[go: up one dir, main page]

CN119182651A - Method and system for enhancing trusted DCS networking redundancy - Google Patents

Method and system for enhancing trusted DCS networking redundancy Download PDF

Info

Publication number
CN119182651A
CN119182651A CN202411279281.9A CN202411279281A CN119182651A CN 119182651 A CN119182651 A CN 119182651A CN 202411279281 A CN202411279281 A CN 202411279281A CN 119182651 A CN119182651 A CN 119182651A
Authority
CN
China
Prior art keywords
network
protocol
link aggregation
switch
dcs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411279281.9A
Other languages
Chinese (zh)
Inventor
王宾
孙浩沩
张军
刘岩
张津
韩培林
张勇
冯震震
杨柳
吴龙飞
焦龙
王鑫
王康
贾泽冰
李博洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Gaohong Xin'an Zhejiang Information Technology Co ltd
Xian Thermal Power Research Institute Co Ltd
Original Assignee
Datang Gaohong Xin'an Zhejiang Information Technology Co ltd
Xian Thermal Power Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Gaohong Xin'an Zhejiang Information Technology Co ltd, Xian Thermal Power Research Institute Co Ltd filed Critical Datang Gaohong Xin'an Zhejiang Information Technology Co ltd
Priority to CN202411279281.9A priority Critical patent/CN119182651A/en
Publication of CN119182651A publication Critical patent/CN119182651A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/10Packet switching elements characterised by the switching fabric construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/15Interconnection of switching modules

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for enhancing network redundancy of trusted DCS includes confirming master switch and standby switch of system network, configuring VRRP protocol in master switch and standby switch, enabling system network to operate normally by standby switch according to virtual IP address when master switch is out of order, carrying out aggregation on selected physical links and ports in system network to form link aggregation group by link aggregation protocol, configuring link aggregation group between devices of system network, generating a minimum generation tree in each network region by MSTP protocol according to physical links and operation state of system network to ensure network to have correct tree topology structure, raising fault tolerance capability and stability of network, raising network bandwidth and load capability and ensuring industrial control system to recover quickly when network is out of order and guaranteeing continuity of production and reliability of system.

Description

Method and system for enhancing trusted DCS networking redundancy
Technical Field
The invention relates to the field of industrial automation and intelligent manufacturing, in particular to a method and a system for enhancing the networking redundancy of a trusted DCS.
Background
Conventional network designs have the risk of single point failure, and once the main network equipment fails, for example, a switch fails, power fails, network cable fails, etc., the whole system may be paralyzed. To ensure continuous availability of the system, the influence of single-point faults on the system needs to be solved.
With the rapid development of industrial automation and intelligent manufacturing, network stability and security of industrial control systems become critical. In modern industrial production, distributed Control Systems (DCS) are responsible for monitoring and controlling the production process of a plant as an integrated automation control system. DCS systems are typically made up of a plurality of control nodes connected by a network, the nodes cooperating to achieve efficient production management. However, there are some limitations to the conventional DCS network design. In particular, they typically rely on a single critical network device, such as a switch, to maintain operation of the entire network. The design has the risk of single-point faults, which means that once the main network equipment fails, such as a switch fails, power is interrupted or network cables are damaged, the whole system can be paralyzed, and the production is interrupted, so that huge economic loss is caused.
In addition, as the size and complexity of industrial networks increases, the bandwidth and load capacity of the networks also face challenges. Conventional network designs may not meet the increasing data transmission requirements, resulting in insufficient data transmission rates and throughput, affecting production efficiency. In order to solve the above problems and improve the reliability and stability of the industrial control system, a new network redundancy method is needed.
Disclosure of Invention
Aiming at the problems existing in the prior art, the invention provides a method and a system for enhancing the networking redundancy of a trusted DCS, which aim to improve the fault tolerance and the stability of a network and improve the bandwidth and the load capacity of the network simultaneously by introducing Virtual Routing Redundancy Protocol (VRRP), multi-instance spanning tree (MSTP) technology and link and port aggregation technology, ensure that an industrial control system can be quickly recovered when facing network faults, and ensure the continuity of production and the reliability of the system.
The invention is realized by the following technical scheme:
a method of enhancing trusted DCS networking redundancy, comprising the steps of:
Determining a main switch and a standby switch of a system network, configuring VRRP protocols in the main switch and the standby switch, monitoring the running state of the main switch in real time, and enabling the standby switch to become the main switch according to the virtual IP address to enable the system network to normally run when the main switch fails;
The method comprises the steps that selected physical links and ports in a system network are aggregated by adopting a link aggregation protocol to form a link aggregation group, and the link aggregation group is configured among devices of the system network;
The system network is partitioned according to the physical links and the running state of the system network, a minimum spanning tree is generated in each network area by using the MSTP protocol, and the network is ensured to have a correct tree topology structure by the minimum spanning tree generated by the MSTP protocol.
Preferably, the configuration method of the VRRP protocol is as follows:
And respectively configuring VRRP protocol on the main switch and the standby switch according to VRRP protocol parameters, wherein the VRRP protocol parameters comprise the ID, the virtual IP address and the priority of the virtual router.
Preferably, the standby switch is plural, and the priority is set for the plural standby switches.
Preferably, the link aggregation protocol is a link aggregation control protocol or a static aggregation protocol.
Preferably, after the physical links and ports are aggregated, configuration parameters of the link aggregation group include a group name, an aggregation mode and a bandwidth allocation policy.
Preferably, the physical link is an ethernet cable, and the port is a device port connected to the physical link.
Preferably, the physical link physical connection and link state are determined based on the network topology of the network system.
Preferably, the network area includes a plurality of independent areas or a plurality of virtual local area networks.
Preferably, the network system is divided into a plurality of network areas, and a unique MSTP instance ID is configured for each network area pair.
A system for enhancing trusted DCS networking redundancy, comprising:
the VRRP module is used for determining a main switch and a standby switch of the system network, configuring VRRP protocols in the main switch and the standby switch, monitoring the running state of the main switch in real time, and enabling the standby switch to become the main switch according to the virtual IP address to enable the system network to normally run when the main switch fails;
The link aggregation module is used for aggregating selected physical links and ports in the system network by adopting a link aggregation protocol to form a link aggregation group, and configuring the link aggregation group between devices of the system network;
The MSTP module is used for partitioning the system network according to the physical links and the running state of the system network, generating a minimum spanning tree in each network area by using the MSTP protocol, and ensuring that the network has a correct tree topology structure by the minimum spanning tree generated by the MSTP protocol.
Compared with the prior art, the invention has the following beneficial technical effects:
the method for enhancing the reliability of the DCS networking provided by the invention comprehensively utilizes an advanced network technology, firstly realizes real-time monitoring and seamless switching between the main switch and the standby switch through the VRRP protocol, ensures the continuous availability of key network services, and can ensure that network connection is not interrupted even if the main equipment fails. And secondly, a plurality of physical links are combined into a single logical link through a link aggregation protocol, so that the bandwidth capacity of the link is improved, the redundancy of the link is enhanced, and the link can be quickly recovered when the link fails, and the stability of data transmission is ensured. In addition, the MSTP protocol is utilized to intelligently partition the network, and the minimum spanning tree is constructed in each partition, so that the generation of a network loop is effectively avoided, the data transmission path is optimized, and the efficiency and the response speed of the network are improved. In the whole, the scheme provides a solid foundation for constructing an enterprise-level network environment with high reliability, high performance and easy management through the fusion application of the technologies, and is particularly suitable for key business scenes with extremely high requirements on network stability and security.
Drawings
FIG. 1 is a flow chart of a method of enhancing the redundancy of a trusted DCS network of the present invention.
Detailed Description
The invention will now be described in further detail with reference to the accompanying drawings, which illustrate but do not limit the invention.
Referring to fig. 1, a method for enhancing the redundancy of a trusted DCS network includes the steps of:
Step 1, determining a main switch and a standby switch of a system network, configuring VRRP protocols in the main switch and the standby switch, monitoring the running state of the main switch in real time, when the main switch fails, the standby switch becomes the main switch according to a virtual IP address to enable the system network to run normally,
The virtual routing redundancy protocol (Virtual Router Redundancy Protocol, VRRP) is a network protocol that aims to increase the availability and fault tolerance of routers or switches in a network. VRRP is designed to solve the single point of failure problem, ensuring that hosts in the network can switch seamlessly to standby devices when a default gateway (typically a router or switch) fails, thereby preserving continuity of network communications.
VRRP performs its function by creating a virtual router that has a virtual IP address that is visible to hosts in the network. The virtual IP address serves as a default gateway address in the network. In a network that configures VRRP, participating devices are assigned a virtual router identifier and assigned a priority. One device is elected as a Master device (Master) and the other devices as Backup devices (Backup). The primary device is responsible for handling all traffic through the virtual IP address while the backup device is in a standby state. When the main equipment fails, one of the backup equipment is automatically lifted to be the main equipment according to the priority, and takes over the virtual IP address to maintain network communication. The VRRP operates at the network layer and sends VRRP advertisement messages via multicast, which contain the ID, priority and other configuration information of the virtual router. The VRRP detects the health of the master device by sending advertisement messages at regular intervals. If the backup device does not receive an announcement from the primary device within a certain time, it will assume that the primary device has failed and begin electing a new primary device. The design goal of VRRP is to achieve seamless handoff, i.e., when the master fails, hosts in the network continue to communicate without reconfiguration. When a master device is elected, the highest priority device is selected as the master device. If the priorities are the same, the election is typically based on the MAC address of the device.
The specific method comprises the following steps:
S1.1, determining a master-slave switch, namely selecting one switch in a network as the master switch and selecting a plurality of switches as backup switches.
And S1.2, planning VRRP protocol parameters, namely planning the priority parameters of the ID, the virtual IP address, the master switch and the plurality of backup switches for the virtual router.
And S1.3, configuring VRRP protocols, namely respectively configuring VRRP protocols on the main switch and the plurality of standby switches according to the planned VRRP protocol parameters, wherein the VRRP protocols comprise the ID, the virtual IP address and the priority of the virtual router.
S1.4, communication and monitoring, namely ensuring normal communication between the main switch and the standby switch, and monitoring the state of the VRRP protocol to ensure effective operation of the VRRP protocol.
S1.5, detecting the state of the main switch by adopting a real-time monitoring system, so as to ensure timely response when the main switch fails.
S1.6, when the real-time monitoring system detects that the main switch fails and cannot work normally, the backup switch automatically takes over the virtual IP address to become a new main switch so as to maintain network communication uninterrupted.
The priority mechanism in the VRRP protocol ensures that under normal conditions the highest priority switch acts as the master. If the primary device fails, the next highest priority device will automatically take over. By means of the VRRP protocol, the network achieves high availability, keeping network services uninterrupted even in case of failure of critical network devices. The VRRP protocol simplifies management of the network because it reduces the manual intervention required in the event of a network failure, while increasing the speed of failure recovery. The adoption of the VRRP technology plays an important role in improving the network stability and reducing the single point failure risk.
Step 2, the selected physical links and ports in the system network are aggregated by adopting a link aggregation protocol to form a link aggregation group, and the link aggregation group is configured among devices of the system network;
Physical links and ports are aggregated together, meaning the process of bundling multiple physical links (i.e., network cables) and ports into a single logical link or logical port in a network configuration. This technique is commonly referred to as Link Aggregation (Link Aggregation) or Link bundling (Trunking).
Physical links refer to the actual system network transmission media, such as ethernet cables (Cat 5e, cat6, etc.), optical fibers, etc., that are used to connect network devices, such as switches, routers, servers, etc.
The port is an interface on the system network equipment, and the equipment can be connected with a physical link through the interfaces to realize the sending and receiving of data.
Aggregation-combining multiple physical links and ports to make them appear and operate like a single link or port at the network layer. The purpose of this is to increase the bandwidth of the link and provide redundancy in case of network disruption caused by a single link failure.
Link aggregation acts to increase throughput in the first place, i.e., the bandwidths of multiple links can be added up to provide a higher data transmission rate than a single link. Secondly, redundancy is improved, namely if one link or port fails, other links can continue to work, so that network interruption is avoided. In addition, load balancing may distribute network traffic among multiple links to prevent failure of any one link due to overload.
Implementation of link aggregation is implemented by a specific protocol, such as LACP (link aggregation control protocol) or static aggregation. LACP is a dynamic protocol that automatically discovers and negotiates the configuration of link aggregation, while static aggregation requires manual configuration by an administrator.
The arrangement method of the link aggregation group specifically comprises the following steps:
S2.1, the aggregation group members determine that the physical links and ports to be link aggregated are selected, which will work together to increase bandwidth and redundancy.
S2.2, port number decision-making, namely determining the number of ports participating in link aggregation in each device, which is generally based on the requirements of a link aggregation protocol and the network requirements.
S2.3, selecting an appropriate link aggregation protocol, wherein LACP (link aggregation control protocol) and static aggregation are common. LACP is dynamic and can automatically negotiate aggregation parameters, and static aggregation requires manual configuration.
S2.4, creating a link aggregation group, namely creating the link aggregation group on the network equipment, wherein the link aggregation group is a process of bundling a plurality of physical links and ports into one logical link.
S2.5, configuring link aggregation parameters, namely configuring necessary parameters such as group names, aggregation modes (active-standby or full active), bandwidth allocation strategies and the like for the link aggregation group.
And S2.5, deploying link aggregation, namely deploying link aggregation configuration in a network, ensuring that the aggregation groups on all relevant devices are consistent in setting, and avoiding configuration errors.
S2.6, verifying configuration correctness, namely ensuring that the physical links and ports of the link aggregation group members are set correctly, and all the links and ports are in an active state.
S2.7, monitoring the link aggregation state, namely periodically monitoring the running state of the link aggregation group, ensuring that all member links or ports work normally, and timely finding and solving possible problems.
And secondly, in the link aggregation, if one link or port fails, the traffic can be automatically transferred to other links or ports, thereby avoiding network interruption.
And 3, partitioning the network system according to the physical links and the running states of the network system, configuring an MSTP protocol on equipment of the network system, generating a minimum spanning tree in each network area by using the MSTP protocol, and ensuring that the network has a correct tree topology structure by the minimum spanning tree generated by the MSTP protocol, thereby being beneficial to optimizing a network flow path and improving the efficiency and stability of the network.
The Multiple SPANNING TREE Protocol (MSTP) is a network Protocol for preventing the occurrence of bridged loops in a Local Area Network (LAN) and allowing Multiple spanning tree instances to coexist to support traffic separation for Virtual Local Area Networks (VLANs).
MSTP allows the creation of separate spanning tree instances for each VLAN, providing specialized traffic paths for each VLAN. MSTP distinguishes between different spanning tree instances by instance ID. Each VLAN is assigned a unique instance ID, which may belong to different instances even though multiple VLANs use the same VLAN ID. In MSTP, ports may play different roles, such as Root Port, designated Port (DESIGNATED PORT), and Alternate/Backup Port.
The MSTP port has several states including Blocking (Blocking), listening (Listening), learning and Forwarding (Learning/Forwarding). MSTP avoids loops by creating a spanning tree within each VLAN, ensuring that traffic for each VLAN is transmitted over only one active path.
MSTP allows a network administrator to configure different network paths for different VLANs, optimize network traffic, reduce congestion, and improve network redundancy. MSTP uses the priority value to elect the Root Bridge, and the highest priority Bridge device will become the Root Bridge. If the priorities are the same, it is determined by comparing the MAC addresses. MSTP supports fast forwarding ports (PortFast) that can speed up the transition from blocking to forwarding states, suitable for ports that are directly connected to the end device.
MSTP itself does not provide security features, but may be used in conjunction with security protocols such as BPDU filtering, BPDU guarding, etc. to enhance the security of the network. A network administrator may use network management tools to monitor and configure MSTP, including looking at spanning tree topology, port status, and priority settings.
The MSTP protocol is a key component in modern data centers and enterprise networks that increases the flexibility and efficiency of the network while maintaining the stability and reliability of the network by creating separate spanning tree instances for each VLAN.
The configuration process of the MSTP protocol is as follows:
s3.1, network topology planning, which is an important step of network design, involves analyzing the network structure and determining the physical connection and link state between network devices.
S3.1, dividing the network area into different areas or Virtual Local Area Networks (VLAN) according to the complexity of the network. Each zone or VLAN is logically independent and may have its own traffic and security policies.
S3.1, allocating MSTP instance IDs, namely allocating a unique MSTP instance ID for each VLAN or network region. Instance IDs are used to distinguish between different MSTP instances, ensuring that they do not affect each other.
S3.2, MSTP protocol configuration, namely starting the MSTP protocol on the network equipment and configuring. Configuration parameters include priority, instance ID, port type, etc., which need to be consistent across all relevant devices.
S3.3, generating a minimum spanning tree, wherein the MSTP protocol utilizes the configuration information to generate a minimum spanning tree in each region. This tree structure ensures that there are no loops in the network, thus avoiding broadcast storms and MAC address table inconsistencies.
S3.4, port division, namely ensuring that all devices correctly divide the ports into corresponding MSTP examples. The ports may be configured as edge ports (not participating in the spanning tree protocol), P2P (point-to-point) ports, or normal ports.
S3.5, establishing a tree topology structure, namely ensuring that the network has a correct tree topology structure through a minimum spanning tree generated by an MSTP protocol, which is helpful for optimizing a network flow path and improving the efficiency and stability of the network.
And S3.6, performing fault simulation test periodically to evaluate the performance of the MSTP protocol under the actual fault scene. These tests may help identify and solve potential problems.
And S3.7, adjusting configuration parameters, namely adjusting MSTP configuration parameters such as port priority, path cost and the like according to the result of the fault simulation test so as to improve network performance and reliability.
And S3.8, monitoring network performance, namely implementing continuous network performance monitoring to ensure that the MSTP protocol works as expected and timely detecting and responding to any change or fault in the network.
MSTP provides a flexible way to manage large and complex networks, allowing optimization of network redundancy and path selection while maintaining VLAN traffic separation. In configuring MSTP, network security and VLAN policies also need to be considered to ensure that traffic between different VLANs is isolated and that network policies are properly enforced. The MSTP protocol optimizes the network topology by generating the minimum spanning tree, improves the stability and efficiency of the network, and avoids the problems brought by the loop. The configuration and management of the MSTP protocol requires careful planning and regular maintenance to ensure continued performance and reliability of the network.
Example 1
A system for enhancing trusted DCS networking redundancy, comprising:
the VRRP module is used for determining a main switch and a standby switch of the system network, configuring VRRP protocols in the main switch and the standby switch, monitoring the running state of the main switch in real time, and enabling the standby switch to become the main switch according to the virtual IP address to enable the system network to normally run when the main switch fails;
The link aggregation module is used for aggregating selected physical links and ports in the system network by adopting a link aggregation protocol to form a link aggregation group, and configuring the link aggregation group between devices of the system network;
The MSTP module is used for partitioning the system network according to the physical links and the running state of the system network, generating a minimum spanning tree in each network area by using the MSTP protocol, and ensuring that the network has a correct tree topology structure by the minimum spanning tree generated by the MSTP protocol.
The method for enhancing the redundancy of the trusted DCS networking, provided by the invention, firstly introduces a VRRP technology to carry out redundancy setting of the main and standby switches, introduces a VRRP protocol in the industrial control system networking to realize redundancy backup among the switches, ensures that the main switch can be quickly switched to the standby switch when faults occur, improves the network stability, secondly, introduces a link aggregation and port aggregation technology to improve the network bandwidth and load capacity, effectively improves the network bandwidth and load capacity, improves the data transmission rate and throughput, and enhances the stability and fault tolerance capacity of the network. Finally, a multi-instance spanning tree (MSTP) technology is introduced into the network system to quickly recover the network and protect the loop, an MSTP protocol is configured, the minimum spanning tree is generated, faults are monitored and convergence time is optimized, and the optimal path can be quickly recalculated when the network fails, so that the system is ensured to quickly recover normal operation, and the stability and reliability of the system are ensured.
The above is only for illustrating the technical idea of the present invention, and the protection scope of the present invention is not limited by this, and any modification made on the basis of the technical scheme according to the technical idea of the present invention falls within the protection scope of the claims of the present invention.

Claims (10)

1.一种增强可信DCS组网冗余的方法,其特征在于,包括以下过程:1. A method for enhancing trusted DCS networking redundancy, characterized by comprising the following process: 确定系统网络的主交换机和备用交换机,并在主交换机和备用交换机中配置VRRP协议,实时监控主交换机的运行状态,当主交换机出现故障,备用交换机根据虚拟IP地址成为主交换机使系统网络正常运行;Determine the main switch and backup switch of the system network, and configure the VRRP protocol in the main switch and the backup switch to monitor the operating status of the main switch in real time. When the main switch fails, the backup switch becomes the main switch according to the virtual IP address to ensure the normal operation of the system network. 将系统网络中的选定的物理链路和端口采用链路聚合协议进行聚合形成链路聚合组,将链路聚合组配置在系统网络的设备之间;Aggregating selected physical links and ports in the system network using a link aggregation protocol to form a link aggregation group, and configuring the link aggregation group between devices in the system network; 根据系统网络的物理链路及其运行状态对系统网络进行分区,利用MSTP协议在各网络区生成一颗最小生成树,通过MSTP协议生成的最小生成树,确保了网络具有正确的树状拓扑结构。The system network is partitioned according to the physical links and their operating status. The MSTP protocol is used to generate a minimum spanning tree in each network area. The minimum spanning tree generated by the MSTP protocol ensures that the network has a correct tree topology. 2.根据权利要求1所述的一种增强可信DCS组网冗余的方法,其特征在于,所述VRRP协议的配置方法如下:2. According to a method for enhancing trusted DCS networking redundancy according to claim 1, it is characterized in that the configuration method of the VRRP protocol is as follows: 根据VRRP协议参数在主交换机和备交换机上分别配置VRRP协议,VRRP协议参数包括虚拟路由器的ID、虚拟IP地址和优先级。Configure the VRRP protocol on the master switch and the standby switch according to the VRRP protocol parameters. The VRRP protocol parameters include the virtual router ID, virtual IP address, and priority. 3.根据权利要求1所述的一种增强可信DCS组网冗余的方法,其特征在于,所述备用交换机为多个,并对多个备用交换机设置优先级。3. A method for enhancing trusted DCS networking redundancy according to claim 1, characterized in that there are multiple backup switches and priorities are set for the multiple backup switches. 4.根据权利要求1所述的一种增强可信DCS组网冗余的方法,其特征在于,所述链路聚合协议为链路聚合控制协议或静态聚合协议。4. The method for enhancing trusted DCS networking redundancy according to claim 1, wherein the link aggregation protocol is a link aggregation control protocol or a static aggregation protocol. 5.根据权利要求1所述的一种增强可信DCS组网冗余的方法,其特征在于,所述物理链路和端口聚合后,对链路聚合组配置参数,包括组名、聚合方式和带宽分配策略。5. The method for enhancing trusted DCS networking redundancy according to claim 1 is characterized in that after the physical links and ports are aggregated, the link aggregation group is configured with parameters including group name, aggregation mode and bandwidth allocation strategy. 6.根据权利要求1所述的一种增强可信DCS组网冗余的方法,其特征在于,所述物理链路为太网电缆,端口为与物理链路连接的设备端口。6. The method for enhancing trusted DCS networking redundancy according to claim 1, wherein the physical link is an Ethernet cable, and the port is a device port connected to the physical link. 7.根据权利要求1所述的一种增强可信DCS组网冗余的方法,其特征在于,根据网络系统的网络拓扑确定物理链路物理连接和链路状态。7. A method for enhancing trusted DCS networking redundancy according to claim 1, characterized in that the physical connection and link status of the physical link are determined according to the network topology of the network system. 8.根据权利要求1所述的一种增强可信DCS组网冗余的方法,其特征在于,所述网络区包括多个独立区域或多个虚拟局域网。8. A method for enhancing trusted DCS networking redundancy according to claim 1, characterized in that the network area includes multiple independent areas or multiple virtual local area networks. 9.根据权利要求1所述的一种增强可信DCS组网冗余的方法,其特征在于,所述网络系统划分形成多个网络区,并对各网络区对配置唯一的MSTP实例ID。9. A method for enhancing trusted DCS networking redundancy according to claim 1, characterized in that the network system is divided into multiple network areas, and a unique MSTP instance ID is configured for each network area pair. 10.一种执行权利要求1-9任一项所述的一种增强可信DCS组网冗余的系统,其特征在于,包括:10. A system for implementing the enhanced trusted DCS networking redundancy according to any one of claims 1 to 9, characterized in that it comprises: VRRP模块,用于确定系统网络的主交换机和备用交换机,并在主交换机和备用交换机中配置VRRP协议,实时监控主交换机的运行状态,当主交换机出现故障,备用交换机根据虚拟IP地址成为主交换机使系统网络正常运行;VRRP module is used to determine the main switch and backup switch of the system network, and configure VRRP protocol in the main switch and backup switch to monitor the operation status of the main switch in real time. When the main switch fails, the backup switch becomes the main switch according to the virtual IP address to ensure the normal operation of the system network; 链路聚合模块,用于将系统网络中的选定的物理链路和端口采用链路聚合协议进行聚合形成链路聚合组,将链路聚合组配置在系统网络的设备之间;A link aggregation module, used to aggregate selected physical links and ports in the system network using a link aggregation protocol to form a link aggregation group, and configure the link aggregation group between devices in the system network; MSTP模块,用于根据系统网络的物理链路及其运行状态对系统网络进行分区,利用MSTP协议在各网络区生成一颗最小生成树,通过MSTP协议生成的最小生成树,确保了网络具有正确的树状拓扑结构。The MSTP module is used to partition the system network according to the physical links and operating status of the system network, and use the MSTP protocol to generate a minimum spanning tree in each network area. The minimum spanning tree generated by the MSTP protocol ensures that the network has a correct tree topology.
CN202411279281.9A 2024-09-12 2024-09-12 Method and system for enhancing trusted DCS networking redundancy Pending CN119182651A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411279281.9A CN119182651A (en) 2024-09-12 2024-09-12 Method and system for enhancing trusted DCS networking redundancy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411279281.9A CN119182651A (en) 2024-09-12 2024-09-12 Method and system for enhancing trusted DCS networking redundancy

Publications (1)

Publication Number Publication Date
CN119182651A true CN119182651A (en) 2024-12-24

Family

ID=93897106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411279281.9A Pending CN119182651A (en) 2024-09-12 2024-09-12 Method and system for enhancing trusted DCS networking redundancy

Country Status (1)

Country Link
CN (1) CN119182651A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120416148A (en) * 2025-07-01 2025-08-01 上海中船船舶设计技术国家工程研究中心有限公司 A redundant network communication device for high-speed vessels

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120416148A (en) * 2025-07-01 2025-08-01 上海中船船舶设计技术国家工程研究中心有限公司 A redundant network communication device for high-speed vessels

Similar Documents

Publication Publication Date Title
US7209435B1 (en) System and method for providing network route redundancy across Layer 2 devices
US9628375B2 (en) N-node link aggregation group (LAG) systems that can support various topologies
EP1982447B1 (en) System and method for detecting and recovering from virtual switch link failures
RU2530338C2 (en) Prepared connection based on state of communication lines of providers (plsb) with routed redundancy
US9614727B2 (en) N-node systems and methods for link aggregation groups (LAG)
CN104025513B (en) Apparatus and method for the control level in data center network
US20080215910A1 (en) High-Availability Networking with Intelligent Failover
EP1491000A2 (en) Network management system
US9847914B2 (en) Method and system for site interconnection over a transport network
CN1937521A (en) Retention of a stack address during primary master failover
CN105656645A (en) Decision making method and device for fault processing of stacking system
EP1803259B1 (en) Carrier class resilience solution for switched ethernet local area networks (lans)
CN119182651A (en) Method and system for enhancing trusted DCS networking redundancy
CN112995002B (en) Switch ring network design method, switch and storage medium
CN114900389A (en) Data center wide area network networking system and wide area network virtual access method
CN117834434A (en) Port configuration method and device of switch, electronic equipment and storage medium
CN116054929B (en) Business protection system
Ujcich et al. Thoughts on the Internet architecture from a modern enterprise network outage
CN116668282B (en) High availability method and system for two-layer gateway based on STP spanning tree protocol
US20050281272A1 (en) Displaying virtual network properties in a graphical user interface
WO2006027824A1 (en) Communication network system and trouble detecting apparatus
Çapalı et al. Business Continuity Focused Hierarchic Network Topology Application for Universities
HK1115695B (en) Carrier class resilience solution for switched ethernet local area networks (lans)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination