Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing elastic network interface

An elastic network and interface technology, applied in the field of communication, can solve problems such as the inability to guarantee the normal transmission of traffic, achieve the effect of improving reliability and link utilization, and ensuring normal operation

Active Publication Date: 2018-02-13
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a method and system for implementing an elastic network interface, so as to at least solve the above-mentioned problem that the normal transmission of traffic in any network cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing elastic network interface
  • Method and system for implementing elastic network interface
  • Method and system for implementing elastic network interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] This embodiment provides a method for implementing and protecting an elastic network interface, see figure 1 , the method includes the following steps:

[0047] Step S102, aggregating one or more aggregation ports on one or more nodes into a DLAG;

[0048] One or more nodes here may be located in the same network, and all are connected to one or more nodes of another network. It can also be located in a different network or within a network.

[0049] When the one or more nodes are located in the same network and are all connected to one or more nodes of another network, the aggregated DLAG is preferably a distributed elastic network interconnection interface, and the elastic network interconnection The connection port is used to transmit the traffic inside the network to the outside of the network, or to transmit the traffic outside the network to the inside of the network, and realize the protection of the traffic between the inside and outside of the network.

[00...

example 1

[0096] like Figure 5 In the network connection topology diagram shown, nodes A and B have their own node IDs (node ​​id), which are 001 and 002 respectively, and also have their own node priorities (node ​​priority), which are 0 and 1 respectively. Similarly, nodes C and D have their own node ids, which are 003 and 004 respectively, and their own node priorities, which are 0 and 1 respectively. It is hoped that through LICP and LACP, a' of node A and b' of node B can form a distributed link aggregation group DLAG; c' of node C and d' of node D can also form a distributed link aggregation group Group DLAG. From a macro point of view, although the link between A and C and the link between B and D are on different nodes, they work in an aggregation group, and traffic can be transmitted through this aggregation group to achieve traffic control. protection and load sharing.

[0097] b' and a' notify each other of their own system information (i.e. the system parameters in the a...

example 2

[0107] like Figure 10 In the network connection topology diagram shown, there are two edge nodes in the network on each side, and the network 11 is connected to the nodes C and D of the network 22 through nodes A and B. There is a full connection between nodes A, B, C, and D, that is, A is connected to C and D, and B is also connected to C and D. When a' and b' are regarded as a DLAG, c' and d' are viewed as When it is a DLAG, there are four aggregated links in this DLAG, and traffic protection and load sharing are realized through these aggregated links.

[0108] The aggregation process of this example is similar to Example 1. b' and a' notify each other of their system information through the LICP protocol, such as system id, system priority, key and other information. The format can be as follows Image 6 , Figure 7 , Figure 9 As shown, when these values ​​are the same, it is possible for these nodes to aggregate into a DLAG.

[0109] Therefore, b' notifies a' of its...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for realizing an elastic network interface. Wherein, the method includes: aggregating one or more aggregation ports on one or more nodes into a DLAG; implementing a distributed elastic network interface through the DLAG. The invention solves the problem that the existing ring network and other protection technologies cannot guarantee the normal transmission of traffic in any network, effectively guarantees the normal operation of the business in the network, and improves the reliability of the network interface and the utilization rate of the link .

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method and system for implementing an elastic network interface. Background technique [0002] With the rapid development of broadband services, more and more interconnections between networks are used to carry more services. There are many ways to protect the link and the nodes on it according to the technology used inside the network. As the demand for traffic protection becomes stronger and higher, some operators have also raised the need to implement traffic protection in the case of network interconnection. The traffic protection here can be realized by means of link aggregation, such as port aggregation or loop protection. Currently, the commonly used standards for link aggregation support port aggregation on one node, so they are only applicable to link protection. It can be seen that in the current link aggregation technology, the protection of nodes on the netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/70H04L45/243H04L45/28
CPCH04L45/245H04L45/28H04L41/0654Y02D30/00Y02D30/50G06F15/161
Inventor 敖婷喻敬海魏月华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products