CN106572021B - Method for realizing network virtualization superposition and network virtualization edge node - Google Patents

Method for realizing network virtualization superposition and network virtualization edge node Download PDF

Info

Publication number
CN106572021B
CN106572021B CN201510647010.9A CN201510647010A CN106572021B CN 106572021 B CN106572021 B CN 106572021B CN 201510647010 A CN201510647010 A CN 201510647010A CN 106572021 B CN106572021 B CN 106572021B
Authority
CN
China
Prior art keywords
virtual network
virtual
network identifier
protocol
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510647010.9A
Other languages
Chinese (zh)
Other versions
CN106572021A (en
Inventor
王翠
张征
胡方伟
黄孙亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510647010.9A priority Critical patent/CN106572021B/en
Priority to PCT/CN2016/087112 priority patent/WO2016198022A1/en
Publication of CN106572021A publication Critical patent/CN106572021A/en
Application granted granted Critical
Publication of CN106572021B publication Critical patent/CN106572021B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/20Support for services
    • H04L49/201Multicast operation; Broadcast operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method for realizing network virtualization superposition and an NVE node, wherein the method comprises the following steps: acquiring a virtual network identifier of a connected virtual network; advertising the virtual network identification via a routing protocol. The invention can reduce the burden of the current data center on the data plane and the control plane of the BUM flow forwarding method.

Description

Method for realizing network virtualization superposition and network virtualization edge node
Technical Field
The invention relates to the technical field of network virtualization, in particular to a method for realizing network virtualization superposition and a network virtualization edge node.
Background
The Bit Index Replication (BIER) technology is a multicast technology that has been studied in IETF (Internet Engineering Task Force) in recent two years, and as shown in fig. 1, the basic principle is to allocate a unique BFR-id (Bit-Forwarding Router Identifier) to each node in a BIER domain, where each Bit in a Bit string (BitString) corresponds to a BFR-id. For example, a BFR-1 with a BFR-id of 1 corresponds to a BitSting of 00001, a BFR-2 with a BFR-id of 2 corresponds to a BitSting of 00010, and so on. When the multicast message reaches the BFR-1, the BFR-1 is used as a BFIR (Bit-Forwarding Ingress Router), and the BFR-1 determines which BFERs (Bit-Forwarding Egress Router) need the multicast flow in some way, for example, when it is obtained that the BFRs 2 and BFR-3 need the multicast flow, the BFRs-ids corresponding to the BFERs that need the multicast flow are combined into a Bit string BitString 00110 and encapsulated in a BIER message header, and then the multicast data message encapsulated with the BIER header is forwarded through a Bit Index Forwarding Table (Bit Index Forwarding Table, abbreviated as bilt) generated by an extended IGP (internal Gateway Protocol).
As mentioned above, the BIFT IS extended based on the IGP protocol, and the current IGP protocol supporting the extension mainly includes an IS-IS (Intermediate System-to-Intermediate System) protocol and an OSPF (Open Shortest Path First) protocol, as shown in fig. 2, the IS-IS protocol IS an extended IS-IS LSA (Link-State Advertisement) protocol for supporting the BIER technology; as shown in FIG. 3, the OSPF protocol is an OSPF-LSA extended to support the BIER technology;
based on the BIER technology, the network node does not need to support a multicast protocol and maintain the state of each multicast flow, and the realization of a multicast control plane and the performance of the network node are greatly simplified. Moreover, the BIER technology effectively utilizes the current IGP protocol, and can realize and improve the deployment of multicast only by slightly expanding the current IGP protocol. Further, BIER technology can also be combined with current software-defined networking technology to mitigate obstacles for future software-defined networking development.
On the other hand, the virtualized data center technology is more and more widely applied to data center deployment of private cloud/public cloud/hybrid cloud. A solution NVO3 technology (Network Virtualization using overlay over Layer 3, Layer 3-based Network Virtualization overlay) for virtualized data centers proposed by IETF international standards organization is also gradually performing its standardization work. Among them, the most widely used is the Virtual eXtensible Local Area Network (VXLAN).
The virtualization technology enables each physical server to be virtualized into multiple Virtual Machines (VMs), and Virtual Machines belonging to the same VLAN (Virtual Local Area Network) domain can communicate with each other. But since the VLAN only supports 4096, the number of current tenants is greatly limited. Meanwhile, due to the large two-layer network structure of the current data center, in order to prevent loops, a distribution Tree Protocol (Spanning Tree Protocol) is used, which also causes a large number of ports or links to be disabled and wasted. Further, three-tier IP technology is gradually being introduced into data centers. This means that when interworking is required for virtual machines belonging to different networks, not only a two-tier network but also a three-tier network needs to be spanned. The VXLAN technology is developed for various reasons. First, the VXLAN technology uses a 24-bit Virtual Network Identifier (VNI) to identify a VXLAN domain, i.e., a VXLAN subscriber supporting 16M. In addition, VXLAN is an overlay technology, and no matter whether a transmission network is a two-layer or three-layer network, VXLAN can mark a VXLAN identifier on an original message, and then encapsulate the VXLAN identifier in a Tunnel (Tunnel) and forward the VXLAN identifier to a remote end, so as to implement intercommunication for virtualized virtual machines belonging to the same tenant.
In a data center, there are two types of traffic, one is unicast traffic, and the other is BUM traffic (Broadcast \ Unknown \ Multicast), such as ARP (Address Resolution Protocol)/ND (Neighbor Discovery Protocol), DHCP (Dynamic Host Configuration Protocol), mDNS (Multicast DNS, Multicast DNS (Domain Name System)), and the like. For unicast traffic, the technical architecture of the current NVO3 is shown in fig. 4, where Server 1/Server2/Server3 are virtualized into different virtual machines VM1-VM6, respectively, belonging to different tenants. A Virtual Network (Virtual Network) is formed among Virtual machines belonging to the same tenant; for example, VM1 and VM3 belong to the same tenant a, VM2 and VM5 belong to the same tenant B, and VM4 and VM6 belong to the same tenant C. NVE (Network Virtualization Edge) is a node that performs tunnel encapsulation/decapsulation. The overlay tunnel between NVEs may select a VXLAN tunnel. Specifically, as shown in fig. 5, it is a message header structure of the VXLAN data plane. As further shown in fig. 6, it is a tunnel message data structure after NVE encapsulation. When the data plane is forwarded, after an original message is encapsulated by a VXLAN message header on the NVE, an outer tunnel is encapsulated according to a tunnel destination IP address corresponding to the VXLAN, and then the message is unicast-forwarded to the remote NVE, for example, after data traffic of tenant a initiated by VM1 reaches NVE1, the NVE1 encapsulates the VXLAN header carrying vni (virtual Network identifier) of 1, and then encapsulates the outer tunnel according to the tunnel destination IP address NVE2 corresponding to the VXLAN, and then forwards the outer tunnel to the remote NVE 2. After receiving the message, the remote NVE2 decapsulates the outer tunnel, and forwards the message to the VM3 of the tenant network a belonging to the VXLAN according to the VNI in the VXLAN header. The forwarding of tenant B and tenant C is similar. In the VXLAN tunnel, the VNI specific refers to a VXLAN Network Identifier (VXLAN Network Identifier).
For BUM traffic, the current deployment of NVO3 is shown in fig. 7, for example, VM1, VM3, and VM5 belong to the same tenant, and after NVE1 receives BUM traffic, the method is to perform entry replication on an NVE1 endpoint, replicate multicast traffic, respectively encapsulate VXLAN headers, further encapsulate IP addresses (NVE2 and NVE3) of multiple tunnels corresponding to the VXLAN, and respectively send the IP addresses to different remote NVE2 and NVE 3. However, this method is only suitable for small networks, when a tenant network is large, a large amount of burden exists on an entry endpoint to copy multicast messages, and a large amount of bandwidth between NVEs is wasted, and mapping of a tunnel destination address corresponding to a VXLAN on the NVE needs additional control plane technology to assist delivery. The second method is that a multicast protocol PIM is operated on a network between NVEs to establish a multicast distribution tree, then after the NVE1 receives a BUM message, the VXLAN to which the BUM message belongs is searched, then the multicast group mapping corresponding to the VXLAN is searched, then the BUM message is packaged with a VXLAN message header, and then the BUM message is forwarded along the multicast distribution tree which is established between the NVEs and belongs to the corresponding multicast group. The method can solve the burden of the inlet end points and the bandwidth between the NVEs to a certain extent, but a three-layer PIM protocol is required to be operated between the NVEs, the multicast tree is required to be maintained in the whole network, the complexity and the deployability of the network are increased to another extent, and the mapping of the multicast group corresponding to the VXLAN on the NVE also needs additional control plane technology to assist in issuing.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method for realizing network virtualization overlay and an NVE node, so as to alleviate various defects of a data plane and a control plane of a BUM flow forwarding method in the current data center.
In order to solve the above technical problem, the present invention provides a method for implementing a virtualized network overlay, which is applied to a network virtualization edge node of a virtualized data center, and includes:
acquiring a virtual network identifier of a connected virtual network;
advertising the virtual network identification via a routing protocol.
Further, the method also has the following characteristics: said advertising said virtual network identification comprises:
advertising a valid virtual network identifier; and/or
Advertising the revoked virtual network identification.
Further, the method also has the following characteristics:
the routing protocol includes any one of: intermediate system to intermediate system protocol, open shortest path first protocol and border gateway protocol
Further, the method also has the following characteristics:
the routing protocol supports the IPv4 network protocol and the IPv6 network protocol.
Further, the method also has the following characteristics:
the virtual network identifier comprises a network identifier of a virtual extensible local area network.
In order to solve the above problem, the present invention further provides a network virtualization edge node, including:
an acquisition module, configured to acquire a virtual network identifier of a connected virtual network;
and the advertisement module is used for advertising the virtual network identifier through a routing protocol.
Further, the network virtualization edge node also has the following characteristics:
the advertising module, advertising the virtual network identifier, includes: advertising a valid virtual network identifier; and/or advertising a revoked virtual network identity, the routing protocol comprising any one of: the routing protocol supports an IPv4 network protocol and an IPv6 network protocol, and the virtual network identifier comprises a network identifier of a virtual extensible local area network.
In order to solve the above problem, the present invention further provides a method for implementing a virtualized network overlay, which is applied to a network virtualization edge node of a virtualized data center, and includes:
receiving an announcement message carrying a virtual network identifier;
and analyzing the virtual network identifications, and establishing or updating a mapping relation between the corresponding virtual network identifications and bit strings of nodes sending the same virtual network identifications according to the virtual network identifications.
Further, the method also has the following characteristics:
the notification message includes: and the notification message carries the effective virtual network identifier and/or the revoked virtual network identifier.
Further, the method also has the following characteristics:
further comprising:
when receiving broadcast \ unknown \ multicast BUM flow of a tenant, searching a virtual network identifier to which the tenant rate belongs, packaging a corresponding virtual network message header, searching a bit string corresponding to the virtual network identifier, packaging a bit index display replication header corresponding to the bit string, and forwarding according to a bit index forwarding table.
In order to solve the above problem, the present invention further provides a network virtualization edge node, including:
a receiving module, configured to receive an announcement packet carrying a virtual network identifier;
and the processing module is used for analyzing the virtual network identifications, and establishing or updating a mapping relation between the corresponding virtual network identifications and bit strings of nodes sending the same virtual network identifications according to the virtual network identifications.
Further, the network virtualization edge node also has the following characteristics:
the receiving module receives the notification message, which includes: and the notification message carries the effective virtual network identifier or the notification message carries the revoked virtual network identifier.
Further, the network virtualization edge node also has the following characteristics:
the receiving module is further configured to receive broadcast \ unknown \ multicast BUM traffic of a tenant;
the processing module is further configured to search for a virtual network identifier to which the tenant rate belongs, encapsulate a corresponding virtual network packet header, search for a bit string corresponding to the virtual network identifier, encapsulate a bit index display copy header corresponding to the bit string, and forward the bit string according to a bit index forwarding table.
In summary, the present invention provides a method for implementing network virtualization overlay and an NVE node, so as to reduce the burden of the current data center on the data plane and the control plane of the BUM traffic forwarding method.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram of a prior art BIER technology architecture;
FIG. 2 IS a diagram of a prior art IS-IS protocol extension implementing the BIER control plane;
FIG. 3 is a diagram of a prior art OSPF protocol extension implementing the BIER control plane;
FIG. 4 is a schematic diagram of a prior art NVO3 technology architecture (unicast scenario);
fig. 5 is a schematic diagram of a VXLAN message header structure of the prior art;
FIG. 6 is a diagram illustrating a structure of a message forwarded on a tunnel after NVE encapsulation in the prior art;
FIG. 7 is a schematic diagram of a prior art NVO3 technology architecture (BUM scenario);
fig. 8 is a flowchart of a method for implementing a virtualized network overlay on a transmitting side according to an embodiment of the present invention;
fig. 9 is a schematic diagram of an NVE node on the transmitting side according to an embodiment of the present invention;
fig. 10 is a flowchart of a method for implementing a virtualized network overlay on a receiving side according to an embodiment of the present invention;
fig. 11 is a schematic diagram of an NVE node on the receiving side according to an embodiment of the present invention;
fig. 12 IS a schematic diagram of carrying a virtual network identifier based on IS-IS protocol extension according to an embodiment of the present invention;
FIG. 13 is a schematic diagram of an application scenario of an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
In view of the problems in the prior art, if the BIER technology can be introduced into the virtualized network overlay NVO3, the BIER technology is used to implement the forwarding technology of the data plane of the BUM traffic of the data center, and at the same time, extensions of IGP-BIER and BGP-BIER are introduced at the control plane, so that the source NVE discovers the control plane technology of NVEs of which the remote ends belong to the same VXLAN. Therefore, various defects of the current data center on the data plane and the control plane of the BUM flow forwarding method are greatly reduced, and the deployment of the virtualized data center and the deployment of the BIER are further accelerated. The embodiment of the invention tries to introduce the BIER technology into the virtualized data center network to realize the optimal realization of BUM flow forwarding in the virtualized network.
Fig. 8 is a flowchart of a method for implementing a virtualized network overlay on a sending side according to an embodiment of the present invention, and as shown in fig. 8, the method of the present embodiment is applied to an NVE node of a virtualized data center, and includes:
step 11, obtaining a VNI of a connected virtual network;
and step 12, advertising the VNI through a routing protocol.
Wherein notifying the VNI comprises: advertise a valid VNI; and/or advertise revoked VNIs.
Wherein the routing protocol comprises any one of: the IS-IS protocol, the OSPF protocol or the BGP protocol, and the routing protocol supports the IPv4 network protocol and the IPv6 network protocol.
Wherein the VNI comprises a network identification of VXLAN.
Fig. 9 is a schematic diagram of an NVE node on a transmitting side according to an embodiment of the present invention, and as shown in fig. 9, the NVE node according to this embodiment may include:
an acquisition module for acquiring a VNI of a connected virtual network;
and the notification module is used for notifying the VNI through a routing protocol.
In a preferred embodiment, the advertising module that advertises the VNI includes: advertise a valid VNI; and/or advertise revoked VNIs.
Fig. 10 is a flowchart of a method for implementing a virtualized network overlay on a receiving side according to an embodiment of the present invention, and as shown in fig. 10, the method of the present embodiment is applied to an NVE node of a virtualized data center, and includes:
step 21, receiving an announcement message carrying a VNI;
step 22, analyzing the VNIs, and establishing or updating a mapping relationship between the corresponding VNI and a bit string of a node sending the same VNI according to the VNI.
The method of this embodiment may further include:
when BUM flow of a tenant is received, a VNI of the tenant rate is searched, a corresponding virtual network message header is packaged, a bit string corresponding to the VNI is searched, a bit index corresponding to the bit string is packaged to display a copy header, and forwarding is carried out according to a bit index forwarding table.
Fig. 11 is a schematic diagram of an NVE node on a receiving side according to an embodiment of the present invention, and as shown in fig. 11, the NVE node according to this embodiment may include:
a receiving module, configured to receive an announcement packet carrying a VNI;
and the processing module is used for analyzing the VNIs and establishing or updating a mapping relation between the corresponding VNIs and bit strings of nodes sending the same VNIs according to the VNIs.
In a preferred embodiment, the receiving module may be further configured to receive BUM traffic of a tenant;
the processing module may be further configured to search for a VNI to which the tenant rate belongs, encapsulate a corresponding virtual network packet header, search for a bit string corresponding to the VNI, encapsulate a bit index corresponding to the bit string to display a replication header, and forward the replication header according to a bit index forwarding table.
The core idea of the invention is explained below with reference to an embodiment.
The first embodiment is as follows:
currently, when the IS-IS protocol extension implements BIER control plane, for IPv4 (fourth edition of internet protocol) network, extension IS performed under Extended IP accessibility TLV (Type \ length \ Value )) (TLV Type 135) and Multi-Topology readable IPv4 Prefixes TLV (Multi-Topology Reachable IPv4 prefix TLV) (TLV Type 235) of IS-IS protocol; and for an IPv6 (sixth edition of Internet protocol) network, extension IS carried out under an IPv6 availability TLV (type TLV 236) and a Multi-Topology readable IPv6 Prefixes TLV (type TLV 237) of IS-IS, and the specific extension format IS shown in FIG. 2.
In an embodiment of the present invention, the BIER technique IS applied to the control plane of the virtualized data center, and then a new sub-sub-TLV (sub-TLV) IS further defined in the IS-IS extension defined in fig. 2, which IS used to advertise the virtual network identifier of the virtual network. Specifically, a reference format of a packet carrying a virtual network identifier based on IS-IS protocol extension IS shown in fig. 12.
The Type identifies the sub-sub-TLV Type, and the embodiment of the invention is used for identifying the sub-sub-TLV of the virtual network; length identifies the Length of Value part in the sub-sub-TLV; the Virtual Network Identifier is a Virtual Network Identifier, 24-bit, which uniquely identifies the Virtual Network.
The second embodiment is as follows:
currently, the OSPF protocol extension implements the BIER control plane, and extends the IPv4 network under the Extended Prefix TLV (Extended Prefix TLV) of the OSPFv2 protocol; and for the IPv6 network, the extension is carried out under the Extended LSA TLV (Extended Link State advertisement TLV) of OSPFv3, and the specific extension format is shown in figure 3.
Embodiments of the present invention attempt to apply BIER technique to the control plane of the virtualized data center, and thus a new sub-sub-TLV is further defined in the OSPF and OSPFv3 extensions defined in fig. 3 above for advertising the virtual network identifier of the virtual network. Specifically, a message reference format carrying a virtual network identifier based on OSPF and OSPFv3 protocol extensions is also shown in fig. 12.
The Type identifies the sub-sub-TLV Type, and the embodiment of the invention is used for identifying the sub-sub-TLV of the virtual network; length identifies the Length of Value part in the sub-sub-TLV; the Virtual Network Identifier is a Virtual Network Identifier, 24-bit, which uniquely identifies the Virtual Network.
The third concrete embodiment:
the embodiment of the invention tries to apply the BIER technology to the control surface of the virtualized data center, so a new sub-TLV is further expanded under the BGP BIER attribute of the BGP protocol for announcing the virtual network identifier; or the network layer reachable information NLRI of the BGP protocol is expanded to inform the virtual network identifier.
The fourth concrete embodiment:
the OSPF protocol can support the establishment of OSPF virtual chains on BFIR and BFER devices of the BIER domain, the extended TLV information mentioned in the embodiments of the present invention is directly transmitted to the edge device of the BIER domain through the virtual chains, the BFIR and the BFER devices directly interact with each other to connect VNI information, and the information storage of intermediate nodes of the BIER domain is reduced. The advertised format is still based on the packet reference format carrying the virtual network identity in the OSPF protocol extension as also shown in fig. 12.
The Type identifies the sub-sub-TLV Type, and the embodiment of the invention is used for identifying the sub-sub-TLV of the virtual network; length identifies the Length of Value part in the sub-sub-TLV; the Virtual Network Identifier is a Virtual Network Identifier, 24-bit, which uniquely identifies the Virtual Network.
The fifth concrete embodiment:
as shown in fig. 13, NVEs (NVE1/NVE2/NVE3) run IGP or BGP protocol between them, VM1 belonging to tenant a (VXLAN identifier 10) is connected to NVE1, BFRID of NVE1 is 1, and corresponding BitString is 001; meanwhile, VM3 belonging to tenant a (VXLAN identity 10) is connected to NVE2, BFRID of NVE2 is 2, corresponding BitString is 010, VM5 belonging to tenant a (VXLAN identity 10) is connected to NVE3, BFRID of NVE3 is 3, and corresponding BitString is 100. The NVE1/NVE2/NVE3 carries BIER information and VXLAN information through IGP protocol extension or BGP protocol extension.
When NVEs are directly connected, VXLAN information can be directly announced through the IGP format extended in embodiment one or embodiment two.
For example, NVE2 announces BIER information and VXLAN information, NVE1 receives the BIER information and VXLAN information, and locally establishes a mapping relationship between the VXLAN information and BitString [ VXLAN 10:010], and similarly, NVE3 announces BIER information and VXLAN information, and NVE1 also receives the BIER information and VXLAN information, and updates the local mapping to [ VXLAN 10:110 ]. When the NVE1 receives the tenant multicast traffic from the VM1, it searches that the multicast traffic belongs to the VXLAN10, encapsulates the VXLAN header, further searches that the BitString corresponding to the remote NVEs belonging to the VXLAN is 110, further encapsulates the BIER header, and forwards the multicast packet.
When NVEs are not directly connected but need to be communicated through a plurality of nodes, two methods can be realized:
the method comprises the following steps: the NVEs advertise VXLAN information through the extended IGP format in the first embodiment and the second embodiment; and the intermediate node receives that the VXLAN information is not identified, and then forwards the IGP notification message according to the IGP rule.
The second method comprises the following steps: through the implementation of the third specific embodiment or the fourth specific embodiment, BGP neighbors or OSPF virtual links are established between NVEs, and VXLAN information is directly notified between NVEs without processing by an intermediate node.
Similarly, NVE2 announces BIER information and VXLAN information, and NVE1 receives the BIER information and VXLAN information and establishes a mapping relationship between the VXLAN information and BitString [ VXLAN 10:010], and NVE3 announces BIER information and VXLAN information, and NVE1 receives the BIER information and VXLAN information and updates the local mapping to [ VXLAN 10:110], regardless of method one or method two. When the NVE1 receives the tenant multicast traffic from the VM1, it searches that the multicast traffic belongs to the VXLAN10, encapsulates the VXLAN header, further searches that the BitString corresponding to the remote NVEs belonging to the VXLAN is 110, further encapsulates the BIER header, and forwards the multicast packet.
The sixth specific embodiment:
in the embodiment, the forwarding plane is updated based on the migration of the virtual machine, as shown in fig. 13, when the virtual machine VM5 migrates from the affiliated vnia to the affiliated vnib, the node NVE3 connected to the VM5 finds that the user affiliated to the VXLAN10 migrates, and then withdraws the VXLAN information through the notification of the IGP protocol or the BGP protocol.
When NVEs are directly connected, revocation VXLAN information can be directly notified through the IGP format extended in the first embodiment and the second embodiment; for example, NVE3 announces that VXLAN information is revoked, and NVE1, upon receiving it, locally updates the mapping relationship between the originally stored VXLAN information and BitString, from [ VXLAN 10:110] to [ VXLAN 10:010 ]. Thus, when the NVE1 receives the subsequent tenant multicast traffic from the VM1, it still searches that the multicast traffic belongs to VXLAN10, encapsulates the VXLAN header, further searches, finds that the BitString corresponding to the remote NVEs belonging to the VXLAN is updated to 010, and then further encapsulates the updated BIER header to forward the multicast packet.
When NVEs are not directly connected but need to be communicated through a plurality of nodes, two methods can be used for realizing the method disclosed by the invention:
the method comprises the following steps: the NVE3 announces the revocation of VXLAN information through the IGP format extended in embodiment one and embodiment two; and if the intermediate node receives the information of the withdrawn VXLAN and does not recognize the information, forwarding the IGP notification message according to the IGP rule.
The second method comprises the following steps: through the implementation in the third embodiment or the fourth embodiment, the NVE3 establishes a BGP neighbor or OSPF virtual chain between the NVE1 and the NVE3, and directly notifies the withdrawn VXLAN information between the NVE1 and the NVE 3. The intermediate node does not need to process.
Thus, either by method one or method two, NVE1 updates the local mapping to VXLAN 10:010 after receiving the VXLAN revoke message. When NVE1 receives the subsequent tenant multicast traffic from VM1, it still searches that the multicast traffic belongs to VXLAN10, encapsulates the VXLAN header, further searches, finds that BitString corresponding to the remote NVEs belonging to the VXLAN is updated to 010, and then further encapsulates the updated BIER header to forward the multicast packet.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing the relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, and the like. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module/unit in the above embodiments may be implemented in the form of hardware, and may also be implemented in the form of a software functional module. The present invention is not limited to any specific form of combination of hardware and software.
The foregoing is only a preferred embodiment of the present invention, and naturally there are many other embodiments of the present invention, and those skilled in the art can make various corresponding changes and modifications according to the present invention without departing from the spirit and the essence of the present invention, and these corresponding changes and modifications should fall within the scope of the appended claims.

Claims (10)

1. A method for realizing virtual network overlay is applied to a network virtual edge node of a virtual data center, and comprises the following steps:
acquiring a virtual network identifier of a connected virtual network;
advertising the virtual network identification via a routing protocol; wherein the virtual network identifier is carried in a newly added field of the routing protocol;
wherein said advertising said virtual network identification comprises: advertising a valid virtual network identifier; and/or advertising the revoked virtual network identification.
2. The method of claim 1,
the routing protocol includes any one of: an intermediate system to intermediate system protocol, an open shortest path first protocol, and a border gateway protocol.
3. The method of claim 1,
the routing protocol supports the IPv4 network protocol and the IPv6 network protocol.
4. The method of any one of claims 1-3,
the virtual network identifier comprises a network identifier of a virtual extensible local area network.
5. A network virtualization edge node, comprising:
an acquisition module, configured to acquire a virtual network identifier of a connected virtual network; wherein, the virtual network identification is carried in a newly added field of a routing protocol;
the advertisement module is used for advertising the virtual network identifier through a routing protocol;
the advertising module, advertising the virtual network identifier, includes: advertising a valid virtual network identification, and/or advertising a revoked virtual network identification.
6. The network virtualization edge node of claim 5,
the routing protocol includes any one of: the routing protocol supports an IPv4 network protocol and an IPv6 network protocol, and the virtual network identifier comprises a network identifier of a virtual extensible local area network.
7. A method for realizing virtual network overlay is applied to a network virtual edge node of a virtual data center, and comprises the following steps:
receiving an announcement message carrying a virtual network identifier; wherein, the virtual network identification is carried in a newly added field of a routing protocol; the notification message includes: carrying an effective virtual network identifier and/or an announcement message carrying a revoked virtual network identifier;
analyzing the virtual network identifier, and establishing or updating a mapping relation between the corresponding virtual network identifier and a bit string of a node sending the same virtual network identifier according to the virtual network identifier;
when receiving broadcast \ unknown \ multicast BUM flow of a tenant, searching a virtual network identifier to which the tenant belongs, packaging a corresponding virtual network message header, and forwarding the BUM flow.
8. The method of claim 7, wherein the forwarding the BUM traffic comprises:
and searching a bit string corresponding to the virtual network identifier, packaging a bit index display copying head corresponding to the bit string, and forwarding according to a bit index forwarding table.
9. A network virtualization edge node, comprising:
a receiving module, configured to receive an announcement packet carrying a virtual network identifier; wherein, the virtual network identification is carried in a newly added field of a routing protocol; the notification message includes: an announcement message carrying an effective virtual network identifier or an announcement message carrying a revoked virtual network identifier;
the processing module is used for analyzing the virtual network identifications, and establishing or updating a mapping relation between the corresponding virtual network identifications and bit strings of nodes sending the same virtual network identifications according to the virtual network identifications;
the receiving module is further configured to receive broadcast \ unknown \ multicast BUM traffic of a tenant;
the processing module is further configured to search for a virtual network identifier to which the tenant belongs, encapsulate a corresponding virtual network header, and forward the BUM traffic.
10. The network virtualization edge node of claim 9,
the forwarding of the BUM traffic by the processing module specifically includes: and searching a bit string corresponding to the virtual network identifier, packaging a bit index display copying head corresponding to the bit string, and forwarding according to a bit index forwarding table.
CN201510647010.9A 2015-10-09 2015-10-09 Method for realizing network virtualization superposition and network virtualization edge node Active CN106572021B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510647010.9A CN106572021B (en) 2015-10-09 2015-10-09 Method for realizing network virtualization superposition and network virtualization edge node
PCT/CN2016/087112 WO2016198022A1 (en) 2015-10-09 2016-06-24 Method for implementing virtualization network overlay and network virtualization edge node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510647010.9A CN106572021B (en) 2015-10-09 2015-10-09 Method for realizing network virtualization superposition and network virtualization edge node

Publications (2)

Publication Number Publication Date
CN106572021A CN106572021A (en) 2017-04-19
CN106572021B true CN106572021B (en) 2021-07-06

Family

ID=57503042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510647010.9A Active CN106572021B (en) 2015-10-09 2015-10-09 Method for realizing network virtualization superposition and network virtualization edge node

Country Status (2)

Country Link
CN (1) CN106572021B (en)
WO (1) WO2016198022A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941437B (en) * 2016-01-04 2020-11-17 中兴通讯股份有限公司 Information transmission method and device
CN108632678B (en) * 2017-03-22 2023-03-24 中兴通讯股份有限公司 Data transmission method, device and system
CN108632150B (en) * 2017-03-22 2022-02-25 中兴通讯股份有限公司 Information transmission method and device
CN108965134B (en) * 2017-05-23 2022-04-29 中兴通讯股份有限公司 Message forwarding method and device
CN109150730A (en) * 2017-06-15 2019-01-04 中兴通讯股份有限公司 The cross-domain method, apparatus of multicast, system and computer readable storage medium
CN110417657B (en) 2018-04-27 2022-05-17 华为技术有限公司 Method and device for processing multicast data message
CN109729012B (en) * 2018-12-24 2021-08-24 新华三技术有限公司 Unicast message transmission method and device
CN113114576B (en) * 2019-12-25 2022-11-25 华为技术有限公司 Method, equipment and system for sending message
CN115134297A (en) * 2021-03-29 2022-09-30 华为技术有限公司 BIERv6 message processing method, equipment and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326915A (en) * 2012-03-23 2013-09-25 华为技术有限公司 Method, device and system for achieving three-layer VPN
CN104518940A (en) * 2014-10-27 2015-04-15 华为技术有限公司 Communication method and device for NVO3 (network virtualization over layer 3) network and MPLS (multi-protocol label switching) network
CN104734929A (en) * 2013-12-18 2015-06-24 华为技术有限公司 Method and device for routing diffusion
CN104871495A (en) * 2012-09-26 2015-08-26 华为技术有限公司 Overlay virtual gateway for overlay networks

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581277A (en) * 2012-08-09 2014-02-12 中兴通讯股份有限公司 Distributing method and system of data center virtualization network address and directory server
US8931046B2 (en) * 2012-10-30 2015-01-06 Stateless Networks, Inc. System and method for securing virtualized networks
CN104348724B (en) * 2013-07-31 2019-04-26 华为技术有限公司 A kind of data forwarding method and device for supporting multi-tenant
US9749214B2 (en) * 2014-02-26 2017-08-29 Futurewei Technologies, Inc. Software defined networking (SDN) specific topology information discovery

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326915A (en) * 2012-03-23 2013-09-25 华为技术有限公司 Method, device and system for achieving three-layer VPN
CN104871495A (en) * 2012-09-26 2015-08-26 华为技术有限公司 Overlay virtual gateway for overlay networks
CN104734929A (en) * 2013-12-18 2015-06-24 华为技术有限公司 Method and device for routing diffusion
CN104518940A (en) * 2014-10-27 2015-04-15 华为技术有限公司 Communication method and device for NVO3 (network virtualization over layer 3) network and MPLS (multi-protocol label switching) network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Non-Tunneling Edge-Overlay Model using OpenFlow for Cloud Datacenter Networks;RYOTA KAWASHIMA 等;《2013 IEEE International Conference on Cloud Computing Technology and Science》;20131231;第176-181页 *
Performance Evaluation of Non-Tunneling Edge-Overlay Model on 40GbE Environment;RYOTA KAWASHIMA 等;《2014 IEEE 3rd Symposium on Network Cloud Computing and Applications》;20141231;第69页第3段-71页第1段 *

Also Published As

Publication number Publication date
CN106572021A (en) 2017-04-19
WO2016198022A1 (en) 2016-12-15

Similar Documents

Publication Publication Date Title
CN106572021B (en) Method for realizing network virtualization superposition and network virtualization edge node
US11115375B2 (en) Interoperability between data plane learning endpoints and control plane learning endpoints in overlay networks
CN111510379B (en) EVPN message processing method, device and system
CN108574630B (en) EVPN message processing method, device and system
US7590119B2 (en) Method and apparatus for context-based prefix updates in border gateway protocol
CN110912796B (en) Communication method, device and system
US8898334B2 (en) System for network deployment and method for mapping and data forwarding thereof
US20180205636A1 (en) Bier packet transmission method and device
US9300524B2 (en) Message forwarding between geographically dispersed network sites
CN108964940B (en) Message sending method and device and storage medium
US20080205401A1 (en) Setting a Forwarding Address in an Internet Protocol Version 6 (IPv6) Routing Protocol Domain at a Boundary with a Different Routing Protocol Domain
CN104871495A (en) Overlay virtual gateway for overlay networks
US20160191324A1 (en) Subsequent address family identifier for service advertisements
CN112511444A (en) Multicast traffic transmission method, device, communication node and storage medium
US20200296039A1 (en) Dynamic next-hop selection for routes in a network fabric
WO2022184169A1 (en) Packet forwarding method and system, storage medium, and electronic device
JP2014150364A (en) Address generation device
CN110752989A (en) Method and device for forwarding east-west traffic
CN114598635A (en) Message transmission method and device
WO2021017590A1 (en) Method, system, and first gw for achieving dci three-layer communication
CN117478503A (en) Multicast configuration method and device
WO2021189993A1 (en) Routing method, routing apparatus and computer-readable storage medium
CN113542441B (en) Communication processing method and device
WO2024016869A1 (en) Multicast configuration method and apparatus
US10924395B2 (en) Seamless multipoint label distribution protocol (mLDP) transport over a bit index explicit replication (BIER) core

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant