The present disclosure relates to a route switching method, a transfer device, and a communication system in a ring network.
There is a communication system in which a communication route is formed in a ring shape and the communication route is made redundant by setting a blocked port in a transfer device (see, for example, PTL 1 and NPL 1).
[PTL 1] Japanese Patent Application Publication No. 2009-189070
[NPL 1] JT-G8032 Ethernet Ring Protection Switching, Established Feb. 23, 2012
The route switching work as illustrated in
Accordingly, the present invention addresses the problems described above with an object of providing a route switching method, a transfer device, and a communication system that can continue communication even during route switching work.
In order to achieve the object described above, the route switching method according to the present invention causes a failure detection node to make a bypass determination of a normal packet in the ring when a failure occurs in the ring network so as to temporarily bypass the packet in parallel with the route switching processing.
Specifically, the route switching method according to the present invention is a route switching method in a ring network, the method including: detecting a non-transferable route through which packet transfer is disabled in the ring network; performing route switching work that changes a position of a blocked port set in a transfer device in the ring network and performs switching to a route that avoids the non-transferable route; and performing bypass transfer that transfers a packet while bypassing the non-transferable route during the route switching work, in which, in the bypass transfer, the transfer device having detected the non-transferable route attaches a bypass packet flag to a packet that passes through the non-transferable route and specifies the packet as a bypass packet, the transfer device having detected the non-transferable route returns the bypass packet and transfers the bypass packet in a direction opposite to that of the packet, and the transfer device for which the blocked port is set in the ring network transfers the bypass packet from the blocked port before the route switching work.
It should be noted that the blocked port is released after the route switching work, so the packet is transferred through a route that avoids the non-transferable route as a normal packet without being given the bypass packet flag.
In addition, a transfer device according to the present invention for achieving the route switching method is a transfer device included in a ring network, the transfer device, including: a detection unit that detects a non-transferable route through which packet transfer is disabled in the ring network; and a transfer control unit that performs route switching work for setting or releasing a blocked port by communicating with another transfer device in the ring network and performs switching a route of packet to a route that avoids the non-transferable route, in which the transfer control unit has a packet processing function that attaches a bypass packet flag to a packet that passes through the non-transferable route and specifies the packet as a bypass packet when the non-transferable route is detected, a turning function that turns the bypass packet in a direction opposite to that of the packet in the ring network, and a blocked port transfer function that transfers the bypass packet from the blocked port if the blocked port is set when the bypass packet is received before the route switching work.
By using the bypass packet, this route switching method can reduce the communication interruption time to the time (which depends on the transfer device) from the occurrence of a failure to the detection of the failure even if the failure occurs in the ring network. In addition, the route switching method can perform route switching without a communication interruption even when route switching in a ring network is performed in a planned manner. Accordingly, the present invention can provide the route switching method and the transfer device that can continue communication even during route switching work.
The route switching method attaches a blocked port pass flag that indicates whether to pass through the blocked port to the bypass packet. The route before passing through the blocked port is a turning section and, when the packet is output to the outside of the ring network, double transfer occurs. Accordingly, double transfer can be prevented by causing the packet to indicate “before passing through the blocked port” and “after passing through the blocked port”.
In this route switching method, the transfer device that transfers the packet to the outside of the ring network determines whether the packet is identical to a past packet and, when the packet is identical to the past packet, discards the packet.
When the packet is a multicast packet, both the normal packet and the bypass packet arrive depending on the node. Accordingly, double transfer can be prevented by checking the identity between the normal packet and the bypass packet and discarding one of these packets.
The communication system according to the present invention is a communication system for a ring network that includes the transfer device described above. Since this communication system includes the transfer device described above, the communication system can achieve the route switching method described above. Accordingly, the present invention can provide the communication system that can continue communication even during route switching work.
It should be noted that the inventions described above can be combined as much as possible.
The present invention can provide the route switching method, the transfer device, and the communication system that can continue communication even during route switching work.
Embodiments of the present invention will be described with reference to the attached drawings. The embodiments described below are examples of the present invention and the present invention is not limited to the following embodiments. It should be noted that components having the same reference numeral in this specification and the drawings are assumed to be identical to each other.
In the embodiment, description is given focusing on one ring network.
The route switching method include: detecting a non-transferable route (link directly connecting the node A and node B to each other) through which packet transfer is disabled in the ring network (
It should be noted that the non-transferable route may be caused by a failure or a planned route switching work.
In the bypass transfer in
It should be noted that, since the blocking of the port e1 is released as illustrated in
When transfer by the transfer device is flooding, a blocked port pass flag indicating whether to pass through the blocked port is preferably attached to the bypass packet. FIG. 4 is a figure for describing the effect of the blocked port pass flag.
First, the case in which the blocked port pass flag in
In addition, the node E transfers the bypass packet from the blocked port e1 to the node D. The bypass packet is transferred to the node D, the node C, and the node B in this order, restored to the original packet in these nodes, and transferred to the outside of the ring. In other words, in an area Ar2 (area including the nodes B, C, and D) in which the bypass packet exceeds the blocked port e1, the packet from terminal 1 can be output even if the link between the node A and the node B fails, and the terminal 2 can receive the packet.
In contrast, in an area An (area including the nodes A, F, and E) in which the bypass packet does not exceed the blocked port e1, double transfer of the packet occurs as indicated by the symbols g1 and g2.
The blocked port pass flag is used to prevent this double transfer of the packet in the embodiment. The individual nodes determine whether the bypass packet is output to the outside of the ring by checking the value of the blocked port pass flag. For example, the individual nodes determine that the bypass packet is not output to the outside of the ring when the blocked port pass flag is “0” or the bypass packet is output to the outside of the ring when the blocked port pass flag is “1”.
A specific example will be described with reference to
In addition, the node E changes the blocked port pass flag from “0” to “1” when transferring the bypass packet from the blocked port e1. Accordingly, the nodes (B, C, and D) in the area Ar2 can output the bypass packet and the terminal 2 can receive the packet as in the case in
Then, the transfer device 11 that can achieve the route switching method in the ring network described above will be described.
It should be noted that the packet processing function preferably attaches the blocked port pass flag indicating whether to pass through the blocked port to the bypass packet.
The transfer device 11 will be described in more detail. The transfer device 11 includes specific ring ports (21-1 and 21-2), a non-specific ring port 22, a packet transfer processing unit 23, a normal packet turn processing unit 24, a bypass packet flag attachment processing unit 25, blocked port pass flag change processing units (26-1 and 26-2), a blocked port pass flag control processing unit 27, and a bypass packet flag deletion processing unit 28.
The specific ring ports (21-1 and 21-2) are ports constituting the ring network and transmit and receive packets. The non-specific ring port 22 is the port other than the specific ring ports (21-1 and 21-2) and sends and receives the packet to and from the outside of the ring network. The packet transfer processing unit 23 performs the transfer processing of packets. When the detection unit 15 detects a failure in the ring, the normal packet turn processing unit 24 performs turn processing of packets within the transfer device by using failure information and network information held by the transfer device 11. It is assumed that, for example, when a packet to be transferred from the specific ring port 21-2 to the specific ring port 21-1 or from the non-specific ring port 22 to the specific ring port 21-1 arrives, the link of the specific ring port 21-1 fails and the packet cannot be transferred. The normal packet turn processing unit 24 changes the header of the packet so that the packet is transferred in the opposite direction (output from the specific ring port 21-2) using the retained information.
The bypass packet flag attachment processing unit 25 attaches the bypass packet flag to the packet subjected to the turn processing by the normal packet turn processing unit 24 and converts the packet to an emergency bypass packet that is concluded within the ring. It should be noted that the bypass packet flag attachment processing unit 25 preferably attaches the blocked port pass flag (for example, “0”) too when the attaching the bypass packet flag to the bypass packet.
Here, it is assumed that the specific ring port 21-2 of the transfer device 11 is blocked. When the specific ring port 21-1 receives a bypass packet from the outside, the packet transfer processing unit 23 outputs the packet from the blocked specific ring port 21-2 by using the bypass packet information, and the failure information and the network information held by the transfer device. At this time, the blocked port pass flag change processing unit 26-2 changes (changes the blocked port pass flag from “0” to “1”) the flag indicating that the bypass packet has passed the blocked port when the bypass packet is output from the blocked port.
The blocked port pass flag control processing unit 27 determines the transfer and disposal of the bypass packet based on the blocked port pass flag of the bypass packet to be output from the non-specific ring port 22. For example, the blocked port pass flag control processing unit 27 instructs the packet transfer unit 23 to discard the bypass packet to be output from the non-specific ring port 22 because the blocked port pass flag control processing unit 27 allows the bypass packet with a blocked port pass flag of 0 to be output to the specific ring port (21-1 or 21-2) and disallows the bypass packet to be output from the non-specific ring port 22.
In contrast, the blocked port pass flag control processing unit 27 allows the bypass packet with a blocked port pass flag of 1 to be output to the specific ring port (21-1 or 21-2) and to be output from the non-specific ring port 22. Accordingly, the bypass packet flag deletion processing unit 28 deletes the bypass packet flag and the blocked port pass flag from the bypass packet to be output from the non-specific ring port 22 and restores the packet format thereof to the normal packet format. The non-specific ring port 22 outputs the packet with the packet format restored to the normal packet format.
The processing for a normal packet in
The packet transfer processing unit 23 determines whether the transmission port that outputs the packet is in a untransmittable state (the transmission destination fails) or ring switching is not performed (ring switching report is not received yet) (step S11). Here, the transmission port includes both the specific ring port 21 and the non-specific ring port 22. In the case of “Yes” in step S11, a check is made as to whether the reception port that has received the packet is the specific ring port 21 (step S12). In the case of “No” in step S12, a check is made as to whether the transmission port that outputs the packet is the specific ring port 21 (step S13). In the case of “No” in step S11 or “No” in step S13, packet transfer based on the header of the packet is performed (step S14).
In the case of “Yes” in step S12, a check is made as to whether the transmission port that outputs the packet and the reception port that has received the packet are the specific ring ports (21-1 and 21-2) in the same ring network (step S15). In the case of “No” in step S15, step S14 is executed. In contrast, in the case of “Yes” in step S13 or “Yes” in step S15, a check is made as to whether the blocked port pass flag is attached (step S16). Specifically, a check is made as to whether the specific ring port in the same ring network as own specific ring port or the specific ring port in a untransmittable state in the transfer destination node is a blocked port. For example, in step S16, when a failure occurs in the link between the node A and the node B in the state as illustrated in the node A in
In the case of “No” in step S16 (for example, in the case of the node A in
In contrast, in the case of “Yes” in step S16 (for example, when a failure occurs in the link between the node F and the node E in
It should be noted that the blocked port in step S16 also includes the port (the ring protection link end point for which blocking has been released, for example, the port e1 in
Next, the processing of the bypass packet in
The packet transfer processing unit 23 checks whether the bypass packet has made one turn in the ring network (step S21). Specifically, a check is made as to whether the node ID of the header portion of the received bypass packet is inconsistent with that of own node. In the case of “Yes” in step S21, a check is made as to whether the specific ring port that transmits the bypass packet is enabled (step S22). In the case of “No” in step S21 or “No” in step S22, the bypass packet is discarded due to double failure (step S23).
In contrast, in the case of “Yes” in step S22, a check is made as to whether the specific ring port transmits the bypass packet and the specific ring port that receives the bypass packet are present in the same ring network (step S24). In the case of “No” in step S24, a check is made as to whether the specific ring port that transmits the bypass packet is a blocked port (step S25). In the case of “Yes” in step S25, the blocked port pass flag of the bypass packet is changed from “0” to “1” and the bypass packet is transferred from the blocked specific ring port (step S26). In contrast, in the case of “No” in step S25, the blocked port pass flag of the bypass packet is not changed and the bypass packet is transferred from the specific ring port that transmits the bypass packet (step S27).
In the case of “Yes” in step S24, since the packet is transferred to the outside of the ring network, the blocked port pass flag is checked to prevent double transfer (step S28). When the blocked port pass flag is “0” (“No” in step S28), double transfer is assumed, so the bypass packet is discarded (step S29). In contrast, when the blocked port pass flag is “1” (“Yes” in step S28), double transfer is not assumed, so the bypass packet flag is removed and the packet is transferred from the non-specific ring port to the outside of the ring network (step S30).
It should be noted that the blocked port in step S25 also includes the port (the ring protection end point for which blocking has been released, for example, the port e1 in
The transfer device 11 reads the received packet and makes a bypass determination in the ring network. The determination depends on the reception packet, the attributes of the transmission and reception ports, and the state of the transmission port as illustrated in the table in
As described above, when a failure occurs in the ring network, the communication interruption time due to route switching can be reduced to the time from the occurrence to the detection of the failure by using the bypass packet. In addition, even when route switching in the ring network is performed in a planned manner, the route switching can be performed without causing a communication interruption.
The case in which a multicast packet is transferred in the ring network will be described in the embodiment.
It is assumed that a failure has occurred in the link between the node C and the node D. In this case, the packet 0 is not affected by the failure and reaches all the nodes. However, the node C blocks a port c2 and the node D blocks a port d1 after the failure is detected by the node C and the node D, so a packet 1 and subsequent packets are returned as bypass packets at the node C.
In contrast, since the packets are multicast packets, the packets are also transferred in the opposite direction in the ring network. The packets 0 that turn in the opposite direction are transferred from the node A to the node E, and the transfer of the packet is stopped at the blocked port e1.
The node C and the node D detect this failure and transmit the control packets in the direction away from the failed link, and the node E releases the blocking of the port e1 by receiving this control packets. Accordingly, the node D can receive the packets that turn in the opposite direction even after the occurrence of the failure. However, the bypass packets returned by the node C also reach the node D in the opposite direction. That is, although the node D has received the packets 1 and 2, the node D also receive these bypass packets 1 and 2, thereby causing packet duplication.
It should be noted that the node C stops transmitting the bypass packet after the control packet transmitted by the node D reaches the node C via the nodes E, F, A, and B, so the packet duplication at the node D is resolved (packet duplication does not occur at the packet 3 and subsequent packets).
When the multicast packet is transferred via the ring network as illustrated in
The duplicate packet discard processing unit 29 determines the duplication between the normal packet and the bypass packet and performs transfer or discarding. The identity determination information giving unit 32 gives information for determining the identity of the packets to the normal packet. The identity determination information deletion processing unit 31 deletes the identity determination information of the packet. The duplicate packet discard processing unit 29 compares the packet to be transferred to the outside of the ring network with the packet transferred to the outside of the ring network in the past using information given by the identity determination information giving unit 32. As a result of the comparison, when the identity determination information is consistent with that of the packet transferred to the outside of the ring network in the past, the duplicate packet discard processing unit 29 determines packet duplication and discards the packet to be transferred to the outside of the ring network. In contrast, when the identity determination information is inconsistent with that of the packet transferred to the outside of the ring network in the past, the duplicate packet discard processing unit 29 does not discard the packet and transfers the packet to the outside of the ring network after the identity determination information deletion processing unit 31 deletes the identity determination information.
The processing of the normal packet in
In the case of “No” in step S13, the identity determination information of the received packet is compared with that of the past packet (step S19). When the identity determination information of the received packet is different from that of the past packet (“No” in step S19), packet transfer based on the header of the packet is performed (step S14). In contrast, when the identity determination information of the received packet is the same as that of the past packet (“Yes” in step S19), packet duplication has occurred, so the received packet is discarded (step S20). Alternatively, in the case of “Yes” in step S13 or “Yes” in step S15, the identity determination information is added to the normal packet (step S19a) and then step S16 is executed.
The processing of the bypass packet in
When the blocked port pass flag is “1” (“Yes” in step S28), the identity determination information of the received bypass packet is compared with that of the past packet (step S31). When the identity determination information of the received bypass packet is consistent with that of the past packet (“Yes” in step S31), the received bypass packet is discarded to prevent packet duplication (step S32). In contrast, when the identity determination information of the received bypass packet is inconsistent with that of the past packet (“No” in step S31), step S30 is executed.
The transfer device 11a according to the embodiment adds information for determining the identity of the packet to the normal packet, checks the identity determination information in the transfer devices. Then, when the identity determination information is inconsistent with that of the packet transferred in the past, the transfer device 11a deletes the identity determination information and transfer the packet to the outside of the ring network. When the identity determination information is consistent with that of the packet transferred in the past, the transfer device 11a discards the packet without transferring the packet to the outside of the ring network. The transfer device 11a according to the embodiment can prevent duplication of the same packet caused by delivery of both the normal packet and the bypass packet to the destination.
The case in which a multicast packet is transferred via a ring network will be also described in the embodiment. The problem with the case in which a multicast packet is transferred via the ring network is as illustrated in
The duplicate packet discard processing unit 29 according to the embodiment also determines the duplication between the normal packet and the bypass packet and then performs transferring or discarding, but is different from the duplicate packet discard processing unit 29 according to the embodiment 2 that makes a determination based on the identity determination information added to the packet. The duplicate packet discard processing unit 29 according to the embodiment performs specific calculation based on packet information and compares the result with the calculation result of the packet transferred to the outside of the ring network in the past. An example of the specific calculation will be indicated.
The CRC (cyclic redundancy check) value of the generating polynomial G(x) below is calculated using, for example, an FCS (frame check sequence, four octets).
G(x)=x32+x26+x23+x22+x16+x12+x11+x10+x8+x7+x530 x5+x2+x+1
As a result of the comparison, when the calculation result is consistent with the packet transferred to the outside of the ring network in the past, the duplicate packet discard processing unit 29 determines packet duplication and discards the packet to be transferred to the outside of the ring network. In contrast, when the calculation result is inconsistent with the packet transferred to the outside of the ring network in the past, the duplicate packet discard processing unit 29 transfers the packet to the outside of the ring network without discarding the packet.
The processing of the normal packet in
In the case of “No” in step S13, the specific calculation as described above is performed (step S19b). Then, the calculation result of the received packet is compared with the calculation result of the past packet (step S19c). When the calculation result of the received packet is different from the calculation result of the past packet (“No” in step S19c), packet transfer based on the header of the packet is performed (step S14). In contrast, when the calculation result of the received packet is the same as that of the past packet (“Yes” in step S19c), the received packet is discarded because packet duplication occurs (step S20).
The processing of the bypass packet in
When the blocked port pass flag is “1” (“Yes” in step S28), the specific calculation described above is performed on the received bypass packet (step S31b). Then, the calculation result of the received bypass packet is compared with the calculation result of the past packet (step S31c). When the calculated result of the received bypass packet is consistent with the calculated result of the past packet (“Yes” in step S31c), the received bypass packet is discarded because packet duplication occurs (step S32). In contrast, when the calculated result of the received bypass packet is inconsistent with the calculated result of the past packet (“No” in step S31c), step S30 is executed.
The transfer device 11b according to the embodiment performs the specific calculation based on the packet information and compares the calculation result with the calculation result of the packet transferred in the past. The transfer device 11b transfers the packet as it is when the calculation result is inconsistent with the calculation result of the packet transferred in the past or discards the packet when these calculation results are consistent with each other. The transfer device 11b according to the embodiment can prevent duplication of the same packet caused by delivery of both the normal packet and the bypass packet to the destination. Furthermore, the transfer device 11b can prevent duplication without requiring a special header or the like of the packet as compared with the transfer device 11a according to the second embodiment.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2020/015599 | 4/7/2020 | WO |