data configuration device for ring network protection, comprising: an obtaining module and a sending module;
    所述获取模块,设置为令环形网络的多个节点中的第一节点获取配置数据,其中,所述配置数据为执行环形网络保护相关的配置数据;The acquiring module is configured to enable the first node of the plurality of nodes of the ring network to obtain configuration data, where the configuration data is configuration data related to performing ring network protection;
    所述发送模块,设置为令所述第一节点发送携带有所述配置数据的第一报文至所述环形网络中除所述第一节点之外的其他节点,其中,所述第一报文用于指示所述其他节点根据所述第一报文中的配置数据执行数据配置。The sending module is configured to enable the first node to send a first packet carrying the configuration data to other nodes in the ring network except the first node, where the first packet The text is used to instruct the other node to perform data configuration according to the configuration data in the first packet.
  15. 根据权利要求14所述的环形网络保护的数据配置装置,所述装置还包括:执行模块;The apparatus for configuring data of a ring network protection according to claim 14, further comprising: an execution module;
    所述执行模块,设置为在所述发送模块发送携带有所述配置数据的第一报文至所述环形网络中除所述第一节点之外的其他节点之后,所述第一节点以及所述其他节点在完成所述配置数据的配置后,执行环形网络保护的部署。The execution module is configured to: after the sending module sends the first packet carrying the configuration data to other nodes in the ring network other than the first node, the first node and the After completing the configuration of the configuration data, the other nodes perform the deployment of the ring network protection.
  16. 根据权利要求15所述的环形网络保护的数据配置装置,其中,所述第一节点以及所述其他节点在完成所述配置数据的配置后,所述执行模块执行环形网络保护的部署包括:The apparatus for configuring a ring network protection according to claim 15, wherein the deployment of the ring network protection by the execution module after the configuration of the configuration data is completed by the first node and the other nodes:
    从所述环形网络的多个节点中确定目标节点;Determining a target node from a plurality of nodes of the ring network;
    其中,所述目标节点用于发送第二报文,所述第二报文用于指示所述环形网络中除所述目标节点之外的其他节点启动环形网络保护功能。The target node is configured to send a second packet, where the second packet is used to indicate that other nodes in the ring network except the target node initiate a ring network protection function.
  17. 根据权利要求16所述的环形网络保护的数据配置装置,其中,所述第一报文中携带有所述第一节点的节点标识;The data configuration apparatus of the ring network protection according to claim 16, wherein the first packet carries a node identifier of the first node;
    所述执行模块从所述环形网络的多个节点中确定目标节点包括: Determining the target node from the plurality of nodes of the ring network by the execution module includes:
    令每个所述其他节点分别生成第三报文,其中,所述第三报文携带有该节点的节点标识;以及每个所述其他节点分别将生成的第三报文发送至所述环形网络中除自身之外的节点;And causing each of the other nodes to generate a third packet, where the third packet carries a node identifier of the node; and each of the other nodes respectively sends the generated third packet to the ring a node other than itself in the network;
    令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点。And causing the first node and the other node to determine the target node according to the acquired node identifier.
  18. 根据权利要求17所述的环形网络保护的数据配置装置,其中,所述执行模块令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点包括:The data configuration apparatus of the ring network protection according to claim 17, wherein the execution module causes the first node and the other node to determine the target node according to the acquired node identifier, including:
    令所述第一节点和所述其他节点分别判断节点自身的节点标识与获取到的节点标识之间的关系是否满足预设规则,并根据判断结果确定该节点是否为所述目标节点。The first node and the other nodes respectively determine whether the relationship between the node identifier of the node itself and the acquired node identifier meets a preset rule, and determines whether the node is the target node according to the determination result.
  19. 根据权利要求18所述的环形网络保护的数据配置装置,其中,The ring network protected data configuration device according to claim 18, wherein
    所述节点标识包括该节点的媒体接入控制MAC地址;The node identifier includes a media access control MAC address of the node;
    所述预设规则为节点自身的节点标识大于获取到的节点标识。The preset rule is that the node identifier of the node itself is greater than the obtained node identifier.
  20. 根据权利要求16所述的环形网络保护的数据配置装置,所述装置还包括生成模块、处理模块和确定模块;The apparatus for configuring a ring network protection according to claim 16, further comprising a generating module, a processing module, and a determining module;
    所述生成模块,设置为在从所述环形网络的多个节点中确定目标节点之后,令所述目标节点生成并发送第四报文,其中,所述第四报文携带有生存时间TTL;The generating module is configured to: after determining the target node from the plurality of nodes of the ring network, causing the target node to generate and send a fourth packet, where the fourth packet carries a lifetime TTL;
    所述处理模块,设置为令所述环形网络中除所述目标节点之外的节点对接收到的所述第四报文中的TTL执行预设变化处理,并转发处理后的第四报文;The processing module is configured to enable a node other than the target node in the ring network to perform preset change processing on the received TTL in the fourth packet, and forward the processed fourth packet ;
    所述确定模块,设置为令所述环形网络中除所述目标节点之外的节点根据接收到的所述第四报文的TTL确定自身在所述环形网络中的位置。The determining module is configured to enable a node other than the target node in the ring network to determine its location in the ring network according to the received TTL of the fourth packet.
  21. 根据权利要求20所述的环形网络保护的数据配置装置,其中,在所述环形网络中包括多个子环形网络的情况下,其中,每个子环形网络包括第一节点和其他节点,所述第一报文和所述第三报文还携带有端口计数信息,所述端口计数信息中包括端口作为目标端口和邻居端口的总次数,所述目标 端口为所述目标节点用于发送初始TTL的端口,所述邻居端口为接收所述初始TTL的端口,所述多个子环形网络包括第一子环形网络;The ring network protected data configuration apparatus according to claim 20, wherein, in the case where the ring network includes a plurality of sub-ring networks, wherein each sub-ring network includes a first node and other nodes, the first The packet and the third packet further carry port count information, where the port count information includes the total number of times the port is the target port and the neighbor port, and the target The port is a port used by the target node to send an initial TTL, the neighboring port is a port that receives the initial TTL, and the multiple sub-ring networks include a first sub-ring network;
    所述执行模块令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点还包括:Determining, by the execution module, that the first node and the other node determine the target node according to the obtained node identifier further includes:
    令所述第一子环形网络根据其他子环形网络的端口计数信息确定所述总次数最少的端口;And causing the first sub-ring network to determine the port with the least total number of times according to port count information of other sub-ring networks;
    令所述第一子环形网络根据所述总次数最少的端口确定所述第一子环形网络的目标端口;Determining, by the first sub-ring network, a target port of the first sub-ring network according to the port with the least total number of times;
    令所述第一子环形网络根据所述目标端口确定所述目标节点。And causing the first sub-ring network to determine the target node according to the target port.
  22. 根据权利要求21所述的环形网络保护的数据配置装置,其中,所述执行模块令所述第一子环形网络根据所述总次数最少的端口确定所述第一子环形网络的目标端口包括:The data configuration apparatus of the ring network protection according to claim 21, wherein the execution module causes the first sub-ring network to determine the target port of the first sub-ring network according to the port with the least total number of times:
    令所述第一子环形网络选择所述总次数最少的端口中对应的MAC地址最大的节点的端口作为所述目标端口。And causing the first sub-ring network to select, as the target port, a port of a node with a corresponding least MAC address among the ports with the least total number of times.
  23. 根据权利要求20中所述的环形网络保护的数据配置装置,所述装置还包括重置模块和检测模块;A data configuration apparatus for ring network protection according to claim 20, the apparatus further comprising a reset module and a detection module;
    所述重置模块,设置为令所述目标节点在接收到所述第三报文时,所述目标节点重置第一定时器;The reset module is configured to enable the target node to reset the first timer when the target node receives the third packet;
    所述检测模块,设置为令所述目标节点检测所述第一定时器的是否超时;The detecting module is configured to enable the target node to detect whether the first timer expires;
    所述发送模块,还设置为如果检测到所述第一定时器超时,则发送所述第二报文。The sending module is further configured to send the second packet if the first timer is detected to be timed out.
  24. 根据权利要求23所述的环形网络保护的数据配置装置,The data configuration apparatus for ring network protection according to claim 23,
    所述检测模块还设置为,在所述第一节点和所述其他节点接收到所述第三报文时,令所述第一节点和所述其他节点分别检测对应的第二定时器是否超时;The detecting module is further configured to: when the first node and the other node receive the third packet, let the first node and the other node respectively detect whether the corresponding second timer expires ;
    所述确定模块还设置为,如果检测到所述对应的第二定时器超时,则令所述第一节点和所述其他节点根据获取到的节点标识确定所述目标节点。 The determining module is further configured to: if it is detected that the corresponding second timer expires, let the first node and the other node determine the target node according to the acquired node identifier.
  25. 根据权利要求16所述的环形网络保护的数据配置装置,其中,所述第二报文还携带有TTL;The data configuration apparatus of the ring network protection according to claim 16, wherein the second packet further carries a TTL;
    所述执行模块还设置为:The execution module is further configured to:
    在所述环形网络中新增节点的情况下,令所述环形网络中除所述目标节点之外的节点对接收到的所述第二报文中的TTL执行预设变化处理,并转发处理后的第二报文;In a case where a node is added to the ring network, the node other than the target node in the ring network performs preset change processing on the received TTL in the second packet, and performs forwarding processing. Second message afterwards;
    令所述环形网络中除所述目标节点之外的节点根据接收到的所述第二报文的TTL确定自身在所述环形网络中的位置。And determining, by the node other than the target node, the location of the second packet in the ring network according to the received TTL of the second packet.
  26. 根据权利要求23所述的环形网络保护的数据配置装置,其中,所述第二报文还携带有TTL;The data configuration apparatus of the ring network protection according to claim 23, wherein the second packet further carries a TTL;
    所述检测模块还设置为:在所述环形网络中新增节点的情况下,令所述环形网络中除所述目标节点之外的节点检测在预设时间段内是否接收到所述第二报文;The detecting module is further configured to: when a node is added to the ring network, cause a node other than the target node in the ring network to detect whether the second is received within a preset time period Message
    所述执行模块还设置为:如果检测到在预设时间段内接收到所述第二报文,则令所述环形网络中除所述目标节点之外的节点对接收到的所述第二报文中的TTL执行预设变化处理,并转发处理后的第二报文,以及令所述环形网络中除所述目标节点之外的节点根据接收到的所述第二报文的TTL确定自身在所述环形网络中的位置;The execution module is further configured to: if it is detected that the second message is received within a preset time period, let the node in the ring network other than the target node receive the second The TTL in the packet performs the preset change processing, and forwards the processed second packet, and causes the node other than the target node in the ring network to determine the TTL according to the received second packet. The location of itself in the ring network;
    所述执行模块还设置为:如果检测到在预设时间段内未接收到所述第二报文,则令所述环形网络中除所述目标节点之外的节点将获取到的节点标识中所述目标节点的节点标识信息删除,并重新确定所述目标节点。The execution module is further configured to: if it is detected that the second packet is not received within the preset time period, let the node in the ring network that is acquired by the node other than the target node The node identification information of the target node is deleted, and the target node is re-determined.
  27. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现权利要求1至13任意一项所述的环形网络保护的数据配置方法。 A computer readable storage medium storing computer executable instructions, the computer executable instructions being executed by a processor to implement the data configuration method of the ring network protection according to any one of claims 1 to 13.
PCT/CN2016/089809 2015-10-08 2016-07-12 Data configuration method and device for protecting ring network WO2017059715A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510646574.0 2015-10-08
CN201510646574.0A CN106571936A (en) 2015-10-08 2015-10-08 Loop network protection data configuration method and device

Publications (1)

Publication Number Publication Date
WO2017059715A1 true WO2017059715A1 (en) 2017-04-13

Family

ID=58487232

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/089809 WO2017059715A1 (en) 2015-10-08 2016-07-12 Data configuration method and device for protecting ring network

Country Status (2)

Country Link
CN (1) CN106571936A (en)
WO (1) WO2017059715A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995047A (en) * 2019-12-16 2021-06-18 中兴通讯股份有限公司 Flow control method, electronic device, and storage medium
CN116866457A (en) * 2023-09-04 2023-10-10 常州楠菲微电子有限公司 Loop detection message processing method and device for two-layer network

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112445658B (en) * 2020-10-30 2023-03-03 深圳云天励飞技术股份有限公司 Information synchronization method and related equipment
CN114401324B (en) * 2021-12-30 2024-03-01 华为技术有限公司 Message forwarding method, network equipment and system
CN115865701B (en) * 2023-02-21 2023-05-26 南京芯驰半导体科技有限公司 Node control method, device and system based on daisy chain network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080304407A1 (en) * 2004-09-16 2008-12-11 Alcatel Telecom Israel Efficient Protection Mechanisms For Protecting Multicast Traffic in a Ring Topology Network Utilizing Label Switching Protocols
CN101483571A (en) * 2009-02-26 2009-07-15 杭州华三通信技术有限公司 RRPP configuring method, system and device
CN101771592A (en) * 2009-01-05 2010-07-07 迈普通信技术股份有限公司 Method for automatically configuring EAPS transmission nodes

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8149692B2 (en) * 2008-12-31 2012-04-03 Ciena Corporation Ring topology discovery mechanism
CN104079462B (en) * 2014-07-16 2017-10-17 北京华为数字技术有限公司 Looped network configures detection method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080304407A1 (en) * 2004-09-16 2008-12-11 Alcatel Telecom Israel Efficient Protection Mechanisms For Protecting Multicast Traffic in a Ring Topology Network Utilizing Label Switching Protocols
CN101771592A (en) * 2009-01-05 2010-07-07 迈普通信技术股份有限公司 Method for automatically configuring EAPS transmission nodes
CN101483571A (en) * 2009-02-26 2009-07-15 杭州华三通信技术有限公司 RRPP configuring method, system and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995047A (en) * 2019-12-16 2021-06-18 中兴通讯股份有限公司 Flow control method, electronic device, and storage medium
CN116866457A (en) * 2023-09-04 2023-10-10 常州楠菲微电子有限公司 Loop detection message processing method and device for two-layer network

Also Published As

Publication number Publication date
CN106571936A (en) 2017-04-19

Similar Documents

Publication Publication Date Title
WO2017059715A1 (en) Data configuration method and device for protecting ring network
US11621926B2 (en) Network device and method for sending BGP information
US7983173B2 (en) System and method for detecting link failures
EP3026852B1 (en) Loop avoidance method, device and system
US8213296B2 (en) Link aggregation protection
EP3169024B1 (en) Designated forwarder (df) election based on static df election procedure
US9148346B2 (en) Multiple ring identification and configuration protocol
US8811190B2 (en) Maximum transmission unit (MTU) size discovery mechanism and method for data-link layers
CN108234234B (en) Maintaining endpoint devices, methods for communication, and computer-readable media
US9338060B2 (en) Multiple ring identification and configuration protocol
US20140301185A1 (en) Handling a fault in an ethernet ring network
EP3291486B1 (en) Selective transmission of bidirectional forwarding detection (bfd) messages for verifying multicast connectivity
EP2697940A1 (en) Handling a fault in an ethernet ring network
EP3048761A1 (en) Control method and device for self-loopback of network data
EP3226520B1 (en) Performing duplicate address detection for an integrated routing and bridging device
EP3148159B1 (en) Using a multicast address as a tunnel remote gateway address in a layer 2 tunneling protocol access concentrator
ES2797729T3 (en) Method and system to reduce the change in the DR of the PIM protocol
CN106330700A (en) Method and device for data communication network main and standby access network element protection
US8804570B1 (en) Propagating LDP MAC flush as TCN
EP3687131A1 (en) Method, apparatus and system for rapidly restoring service during path switching
KR101469244B1 (en) Apparatus and method for eliminating unnecessary packets in received data
CN105634786B (en) link keep-alive method and device
US20170155543A1 (en) Control apparatus, communication system, and control method
US11528224B1 (en) Dynamic traffic redirection for a virtual gateway of a distributed tunnel fabric
CN113452543A (en) Detection of multi-homed misconfigurations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16853022

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16853022

Country of ref document: EP

Kind code of ref document: A1