Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for protecting path in TRILL network

A path protection and path technology, applied in the field of communications, can solve the problems of taking several seconds or even minutes, user data loss, and high network convergence speed, to avoid loss and improve efficiency.

Inactive Publication Date: 2013-07-03
ZTE CORP
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a link in the network fails, it is necessary to re-flood the link data notification and recalculate the route. Depending on the size of the network, this process generally takes a few seconds or even a few minutes to converge. During route convergence, it will cause Loss of User Data
[0003] TRILL (Transparent Interconnection of Lots of Links, transparent interconnection of multiple links) uses ISIS as the control plane distribution protocol. TRILL is expected to be deployed on a large scale in the data center. This kind of network environment will have a relatively high convergence speed for the network, and the convergence speed of traditional routing The speed cannot meet the requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting path in TRILL network
  • Method and device for protecting path in TRILL network
  • Method and device for protecting path in TRILL network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0035] figure 2 It is a schematic diagram of a device for path protection in a TRILL network according to an embodiment of the present invention, such as figure 2 As shown, the device of this embodiment includes:

[0036] The first module is used to identify the TE path by using the TE alias of each node in the process of calculating the traffic engineering (TE) path as the backup path for the active path;

[0037] The second module is configured to switch the data packets on the active path to the TE path when it is detected that the active path fails.

[0038] Wherein,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for protecting a path in a TRILL network. The method and device for protecting the path in the TRILL network comprises the following steps: taking advantage of traffic engineering (TE) aliases of nodes to identify a TE path in the process of calculating the TE path which is used as an alternate path for a primary path; and switching data messages of the primary path to the TE path when breakdown of the primary path is detected. The method and device for protecting the path in the TRILL network can improve efficiency of protecting switchover and avoid causing losses of data of users.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for path protection in a TRILL (Transparent Interconnection of Lots of Links, transparent interconnection of multiple links) network. Background technique [0002] Link state routing protocols, such as OSPF (Open Shortest Path First, open shortest path first), ISIS (Intermediate system to Intermediate system, intermediate system to intermediate system) protocol uses SPF (Shortest Path First, shortest path first) algorithm to build a chain Link state database, and generate routes according to the link state database. When a link in the network fails, it is necessary to re-flood the link data notification and recalculate the route. Depending on the size of the network, this process generally takes a few seconds or even a few minutes to converge. During route convergence, it will cause Loss of User Data. [0003] TRILL (Transparent Interconnectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/707H04L45/24
Inventor 胡方伟秦超
Owner ZTE CORP