Intersect looped network, node and protecting method of random topology intersect looped network

A technology of intersecting rings and ring networks, applied in the field of Ethernet ring networks, to achieve the effect of smooth data links

Active Publication Date: 2010-12-22
NEW H3C TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, at present, there is only an effective ring network protection mechanism for a single Ethernet ring network. For any topology where multiple Ethernet ring networks intersect, there is no effective ring network protection mechanism to ensure the smoothness of the ring network links and avoid loops

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intersect looped network, node and protecting method of random topology intersect looped network
  • Intersect looped network, node and protecting method of random topology intersect looped network
  • Intersect looped network, node and protecting method of random topology intersect looped network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] In this embodiment, the implementation process of the present invention is described by using the first detection method.

[0034] image 3 It is a flow chart of protecting an intersecting ring network of any topology in Embodiment 1 of the present invention. see image 3 , the process includes:

[0035] Step 301: For all the intersecting Ethernet ring networks, set each ring network in advance as each layer ring starting from the uppermost layer ring and descending layer by layer.

[0036] still with figure 2 The intersecting structure of three Ethernet ring networks is shown as an example. In this step 301, the Ethernet ring network R1 can be set as the first layer ring, and the Ethernet ring networks R2 and R3 can be respectively set as the second layer ring and the third layer ring. layer ring. Wherein, the first ring is the uppermost ring, and the third ring is the lowermost ring.

[0037] In specific service implementation, the upper and lower layer relatio...

Embodiment 2

[0086] In this embodiment, the implementation process of the present invention is described by using the second detection method.

[0087] Figure 7 It is a flow chart of protecting an Ethernet ring network of any topology in Embodiment 2 of the present invention. see Figure 7 , the process includes:

[0088] All descriptions of steps 701 to 702 are the same as those of steps 301 to 302.

[0089] Step 703: For two edge nodes corresponding to one Ethernet ring network, set a master edge node and an assistant edge node.

[0090] For ease of description, in the following steps, the upper layer ring R1 and the lower layer ring R2 are taken as examples to illustrate the subsequent implementation process of the present invention. For the two edge nodes corresponding to the second layer ring R2, for example, S5 may be set as the primary edge node, and S3 may be set as the auxiliary edge node.

[0091] Step 704: The main edge node S5 corresponding to the second-level ring R2 con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protection method for an arbitrarily topologized cross ring network, nodes and the cross ring network. The method comprises the steps that each ether ring network is respectively set into a respective layer ring declining vertically from the uppermost layer of ring in an arbitrarily topologized cross ring network formed through a plurality of ether ring networks being crossed; the position between two nodes on the edges corresponding to an arbitrary first ether ring network in the cross ring network is inspected for passages, a slave port is ensured to be in the unlocked status through the master nodes of an arbitrary ring of the first ether ring network and the rings in the lower layers if the inspection result is negative, wherein, when the nodes on the edges are adopted as virtual nodes which adopts the network composed of all the rings in the upper layers of the first ether ring network as the first ether ring network, the virtual nodes are connected intothe node where the port of the first ether ring network is positioned.

Description

technical field [0001] The invention relates to the Ethernet ring network technology, in particular to a method for protecting an intersecting ring network of an arbitrary topology, a node and an intersecting ring network. Background technique [0002] At present, the Ethernet ring network is gradually popularized and applied. figure 1 It is a schematic diagram of the structure of a single Ethernet ring network. see figure 1 , in a single Ethernet ring network, including a master node and multiple transmission nodes, the master node and each transmission node transmit business data on the Ethernet ring network to complete various business functions. [0003] Since the Ethernet ring network is a ring network structure, it is necessary to prevent loops, so as to avoid broadcast storms caused by unknown unicasts and broadcasts being circulated on the ring. At present, for a single Ethernet ring network, there are relatively mature technologies to avoid loops and ensure data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/42H04L12/26
Inventor 赵里遥
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products