Ethernet loop protection method and apparatus

An Ethernet and ring protection technology, applied in the Ethernet field, can solve problems such as difficult to achieve fault recovery, and achieve the effect of simple implementation and strong compatibility

Active Publication Date: 2008-07-30
HUAWEI TECH CO LTD
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, when a multi-point failure occurs on the Ethernet ring network, since some nodes may not be ab

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ethernet loop protection method and apparatus
  • Ethernet loop protection method and apparatus
  • Ethernet loop protection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] Please see image 3 , image 3 It is a specific flowchart of the Ethernet ring protection method disclosed in Embodiment 1 of the present invention. Such as image 3 As shown, the method includes:

[0064] Step S301, the link between the adjacent nodes performs fault detection through the control message, and judges whether the link has a fault, if yes, execute step S302, otherwise continue to execute step S301;

[0065] In this step, the control message may be a CC message, and CC messages may be used to detect faults between nodes on the Ethernet ring network. Each node periodically sends a CC message to its adjacent nodes, and the node that receives the CC message directly terminates the message and does not continue to forward it to other nodes. When the node does not receive the CC message within a predetermined time period, it can be determined that the link between the node and the adjacent node fails. The specific process of using the CC message to detect l...

Embodiment 2

[0085] Embodiment 1 describes the specific implementation of the present invention when a single link fails on the Ethernet ring network. This embodiment further illustrates the specific implementation of the present invention by taking multiple faults on the Ethernet ring network and fault recovery as an example.

[0086] In this embodiment, when a node detects a link, its specific method flow is the same as that in Embodiment 1, and will not be repeated here. The difference between embodiment 2 and embodiment 1 is: when the link failure in embodiment 1 has not been recovered, when other links fail again, after the nodes on the ring network receive the AIS alarm information, they judge that the fault identification has changed, then Empty the forwarding table and re-learn. This process will be described in detail below in conjunction with the accompanying drawings.

[0087] Please see Image 6 , Image 6 It is a schematic diagram when multiple faults occur on the Ethernet ...

Embodiment 3

[0090] The difference between this embodiment and Embodiment 1 and Embodiment 2 is that each node receiving the fault information in this embodiment no longer stores and updates the fault identification composed of the source address of the alarm information, but each node only confirms the normal state and fault status. When the node that receives the fault alarm information receives the fault alarm information in the normal state, it clears the forwarding table and restarts self-learning; when the node that receives the fault alarm information receives the fault alarm information in the fault state, it does not clear the idling Instead, the timer corresponding to the fault condition is reset.

[0091] Further, if other nodes do not receive the control message again within a predetermined time, then change the state of this node from the fault state to a normal state, and clear the forwarding table of this node.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting Ethernet ring, and a corresponding device. The method and the device are characterized in that when the link on Ethernet ring is failed, link failed node block and a port connected with the failed link are detected, and control information are continuously transmitted to other nodes; the other nodes receive the control information and judges whether a self-maintained failure mark varies, and the forwarding table of the node is emptied, the failure mark stored by the node is updated, and a timer corresponding to the failure mark is reset if the self-maintained failure mark varies; otherwise, only the timer corresponding to the failure mark is reset. The method and the corresponding device in the invention can effectively implement Ethernet ring protection under various conditions, with simple process and high compatibility.

Description

technical field [0001] The invention relates to Ethernet technology, in particular to an Ethernet ring protection method and device. Background technique [0002] With the rapid development of carrier-class Ethernet, ERP (Ethernet Ring Protection) has become an Ethernet service protection method that the industry pays attention to. Ethernet ring protection is based on physical or logical ring topology, using the characteristics of closed ring and Ethernet to realize fast protection switching of point-to-point, point-to-multipoint and multipoint-to-multipoint services, with high bandwidth utilization and fast protection switching speed , Low network construction cost, support point-to-multipoint and multipoint-to-multipoint service switching and other characteristics. [0003] The Ethernet ring network presents a ring topology on the link layer. In order to prevent infinite loopback of packets on the Ethernet ring, a blocking port will be set at the link layer. When a servic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/437H04L12/24H04L45/02H04L45/18H04L45/28
CPCH04L12/4637H04L12/437H04L45/18H04L45/28H04L45/02H04L45/48
Inventor 龙昊杨洋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products