Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for inhibiting topology oscillation through IS-IS (intermediate system to intermediate system) protocol

A topology and protocol technology, applied in the field of network equipment, can solve problems such as consumption of computing resources and interruption of business data flow, and achieve the effects of saving computing resources, avoiding communication interruption, and ensuring smooth communication

Active Publication Date: 2015-04-01
ANHUI WANTONG POSTS & TELECOMM CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, a topology and routing shock occurs, which leads to the interruption of business data traffic; consumes computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for inhibiting topology oscillation through IS-IS (intermediate system to intermediate system) protocol
  • Method for inhibiting topology oscillation through IS-IS (intermediate system to intermediate system) protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] A method for IS-IS protocol to suppress topology oscillation,

[0034]A: When the target intermediate system, that is, the target IS, fills in the neighbor information in the neighbor TLV in the LSP, it fills in the neighbor IDs in ascending order of the neighbor IDs.

[0035] B: When the target intermediate system, that is, the target IS, generates an LSP, if the LSP is filled with a neighbor TLV, it must fill in a neighbor range TLV.

[0036] C: When the target intermediate system (i.e., the target IS) generates an LSP, the neighbor ID in the neighbor range TLV starts to fill in the neighbor ID: if this LSP fragment is the first LSP fragment to fill in the neighbor TLV, the neighbor ID starts The neighbor ID is filled with all 0x00; if this LSP segment is not the first LSP segment to fill in the neighbor TLV, then the start neighbor ID, that is, the start neighbor ID is filled with the last neighbor ID filled in the previous LSP segment plus 1.

[0037] D: When the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for inhibiting topology oscillation through the IS-IS (intermediate system to intermediate system) protocol. The method comprises steps as follows: A, a target intermediate system, namely a target IS, fills neighbor information in neighbor TLV (type-length-value) of an LSP (link-state packet) in a sequence of neighbor IDs from small to large; and B, when the target intermediate system, namely the target IS, generates one LSP, one neighbor range TLV must be filled if the neighbor TLV is filled with the LSP. According to the method, topology and routing oscillation of neighbors moving between the LSP fragments is eliminated, a number of variational intermediate calculation processes are shielded, and topology oscillation is eliminated; calculating resources are saved; topology calculation can be triggered only when a calculation-party intermediate system only completely collects all neighbor description information of the target intermediate system, so that a number of variational intermediate calculation processes are shielded, and topology and route calculation is not performed in the intermediate calculation processes; smooth communication is guaranteed; and with the adoption of the method, the topology and route calculation caused by the intermediate variational processes is avoided, so that communication outage under the condition is further avoided.

Description

technical field [0001] The invention relates to a network device running an ISIS (intermediate system to intermediate system) routing protocol and a method for suppressing topology oscillation for the ISIS protocol. Background technique [0002] The intermediate system to intermediate system routing protocol (ISIS) is a dynamic, link state-based interior gateway protocol (IGP). The link state protocol data packet (LSP) describes the link state information of the intermediate system (IS), and sends it to the network, and also stores the LSP sent by all intermediate system (IS) devices on the network topology to form the link state Database (LSDB), ISIS uses the link state database (LSDB) to calculate the best route to the destination address through the shortest path first algorithm (SPF). First, the shortest path first algorithm (SPF) is executed, and the topology is calculated according to the neighbor TLV (type-length-value) of the LSP in the link state database (LSDB)....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/703H04L12/751H04L45/28H04L45/02
Inventor 周能强吴兰周光如谢倩陈培磊
Owner ANHUI WANTONG POSTS & TELECOMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products