Method and device for detecting and inhibiting Ethernet link storm

A storm, one-half technology, applied in the field of communication, can solve problems that do not meet the field environment

Active Publication Date: 2013-01-16
DATANG MOBILE COMM EQUIP CO LTD
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved in this application is to propose a method and device for detecting and suppressing an Ethernet link storm, so as to solve the requirement that the existing technology does not meet the requirements of the field environment, and in the design scheme for dynamic configuration of the Ethernet module, a A method and device for detecting and suppressing an Ethernet link storm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting and inhibiting Ethernet link storm
  • Method and device for detecting and inhibiting Ethernet link storm
  • Method and device for detecting and inhibiting Ethernet link storm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Embodiment 1 describes in detail a method for detecting and suppressing an Ethernet link storm proposed by this application.

[0050] refer to figure 1 , which shows a flowchart of a method for detecting and suppressing an Ethernet link storm according to Embodiment 1 of the present application.

[0051] Step 11, setting the forwarding rate threshold value of each forwarding port according to the maximum bandwidth of each forwarding port in the switch chip;

[0052] During broadcast storms, the forwarding rate of data packets in the Ethernet link is much higher than that of transmitting normal business data, so the forwarding rate threshold can be set for each forwarding port according to the maximum bandwidth of each forwarding port in the switch chip to ensure The forwarding rate of each forwarding port under normal service will not reach the forwarding rate threshold.

[0053] For example, the maximum bandwidth of forwarding port A is 1000 Mbps, and the maximum ban...

Embodiment 2

[0068] Embodiment 2 introduces in detail a method for detecting and suppressing an Ethernet link storm proposed by this application.

[0069] refer to figure 2 , which shows a flowchart of a method for detecting and suppressing an Ethernet link storm described in Embodiment 2 of the present application.

[0070] Step 21, setting the forwarding rate threshold value of each forwarding port according to the maximum bandwidth of each forwarding port in the switch chip;

[0071] According to the maximum bandwidth of each forwarding port in the switch chip, a forwarding rate threshold is set for each forwarding port to ensure that the forwarding rate of each forwarding port will not reach the forwarding rate threshold under normal service.

[0072] Set the forwarding rate threshold value of each forwarding port in the switch chip to half of the maximum bandwidth of each forwarding port.

[0073] Since the packet forwarding rate of the Ethernet link during a broadcast storm is clo...

Embodiment 3

[0102] In the third embodiment, a method for detecting and suppressing an Ethernet link storm proposed in this application is introduced in detail.

[0103] refer to Figure 5 , which shows a flowchart of a method for detecting and suppressing an Ethernet link storm described in Embodiment 3 of the present application.

[0104] Step 31, setting the forwarding rate threshold value of the forwarding port;

[0105] Set the forwarding rate threshold of forwarding port A to 500 Mbps.

[0106] Step 32, detecting the forwarding rate of the forwarding port;

[0107]It is detected that the forwarding rate of forwarding port A at time T6 is 600 Mbps; the forwarding rate at time T7 is 300 Mbps.

[0108] Step 33, judging whether the forwarding rate exceeds the forwarding rate threshold;

[0109] Judging that the forwarding rate of forwarding port A of 600 Mbps at time T6 exceeds its forwarding rate threshold of 500 Mbps; judging that the forwarding rate of forwarding port A of 300 Mbp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for detecting and inhibiting an Ethernet link storm in order to solve the problem that the prior art does not meet the demand of an external environment. The invention provides the method and device for detecting and inhibiting the Ethernet link storm in a design scheme of executing dynamic allocation on an Ethernet module. The method comprises the following steps of: setting a transfer rate threshold value of each transfer port according to the maximal bandwidth of each transfer port in an exchanging chip; detecting the transfer rate of each transfer port; and judging whether the transfer rate is equal to or more than the transfer rate threshold value of the corresponding transfer port, if so, turning off the transfer port. The storm is inhibited via dynamically switching on / off an Ethernet link in the method, so that the configuration of the Ethernet link is more flexible; in addition, the network address for remotely logging a base station is statically bonded with the port of the exchanging chip so that the base station can be remotely logged when the storm is broadcast, in this way, operations such as positioning problems, adjusting software configuration and extracting base station information are performed conveniently.

Description

technical field [0001] The present application relates to the technical field of communications, in particular to a method and device for detecting and suppressing an Ethernet link storm. Background technique [0002] The Ethernet link in the base station is responsible for realizing the data transmission between the boards and the data link layer inside the board, so as to ensure the communication between the base stations and the network layer between the base station and the personal computer (PC). , and then realize various tools on the PC side to maintain, manage and debug the base station, such as updating the version of the base station, deploying cell parameters and other operations. [0003] The key to the Ethernet link is the Ethernet switching chip on each board, which is connected to each processor of the base station, and can realize Layer 2 forwarding, forwarding Ethernet packets from the source Medium Access Control (MAC) address to the destination MAC addres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/801H04L12/947
Inventor 李侠刘博强笪禹
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products