Method and device for preventing loop formation
A loop and logical link technology, applied in the field of communication, can solve the problem of wasting bandwidth, and achieve the effect of avoiding bandwidth waste, flexible traffic forwarding, and preventing loop formation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] This preferred embodiment 1 describes the situation of 2 networks and interconnected racks between the 2 networks, wherein the source port of the traffic is distinguished according to the packet encapsulation whether it is an interconnection port or a network port, and the source port is designated as the interconnection port Additional encapsulation is added when the traffic travels from the internal port.
[0077] Figure 10 is a schematic diagram of a distributed interconnection port protection network according to preferred embodiment 1 of the present invention, such as Figure 10 As shown, it includes the following process a'-->b'-->d'-->c', which will be described in detail below.
[0078] a'-->b': The internal port of a' finds that the source port is a network port, so no additional encapsulation format is added, and it is normally forwarded to b'.
[0079] b'-->d': The inline port of b' receives the message, according to the encapsulation format, it is found t...
Embodiment 2
[0083] The second preferred embodiment describes the situation that there are two networks and racks are interconnected between multiple networks. In the second preferred embodiment, it is assumed that each internal port has multiple links, and the source port is distinguished according to the link that the message travels, whether it is an interconnection port or a network port. Specifically, link B, link D, and link F are designated to forward traffic whose source port is an interconnection port; link A, link C, and link E are designated to forward traffic whose source port is a network port.
[0084] Figure 11 is a schematic diagram of a distributed interconnection port protection network according to the second preferred embodiment of the present invention, such as Figure 11 As shown, it includes the following process a'-->b'-->d'-->c'-->e', which will be described in detail below.
[0085] a'-->b': The internal port of a' finds that the source port is a network port, ...
Embodiment 3
[0091] The third preferred embodiment describes the situation of two networks and racks interconnected between the two networks. In the third preferred embodiment, it is assumed that the nodes between the networks are fully connected, that is, a' is connected to c' and d', and b' is connected to c' and d'. The third preferred embodiment distinguishes the source port according to the virtual local area network identifier (vlan-id) of the outer layer encapsulation, whether it is an interconnection port or a network port. Specifically, the traffic forwarded by the internal port needs to add an additional encapsulation format (PB or PBB), which is distinguished by the different vlan-id of the outer layer. Here, the source port is specified as the traffic of the interconnection port, and the vlan-id of the outer layer 200, the source port is the traffic of the network port, and the vlan-id of the outer layer encapsulation is 100.
[0092] Figure 12 is a schematic diagram of a di...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


