CN113810260A - Network networking method and system - Google Patents

Network networking method and system Download PDF

Info

Publication number
CN113810260A
CN113810260A CN202010552863.5A CN202010552863A CN113810260A CN 113810260 A CN113810260 A CN 113810260A CN 202010552863 A CN202010552863 A CN 202010552863A CN 113810260 A CN113810260 A CN 113810260A
Authority
CN
China
Prior art keywords
aggregation
network
link
port
logical link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010552863.5A
Other languages
Chinese (zh)
Inventor
黄渊峰
李明欣
万千
甘涛
王海峰
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010552863.5A priority Critical patent/CN113810260A/en
Publication of CN113810260A publication Critical patent/CN113810260A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0003Two-dimensional division
    • H04L5/0005Time-frequency
    • H04L5/0007Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT
    • H04L5/001Time-frequency the frequencies being orthogonal, e.g. OFDM(A), DMT the frequencies being arranged in component carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a network networking method and system, the method is used for a first device and a second device in a first network and a third device and a fourth device in a second network, a second-layer service protocol or a third-layer service protocol is deployed in the first network, and the method comprises the following steps: based on the static LACP, link aggregation is carried out on a physical port butted between the first device and the third device and a physical port butted between the second device and the fourth device, and a first aggregation logical link and a second aggregation logical link are generated between the first device and the third device and between the second device and the fourth device; establishing cross-device link aggregation between a first device and a second device; the mechanism based on cross-device link aggregation switches to one of the first aggregation logical link and the second aggregation logical link to carry traffic when the other aggregation logical link is interrupted. The method and the device can rapidly switch the equipment and the link for bearing the service when the network fails, and ensure the high reliability of the network.

Description

Network networking method and system
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a network networking method and system.
Background
When networks are connected and networked through Ethernet interfaces, three topological scenarios generally exist: the first is that a single device of two-side network is docked (as shown in fig. 1 a); the second is that one side of the network has a single device, and the other side of the network has two devices which realize V-shaped butt joint (as shown in figure 1 b); the third is that one side is networked with two devices, and the other side is also networked with two devices to realize square-shaped docking (as shown in fig. 1 c). And the network reliability of the third type of font topology scene is the highest. However, in practical applications, the third topology scenario can only implement the interworking between the three-tier service and the three-tier service between the two-sided networks (hereinafter referred to as L3+ L3 service), and the interworking between the two-tier service and the three-tier service (hereinafter referred to as L2+ L3 service) and the interworking between the two-tier service and the two-tier service (hereinafter referred to as L2+ L2 service) implement communication protection mainly through the second topology scenario.
With the development of network communication technology, various industries have stronger and stronger networks, the realization of bilateral network L2+ L3 and L2+ L2 services depends on V-shaped network topology, and the network networking reliability is low and is difficult to meet the requirement of actual network services on the network reliability. For example, a single device is deployed in a network on one side, and once the single device has a power failure, a device upgrade, and the like, the entire network is easily failed.
In the prior art, in order to improve the reliability of services of the two-sided network L2+ L3 and L2+ L2, a network configuration scheme of a rectangular network is provided, that is: two switches in a two-layer network are clustered into one switch through a stacking technology, an aggregation logic port ETH-TRUNK of the same equipment on a three-layer network configures a VLAN subinterface to terminate a VLAN of the two-layer network, the ETH-TRUNK on the two-layer network configures a two-layer TRUNK adding VLAN, the added VLAN is consistent with the VLAN of the three-layer network subinterface, when the three-layer network ETH-TRUNK subinterface configures a three-layer gateway, an L2+ L3 butt joint scheme is realized, and when the three-layer network ETH-TRUNK subinterface configures a CCC two-layer VPN, an L2+ L2 butt joint scheme is realized.
However, the above method requires the switch equipment to support the stacking technology, the stacking distance between the switches is between 0.5 and 1 meter, the stacked switches need to be installed in the same local address, and there is a single local address hidden danger, for example, when there is a power problem, the stack switches may interrupt the service at the same time, and there is also a problem of low reliability of service interfacing between the two-sided network L2+ L3 and L2+ L2.
Disclosure of Invention
The embodiment of the invention provides a network networking method and system, which aim to solve the problem of low service docking reliability of a bilateral network L2+ L3 and L2+ L2 in the prior art.
A first aspect of an embodiment of the present invention provides a network networking method, which is applied to a first device and a second device in a first network and a third device and a fourth device in a second network, where a second-layer service protocol or a third-layer service protocol is deployed in the first network, and the method includes:
based on a static Link Aggregation Control Protocol (LACP), respectively performing link aggregation on a physical port butted between the first device and the third device and a physical port butted between the second device and the fourth device to generate a first aggregation logical link and a second aggregation logical link between the first device and the third device and between the second device and the fourth device;
establishing cross-device link aggregation between the first device and the second device;
based on the mechanism of cross-device link aggregation, when one of the first aggregation logical link and the second aggregation logical link is interrupted, switching to the other aggregation logical link to carry traffic.
Optionally, the performing, based on the static link aggregation control protocol LACP, link aggregation on the physical port docked between the first device and the third device and the physical port docked between the second device and the fourth device respectively includes:
respectively binding respective physical ports of the first device, the second device, the third device and the fourth device to a first aggregation logic port, a second aggregation logic port, a third aggregation logic port and a fourth aggregation logic port, wherein the first aggregation logic port, the second aggregation logic port, the third aggregation logic port and the fourth aggregation logic port are all deployed with static LACPs;
and the first aggregation logic port and the third aggregation logic port are butted to form a first aggregation logic link, and the second aggregation logic port and the fourth aggregation logic port are butted to form a second aggregation logic link.
Optionally, the establishing cross-device link aggregation between the first device and the second device includes:
and performing cross-device binding on a first aggregation logical port corresponding to the first device and a second aggregation logical port corresponding to the second device to generate an aggregation logical link between the first device and the second device.
Optionally, the switching to another aggregated logical link to carry a service when one of the first aggregated logical link and the second aggregated logical link is interrupted based on the cross-device link aggregation mechanism includes:
determining an active device and a standby device of the first device and the second device based on the mechanism for cross-device link aggregation;
setting an aggregation logic port of the main equipment to be in an available state, and setting an aggregation logic port of the standby equipment to be in a closed state;
and when the aggregation logic link connected with the main equipment is interrupted, setting an aggregation logic port of the standby equipment to be in an available state so as to switch to the aggregation logic link carrying service where the standby equipment is located.
Optionally, the determining, by the mechanism for cross-device link aggregation, an active device and a standby device in the first device and the second device includes:
determining the device with the highest system priority in the first device and the second device as an active device, and determining the other device as a standby device;
and if the system priorities of the first device and the second device are the same, determining the device with the minimum system identifier as an active device and the other device as a standby device.
Optionally, the first network is a three-layer router network, and the second network is a two-layer switch network.
A second aspect of an embodiment of the present invention provides a network networking system, including: the network comprises a first device and a second device in a first network, a third device and a fourth device in a second network, wherein a three-layer network protocol or a two-layer network protocol is deployed in the first network;
a first aggregation logical link is established between the first device and the third device, and the first aggregation logical link is obtained by performing link aggregation on a physical port which is butted between the first device and the third device based on a static Link Aggregation Control Protocol (LACP);
a second aggregation logical link is established between the second device and the fourth device, and the second aggregation logical link is obtained by performing link aggregation on a physical port which is butted between the second device and the fourth device based on a static Link Aggregation Control Protocol (LACP);
a cross-device aggregation logical link is established between the first device and the second device, and the cross-device aggregation logical link is used for switching to another aggregation logical link to carry traffic when one of the first aggregation logical link and the second aggregation logical link is interrupted.
Optionally, the first network is a three-layer router network, and the second network is a two-layer switch network.
A third aspect of an embodiment of the present invention provides a computer apparatus, including: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executes the computer-executable instructions stored in the memory, so that the at least one processor executes the network networking method provided by the first aspect of the embodiment of the present invention.
A fourth aspect of the present invention provides a computer-readable storage medium, where a computer executing instruction is stored in the computer-readable storage medium, and when a processor executes the computer executing instruction, the network networking method provided in the first aspect of the present invention is implemented.
The embodiment of the invention provides a network networking method and a network networking system, wherein the method is applied to a first device and a second device in a first network and a third device and a fourth device in a second network, link aggregation is respectively carried out on a physical port butted between the first device and the third device and a physical port butted between the second device and the fourth device on the basis of a static Link Aggregation Control Protocol (LACP), a first aggregation logical link is generated between the first device and the third device, and a second aggregation logical link is generated between the second device and the fourth device; and because cross-device link aggregation is established between the first device and the second device; the cross-address port font docking of the equipment in the first network and the equipment in the second network is realized, when one aggregation logic link of the first aggregation logic link and the second aggregation logic link is interrupted, the equipment can be rapidly switched to the other aggregation logic link to carry services, a two-layer service protocol or a three-layer service protocol is deployed in the first network, and a two-layer service protocol is deployed in the second network, so that the protection of the service docking of the L2+ L3 and the L2+ L2 of the double-side network is realized, and the high-reliability protection of the port font network for the L2+ L3 and the L2+ L2 services is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1a is a network networking topology diagram shown in an exemplary embodiment of the present invention;
FIG. 1b is a network networking topology diagram illustrating another exemplary embodiment of the present invention;
FIG. 1c is a network networking topology diagram illustrating another exemplary embodiment of the present invention;
FIG. 2 is a network networking topology diagram illustrating another exemplary embodiment of the present invention;
fig. 3 is a diagram illustrating an application scenario of a network networking method according to an exemplary embodiment of the present invention;
fig. 4 is a flowchart illustrating a network networking method according to an exemplary embodiment of the present invention;
fig. 5 is a network networking topology diagram shown in another exemplary embodiment of the present invention;
fig. 6 is a network networking topology diagram shown in another exemplary embodiment of the present invention;
fig. 7 is a network networking topology diagram illustrating another exemplary embodiment of the present invention;
fig. 8 is a network networking topology diagram shown in another exemplary embodiment of the present invention;
fig. 9 is a network networking topology diagram shown in another exemplary embodiment of the present invention;
fig. 10 is a network networking topology diagram shown in another exemplary embodiment of the present invention;
fig. 11 is a network networking topology diagram, shown in another exemplary embodiment of the present invention;
fig. 12 is an application scenario diagram of a network networking method according to another exemplary embodiment of the present invention;
fig. 13 is an application scenario diagram of a network networking method according to another exemplary embodiment of the present invention;
fig. 14 is an application scenario diagram of a network networking method according to another exemplary embodiment of the present invention;
fig. 15 is an application scenario diagram of a network networking method according to another exemplary embodiment of the present invention;
fig. 16 is a schematic structural diagram of a network networking system according to an exemplary embodiment of the present invention
Fig. 17 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
When networks are connected and networked through Ethernet interfaces, three topological scenarios generally exist: the first is that a single device of two-side network is docked (as shown in fig. 1 a); the second is that one side of the network has a single device, and the other side of the network has two devices which realize V-shaped butt joint (as shown in figure 1 b); the third is that one side is networked with two devices, and the other side is also networked with two devices to realize square-shaped docking (as shown in fig. 1 c). And the network reliability of the third type of font topology scene is the highest. However, in practical applications, the third topology scenario can only implement the interworking between the three-tier service and the three-tier service between the two-sided networks (hereinafter referred to as L3+ L3 service), and the interworking between the two-tier service and the three-tier service (hereinafter referred to as L2+ L3 service) and the interworking between the two-tier service and the two-tier service (hereinafter referred to as L2+ L2 service) implement communication protection mainly through the second topology scenario.
With the development of network communication technology, various industries have stronger and stronger networks, the realization of bilateral network L2+ L3 and L2+ L2 services depends on V-shaped network topology, and the network networking reliability is low and is difficult to meet the requirement of actual network services on the network reliability. For example, a single device is deployed in a network on one side, and once the single device has a power failure, a device upgrade, and the like, the entire network is easily failed.
In the prior art, in order to improve the reliability of services of the two-sided network L2+ L3 and L2+ L2, a network networking scheme of a rectangular network is provided (as shown in fig. 2), that is: two switches in a two-layer network are clustered into one switch through a stacking technology, an aggregation logic port ETH-TRUNK of the same equipment on a three-layer network configures a VLAN subinterface to terminate a VLAN of the two-layer network, the ETH-TRUNK on the two-layer network configures a two-layer TRUNK adding VLAN, the added VLAN is consistent with the VLAN of the three-layer network subinterface, when the three-layer network ETH-TRUNK subinterface configures a three-layer gateway, an L2+ L3 butt joint scheme is realized, and when the three-layer network ETH-TRUNK subinterface configures a CCC two-layer VPN, an L2+ L2 butt joint scheme is realized. However, the above method is also a method of V-type networking essentially, the switch equipment is required to support the stacking technology, the stacking distance between the switches is between 0.5 and 1 meter, the stacked switches are required to be installed in the same local address, and there is a single local address hidden danger, for example, when power supply is in trouble, the stacked switches may interrupt service at the same time, and there is also a problem of low reliability of service docking of the double-side network L2+ L3 and L2+ L2.
Aiming at the defect, the technical scheme of the invention mainly comprises the following steps: for a first device and a second device in a first network and a third device and a fourth device in a second network, respectively performing link aggregation on a physical port butted between the first device and the third device and a physical port butted between the second device and the fourth device based on a static Link Aggregation Control Protocol (LACP), generating a first aggregation logical link between the first device and the third device and a second aggregation logical link between the second device and the fourth device; and because cross-device link aggregation is established between the first device and the second device; according to the mechanism of cross-device link aggregation, when one aggregation logical link of a first aggregation logical link and a second aggregation logical link is interrupted, the other aggregation logical link can be quickly switched to carry services, and because a two-layer service protocol or a three-layer service protocol is deployed in a first network and a two-layer service protocol is deployed in a second network, the service butt joint protection of a double-side network L2+ L3 and L2+ L2 is realized, and the high-reliability protection of a square network for the L2+ L3 and L2+ L2 services is ensured.
Fig. 3 is a diagram illustrating an application scenario of a network networking method according to an exemplary embodiment of the present invention.
As shown in fig. 3, the basic architecture of the application scenario provided by this embodiment mainly includes: a first device 31 and a second device 32 in a three-layer network, a third device 33 and a fourth device 34 in a two-layer network; wherein, the three-layer network is a three-layer router network, and the two-layer network is a two-layer switch network; the first device and the second device may be routers and the third device and the fourth device are switches.
Fig. 4 is a flowchart illustrating a network networking method according to an exemplary embodiment of the present invention, where the method provided in this embodiment is applied to the interfacing between a first device and a second device in a three-layer network and a third device and a fourth device in a two-layer network in the embodiment illustrated in fig. 3.
As shown in fig. 4, the method provided by the present embodiment may include the following steps.
S401, based on the static link aggregation control protocol LACP, respectively performing link aggregation on the physical port docked between the first device and the third device and the physical port docked between the second device and the fourth device, so as to generate a first aggregation logical link and a second aggregation logical link between the first device and the third device and between the second device and the fourth device, respectively.
The first device and the second device are devices in a first network, and the first network is a three-layer router network; the third device and the fourth device are devices in a second network, the second network is a two-layer switch network, and the connections among the first device, the second device, the third device and the fourth device in the networks on both sides can be in the same local address, and can also realize local address deployment and docking through an optical cable or an optical transport network OTN system.
It should be noted that a three-layer network protocol or a two-layer network protocol is deployed in the three-layer router network, a two-layer VLAN is deployed in the two-layer switch network, and if a three-layer service IP is configured in the three-layer router network, interactive processing of a two-layer service and a three-layer service in the two-layer network and three-layer network docking is correspondingly implemented (i.e., L2+ L3 service is implemented); if the PW or CCC second-layer service protocol is configured in the three-layer router network, the L2+ L2 service is correspondingly realized.
Specifically, respective physical ports of the first device, the second device, the third device, and the fourth device are respectively bound to a first aggregation logic port, a second aggregation logic port, a third aggregation logic port, and a fourth aggregation logic port, and the first aggregation logic port, the second aggregation logic port, the third aggregation logic port, and the fourth aggregation logic port are all deployed with a static LACP; and the first aggregation logic port and the third aggregation logic port are butted to form a first aggregation logic link, and the second aggregation logic port and the fourth aggregation logic port are butted to form a second aggregation logic link.
The aggregation logical port may be an ETH-TRUNK port or a Smart-group port.
Illustratively, the physical ports where the switch and the router are interfaced with each other have one or more ports, the switch binds each of the one or more physical ports to the first ETH-TRUNK port, and similarly, the physical ports where the router and the switch are interfaced with each other also bind to the second ETH-TRUNK port, and the first ETH-TRUNK port and the second ETH-TRUNK port are interfaced with each other to form an aggregated logical link between the switch and the router, where the aggregated logical link includes one or more physical links between the switch and the router. Flow load sharing can be realized through the Eth-Trunk port; reliability can also be improved, for example, when a physical link connected to a member interface of the switch fails, traffic can be switched to other available physical links in the aggregation logical link, thereby improving reliability of the whole Trunk link; the bandwidth can be increased, and the total bandwidth of the Eth-Trunk port is the sum of the bandwidths of all the member interfaces.
S402, cross-device link aggregation between the first device and the second device is established.
Specifically, a first aggregation logical port corresponding to the first device and a second aggregation logical port corresponding to the second device are bound across devices to generate an aggregation logical link between the first device and the second device.
The cross-device binding may be based on E-TRUNK binding or MC-LAG binding.
S403, based on the mechanism of cross-device link aggregation, when one of the first aggregation logical link and the second aggregation logical link is interrupted, switching to another aggregation logical link to carry a service.
In this step, based on the mechanism for cross-device link aggregation, determining an active device and a standby device in the first device and the second device; setting an aggregation logic port of the main equipment to be in an available state, and setting an aggregation logic port of the standby equipment to be in a closed state; and when the aggregation logic link connected with the main equipment is interrupted, setting an aggregation logic port of the standby equipment to be in an available state so as to switch to the aggregation logic link carrying service where the standby equipment is located.
Specifically, because the aggregation logical ports are all deployed with static LACPs, the static LACPs may automatically negotiate two ends, and after the aggregation logical port of the active device in the three-layer network is set to an available state, the aggregation logical port of a device (assumed to be a third device) in the two-layer network that is in butt joint with the active device may also be set to an available state, and similarly, the aggregation logical port of a device (assumed to be a fourth device) in the two-layer network that is in butt joint with the standby device may be set to a closed state.
In addition, the reasons for causing the interruption of the aggregation logical link connected to the active device include: the failure of the active device, the failure of the aggregation logic port of the active device, the failure of the third aggregation logic port of the third device, the failure of the board cards of the active device and the third device, and the like. When any one or more faults occur, the aggregation logic link between the main device and the third device is interrupted, so that the aggregation logic port of the main device becomes a closed state; at this time, the cross-device link aggregation mechanism between the active device and the standby device sets the aggregation logical port of the standby device to an available state, and the aggregation logical port of the fourth device also becomes an available state based on the static LACP auto-negotiation two ends, so that the interrupted service is switched to the aggregation logical link between the standby device and the fourth device for processing.
It should be noted that, after the aggregation logical link between the active device and the third device is recovered, the cross-device link aggregation mechanism between the active device and the standby device sets the aggregation logical port of the standby device in the closed state after a period of time, and sets the aggregation logical port of the active device in the available state at the same time, after negotiation of the static LACP port, the state of the aggregation logical port of the third device is also switched to the available state, and the state of the aggregation logical port of the fourth device is switched to the closed state.
In an embodiment, the determining, based on the mechanism for cross-device link aggregation, an active device and a standby device in the first device and the second device includes: determining the device with the highest system priority in the first device and the second device as an active device, and determining the other device as a standby device; and if the system priorities of the first device and the second device are the same, determining the device with the minimum system identifier as an active device and the other device as a standby device.
The networking method provided in this embodiment implements the L2+ L2 and L2+ L3 services through a square-shaped networking structure, and is different from the prior art that implements the L2+ L2 and L2+ L3 services by using a V-shaped networking mode, thereby further improving the reliability of implementing the L2+ L2 and L2+ L3 services; and a stacking switch is not needed, the limitation of stacking distance is avoided, and the cross-local network element level protection can be realized. And no matter the line fault, the equipment port module fault, the board card fault or the complete machine fault of the equipment network element, the service can be quickly and automatically switched, and the reliable operation of the service is ensured. And because the equipment in the three-layer network and the equipment in the two-layer network are butted by using the aggregation logic ports, when capacity expansion is needed, the capacity expansion ports at the two ends are only needed to be added to the corresponding aggregation logic ports respectively, and the capacity expansion requirement is quickly met.
For better understanding of the present application, a detailed description will be given below of a specific process of implementing L2+ L2 and L2+ L3 service protection in a square network with reference to a specific example, in the following embodiment, the same device link aggregation is implemented based on ETH-TRUNK, and the cross-device link aggregation is implemented based on E-TRUNK.
Referring to fig. 5, a first device 51 and a second device 52 are included in a three-layer network, and a third device 53 and a fourth device 54 are included in a two-layer network; respectively binding physical ports of the four devices based on ETH-TRUNK to obtain respective ETH-TRUNK ports of the first device, the second device, the third device and the fourth device, wherein each ETH-TRUNK port is provided with a static LACP, the ETH-TRUNK ports of the first device and the third device are in butt joint to generate a first aggregation logical link 55, and the ETH-TRUNK ports of the second device and the fourth device are in butt joint to generate a second aggregation logical link 56; and then, the ETH-TRUNK ports of the first device and the second device are subjected to cross-device binding based on E-TRUNK, and the third device and the fourth device transparently transmit the VLAN information of the second layer through the first aggregation logical link and the second aggregation logical link.
Then, according to the system identifier of the E-TRUNK, the system priority, or whether to force active, etc., the active device and the standby device in the three-layer network are as shown in fig. 6.
Specifically, according to the fact that the system priority of the first device is higher than that of the second device, the first device is determined as the main device, and the second device is determined as the standby device; otherwise, determining the first equipment as standby equipment and determining the second equipment as main equipment; and if the system priorities of the first device and the second device are consistent and the value of the system identifier of the first device is smaller than the value of the system identifier of the second device, determining the first device as the active device and the second device as the standby device. The following description will be made by taking the first device as the active device and the second device as the standby device as an example.
After the active device and the standby device are determined, according to the E-TRUNK protocol feature, the ETH-TRUNK port of the active device is set to UP, and the ETH-TRUNK port of the standby device is set to DOWN, as shown in fig. 7. Because the ETH-TRUNK port of the device deploys the static LACP protocol, the protocol automatically negotiates two ends, where the ETH-TRUNK port state of the active device is UP, and the negotiation result causes the ETH-TRUNK port state of the third device docked with the active device to also be UP, and similarly, the ETH-TRUNK port state of the fourth device docked with the standby device to be DOWN, as shown in fig. 8. Therefore, under normal conditions, the service is interactively processed between the main device and the third device.
When a link between the active device and the third device fails or a port of the active device and the third device fails, the state of the ETH-TRUNK port of the active device and the state of the ETH-TRUNK port of the standby device change to DOWN, as shown in fig. 9. At this time, the E-TRUNK between the active device and the standby device will set the state of the ETH-TRUNK port of the standby device to UP, as shown in fig. 10. The negotiation results in that the ETH-TRUNK port status of the fourth device connected to the standby device also becomes UP via the static LACP negotiation both ends, as shown in fig. 11. At this time, the interrupted service is switched to the standby device and the fourth device for interaction.
It should be noted that, after the active device recovers to the third device, the E-TRUNK may set the state of the ETH-TRUNK port of the standby device to DOWN after a certain time, set the state of the ETH-TRUNK port of the active device to UP, set the state of the ETH-TRUNK port of the third device to UP after LACP negotiation, and set the state of the ETH-TRUNK port of the fourth device to DOWN, thereby implementing the switch-back function.
The 1:1 protection in the square docking is realized through the method, and on the basis of the realization, the specific practice of realizing protection of the services of L2+ L3 and L2+ L2 is explained next.
It can be understood that, no matter the L2+ L3 service scenario or the L2+ L2 service scenario, the implementation in the two-layer network is the same, and the specific implementation is as follows: firstly, setting ETH-TRUNK port modes of third equipment and fourth equipment in a corresponding two-layer network into TRUNK modes, and transmitting a service VLAN; and then the service VLAN is transmitted between the third equipment and the fourth equipment, the VLAN is well configured by the two-layer network end to end, and the third equipment, the fourth equipment and the end to end two-layer node can learn the physical address MAC of the service.
For the implementation of L2+ L3 service in the square type networking: under normal conditions, the master device (marked as a1) in the three-layer network releases the three-layer route, the master device (marked as B1) in the two-layer network, which is docked with a1, learns the MAC of the routing gateway, and the VLANs corresponding to the two-layer network all learn the MAC, thereby implementing the service interworking of L2+ L3, as shown in fig. 12. If the primary devices a1 and B1 are in failure, according to the characteristics of the E-TRUNK protocol, the state of the ETH-TRUNK port of the standby device (a2) in the three-layer network will be UP, and meanwhile, according to LACP coordinated conduction, the state of the ETH-TRUNK port of the standby device (denoted as B2) in the two-layer network, which is docked with a2, will be UP, the three-layer network will release the route from a2, and the two-layer network learns the MAC of the gateway from B2, thereby implementing automatic switching of the L2+ L3 service, as shown in fig. 13.
For the implementation of L2+ L2 service in the square type networking: firstly, ETH-TTRUNK subinterfaces are started on three-layer network equipment A1 and A2, and a service VLAN is terminated; and finally, opening PW service configuration according to a normal E-TRUNK mode. Under normal conditions, a PW/CCC two-layer dedicated line of a three-layer network transmits a far-end service to a1, B1 learns a far-end service MAC address, and then transmits the service MAC address to a far-end service access point through the two-layer network, otherwise, the service MAC of the two-layer network transmits to B1 through the two-layer network, transmits to a1 through an ETH-TRUNK port docked by a1 and B1, and transmits to a far-end service access node through a PW/CCC two-layer dedicated line of the three-layer network, thereby implementing the interworking of L2+ L2 services, as shown in fig. 14. If the primary devices a1 and B1 are in failure, the state of the ETH-TRUNK port of the standby device a2 will be UP according to the E-TRUNK characteristic, and the state of the ETH-TRUNK port of the standby device B2 will be UP according to LACP coordinated conduction, and then the interrupted service is communicated between a2 and B2, so as to implement the switching of the L2+ L2 service, as shown in fig. 15.
Fig. 16 is a schematic structural diagram of a network networking system according to an exemplary embodiment of the present invention.
As shown in fig. 16, the system provided in this embodiment includes: a first device 1601 and a second device 1602 in a first network, a third device 1603 and a fourth device 1604 in a second network, wherein a three-layer network protocol or a two-layer network protocol is deployed in the first network; a first aggregation logical link is established between the first device and the third device, and the first aggregation logical link is obtained by performing link aggregation on a physical port which is butted between the first device and the third device based on a static Link Aggregation Control Protocol (LACP); a second aggregation logical link is established between the second device and the fourth device, and the second aggregation logical link is obtained by performing link aggregation on a physical port which is butted between the second device and the fourth device based on a static Link Aggregation Control Protocol (LACP); a cross-device aggregation logical link is established between the first device and the second device, and the cross-device aggregation logical link is used for switching to another aggregation logical link to carry traffic when one of the first aggregation logical link and the second aggregation logical link is interrupted.
The first network is a three-layer router network, and the second network is a two-layer switch network.
It should be noted that, for the specific implementation of the system provided in this embodiment, reference may be made to the description in the foregoing related method embodiments, and details are not described herein.
Fig. 17 is a schematic hardware structure diagram of a computer device according to an embodiment of the present invention. As shown in fig. 17, the present embodiment provides a computer apparatus 170 including: at least one processor 1701 and memory 1702. The processor 1701 and the memory 1702 are connected by a bus 1703.
In particular implementations, the at least one processor 1701 executes the computer executable instructions stored by the memory 1702 to cause the at least one processor 1701 to perform the network networking method of the above-described method embodiments.
For a specific implementation process of the processor 1701, reference may be made to the above method embodiments, which have similar implementation principles and technical effects, and no further description is given here.
In the embodiment shown in fig. 17, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The memory may comprise high speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
Another embodiment of the present application provides a computer-readable storage medium, where computer-executable instructions are stored, and when a processor executes the computer-executable instructions, a network networking method in the foregoing method embodiment is implemented.
The computer-readable storage medium may be implemented by any type of volatile or non-volatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. Readable storage media can be any available media that can be accessed by a general purpose or special purpose computer.
An exemplary readable storage medium is coupled to the processor such the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Of course, the processor and the readable storage medium may also reside as discrete components in the apparatus.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A network networking method is applied to a first device and a second device in a first network and a third device and a fourth device in a second network, wherein a two-layer service protocol or a three-layer service protocol is deployed in the first network, and the method comprises the following steps:
based on a static Link Aggregation Control Protocol (LACP), respectively performing link aggregation on a physical port butted between the first device and the third device and a physical port butted between the second device and the fourth device to generate a first aggregation logical link and a second aggregation logical link between the first device and the third device and between the second device and the fourth device;
establishing cross-device link aggregation between the first device and the second device;
based on the mechanism of cross-device link aggregation, when one of the first aggregation logical link and the second aggregation logical link is interrupted, switching to the other aggregation logical link to carry traffic.
2. The method of claim 1, wherein the performing link aggregation on the physical port docked between the first device and the third device and the physical port docked between the second device and the fourth device based on a static link aggregation control protocol LACP respectively comprises:
respectively binding respective physical ports of the first device, the second device, the third device and the fourth device to a first aggregation logic port, a second aggregation logic port, a third aggregation logic port and a fourth aggregation logic port, wherein the first aggregation logic port, the second aggregation logic port, the third aggregation logic port and the fourth aggregation logic port are all deployed with static LACPs;
and the first aggregation logic port and the third aggregation logic port are butted to form a first aggregation logic link, and the second aggregation logic port and the fourth aggregation logic port are butted to form a second aggregation logic link.
3. The method of claim 2, wherein the establishing cross-device link aggregation between the first device and the second device comprises:
and performing cross-device binding on a first aggregation logical port corresponding to the first device and a second aggregation logical port corresponding to the second device to generate an aggregation logical link between the first device and the second device.
4. The method of claim 3, wherein the switching to one of the first aggregated logical link and the second aggregated logical link to carry traffic when the other aggregated logical link is broken based on the cross-device link aggregation mechanism comprises:
determining an active device and a standby device of the first device and the second device based on the mechanism for cross-device link aggregation;
setting an aggregation logic port of the main equipment to be in an available state, and setting an aggregation logic port of the standby equipment to be in a closed state;
and when the aggregation logic link connected with the main equipment is interrupted, setting an aggregation logic port of the standby equipment to be in an available state so as to switch to the aggregation logic link carrying service where the standby equipment is located.
5. The method of claim 4, wherein the mechanism for cross-device link aggregation includes a system identifier and a system priority of the first device and the second device, and wherein determining the active device and the standby device of the first device and the second device based on the mechanism for cross-device link aggregation comprises:
determining the device with the highest system priority in the first device and the second device as an active device, and determining the other device as a standby device;
and if the system priorities of the first device and the second device are the same, determining the device with the minimum system identifier as an active device and the other device as a standby device.
6. The method of any of claims 1-5, wherein the first network is a three-tier router network and the second network is a two-tier switch network.
7. A networking system, comprising: the network comprises a first device and a second device in a first network, a third device and a fourth device in a second network, wherein a three-layer network protocol or a two-layer network protocol is deployed in the first network;
a first aggregation logical link is established between the first device and the third device, and the first aggregation logical link is obtained by performing link aggregation on a physical port which is butted between the first device and the third device based on a static Link Aggregation Control Protocol (LACP);
a second aggregation logical link is established between the second device and the fourth device, and the second aggregation logical link is obtained by performing link aggregation on a physical port which is butted between the second device and the fourth device based on a static Link Aggregation Control Protocol (LACP);
a cross-device aggregation logical link is established between the first device and the second device, and the cross-device aggregation logical link is used for switching to another aggregation logical link to carry traffic when one of the first aggregation logical link and the second aggregation logical link is interrupted.
8. The system of claim 7, wherein the first network is a three-tier router network and the second network is a two-tier switch network.
9. A computer device, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the memory-stored computer-executable instructions cause the at least one processor to perform the networking method of any of claims 1-6.
10. A computer-readable storage medium having computer-executable instructions stored therein, which when executed by a processor, implement the networking method of any one of claims 1 to 6.
CN202010552863.5A 2020-06-17 2020-06-17 Network networking method and system Pending CN113810260A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010552863.5A CN113810260A (en) 2020-06-17 2020-06-17 Network networking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010552863.5A CN113810260A (en) 2020-06-17 2020-06-17 Network networking method and system

Publications (1)

Publication Number Publication Date
CN113810260A true CN113810260A (en) 2021-12-17

Family

ID=78943421

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010552863.5A Pending CN113810260A (en) 2020-06-17 2020-06-17 Network networking method and system

Country Status (1)

Country Link
CN (1) CN113810260A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010052028A1 (en) * 2008-11-07 2010-05-14 Nokia Siemens Networks Oy Inter-network carrier ethernet service protection
CN101783743A (en) * 2009-01-19 2010-07-21 华为技术有限公司 Business protection method and switching node
CN102239670A (en) * 2011-04-27 2011-11-09 华为技术有限公司 Loading distribution method and device
CN104333470A (en) * 2014-11-14 2015-02-04 杭州华三通信技术有限公司 Fault handling method and device
CN103534985B (en) * 2011-07-26 2017-02-01 华为技术有限公司 Service load allocating method, apparatus and communication system
CN106712997A (en) * 2015-11-16 2017-05-24 华为技术有限公司 Item recovery method and system, and equipment
CN107465613A (en) * 2016-06-03 2017-12-12 北京华为数字技术有限公司 link aggregation interface communication state switching method and device
CN108337144A (en) * 2017-01-20 2018-07-27 ***通信集团公司 The metropolitan areas TD-LTE return network, path protecting method
CN110351129A (en) * 2019-06-27 2019-10-18 烽火通信科技股份有限公司 Cross-domain guard method and system are transmitted in grouping

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010052028A1 (en) * 2008-11-07 2010-05-14 Nokia Siemens Networks Oy Inter-network carrier ethernet service protection
CN101783743A (en) * 2009-01-19 2010-07-21 华为技术有限公司 Business protection method and switching node
CN102239670A (en) * 2011-04-27 2011-11-09 华为技术有限公司 Loading distribution method and device
CN103534985B (en) * 2011-07-26 2017-02-01 华为技术有限公司 Service load allocating method, apparatus and communication system
CN104333470A (en) * 2014-11-14 2015-02-04 杭州华三通信技术有限公司 Fault handling method and device
CN106712997A (en) * 2015-11-16 2017-05-24 华为技术有限公司 Item recovery method and system, and equipment
CN107465613A (en) * 2016-06-03 2017-12-12 北京华为数字技术有限公司 link aggregation interface communication state switching method and device
CN108337144A (en) * 2017-01-20 2018-07-27 ***通信集团公司 The metropolitan areas TD-LTE return network, path protecting method
CN110351129A (en) * 2019-06-27 2019-10-18 烽火通信科技股份有限公司 Cross-domain guard method and system are transmitted in grouping

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
梁艳花等: ""链路聚合在IP承载网中的应用及优化研究"", 《电脑与信息技术》 *

Similar Documents

Publication Publication Date Title
CN111865779B (en) Route synchronization method and cross-device link aggregation group
US7876764B2 (en) Multiple aggregation protocol sessions in a daisy chain network
CN110166356B (en) Method and network equipment for sending message
US9509591B2 (en) Technique for dual homing interconnection between communication networks
US7558194B2 (en) Virtual private network fault tolerance
US8411690B2 (en) Preventing data traffic connectivity between endpoints of a network segment
CN111740899B (en) ARP request message forwarding method, cross-device link aggregation group and network device
US6910149B2 (en) Multi-device link aggregation
US7643409B2 (en) Computer network with point-to-point pseudowire redundancy
US10044605B2 (en) Apparatus, system, and method for distributing routing-protocol information in clos fabrics
US8724452B2 (en) Technique for protecting communication traffic in a connection having redundancy
US20070047471A1 (en) System and method for implementing virtual ports within ring networks
US8503290B2 (en) Communicating data units in a communications network that provides failure protection
CN115174468A (en) Route synchronization method, cross-device link aggregation group, electronic device and medium
EP4325777A1 (en) Method and device for electing designated forwarder (df)
CN113810260A (en) Network networking method and system
CN114866467A (en) Cluster communication method, device, system, equipment and readable storage medium
CN111786805B (en) Configuration method, equipment and storage medium of private line service
CN112637054B (en) Networking optimization method and device for IP bearing network, computing equipment and storage medium
US9674079B1 (en) Distribution layer redundancy scheme for coupling geographically dispersed sites
CN111385182B (en) Traffic transmission method, device and system
US11991068B2 (en) Multichassis link aggregation method and device
CN115174312B (en) Broadcast information transmission method, tunnel endpoint device, electronic device, and medium
WO2024093306A1 (en) Communication method and apparatus
CN117255051A (en) Centralized core network system and fault processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211217