Method for realizing protection switching based on TRILL (transparent interconnection of lots of link) network, TOR (top of rack) switchboard and system

A technology for network implementation and protection switching, which is applied in the field of communication technology and can solve problems such as delay and packet loss sensitivity

Active Publication Date: 2012-11-14
HUAWEI TECH CO LTD
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiments of the present invention provide a method for implementing protection switching based on TRILL networks, a TOR switch, and a system to solve the prob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing protection switching based on TRILL (transparent interconnection of lots of link) network, TOR (top of rack) switchboard and system
  • Method for realizing protection switching based on TRILL (transparent interconnection of lots of link) network, TOR (top of rack) switchboard and system
  • Method for realizing protection switching based on TRILL (transparent interconnection of lots of link) network, TOR (top of rack) switchboard and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] An embodiment of the present invention provides a method for implementing protection switching based on a TRILL network, such as figure 1 shown, including:

[0038] 101. TOR switch protection group information.

[0039] Wherein, the protection group information may include information of a first link connected between the TOR switch and the first COR switch and information of a second link connected between the TOR switch and the second COR switch. The acquisition of protection group information may be storing the protection group information in the TOR switch through static configuration, and the TOR switch obtains the pre-stored protection group information, or it may be that the TOR switch obtains the protection group information from the link generated by the TRILL protocol. Obtain two link information from a link state database (Link State Data Base, hereinafter referred to as LSDB) as protection group information, and the two links are links between the TOR switc...

Embodiment 2

[0052] Embodiments of the present invention provide a method for implementing protection switching based on a TRILL network, which is applied to a TRILL network, such as figure 2 As shown, the TRILL network includes multiple TOR switches and multiple COR switches, wherein each TOR switch is physically connected to the COR switch. The TRILL protocol is adopted in the TRILL network, and the TRILL protocol includes the protocol specification of the data plane and the protocol specification of the control plane. In the protocol specification of the control plane, TRILL introduces IS-IS as an addressing protocol, which runs between TOR switches and COR switches in all TRILL networks. IS-IS is a routing protocol based on the link state. In the TRILL network, each TOR switch will generate a link state protocol data unit (Link State Protocol Data Unit, hereinafter referred to as LSPDUDU), this LSPDU contains the generated LSPDU All link information of the TOR switch. Each TOR switc...

Embodiment 3

[0081] An embodiment of the present invention provides a top-of-rack switch TOR switch, such as Figure 5 As shown, it includes: an acquiring unit 31 , a first establishing unit 32 , and a first switching unit 33 .

[0082] The acquiring unit 31 is configured to acquire protection group information, where the protection group information includes the first link information connected between the TOR switch and the first core COR switch and the second link information connected between the TOR switch and the second COR switch. link information, and transmit the protection group information to the first establishment unit 32, and its specific implementation method is the same as image 3 The above step 201 is the same and will not be repeated here.

[0083]Wherein, the first link information includes Nickname of the first COR switch, and the second link information includes Nickname of the second COR switch. If the TOR switch and the first COR switch are non-directly connected ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The inventive embodiment discloses a method for realizing protection switching based on TRILL network, which can solve the problem of service interruption sensitive to time delay, packet loss and so on, caused by slow service protection switching. In the invention, a TOR switchboard is used for acquiring protection group information, including first link information connecting the TOR switchboard and a first COR (center of rack) switchboard, and second link information connecting the TOR switchboard and a second COR switchboard; the TOR switchboard constructs a first link between the TOR switchboard and the first COR switchboard according to the first link information, and constructs a second link between the TOR switchboard and the second COR switchboard according to the second link information; and the TOR switchboard switches the business on the first link to the second link if the first link is broken down when the first link serves as the main link. The embodiment of the invention is mainly used in the protection switching process.

Description

technical field [0001] The present invention relates to the field of communication technologies, in particular to a method for realizing protection switching based on a Transparent Interconnection of Lots of Links (hereinafter referred to as TRILL) network, and a Top Of Rack (hereinafter referred to as TOR) switch. and system. Background technique [0002] A switch in a TRILL network has both a layer-2 forwarding function and a layer-3 routing function, and is generally called a route bridge (Route Bridge, hereinafter referred to as RB). TRILL runs on the Data Link Layer (Data Link Layer), that is, the second layer in the Open System Interconnection (OSI) reference model, and uses link state routing technology in the data link layer, and does not It will interfere with the work of the upper router. [0003] In the TRILL network, RB runs the intermediate system to intermediate system routing protocol (Intermediate System to Intermediate System Routing Protocol, hereinafter ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L12/24H04L45/24H04L45/247H04L45/28H04L45/58
CPCH04L41/0668H04L45/58H04L45/28H04L45/66H04L45/22
Inventor 廖文奇
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products