WO2017215291A1 - 基于ipran设备的以太网环路检测及处理方法 - Google Patents

基于ipran设备的以太网环路检测及处理方法 Download PDF

Info

Publication number
WO2017215291A1
WO2017215291A1 PCT/CN2017/075526 CN2017075526W WO2017215291A1 WO 2017215291 A1 WO2017215291 A1 WO 2017215291A1 CN 2017075526 W CN2017075526 W CN 2017075526W WO 2017215291 A1 WO2017215291 A1 WO 2017215291A1
Authority
WO
WIPO (PCT)
Prior art keywords
port
ipran
loop
ipran device
processing
Prior art date
Application number
PCT/CN2017/075526
Other languages
English (en)
French (fr)
Inventor
张钊
马红斌
张亮
Original Assignee
烽火通信科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 烽火通信科技股份有限公司 filed Critical 烽火通信科技股份有限公司
Publication of WO2017215291A1 publication Critical patent/WO2017215291A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0829Packet loss
    • H04L43/0841Round trip packet loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0847Transmission error
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes

Definitions

  • the present invention relates to the field of data and IP switch networks, and in particular to an Ethernet loop detection and processing method based on an IPRAN (IP Radio Access Network) device.
  • IPRAN IP Radio Access Network
  • packet forwarding is performed by MAC address addressing in Layer 2 switching.
  • the mac address learning of the Layer 2 device is performed by the source mac address learning. That is, when a port receives a packet with an unknown source mac address, the MAC address is added to the receiving port, so that the packet can be forwarded directly for the purpose of the MAC address, that is, one learning and multiple forwarding.
  • the MAC address update mechanism of the Layer 2 device is:
  • Ethernet switch node when an Ethernet switch node receives a broadcast frame or an unknown unicast frame, it will flood the frame to all other ports. In the local area network, this method is very simple and practical. The switch node can easily forward broadcast frames or unknown unicast frames to the destination host through flooding.
  • the broadcast frame when there is a loop in the network, the broadcast frame will be flooded and forwarded sequentially on each switch node in the loop, and finally returned to the source switch node; after the source switch node receives the broadcast frame, it will not Discarding, but continuing to flood according to the forwarding mode of the broadcast frame; therefore, the broadcast frame will be forwarded endlessly on each switch node of the loop, and eventually the traffic is getting larger and larger, and the bandwidth is exhausted.
  • the Ethernet switch node also floods the broadcast frame to the port outside the loop and sends it to the host in the LAN. As the flooding traffic increases, the entire LAN and its host are paralyzed, causing serious network failure.
  • the present invention provides an Ethernet loop detection and processing method based on an IPRAN device, detecting whether a loop exists in the Ethernet, reporting a loop alarm through the network management, and eliminating the ring. Road to avoid network failure caused by flooding of network ports.
  • the present invention adopts an Ethernet loop detection and processing method based on an IPRAN device, including: S1. configuring a global loopback detection parameter of the IPRAN device, including a global MAC address of the IPRAN device; S2. adding the VPLS to the IPRAN device. On the port, the interval for detecting the loopback detection frame is configured, and the processing action is taken after the configuration of the port topology is detected. S3. Enable loopback detection on the port that joins the VPLS, that is, in the The port sends a packet carrying the loopback detection frame. When the IPRAN device receives the packet, it checks whether the MAC address in the packet is the same as its own global MAC address. If yes, the corresponding processing is performed according to the processing action. If not, go directly Send a message.
  • the global MAC address of the IPRAN device is a unique identifier of the IPRAN device in the network, and the default is the rack MAC address of the IPRAN device.
  • the processing action includes a port no action, a shutdown action, and an isolation action; when the port is inactive, the port only reports the network management alarm; when the action is closed, the port does not receive any service packet and Signaling packet. When the action is isolated, the port does not forward service packets but receives and sends signaling packets.
  • the two devices have different global MAC addresses, and the first port of the first IPRAN device and the second port and the third port of the second IPRAN device enable the ring. If the first port of the first IPRAN device first finds a loop, the first port is isolated and set as a ring point; the second IPRAN device follows a single-device single-ring scenario. At If the second IPRAN device has port isolation, the first port of the first IPRAN device does not receive the packet carrying the loopback detection frame sent by itself, and determines that the loop disappears and the ring point of the first port is released. The second port or the third port of the second IPRAN device is a ring point.
  • all ports of the first IPRAN device and the second IPRAN device are in the same VLAN, and the first port, the second port, and the third port of the first IPRAN device are respectively The first port, the second port, and the third port of the two IPRAN devices form a link, and a plurality of loops are formed.
  • the configuration processing action is an isolation action, the ports of the two IPRAN devices are enabled to perform loopback detection and are formed.
  • the port number is preferentially isolated. Only the ports with the largest port number on both ends of the link remain connected.
  • the first IPRAN device, the second IPRAN device, and the third IPRAN device each have a first port and a second port, and the ports of the three devices are sequentially linked.
  • the ports of the three devices are sequentially linked.
  • all the ports are in the same VLAN.
  • the port number of the first port is smaller than the port number of the second port in each IPRAN device.
  • One point is to break the loop.
  • the invention has the beneficial effects of: detecting the packet carrying the loopback detection frame, detecting the return condition of the packet, determining the loop in the Ethernet, and reporting the loop alarm through the network management, so that the Ethernet can be discovered in time.
  • the loop avoids serious impact on the entire network and automatically shuts down or blocks the looped ports to eliminate loops.
  • FIG. 1 is a flowchart of an Ethernet loop detection and processing method based on an IPRAN device according to the present invention
  • FIG. 2 is a schematic diagram of a single-loop single-loop scenario according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a looping situation of multiple devices according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a multi-device multi-ring scenario according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a multi-device single-ring scenario according to an embodiment of the present invention.
  • the Ethernet loop detection and processing method based on the IPRAN device supports the loop detection based on the VPLS (Virtual Private LAN service) and the UNI (User Network interface) port. Blocking or shutting down includes the following steps:
  • the global MAC address of the IPRAN device is a unique identifier of the IPRAN device in the network, and the default is the chassis MAC address of the IPRAN device.
  • the processing action includes the port no action, the shutdown action, and the isolation action; when the port is inactive, the port only reports the network management alarm; when the action is closed, the port does not receive any service report. Text and signaling packets; when isolated, the port does not forward service packets but receives and sends signaling packets.
  • the port sends a packet carrying the loopback detection frame.
  • the IPRAN device receives the packet, it checks whether the MAC address in the packet is The own global MAC address is the same, and if so, according to the processing action, corresponding processing is performed. When it is detected that the loop disappears, the isolation of the port is released; if not, the packet is directly forwarded without processing.
  • the first port A and the second port B belong to the same IPRAN device, and the first port A and the second port B form a loop through the external network.
  • the global parameters of the first port A and the second port B are the same, and have the same global MAC address. They are in the same VLAN.
  • the port number of the first port A is smaller than the port number of the second port B.
  • the first port A and the second port B simultaneously send loopback detection frames. Then, regardless of the first port A and the second port B, who first receives the loopback probe frame sent by the other party, since the port number of the first port A is smaller than the port number of the second port B, the connectivity of the first port A is obtained. Change to isolation and position A as a loop point. Since the second port B also receives the loopback detection frame, but the first port A is already isolated, the second port B does not generate an action and maintains its own connectivity.
  • the port that enables loopback detection is the ring point.
  • the connectivity of the first port A changes to isolation, and A is positioned as a loop point, and the loopback detection loop point selection procedure preferentially enables loopback detection.
  • the functional port is a ring point.
  • the two devices When a multi-device is in a looped scenario, the two devices have different global MAC addresses, and the loopback detection function is enabled on the first port of the first IPRAN device and the second port and the third port of the second IPRAN device.
  • the isolation action if the first port of the first IPRAN device first finds that the loop exists, the first port is isolated and set as a ring point; the second IPRAN device is processed according to the single device single ring scenario; when the second IPRAN device is used In If the port is isolated, the first port of the first IPRAN device does not receive the packet carrying the loopback detection frame, and the loop disappears, the ring point of the first port is removed, and the second port of the second IPRAN device or The third port is a loop point.
  • the first IPRAN device and the second IPRAN device have different global MAC addresses, and the first port A of the first IPRAN device and the second port B of the second IPRAN device, Loopback detection is enabled on the third port C. If the first port A of the first IPRAN device discovers the existence of the loop before the second port B or the third port C of the second IPRAN device, the first port A of the first IPRAN device first isolates itself. Obviously, the ring is not successfully located and isolated. The loopback detection function of the second IPRAN device still finds the existence of the ring and processes the ring as described in the single device single ring.
  • the loopback detection of the first port A in the first IPRAN device will not receive the packet carrying the loopback detection frame sent by itself, and judge that the loop disappears, and will The ring point status is released.
  • the second port B or the third port C of the second IPRAN device is a ring point.
  • all ports of the first IPRAN device and the second IPRAN device are in the same VLAN, and the first port, the second port, and the third port of the first IPRAN device are respectively associated with the first port of the second IPRAN device,
  • the second port and the third port form a link, and a plurality of loops are formed.
  • the configuration processing action is an isolation action, the ports of the two IPRAN devices are enabled with loopback detection, and the link number is small. Priority isolation, only the ports with the largest port number on both ends of the link remain connected.
  • the network topology connection relationship between the first IPRAN device and the second IPRAN device is as shown in FIG. 4, all ports are in the same VLAN, and the first port A of the first IPRAN device is The two ports B and the third port C respectively form a link with the first port D, the second port E, and the third port F of the second IPRAN device, as long as two of the AD, BE or CF links are blocked, Can break the loop.
  • the port number size relationship on an IPRAN device is: first port A ⁇ second port B ⁇ third port C
  • the port number size relationship on the second IPRAN device is: first port D ⁇ second port E ⁇ third Port F.
  • the loopback detection function is enabled on the first port A, the second port B, and the third port C of the first IPRAN device, and the first port D, the second port E, and the third port F of the second IPRAN device, according to The ring point judgment logic, if the port number is small, the first port A and the first port D are isolated, and the second port B and the second port E are isolated. The connection between the port C and the third port F is normal. At this time, only the CF link of the data link of the first IPRAN device and the second IPRAN device is connected, and the loop is broken.
  • the first IPRAN device, the second IPRAN device, and the third IPRAN device each have a first port and a second port, and the ports of the three devices are sequentially linked to form a link, and all ports are in the In the same VLAN, when the configuration process is isolated, the port number of the first port is smaller than the port number of the second port in each IPRAN device. In this case, as long as one point in the loop formed by multiple devices is blocked, the loop is broken. .
  • the first IPRAN device, the second IPRAN device, and the third IPRAN device logical entity are connected. All the ports of the device are in the same VLAN. Assume that the size of the port number of each IPRAN device is that the first port A is larger than the second port B. In this case, the loop formed by multiple devices can block the loop on the loop. The purpose of the road. When the loops of the three IPRAN devices are formed and the loopback detection function is enabled at the same time, any port (first port A or second port B) on the three IPRAN devices is considered to be the looping point. When one of the IPRAN devices first receives the loopback probe frame sent by itself, it will block its first port A. The other two IPRAN devices will no longer receive the probe frames they sent, so that there is only a little blocking on the loop and the loop is broken.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Small-Scale Networks (AREA)

Abstract

基于IPRAN设备的以太网环路检测及处理方法,涉及数据和IP交换机网络领域,包括:配置IPRAN设备的环回检测全局参数,包括IPRAN设备的全局MAC地址;在IPRAN设备加入VPLS的端口上,配置环回探测帧的发送间隔,以及配置检测到所述端口拓扑成环之后采取的处理动作;在所述加入VPLS的端口上使能环回检测功能,即在所述端口发送携带环回探测帧的报文,当IPRAN设备收到所述报文时,检查报文中的MAC地址是否与自己的全局MAC地址相同,若是,根据所述处理动作,做出相应处理;若否,直接转发报文。本发明检测以太网的中是否存在环路,通过网管上报环路告警,并消除环路,避免网络端口泛洪导致的网络故障。

Description

基于IPRAN设备的以太网环路检测及处理方法 技术领域
本发明涉及数据和IP交换机网络领域,具体来讲涉及基于IPRAN(IP Radio Access Network,无线接入网IP化)设备的以太网环路检测及处理方法。
背景技术
随着交换机的发展,用户通过以太网交换机接入网络越来越多。在企业网中,用户通过二层以太网交换机接入网络,他们不仅有上internet的需求,同时内部二层互通的需求也相当迫切。当用户需要二层互通时,报文的转发直接通过mac(media access control,介质访问控制)寻址,mac地址学习的正确与否,决定着用户之间是否能够正确的互通。
现有技术方案在二层交换中,通过mac地址寻址来进行报文转发。二层设备的mac地址学习都是通过源mac地址学习来进行的。即:当端口收到一个未知源mac地址的报文,会将这个mac地址添加到接收端口上,以便后续以该mac地址为目的报文能够直接转发,即一次学习,多次转发。
二层设备的mac地址更新机制是:
1、正常老化过程。在指定的老化时间没有源或者目的hit,从地址表中删除掉该mac地址。
2、移动。当新来源mac地址,如果发现该mac地址已经学习到了二层设备上,但是源端口不一样,会修改原来mac地址的源端口, 也就是将原来的mac地址移动到新的端口上来。
在上述情况2中,mac地址的移动是必然的。根据以太网的原理,当以太网交换机节点收到一个广播帧或未知单播帧时,会向其他所有端口泛洪该帧。在局域网中,这种方式非常简单实用,交换机节点通过泛洪的方式,很容易将广播帧或未知单播帧转发给目的主机。但是,当网络中有环路存在时,广播帧会在环路中的各个交换机节点上依次进行泛洪和转发,最终回到源交换机节点;源交换机节点收到该广播帧后,并不会丢弃,而是继续按照广播帧的转发方式进行泛洪;因此,广播帧会永无休止地在环路的各个交换机节点上进行转发,最终流量越来越大,耗尽带宽。以太网交换机节点还会将广播帧向环路之外的端口泛洪,发送给局域网中的主机,随着泛洪流量的增大,从而导致整个局域网及其主机瘫痪,导致严重的网络故障。
发明内容
针对现有技术中存在的缺陷,本发明的目的在于提供一种基于IPRAN设备的以太网环路检测及处理方法,检测以太网的中是否存在环路,通过网管上报环路告警,并消除环路,避免网络端口泛洪导致的网络故障。
为达到以上目的,本发明采取基于IPRAN设备的以太网环路检测及处理方法,包括:S1.配置IPRAN设备的环回检测全局参数,包括IPRAN设备的全局MAC地址;S2.在IPRAN设备加入VPLS的端口上,配置环回探测帧的发送间隔,以及配置检测到所述端口拓扑成环之后采取的处理动作;S3.在所述加入VPLS的端口上使能环回检测功能,即在所述端口发送携带环回探测帧的报文,当IPRAN设备收到所述报文时,检查报文中的MAC地址是否与自己的全局MAC地址相同,若是,根据所述处理动作,做出相应处理;若否,直接转 发报文。
在上述技术方案的基础上,所述IPRAN设备的全局MAC地址,是网络中该IPRAN设备的唯一标识,默认为IPRAN设备的机架MAC地址。
在上述技术方案的基础上,S2中,所述处理动作包括端口无动作、关闭动作和隔离动作;端口无动作时,端口仅上报网管告警;关闭动作时,端口不接收转发任何业务报文和信令报文;隔离动作时,端口不转发业务报文,但是接收和发送信令报文。
在上述技术方案的基础上,当检测到环路消失时,解除端口的隔离动作。
在上述技术方案的基础上,单设备单环场景时,当位于同一IPRAN设备的两个端口通过外部网络形成环路,两个端口均使能环回检测功能,且其中一个端口号小于另一个端口号,配置处理动作为隔离动作时,两个端口同时发送环回探测帧的报文,无论哪个端口先收到另一个端口发送的环回探测帧的报文,都将端口号小的端口隔离,并定为环点,另外一个端口保持连通。
在上述技术方案的基础上,单设备单环场景时,当位于同一IPRAN设备的两个端口通过外部网络形成环路,只有一个端口使能环回检测功能,优先选择使能换回检测功能的端口为环点,并将该端口隔离。
在上述技术方案的基础上,多设备成环场景时,两个设备具有不同的全局MAC地址,在第一IPRAN设备的第一端口和第二IPRAN设备的第二端口、第三端口使能环回检测功能,配置处理动作为隔离动作时,如果第一IPRAN设备的第一端口最先发现环路存在,则第一端口隔离,并设为环点;第二IPRAN设备按照单设备单环场景处 理;当第二IPRAN设备中有端口隔离,则第一IPRAN设备的第一端口收不到自己发送的携带环回探测帧的报文,判断环路消失,解除第一端口的环点,而第二IPRAN设备的第二端口或第三端口为环点。
在上述技术方案的基础上,多设备多环场景时,第一IPRAN设备和第二IPRAN设备所有端口均处于相同VLAN,第一IPRAN设备的第一端口、第二端口和第三端口分别与第二IPRAN设备的第一端口、第二端口和第三端口形成链路,且形成多个环路,配置处理动作为隔离动作时,两个IPRAN设备的端口均使能环回检测功能,且形成链路中,端口号小的优先隔离,只有链路两端端口号最大的端口保持连通。
在上述技术方案的基础上,多设备多环场景时,第一IPRAN设备、第二IPRAN设备和第三IPRAN设备中,均有一个第一端口和一个第二端口,三个设备的端口依次链接形成链路,所有端口均处于相同VLAN,配置处理动作为隔离动作时,每个IPRAN设备中,第一端口的端口号小于第二端口的端口号,此时只要阻塞多设备形成的环路中的一点,则破除环路。
本发明的有益效果在于:通过发送携带环回探测帧的报文,并检测该报文的返回情况,判断以太网中的环路,并通过网管上报环路告警,能够及时发现以太网中的环路,避免对整个网络造成严重的影响,还能够自动关闭或阻塞出现环路的端口,以消除环路。
附图说明
图1为本发明基于IPRAN设备的以太网环路检测及处理方法流程图;
图2为本发明实施例单设备单环场景示意图;
图3为本发明实施例多设备成环场景示意图;
图4为本发明实施例多设备多环场景示意图;
图5为本发明实施例多设备单环场景示意图。
具体实施方式
以下结合附图及实施例对本发明作进一步详细说明。
如图1所示,基于IPRAN设备的以太网环路检测及处理方法,支持基于VPLS(VirtualPrivateLanService,虚拟专用局域网业务)的环路检测,并对UNI(User Networks interface,用户网络侧接口)端口进行阻塞或关断,具体包括如下步骤:
S1.配置IPRAN设备的环回检测全局参数,包括IPRAN设备的全局MAC地址。具体的,IPRAN设备的全局MAC地址,是网络中该IPRAN设备的唯一标识,默认为IPRAN设备的机架MAC地址。
S2.在IPRAN设备中加入VPLS的端口上,配置环回探测帧的发送间隔,以及配置检测到所述端口拓扑成环之后采取的处理动作。环回探测帧的以太网类型可以选择性配置;所述处理动作包括端口无动作、关闭动作和隔离动作;端口无动作时,端口仅上报网管告警;关闭动作时,端口不接收转发任何业务报文和信令报文;隔离动作时,端口不转发业务报文,但是接收和发送信令报文。
S3.在加入VPLS的端口上使能环回检测功能,即在所述端口发送携带环回探测帧的报文,当IPRAN设备收到所述报文时,检查报文中的MAC地址是否与自己的全局MAC地址相同,若是,根据所述处理动作,做出相应处理。当检测到环路消失时,解除端口的隔离;若否,不做处理,直接转发所述报文。
单设备单环场景时,当位于同一IPRAN设备的两个端口通过外部网络形成环路,两个端口均使能环回检测功能,且其中一个端口号小于另一个端口号,当配置处理动作为隔离动作时,两个端口同时发 送环回探测帧的报文,无论哪个端口先收到另一个端口发送的环回探测帧的报文,都将端口号小的端口隔离,并定为环点,另外一个端口保持连通。如果只有一个端口使能环回检测功能,优先选择使能换回检测功能的端口为环点,并将该端口隔离。
如图2所示,单设备单环场景时,第一端口A和第二端口B属于同一个IPRAN设备,第一端口A和第二端口B通过外部网络形成环路。此时第一端口A和第二端口B的全局参数相同,具有相同的全局MAC地址,处于同一个VLAN,第一端口A的端口号小于第二端口B的端口号,当配置处理动作为隔离动作时,将环回探测帧发送时间间隔配置为相同。
如果两个端口均使能环回检测功能,第一端口A和第二端口B同时发送环回探测帧。那么,无论第一端口A和第二端口B谁先收到对方发出的环回探测帧,由于第一端口A的端口号小于第二端口B的端口号,都将第一端口A的连通性改变为隔离,并将A定位为成环点。由于第二端口B也会收到环回探测帧,但是此时第一端口A已经隔离,那么第二端口B不会产生动作,保持自己的连通性。
如果第一端口A和第二端口B只有其中一个使能环回检测功能,使能环回检测的端口即为环点。例如,仅有第一端口A使能环回检测功能,第一端口A的连通性改变为隔离,并将A定位为成环点,环回检测环点选择程序优先选择使能了环回检测功能的端口为环点。
多设备成环场景时,两个设备具有不同的全局MAC地址,在第一IPRAN设备的第一端口和第二IPRAN设备的第二端口、第三端口使能环回检测功能,当配置处理动作为隔离动作时,如果第一IPRAN设备的第一端口最先发现环路存在,则第一端口隔离,并设为环点;第二IPRAN设备按照单设备单环场景处理;当第二IPRAN设备中有 端口隔离,则第一IPRAN设备的第一端口收不到自己发送的携带环回探测帧的报文,判断环路消失,解除第一端口的环点,而第二IPRAN设备的第二端口或第三端口为环点。
如图3所示,多设备成环场景时,第一IPRAN设备和第二IPRAN设备具有不同的全局MAC地址,在第一IPRAN设备的第一端口A和第二IPRAN设备的第二端口B、第三端口C上使能环回检测。如果第一IPRAN设备中第一端口A先于第二IPRAN设备的第二端口B或者第三端口C发现环路的存在,则第一IPRAN设备中第一端口A会先将自己隔离。显然这样并没有成功将环定位并隔离,第二IPRAN设备的环回检测功能依然会发现环的存在,并按照单设备单环中所述处理环。一旦第二IPRAN设备将环成功隔离,则第一IPRAN设备中第一端口A的环回检测,将收不到自己发送的携带环回检测帧的报文,并判断环路消失,将自己的环点状态解除。此时第二IPRAN设备的第二端口B或者第三端口C就是环点。
多设备多环场景时,第一IPRAN设备和第二IPRAN设备所有端口均处于相同VLAN,第一IPRAN设备的第一端口、第二端口和第三端口分别与第二IPRAN设备的第一端口、第二端口和第三端口形成链路,且形成多个环路,当配置处理动作为隔离动作时,两个IPRAN设备的端口均使能环回检测功能,且形成链路中,端口号小的优先隔离,只有链路两端端口号最大的端口保持连通。
如图4所示,多设备多环场景时,第一IPRAN设备和第二IPRAN设备网络拓扑连接关系如图4所示,所有端口均处于相同VLAN,第一IPRAN设备的第一端口A、第二端口B和第三端口C,分别与第二IPRAN设备的第一端口D、第二端口E和第三端口F形成链路,只要将A-D、B-E或C-F链路阻断其中两条,就能破除环路。假设第 一IPRAN设备上的端口号大小关系为:第一端口A<第二端口B<第三端口C,第二IPRAN设备上的端口号大小关系为:第一端口D<第二端口E<第三端口F。在第一IPRAN设备的第一端口A、第二端口B和第三端口C,以及第二IPRAN设备的第一端口D、第二端口E和第三端口F上使能环回检测功能,根据环点判断逻辑,端口号小的优先阻塞,则第一端口A和第一端口D之间会有一个被隔离,第二端口B和第二端口E之间会有一个被隔离,而第三端口C和第三端口F的连接保持正常,此时第一IPRAN设备和第二IPRAN设备的数据链路只有C-F链路是连通的,达到破除环路的目的。
多设备多环场景时,第一IPRAN设备、第二IPRAN设备和第三IPRAN设备中,均有一个第一端口和一个第二端口,三个设备的端口依次链接形成链路,所有端口均处于相同VLAN,当配置处理动作为隔离动作时,每个IPRAN设备中,第一端口的端口号小于第二端口的端口号,此时只要阻塞多设备形成的环路中的一点,则破除环路。
如图5所示,为多设备多环场景时,第一IPRAN设备、第二IPRAN设备和第三IPRAN设备逻辑实体的连接方式。所有设备端口均处于相同VLAN,假设每一个IPRAN设备端口号的大小关系是第一端口A大于第二端口B,此时多设备形成的环路只要能够阻塞环路上的一点,就能达到破除环路的目的。当三台IPRAN设备环路形成后,再同时开启环回检测功能,三台IPRAN设备上任意一个端口(第一端口A或第二端口B)被认为是成环点均是正确的。当其中一台IPRAN设备首先接收到自己发送的环回探测帧时,会将自己的第一端口A阻塞。另外两台IPRAN设备就不会再收到自己发送的探测帧,从而环路上只有一点阻塞,环路破除。
本发明不局限于上述实施方式,对于本技术领域的普通技术人员 来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也视为本发明的保护范围之内。本说明书中未作详细描述的内容属于本领域专业技术人员公知的现有技术。

Claims (9)

  1. 基于IPRAN设备的以太网环路检测及处理方法,其特征在于,包括:
    S1.配置IPRAN设备的环回检测全局参数,包括IPRAN设备的全局MAC地址;
    S2.在IPRAN设备加入VPLS的端口上,配置环回探测帧的发送间隔,以及配置检测到所述端口拓扑成环之后采取的处理动作;
    S3.在所述加入VPLS的端口上使能环回检测功能,即在所述端口发送携带环回探测帧的报文,当IPRAN设备收到所述报文时,检查报文中的MAC地址是否与自己的全局MAC地址相同,若是,根据所述处理动作,做出相应处理;若否,直接转发报文。
  2. 如权利要求1所述的基于IPRAN设备的以太网环路检测及处理方法,其特征在于:所述IPRAN设备的全局MAC地址,是网络中该IPRAN设备的唯一标识,默认为IPRAN设备的机架MAC地址。
  3. 如权利要求1所述的基于IPRAN设备的以太网环路检测及处理方法,其特征在于:S2中,所述处理动作包括端口无动作、关闭动作和隔离动作;端口无动作时,端口仅上报网管告警;关闭动作时,端口不接收转发任何业务报文和信令报文;隔离动作时,端口不转发业务报文,但是接收和发送信令报文。
  4. 如权利要求3所述的基于IPRAN设备的以太网环路检测及处理方法,其特征在于:当检测到环路消失时,解除端口的隔离动作。
  5. 如权利要求1所述的基于IPRAN设备的以太网环路检测及处理方法,其特征在于:单设备单环场景时,当位于同一IPRAN设备的两个端口通过外部网络形成环路,两个端口均使能环回检测功能,且其中一个端口号小于另一个端口号,配置处理动作为隔离动作时, 两个端口同时发送环回探测帧的报文,无论哪个端口先收到另一个端口发送的环回探测帧的报文,都将端口号小的端口隔离,并定为环点,另外一个端口保持连通。
  6. 如权利要求1所述的基于IPRAN设备的以太网环路检测及处理方法,其特征在于:单设备单环场景时,当位于同一IPRAN设备的两个端口通过外部网络形成环路,只有一个端口使能环回检测功能,优先选择使能换回检测功能的端口为环点,并将该端口隔离。
  7. 如权利要求5或6所述的基于IPRAN设备的以太网环路检测及处理方法,其特征在于:多设备成环场景时,两个设备具有不同的全局MAC地址,在第一IPRAN设备的第一端口和第二IPRAN设备的第二端口、第三端口使能环回检测功能,配置处理动作为隔离动作时,如果第一IPRAN设备的第一端口最先发现环路存在,则第一端口隔离,并设为环点;第二IPRAN设备按照单设备单环场景处理;当第二IPRAN设备中有端口隔离,则第一IPRAN设备的第一端口收不到自己发送的携带环回探测帧的报文,判断环路消失,解除第一端口的环点,而第二IPRAN设备的第二端口或第三端口为环点。
  8. 如权利要求1所述的基于IPRAN设备的以太网环路检测及处理方法,其特征在于:多设备多环场景时,第一IPRAN设备和第二IPRAN设备所有端口均处于相同VLAN,第一IPRAN设备的第一端口、第二端口和第三端口分别与第二IPRAN设备的第一端口、第二端口和第三端口形成链路,且形成多个环路,配置处理动作为隔离动作时,两个IPRAN设备的端口均使能环回检测功能,且形成链路中,端口号小的优先隔离,只有链路两端端口号最大的端口保持连通。
  9. 如权利要求1所述的基于IPRAN设备的以太网环路检测及处理方法,其特征在于:多设备多环场景时,第一IPRAN设备、第二 IPRAN设备和第三IPRAN设备中,均有一个第一端口和一个第二端口,三个设备的端口依次链接形成链路,所有端口均处于相同VLAN,配置处理动作为隔离动作时,每个IPRAN设备中,第一端口的端口号小于第二端口的端口号,此时只要阻塞多设备形成的环路中的一点,则破除环路。
PCT/CN2017/075526 2016-06-12 2017-03-03 基于ipran设备的以太网环路检测及处理方法 WO2017215291A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610410024.3 2016-06-12
CN201610410024.3A CN105897515A (zh) 2016-06-12 2016-06-12 基于ipran设备的以太网环路检测及处理方法

Publications (1)

Publication Number Publication Date
WO2017215291A1 true WO2017215291A1 (zh) 2017-12-21

Family

ID=56729105

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/075526 WO2017215291A1 (zh) 2016-06-12 2017-03-03 基于ipran设备的以太网环路检测及处理方法

Country Status (2)

Country Link
CN (1) CN105897515A (zh)
WO (1) WO2017215291A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011819A (zh) * 2018-01-04 2019-07-12 中兴通讯股份有限公司 生成sd告警信息的方法、装置、设备及系统
CN111092782A (zh) * 2018-10-24 2020-05-01 迈普通信技术股份有限公司 被测通信设备、通信设备端口数据转发测试系统及方法
CN111147286A (zh) * 2019-12-10 2020-05-12 中盈优创资讯科技有限公司 Ipran网络环路监控方法及装置
CN114884806A (zh) * 2022-04-01 2022-08-09 国网浙江省电力有限公司杭州供电公司 一种基于高集聚场景下的环路识别与阻断方法
CN115412456A (zh) * 2022-08-11 2022-11-29 浪潮思科网络科技有限公司 一种堆叠环境下的环回检测方法、设备及介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897515A (zh) * 2016-06-12 2016-08-24 烽火通信科技股份有限公司 基于ipran设备的以太网环路检测及处理方法
CN107171952B (zh) * 2017-04-06 2019-10-11 烽火通信科技股份有限公司 一种在vpls中实现防环的方法及设备
CN113472562B (zh) * 2020-03-31 2023-09-01 华为技术有限公司 一种设备管理方法、装置及计算机系统
CN113098709B (zh) * 2021-03-24 2021-12-14 深圳市乙辰科技股份有限公司 基于分布式组网系统的网络恢复方法、装置和计算机设备
CN113328910A (zh) * 2021-05-26 2021-08-31 中国电子科技集团公司第五十四研究所 一种面向生成树协议的链路状态监测方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145981A (zh) * 2006-09-13 2008-03-19 中兴通讯股份有限公司 包含多环的以太环网的环路检测和切换方法
CN101197648A (zh) * 2008-01-02 2008-06-11 中兴通讯股份有限公司 用于接入网的自环路检测方法和装置
US20100020798A1 (en) * 2008-07-25 2010-01-28 Micrel, Inc. True Ring Networks With Gateway Connections Using MAC Source Address Filtering
CN105897515A (zh) * 2016-06-12 2016-08-24 烽火通信科技股份有限公司 基于ipran设备的以太网环路检测及处理方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056224B (zh) * 2007-05-31 2010-09-22 杭州华三通信技术有限公司 一种网络设备的环回检测方法及设备
CN101242315B (zh) * 2008-02-26 2010-08-18 中兴通讯股份有限公司 一种环路检测的方法
CN101931573B (zh) * 2010-08-31 2012-07-04 武汉烽火网络有限责任公司 以太网环路定位方法
CN102739466B (zh) * 2011-04-13 2017-10-17 中兴通讯股份有限公司 一种设置以太网节点检测帧超时时长的方法及系统
CN102332997B (zh) * 2011-10-25 2014-06-25 瑞斯康达科技发展股份有限公司 一种网络设备及其进行链路容量调整的方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145981A (zh) * 2006-09-13 2008-03-19 中兴通讯股份有限公司 包含多环的以太环网的环路检测和切换方法
CN101197648A (zh) * 2008-01-02 2008-06-11 中兴通讯股份有限公司 用于接入网的自环路检测方法和装置
US20100020798A1 (en) * 2008-07-25 2010-01-28 Micrel, Inc. True Ring Networks With Gateway Connections Using MAC Source Address Filtering
CN105897515A (zh) * 2016-06-12 2016-08-24 烽火通信科技股份有限公司 基于ipran设备的以太网环路检测及处理方法

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011819A (zh) * 2018-01-04 2019-07-12 中兴通讯股份有限公司 生成sd告警信息的方法、装置、设备及系统
CN111092782A (zh) * 2018-10-24 2020-05-01 迈普通信技术股份有限公司 被测通信设备、通信设备端口数据转发测试系统及方法
CN111092782B (zh) * 2018-10-24 2022-04-05 迈普通信技术股份有限公司 被测通信设备、通信设备端口数据转发测试系统及方法
CN111147286A (zh) * 2019-12-10 2020-05-12 中盈优创资讯科技有限公司 Ipran网络环路监控方法及装置
CN111147286B (zh) * 2019-12-10 2022-10-21 中盈优创资讯科技有限公司 Ipran网络环路监控方法及装置
CN114884806A (zh) * 2022-04-01 2022-08-09 国网浙江省电力有限公司杭州供电公司 一种基于高集聚场景下的环路识别与阻断方法
CN115412456A (zh) * 2022-08-11 2022-11-29 浪潮思科网络科技有限公司 一种堆叠环境下的环回检测方法、设备及介质
CN115412456B (zh) * 2022-08-11 2023-10-27 浪潮思科网络科技有限公司 一种堆叠环境下的环回检测方法、设备及介质

Also Published As

Publication number Publication date
CN105897515A (zh) 2016-08-24

Similar Documents

Publication Publication Date Title
WO2017215291A1 (zh) 基于ipran设备的以太网环路检测及处理方法
EP3188409B1 (en) Oam mechanisms for evpn active-active services
US8213296B2 (en) Link aggregation protection
EP2560325B1 (en) Method, system and apparatus for managing addresses in ethernet ring network
US6857027B1 (en) Intelligent network topology and configuration verification using a method of loop detection
EP3301861A1 (en) Evpn designated forwarder state propagation to customer edge devices using connectivity fault management
US9608903B2 (en) Systems and methods for recovery from network changes
US8289839B2 (en) Scaling BFD sessions for neighbors using physical / sub-interface relationships
US9007958B2 (en) External loop detection for an ethernet fabric switch
US10277418B2 (en) Method and device for clearing media access control forwarding entry
US20170005921A1 (en) Technique for network service availability
US9641396B2 (en) Packet processing method and system
KR20090089385A (ko) 해시 기반 멀티호밍
US10237088B2 (en) Systems and methods for avoiding inadvertent loops in a layer 2 switched network
CN103873333B (zh) 环网三层收敛方法及装置
US20150244606A1 (en) Method for loopback detection and network device utilizing the same
WO2016116050A1 (zh) 环保护链路故障保护方法、设备及系统
WO2008154781A1 (fr) Procédé de traitement d'un message d'anneau ethernet et système de protection d'anneau ethernet utilisant le procédé
US20190260671A1 (en) Ethernet protection systems and methods with fast traffic recovery eliminating flooding, learning, and flushing
JP5862445B2 (ja) 通信装置
WO2016095322A1 (zh) 一种基于vrrp的数据传输方法及装置
CN101714939A (zh) 一种以太环网主节点的故障处理方法及相应以太环网
JP2003258822A (ja) パケットリングネットワーク及びそれに用いるパケットリングネットワーク間の接続方法
WO2012146097A1 (zh) Vpls网络和以太环网的倒换方法及装置
WO2008095360A1 (fr) Méthode et système de commutation rapide en cas de défaillance d'une liaison d'un réseau privé virtuel

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17812406

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17812406

Country of ref document: EP

Kind code of ref document: A1