Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual local area network (VLAN)-based transparent interconnection of lots of links (TRILL) traffic priority scheduling method

A technology of prioritizing scheduling and traffic, applied in the field of communication, can solve the problems of lack of hierarchy of Layer 2 MAC addresses, waste of investment, exhaustion of MAC address space, etc., to achieve the effect of quality of service assurance

Active Publication Date: 2014-12-17
武汉神州数码云科网络技术有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the future, the horizontal traffic inside the data center will become larger and larger, and STP still needs to be run between the newly added device and the original device. If only one link between the two servers is feasible, the rest of the 10 Gigabit switch ports will be blocked. Not only is it a great waste of investment, but it also cannot support the rapid expansion of services; secondly, when the number of cross-links increases, the design of the Layer 2 network will become very complicated, which link should be reserved and which link should be blocked , Where is the layer-3 gateway located? There will be a lot of problems like this, which will lose the advantage of simple layer-2 network configuration; finally, the traditional layer-2 MAC address has no hierarchical concept, which can easily lead to edge The MAC address space of the device is exhausted, especially in a virtualized data center, where the number of MAC addresses of virtual machines may be in the thousands

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual local area network (VLAN)-based transparent interconnection of lots of links (TRILL) traffic priority scheduling method
  • Virtual local area network (VLAN)-based transparent interconnection of lots of links (TRILL) traffic priority scheduling method
  • Virtual local area network (VLAN)-based transparent interconnection of lots of links (TRILL) traffic priority scheduling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Such as figure 1 As shown, a schematic diagram of the TRILL network connection structure of four sub-switches is given: each switch uses RB instead, figure 1 PC1, PC2 and PC3 are client devices, PC1 is connected to LAN1, PC2 is connected to LAN2, PC3 is connected to LAN3, edge switch RB1 is TRILL network edge device, intermediate switch RB3 is TRILL network transmission device; the port of RB1 A is connected to the switch RB3, and port B is connected to the edge switch RB2; RB2 and RB3 are connected to the TRILL network edge device RB4, where RB2 can be used as an edge device or as a transmission device.

[0023] Port A and port B on the edge switch RB1 are two paths in the TRILL network. The links connected from port A and port B not only transmit the traffic generated by RB1, but also back up each other at the same time.

[0024] TRILL traffic data forwarding priority negotiation process between RB1 and RB4 is as follows: figure 2 As shown, RB1 sends a HELLO messag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual local area network (VLAN)-based transparent interconnection of lots of links (TRILL) traffic priority scheduling method. The topology of a TRILL network is cognized by a link state protocol, RBs determine VLAN-based TRILL traffic processing priorities among the RBs by negotiation according to extended field information in a received handshake protocol message, different service is provided for different users by a shared link on the basis of not extending hardware resources to maximally protect and utilize the conventional resources, different links are not required to be provided for different clients, and the service corresponding to corresponding clients is realized on each link to effectively ensure the quality of service of TRILL traffic.

Description

technical field [0001] The present invention relates to the communication field, in particular to a VLAN (Virtual Local Area Network)-based TRILL (Transparent Interconnection of Lots of Links) flow priority scheduling method. Background technique [0002] Most of today's data center networks are built following the standard hierarchical concept, which is divided into access layer and aggregation / core layer. , STP (spanning tree protocol) is run on all Layer 2 links. When more than one path is reachable between any two points, STP will block the redundant path to ensure that only one path is reachable between two points. , so as to prevent the occurrence of loops. This mode has been adopted on a large scale for a long time in the past, because it is very simple to deploy, access layer devices do not require complex configuration, and most network policies can be distributed to the entire network as long as they are deployed centrally at the aggregation layer. But as the siz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/46H04L47/6275
Inventor 陈振光
Owner 武汉神州数码云科网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products