CN108809759A - Detect the method, apparatus and router of link state - Google Patents

Detect the method, apparatus and router of link state Download PDF

Info

Publication number
CN108809759A
CN108809759A CN201810528568.9A CN201810528568A CN108809759A CN 108809759 A CN108809759 A CN 108809759A CN 201810528568 A CN201810528568 A CN 201810528568A CN 108809759 A CN108809759 A CN 108809759A
Authority
CN
China
Prior art keywords
message
messages
bfd
main path
probe messages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810528568.9A
Other languages
Chinese (zh)
Inventor
吴文
汪亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN201810528568.9A priority Critical patent/CN108809759A/en
Publication of CN108809759A publication Critical patent/CN108809759A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Present disclose provides a kind of method, apparatus and router of detection link state;Wherein, this method includes:It detects and whether there is equal-cost link on main path;If there is equal-cost link, BFD detections are carried out according to the double hair mechanism of preset message;Wherein, the double hair mechanism instructions of message send the BFD messages for carrying different message identifications;If testing result is that main path is reachable, the link state that main path is arranged is UP.The disclosure can improve the stability of network.

Description

Detect the method, apparatus and router of link state
Technical field
This disclosure relates to field of communication technology, more particularly, to a kind of method, apparatus and router of detection link state.
Background technology
SR (Segment Routing, section routing) technology is a kind of source routing technology, uses source path selection mechanism; Message is before entering the tunnels SR, in advance in the SID of the packaged message forwarding path route segment to be passed through of head node (Segment Identifier, segment identification);When message passes through SR nodes, which carries out message according to the SID of message Forwarding.In addition to head node, other node Maintenance free path status.
SR technologies can be applied to MPLS (Multi-Protocol Label Switching, multiprotocol label switching) streams Retransmission technique is measured, IPV6 (Internet Protocol Version 6, the Internet protocol of sixth version) net can also be applied to Network.Wherein, for IPV6 networks, it is contemplated that networking stability, the tunnels SR in IPV6 networks are usually deployed with active-standby path;When It when main path breaks down, enables backup path and carries out flow forwarding, forward and interrupt to avoid flow;However, can in main path There can be a plurality of equal-cost link, i.e., there are multiple sublinks arranged side by side in certain specific forwarding sections of main path, if network is supervised It measures a wherein sub-links to break down, then can enable backup path;Since other sublinks are still unobstructed, network can occur The case where being switched to backup path from main path and switching back into main path quickly, which forms network switching concussions, cause net Network stability is poor.
Invention content
In view of this, the disclosure is designed to provide a kind of method, apparatus and router of detection link state, to carry The stability of high network.
To achieve the goals above, the technical solution that the disclosure uses is as follows:
In a first aspect, present disclose provides a kind of method of detection link state, this method is applied to the tunnels IPV6SR Head node, this method include:It detects and whether there is equal-cost link on main path;If there is equal-cost link, according to preset report Wen Shuanfa mechanism carries out BFD detections;Wherein, the double hair mechanism instructions of message send the BFD messages for carrying different message identifications;If Testing result is that main path is reachable, and the link state that main path is arranged is UP.
Second aspect, present disclose provides a kind of method of detection link state, this method is applied in the tunnels IPV6SR Intermediate node, this method includes:Receive protocol massages, wherein protocol massages include probe messages and BFD messages;Check association Discuss the message identification in the heading of message and next key node;If current intermediate node and next key node Between exist at least two equal-cost links, processing is forwarded to protocol massages according to message identification;Message identification is head node When carrying out BFD detections according to the double hair mechanism of message, the message identification that is carried in the BFD messages of transmission.
The third aspect, present disclose provides a kind of device of detection link state, which is set to the tunnels IPV6SR Head node, the device include:Equal-cost link detection module whether there is equal-cost link for detecting on main path;First BFD is examined Module is surveyed, for if there is equal-cost link, BFD detections to be carried out according to the double hair mechanism of preset message;Wherein, the double hair machines of message System instruction sends the BFD messages for carrying different message identifications;Setup module, if reachable for main path for testing result, if The link state for setting main path is UP.
Fourth aspect, present disclose provides a kind of device of detection link state, which is set in the tunnels IPV6SR Intermediate node, which includes:Message receiving module, for receiving protocol massages, wherein protocol massages include probe messages With BFD messages;Check module, the message identification in heading for checking protocol massages and next key node;Message Forwarding module, if for next key node exist at least two equal-cost links, according to message identification to protocol massages into Row forward process;When message identification is that head node carries out BFD detections according to the double hair mechanism of message, carried in the BFD messages of transmission Message identification.
5th aspect, disclosure embodiment provide a kind of realization device of message transmissions, including processor and machine Readable storage medium storing program for executing, machine readable storage medium are stored with the machine-executable instruction that can be executed by processor, and processor is held Method of the row machine-executable instruction to realize above-mentioned detection link state.
6th aspect, disclosure embodiment provide a kind of machine readable storage medium, and machine readable storage medium is deposited Machine-executable instruction is contained, when being called and being executed by processor, machine-executable instruction promotes to locate machine-executable instruction The method that reason device realizes above-mentioned detection link state.
The method, apparatus and router and machine readable storage medium of above-mentioned detection link state, if deposited on main path In equal-cost link, then according to the double hair mechanism of preset message, the BFD messages for carrying different message identifications are sent, to main road Each equal-cost link on diameter carries out BFD detections, if testing result is that main path is reachable, the link state of the main path is arranged For UP.In which, when only detecting that all equal-cost links on main path interrupt, just main path is reported to interrupt, avoided A wherein equative route interrupts just carry out active-standby path switching caused by switching concussion, improve the stability of network.
Other feature and advantage of the disclosure will illustrate in the following description, alternatively, Partial Feature and advantage can be with Deduce from specification or unambiguously determine, or by implement the disclosure above-mentioned technology it can be learnt that.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, better embodiment cited below particularly, and match Appended attached drawing is closed, is described in detail below.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of disclosure specific implementation mode or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below Attached drawing is some embodiments of the disclosure, for those of ordinary skill in the art, before not making the creative labor It puts, other drawings may also be obtained based on these drawings.
Fig. 1 is the schematic diagram that the message that disclosure embodiment provides is forwarded through the tunnels SR in IPV6 networks;
Fig. 2 is the structural schematic diagram in the tunnels SR in a kind of IPV6 networks that disclosure embodiment provides;
Fig. 3 is the schematic diagram that the tunnels SR carry out active/standby link switchover in the IPV6 networks that disclosure embodiment provides;
Fig. 4 is a kind of flow chart of the method for detection link state that disclosure embodiment provides;
Fig. 5 is the flow chart of the method for another detection link state that disclosure embodiment provides;
Fig. 6 is in the method for another detection link state that disclosure embodiment provides, the first probe messages and the The schematic diagram that two probe messages are transmitted in main path;
Fig. 7 is the flow chart of the method for another detection link state that disclosure embodiment provides;
Fig. 8 is T1 timers and T2 timings in the method for another detection link state that disclosure embodiment provides The timing relations schematic diagram of device;
Fig. 9 is the flow chart of the method for another detection link state that disclosure embodiment provides;
Figure 10 is a kind of structural schematic diagram of the device for detection link state that disclosure embodiment provides;
Figure 11 is the structural schematic diagram of the device for another detection link state that disclosure embodiment provides;
Figure 12 is a kind of structural schematic diagram for router that disclosure embodiment provides.
Specific implementation mode
To keep the purpose, technical scheme and advantage of disclosure embodiment clearer, below in conjunction with attached drawing to this public affairs The technical solution opened is clearly and completely described, it is clear that and described embodiment is a part of embodiment of the disclosure, Rather than whole embodiment.Based on the embodiment in the disclosure, those of ordinary skill in the art are not making creation Property labour under the premise of the every other embodiment that is obtained, belong to the range of disclosure protection.
The technical solution of the disclosure in order to better understand is first below described the SR technologies based on IPV6.
SR based on IPV6 uses source path selection mechanism, and after head node receives message, the follow-up of the packaged message turns The addresses IPV6 of all nodes in path are sent out, which is properly termed as SR Header (follow-up abbreviation SRH or SR);Work as message When passing through intermediate node successively, intermediate node carries out the SRH decapsulation successively, and the addresses corresponding IPV6 are taken out from SRH, And the destination IP as message continues to forward, until completing whole decapsulations of the SRH to terminal note.
Due to using source path selection mechanism, above-mentioned head node that can select arbitrary reachable path or purpose as needed Node, in addition to head node, other node Maintenance free path status.In order to realize the encapsulation of above-mentioned IPV6 messages, the SR of IPV6 Tunnel uses unidirectional tunnel, and relative to single tunnel common in IPV6, user only needs the head node in the unidirectional tunnel to match The route segment inventory (Segment List) forwarded for SR is set, the intermediate node and terminal note in the tunnels SR are without perceiving message Or the specific business involved by network.
The packing forms of header specifically can be as described in Table 1 in above-mentioned IPV6.
Table 1
As shown in Table 1, which includes above-mentioned IPV6 routines packed part and the relevant special package parts SR;It should IPV6 routines packed part can according to agreement RFC 2460 carry out standard packaging setting, be referred to as IPV6Header (after Continuous abbreviation IPV6H or IPV6);The relevant special package parts the SR are above-mentioned SRH.
Wherein, " extension header " field (being referred to as Next Header or NH field) is for showing the message internal layer The protocol type of encapsulation shows that protocol type is IPV4 (Internet Protocol Version for example, if NH=4 4, the Internet protocol of fourth edition);If NH=6, show that protocol type is TCP (Transmission Control Protocol transmission control protocols);If NH=43, show that protocol type is IPV6.
In above-mentioned packing forms, the meaning of other each fields is as follows:
" next stem " field:Next Header are referred to as, length is 8, indicates the protocol class of internal layer encapsulation Type, it is consistent with above-mentioned " extension header " field meanings.
" length of next stem " field:Hdr Ext Len are referred to as, numerical value is equal to the byte that SRH is occupied Number subtracts after 8 bytes again divided by 8, i.e. Hdr Ext Len=2n, n are the number of route segment inventory.
" route-type " field:Routing Type are referred to as, which could be provided as 4, indicate The route-type of the message route for section.
" remaining number of nodes " field:Segments Left are referred to as, which is used to identify the remaining section in the paths SR It counts out, often passes through a node, the numerical value in the field subtracts 1, and as Segments Left=0, equipment can be according to this word Section judges whether the tunnels the SR forwarding of the message terminates, and starts conventional pass-through mode, for example, IP address-based forwarding.
" route segment inventory " field:Segment List are referred to as, the addresses IPV6 for preserving 128 are wrapped altogether Path address containing all nodes passed through from head node to terminal note.
In addition, " next entrance " field (being referred to as Last entry fields), " mark " field (are referred to as Flags fields) and " label " field (being referred to as Tag fields) be not yet utilized, therefore these fields carried out by 0 it is initial Encapsulation.
It is the schematic diagram that message is forwarded through the tunnels SR in IPV6 referring to Fig. 1;It is usually wrapped in the tunnels SR in IPV6 The key node with the above-mentioned header function of update is included, and is only capable of inquiring and identifying the non-of the header specific field Key node;In Fig. 1, device A 1, device A 2 and device A 3 are key node, and equipment B is non-key node;Wherein, device A 1 For head node, device A 2 and equipment B are intermediate node, and device A 3 is terminal note.
Repeating process specifically comprises the following steps:
Step (1), device A 1 receive message, which enters the tunnels SR;Device A 1 message IPV6 load and Increase above-mentioned IPV6H and SRH between Ethernet ETH.
Specifically, device A 1 can determine that the message needs the key node passed through according to the destination address of message, and The addresses IPV6 of the key node are written in " route segment inventory " field in above-mentioned SRH, such as the device A 2 and equipment in Fig. 1 The addresses IPV6 of A3;Since equipment 1 is subsequently there are two the equipment of key node, above-mentioned " remaining number of nodes " is set as Segments Left=2.
After device A 1 completes above-mentioned encapsulation process, the source IP (i.e. SIP) of the message is set as the loopback port address of device A 1 (being referred to as loopback port address), the destination IP (i.e. DIP) of the message are set as first in above-mentioned route segment inventory The addresses layer IPV6, the i.e. addresses IPV6 of device A 2, and then forward the packet to equipment B.
Step (2) after equipment B receives message, the addresses IPV6 of device A 2 is found according to the DIP of message, by the report Text is forwarded to device A 2;In general, equipment B is only used for the addresses inquiry IPV6, and E-Packet, does not have identification SRH or editor more The function of new heading.
Step (3), after device A 2 receives message, " remaining number of nodes " field is updated to Segments Left=1;If Standby A2 finds next key node of the device A 2, the i.e. addresses IPV6 of device A 3 from route segment inventory, and former DIP is replaced The addresses IPV6 of the A3 are changed to, and then are forwarded the packet to device A 3 according to updated DIP.
Non-key node is also likely to be present between above equipment A2 and device A 3, these non-key nodes can form one Communication path between device A 2 and device A 3 can also form a plurality of communication path;When forming a communication path, these Non-key node can E-Packet successively in order, until device A 3;When forming a plurality of communication path, these non-key sections Point can be according to the message transfer amount of each communication path, and the specified communication path forwarding of the selections such as address parameter of message itself should Message, it is of course also possible to which random manner is taken to choose communication path.
Step (4), after device A 3 receives message, " remaining number of nodes " field is updated to Segments Left=0;When When Segments Left=0, show that the device A 3 is SR equipment terminal notes;Device A 3 is used as destination node, can delete in message Message is reduced into state when having just enter into device A 1, i.e. the message knot of IPV6 load and Ethernet ETH by IPV6H and SRH Structure.After message reduction, device A 3 is forwarded the packet to corresponding next node and is set according to the purpose IP address of message itself It is standby.
In actual implementation, the tunnels SR in above-mentioned IPV6 may have increasingly complex network structure, for example, in order to protect Networking stability is demonstrate,proved, the tunnels SR are deployed with main path and backup path.As shown in Fig. 2, device A 1 is head node, device A 4 is eventually Node;Between device A 1 and device A 4, device A 1, device A 2 and device A 4 form main path, device A 1, device A 3 and equipment A4 forms backup path;Wherein, the equipment B in main path, equipment C and equipment D are non-key node, i.e., only support the report of IPV6 Literary forwarding capability.
If main path breaks down, flow can be forwarded the packet and switch to backup path, avoid the feelings of network blockage Condition.In order to improve switch speed, BFD may be used, and (Bidirectional Forwarding Detection, two-way converting are detectd Survey) whether detection main path interrupts mechanism in real time or periodically, if BFD detects interruption, switch flow immediately to spare road Diameter, Fig. 3 are the switching schematic diagram of main/slave link.
With continued reference to Fig. 2, there are two communication links between device A 1 and device A 2, wherein one by device A 1, equipment B, equipment C and device A 2 form, and another is made of device A 1, equipment B, equipment D and device A 2, this two communication link is etc. Valence is route;Therefore, whether BFD detection messages or common data message may all walk appointing in this two equivalent routes Meaning one.
In addition, when message reaches equipment B, equipment B node is generally according to the relevant parameter in the IPV6H and SRH of message Or field (for example, DIP) carries out Hash calculation, to determine that the message is forwarded to equipment C or equipment D;Therefore, if BFD The IPV6H and SRH that detection messages and data message encapsulate is identical, and the result of Hash calculation will be identical, then the BFD detection messages The same path in above-mentioned two equivalent route would generally be selected with data message.
When above-mentioned BFD detection messages and data message have selected the road being made of device A 1, equipment B, equipment C and device A 2 When diameter, if the failure occurred between equipment B and device A 2, it will cause communication disruptions between device A 1 and device A 2;BFD machines System can perceive the interruption, and interrupt signal is reported to device A 1, and device A 1 can carry out the switching of main/slave link, will flow immediately Amount switches on the backup path that device A 1, device A 3 and device A 4 form.
The failure occurred between above equipment B and device A 2 may be that equipment C break down or equipment B and equipment C Between link break down (as shown in Figure 2), it is also possible to the link between equipment C and device A 2 breaks down.
But another equivalent route between equipment B and device A 2 is in normal connection status, BFD there is no interrupting Mechanism is during constantly detection main path break-make, it is more likely that communication that can be between discovering device A1 and device A 2 can be with By device A 1, equipment B, equipment D and device A 2 this route implementing, BFD mechanism is notified that device A 1 switches flow again It returns in main path.
In above process, between equipment B and device A 2 after failure, flow switches to backup path from main path, then Main path is switched back into again, and since main path did not interrupt really always, this switching concussion does not bring benefit, instead can The unstable of network is caused, thus user is it is not expected that this switching concussion being not necessarily to.
In order to avoid this switching is shaken, disclosure embodiment provides a kind of method of detection link state, the party Method is applied to the head node in the tunnels IPV6SR, as shown in figure 4, this method comprises the following steps:
Step S402 is detected and be whether there is equal-cost link on main path;
When disposing the tunnels SR in IPV6 networks, usually the tunnels SR are specified to need the key node passed through by head node Position, to control the flow direction of message;But it is difficult often the distribution situation for knowing the non-key node between key node, it is more difficult It whether there is equal-cost link in main path to determine.
In order to detect the equal-cost link on main path, multiple inspections can be transmitted between the head node and terminal note in the tunnels SR Observe and predict text;For multiple detection messages from the beginning during node-node transmission to terminal note, message itself preserves all nodes passed through, After detection messages reach destination node, then the message is back to head node;Head node inquires the message of return one by one, if institute There is the node preserved in detection messages all identical, then illustrate there is no equal-cost link on the main path, there is only a links;Such as The node preserved in all detection messages of fruit is not exactly the same, then illustrates that there are equal-cost links on the main path;Head node can The node preserved in detection messages to be further analyzed, to obtain the structure of more accurate equal-cost link.
Head node can also detect equal-cost link by other means, for example, can since head node, head node to The intermediate node A of connection send above-mentioned detection messages, to detect between head node and intermediate node A with the presence or absence of chain of equal value Road;After detection, then from intermediate node A to the next-hop intermediate node B being attached thereto above-mentioned detection messages are sent, successively class It pushes away, until terminal note is detected, to complete the equal-cost link detection process of entire primary link.
Step S404 carries out BFD detections if there is equal-cost link according to the double hair mechanism of preset message;Wherein, the report The instruction of Wen Shuanfa mechanism sends the BFD messages for carrying different message identifications;
If there is equal-cost link, then illustrate at least there are two not exactly the same communications between head node and terminal note Link;By taking two communication links as an example, head node can send two BFD detection messages;The two BFD detection messages are through above-mentioned The double hair mechanism processing of message carry different message identifications, and the concrete form of message identification can be digital, alphabetical or other Form;The message identification can be specifically arranged in the heading of detection messages, such as IPV6H or SRH.
When message reaches the node of divergence of equal-cost link, the node of divergence by relevant parameter in IPV6H and SRH or Field carries out Hash calculation, and above-mentioned message identification simultaneously participates in calculating, the meter that the corresponding message of different message identifications obtains at this time It is different to calculate result, you can so that the message for carrying different message identifications walks different equal-cost links.Above-mentioned node of divergence can be with It is interpreted as, the node which shares for equal-cost link, but the different nodes being connected with simultaneously between equal-cost link.
If there are three or more equal-cost links between head node and terminal note, using the double hair machines of above-mentioned preset message When system carries out BFD detections, two BFD detection messages for carrying different identification can be still sent, it is therein with random detection Two equal-cost links;It is of course also possible to according to the item number of equal-cost link, transmission carries the multiple BFD detection messages of different identification, To be detected simultaneously to multiple equal-cost links.
Step S406, if testing result is that main path is reachable, the link state that the main path is arranged is UP.
If terminal note receives the above-mentioned BFD detection messages of head node transmission, it will usually be sent to head node corresponding Back message;BFD detection messages are corresponded with back message;No matter head node sends how many a BFD detection messages, as long as connecing Have received one of back message, you can show that the main path is unobstructed state (i.e. UP states);If head node receives not To any one back message, then it may indicate that the main path is interrupt status (i.e. DOWN states), then needed at this time by flow It switches on backup path.
The method for the above-mentioned detection link state that disclosure embodiment provides, if there are equal-cost link on main path, Then according to the double hair mechanism of preset message, the BFD messages for carrying different message identifications are sent, to each equivalence on main path Link carries out BFD detections, if testing result is that main path is reachable, the link state that the main path is arranged is UP.Which In, when only detecting that all equal-cost links on main path interrupt, just main path is reported to interrupt, avoids wherein one etc. Cost path, which interrupts to switch caused by with regard to carrying out active-standby path switching, shakes, and improves the stability of network.
The method that disclosure embodiment provides another detection link state, this method further describe detection etc. Valence link, and carry out the specific implementation of BFD detections;It can be seen from the above, head node can send detection report to destination node Text whether there is equal-cost link to detect in main path, which is specifically described in present embodiment.This method is applied to The head node in the tunnels IPV6SR, as shown in figure 5, this method comprises the following steps:
Step S502 sends the first probe messages and the second probe messages, wherein this first by the main path in the tunnels SR The message identification that probe messages and the second probe messages carry is different, so that the non-key node in the tunnels SR is according to message identification Forward the first probe messages and the second probe messages;
It can be seen from the above, non-key node usually only has the addresses inquiry IPV6, and E-Packet, does not have identification SRH Or the function of editing and updating heading;In present embodiment, in order to make non-key node identification carry different message identifications Message can open detection function of the non-key node to the tunnels SR, that is, have the function of identifying relevant field in SRH.
Above-mentioned message identification can be arranged in heading, in still unemployed field, for example, message identification is arranged In SRH Flags fields, naturally it is also possible to be arranged in SRH Tag fields.The message identification can be different number Value, for example, 0x01,0x02;Since non-key node has had the function of identifying relevant field in SRH, non-key section Point is when receiving above-mentioned first probe messages and the second probe messages, can be according to message identification by the first probe messages and second Probe messages are forwarded by different ports respectively, so that the first probe messages and the second probe messages walk different chains of equal value Road.
In general, after the completion of the tunnels IPV6SR and corresponding BFD testing mechanisms structure, the main path in the tunnels SR includes Key node has determined;After BFD structure sessions are set up, head node begins to send out above-mentioned first probe messages and second and visits Text is observed and predicted, these probe messages are identical as common data message property, these probe messages are usually required by main path Key node, destination node is the terminal note on main path, i.e., the destination IP of probe messages is the IP of the tunnels SR terminal notes Location.
Step S504, receives corresponding first back message of the first probe messages and the second probe messages are second time corresponding Answer message;
When first probe messages and the second probe messages are transmitted in main path, in order to record the transmission road of probe messages Diameter, often by a node (including key node and non-key node), the node identification that probe messages can will be presently in, Or from the sending port identification record to probe messages of present node;Node identification or sending port mark can be recorded in In " section routing inventory " field of message, it can also be recorded in newly-increased IPV6 extension header or in the Load field of message, These marks can certainly be recorded using other forms, present embodiment is not construed as limiting this.
Fig. 6 show the transmission schematic diagram of the first probe messages and the second probe messages in main path;In Fig. 6, to visit Message accounting is surveyed to be specifically described for the sending port of present node mark;Wherein, solid arrow represents the first detection The transmission path of message, dotted arrow represent the transmission path of the second probe messages;First probe messages and the second detection report Literary branch carries message identification 0x01 and 0x02.
For the first probe messages, transmission process includes the following steps:
Step (1), port 11.1.1.1 of first probe messages through device A 1 are sent to equipment B, record port-mark 11.1.1.1;
Step (2), the IPV6H and SRH of B pairs of the first probe messages of equipment are analyzed, it is known that the pass of the message next-hop Key address of node is A2, and equipment B has been known that two paths reach device A 2, therefore, equipment B through table of query and routing A path can be selected to be transmitted for the first probe messages from two paths, for example, port of first probe messages through equipment B 12.1.1.1 it is sent to equipment C, and records port-mark 12.1.1.1;
Step (3), the IPV6H and SRH of C pairs of the first probe messages of equipment are analyzed, it is known that the pass of the message next-hop Key address of node is A2, thus port 13.1.1.1 of first probe messages through equipment C is sent to device A 2, and records end Mouth mark 13.1.1.1;
After device A 2 receives the first probe messages, the device A 2 is found from the route segment inventory of SRH for step (4) Former DIP, is replaced with the addresses IPV6 of the A4 by next key node, the i.e. addresses IPV6 of device A 4, so according to update after DIP the first probe messages are forwarded to device A 4, while recording equipment A2 sends the port-mark of the first probe messages 16.1.1.1。
Step (5) after device A 4 receives first probe messages, can generate the first back message and be sent to A1;This Above-mentioned whole port-marks of the first probe messages record are carried in one back message;The concrete form of first back message Can be unicast IPV6SR messages.
Similar with the above-mentioned transmission process of first probe messages, for the second probe messages, transmission process includes following steps Suddenly:
Step (1), port 11.1.1.1 of second probe messages through device A 1 are sent to equipment B, record port-mark 11.1.1.1;
Step (2), the IPV6H and SRH of B pairs of the second probe messages of equipment are analyzed, it is known that the pass of the message next-hop Key address of node is A2, and equipment B has been known that two paths reach device A 2, therefore, equipment B through table of query and routing A path can be selected to be transmitted for the first probe messages from two paths, for example, port of second probe messages through equipment B 14.1.1.1 it is sent to equipment D, and records port-mark 14.1.1.1;
Above-mentioned first probe messages and the second probe messages may reach equipment B simultaneously, it is also possible to successively reach equipment B; If it is reaching simultaneously, equipment B can be that first probe messages and the second probe messages distribute sending port at random, as long as full The sending port difference of foot the first probe messages and the second probe messages;It is reached if it is priority, with the first probe messages For first reaching, equipment B can be first the first probe messages random selection sending port, for example, port 12.1.1.1 has been selected, And record port 12.1.1.1 and sent the probe messages for carrying message identification 0x01, it is the second spy to avoid equipment B It observes and predicts text and selects port 12.1.1.1 again, equipment B can only select the port in addition to the 12.1.1.1 of port to send the at this time Two probe messages, for example, port 14.1.1.1.
Certainly, equipment B can preassign message identification and the correspondence of sending port, for example, message identification 0x01 Corresponding ports are identified as 12.1.1.1, and message identification 0x02 corresponding ports are identified as 14.1.1.1;At this point, as long as equipment B is searched The correspondence, you can obtain the port for sending probe messages.
Step (3), the IPV6H and SRH of D pairs of the second probe messages of equipment are analyzed, it is known that the pass of the message next-hop Key address of node is A2, thus port 15.1.1.1 of second probe messages through equipment D is sent to device A 2, and records end Mouth mark 15.1.1.1;
After device A 2 receives the second probe messages, the device A 2 is found from the route segment inventory of SRH for step (4) Former DIP, is replaced with the addresses IPV6 of the A4 by next key node, the i.e. addresses IPV6 of device A 4, so according to update after DIP the second probe messages are forwarded to device A 4, while recording equipment A2 sends the port-mark of the second probe messages 16.1.1.1。
Step (5) after device A 4 receives second probe messages, can generate the second back message and be sent to A1;This Above-mentioned whole port-marks of the second probe messages record are carried in two back messages;The concrete form of second back message Can be unicast IPV6SR messages.
So far, head node has received corresponding first back message of the first probe messages and the second probe messages are corresponding Second back message, with continued reference to Fig. 5:
Step S506 is determined if the next-hop that the first back message and the second back message carry is different on main path There are equal-cost links.
Head node can compare the port-mark recorded in the first back message and the second back message one by one, such as Sequence between the port-mark and port-mark of fruit record is identical, then may indicate that there is no equivalences on primary link Link;If the sequence between the port-mark and port-mark of record is not exactly the same, it can identify on primary link and deposit In equal-cost link.
Following table 2 is the first probe messages and the second probe messages after transmission path shown in above-mentioned Fig. 6, the port of record Mark;
Table 2
First probe messages Second probe messages
11.1.1.1 11.1.1.1
12.1.1.1 14.1.1.1
13.1.1.1 15.1.1.1
16.1.1.1 16.1.1.1
As shown in Table 2, the first probe messages and the second probe messages record have different port-marks, therefore, shown in Fig. 6 Main path on there are equal-cost links.
Step S508 passes through main path and sends the first BFD messages and the 2nd BFD messages, wherein the first BFD messages and 2nd BFD messages carry different message identifications, so that the non-key node in the tunnels SR forwards first according to message identification BFD messages and the 2nd BFD messages;
The message identification that first BFD messages and the 2nd BFD messages carry can equally be arranged in heading not yet by In the field utilized, for example, SRH Flags fields or Tag fields.The message identification may be different numerical value, example Such as, 0x01,0x02.The first probe messages are sent with above-mentioned non-key node and the mode of the second probe messages is similar, it is non-key First BFD messages and the 2nd BFD messages can also be sent on different equal-cost links by node according to message identification.
First BFD messages and the 2nd BFD messages can be sent simultaneously, can also be sent according to sequencing;First BFD Message and the 2nd BFD messages can only be sent once, can also repeatedly be sent in batches.
Step S510 show that main path is reachable if receiving the BFD back messages of main path return in setting time Testing result;
If the equal-cost link of main path is unimpeded, head node can receive the BFD back messages of the first BFD messages, And the 2nd BFD messages BFD back messages;If in the equal-cost link on primary link, failure has occurred in part of links, due to What the first BFD messages and the 2nd BFD messages were walked is different equal-cost link, then terminal note is probably only capable of receiving one of them BFD messages, and return to a BFD back message to head node.
No matter head node receives how many a BFD back messages, as long as head node receives at least one in setting time A BFD back messages then may indicate that main path is unimpeded state, i.e. main path is reachable.
Step S512, the link state that main path is arranged are UP.
Correspondingly, if head node BFD back message in setting time is all not received by, it may indicate that master Path is interrupt status, i.e. main path is unreachable;At this point it is possible to which the link state that main path is arranged is DOWN;When head node is examined When the link state for measuring main path is DOWN, flow can be switched immediately to backup path.
The method of above-mentioned detection link state whether there is equal-cost link by sending probe messages and detecting on main path; If it does, the BFD messages for carrying different message identifications are sent in the form of double hairs, to each chain of equal value on main path Road carries out BFD detections and just main path is reported to interrupt only when head node does not receive any BFD back messages, avoided A wherein equative route interrupts just carry out active-standby path switching caused by switching concussion, improve the stability of network.
The method that disclosure embodiment provides another detection link state;In view of the timeliness of probe messages, Head node is after sending probe messages, it usually needs the rational period of setting one, (in the embodiment, the period was logical Cross the realization of T1 timers), for receiving the corresponding back message of probe messages, and carry out the processes such as subsequent BFD detections.
In addition, in most cases, whether enterprise network or carrier network, network total environment are all opposite It is stable, network failure and probability of happening is relatively low the case where cause to interrupt;In view of sending above-mentioned probe messages and BFD reports Wen Jun is likely to increase the expense of network link, another period can be arranged, and (in the embodiment, which passes through T2 Timer is realized), probe messages are periodically sent to assess whether network structure changes according to the period, Jin Erchong The new transmission mechanism for determining BFD messages.In general, if current network is relatively stable, and network structure variation is little, the period It could be provided as larger numerical value.
As shown in fig. 7, this method specifically comprises the following steps:
Step S702 sends the first probe messages and the second probe messages, wherein this first by the main path in the tunnels SR The message identification that probe messages and the second probe messages carry is different, so that the non-key node in the tunnels SR is according to message identification Forward the first probe messages and the second probe messages;
Step S704 starts timer if completing the transmission of the first probe messages and the second probe messages;The timer It can be realized by above-mentioned T1 timers;
Step S706 receives corresponding first back message of the first probe messages and second in the timing duration of timer Corresponding second back message of probe messages;If receiving the first back message and the second back message, step S708 is executed; If receiving one of the first back message or the second back message, step S710 is executed;If being not received by any response Message executes step S712;
Step S708 judges whether the next-hop that the first back message and the second back message carry is identical;If so, holding Row step S710, if not, executing step S714;
If receiving above-mentioned first back message and the second back message in the timing duration of timer, terminate T1 Timer after above-mentioned steps S708 is finished, starts T2 timers.In the timing duration of T2 timers, step is executed S710 or step S714.
Step S710 carries out BFD detections according to preset message single-shot mechanism, and message single-shot mechanism instruction BFD messages are taken Message identification is not carried with identical message identification or, executes step S716;
If only received (i.e. after T1 timers timing) in the timing duration of timer the first back message or One of second back message then shows that there may be equal-cost links in main path, but possible one of equal-cost link interrupts, and leads Corresponding probe messages are caused to be not sent to terminal note;At this point, the state of main path is equivalent to, there is no equal-cost links.
Step S712 determines that main path is unreachable, and the link state that main path is arranged is DOWN, switches flow immediately to standby Use path.
Step S714 determines that there are equal-cost links on main path, and BFD detections are carried out according to the double hair mechanism of preset message;
Step S716, judges testing result;If testing result is that main path is reachable, step S718 is executed;If detection As a result it is that main path is unreachable, executes step S712.
Step S718, the link state that main path is arranged are UP.
In general, head node when first time sending probe messages, can first start T1 timers, T1 timers are closed or meter When after, restart T2 timers;Since the transmission speed of message in a network is very fast, thus above-mentioned timing duration, i.e. T1 The numerical value of timer can be far smaller than the numerical value of T2 timers.
It can be seen from the above, T2 timers are used to control the sending cycle of probe messages, therefore, the transmission opportunity of probe messages It can be the time point of the T1 timer timing durations before distance T2 timer timing terminates, as shown in figure 8, due to T1 timings The duration of each timing of device is uncertain, and in this way, can make T1 timers not influences the time-count cycle of T2 timers, i.e., T1 timers and T2 timers can be mutual indepedent.Certainly, above-mentioned T2 timers may be set to be in T1 timer timing knots Restart timing after beam.
Assuming that current BFD messages are using double hair mechanism, after sending two probe messages again, if it find that responding Port-mark all same in message, then the BFD messages in the period can be using single-shot mechanism, i.e. the transmission mechanism of BFD messages A length of period is updated when can be with the timing of T2 timers.
The method of above-mentioned detection link state, head node can clearly perceive non-pass on main path by sending probe messages Key node is with the presence or absence of routing situation of equal value so that BFD messages carry out double hairs under reasonable conditions, to on main path Each equal-cost link carry out BFD detections just report main road only when head node does not receive any BFD back messages Diameter interrupts, and avoids a wherein equative route and interrupts to switch caused by with regard to carrying out active-standby path switching and shake, improves network Stability.
Embodiment further provides the methods of another detection link state for the disclosure;This method is applied to the tunnels IPV6SR In intermediate node, this method realizes on the basis of method of the above application in head node;As shown in figure 9, this method includes such as Lower step:
Step S902 receives protocol massages, wherein the protocol massages include probe messages and BFD messages;
Step S904 checks the message identification in the heading of protocol massages and next key node;
Step S906, if there are at least two equal-cost links between current intermediate node and next key node, Processing is forwarded to protocol massages according to message identification.
In the method for above-mentioned detection link state, if there is at least two between intermediate node and next key node Equal-cost link whether there is equal-cost link, and equity then according to message identification to forwarding the protocol massages to detect on main path Valence link carries out BFD detections;Which can be caused by avoid wherein an equative route be interrupted with regard to carrying out active-standby path switching Switching concussion, improves the stability of network.
It should be noted that above-mentioned each method embodiment is described in a progressive manner, each embodiment emphasis What is illustrated is all the difference with other embodiment, and identical similar part is mutually referring to i.e. between each embodiment It can.
Corresponding to above method embodiment, a kind of structural representation of the device of detection link state shown in Figure 10 Figure, the device are set to the head node in the tunnels IPV6SR, which includes:
Equal-cost link detection module 1000 whether there is equal-cost link for detecting on main path;
First BFD detection modules 1002, for if there is equal-cost link, being carried out according to the double hair mechanism of preset message BFD is detected;Wherein, the double hair mechanism instructions of message send the BFD messages for carrying different message identifications;
Setup module 1004, if being that main path is reachable for testing result, the link state that the main path is arranged is UP.
The device for the above-mentioned detection link state that disclosure embodiment provides, if there are equal-cost link on main path, Then according to the double hair mechanism of preset message, the BFD messages for carrying different message identifications are sent, to each equivalence on main path Link carries out BFD detections, if testing result is that main path is reachable, the link state that the main path is arranged is UP.Which In, when only detecting that all equal-cost links on main path interrupt, just main path is reported to interrupt, avoids wherein one etc. Cost path, which interrupts to switch caused by with regard to carrying out active-standby path switching, shakes, and improves the stability of network.
Above-mentioned equal-cost link detection module, is additionally operable to:The first probe messages and second are sent by the main path in the tunnels SR Probe messages, wherein the message identification that the first probe messages and the second probe messages carry is different, so that the non-pass in the tunnels SR Key node forwards the first probe messages and the second probe messages according to message identification;It is first time corresponding to receive the first probe messages Answer message and corresponding second back message of the second probe messages;Under if the first back message and the second back message carry One jumps difference, determines that there are equal-cost links on main path.
Above-mentioned equal-cost link detection module, is additionally operable to:If completing the transmission of the first probe messages and the second probe messages, Start timer;Corresponding first back message of the first probe messages and the second detection report are received in the timing duration of timer Corresponding second back message of text;Device further includes the 2nd BFD detection modules, if for the timing duration in the first timer The first back message or the second back message are inside only received, BFD detections, message list are carried out according to preset message single-shot mechanism Hair mechanism instruction BFD messages carry identical message identification or do not carry message identification.
Above-mentioned first BFD detection modules, are additionally operable to:The first BFD messages and the 2nd BFD messages are sent by main path, In, the first BFD messages and the 2nd BFD messages carry different message identifications so that the non-key node in the tunnels SR according to Message identification forwards the first BFD messages and the first BFD messages;If the BFD for receiving main path return in setting time is returned Message is answered, obtains the reachable testing result of main path.
Above-mentioned message identification is set to SRH Flags fields.
The structural schematic diagram of the device of another detection link state shown in Figure 11, the device are set to IPV6SR Intermediate node in tunnel, the device include:
Message receiving module 1102, for receiving protocol massages, wherein protocol massages include probe messages and BFD messages;
Check module 1104, the message identification in heading for checking protocol massages and next key node;
Packet forwarding module 1106, if there are at least two equal-cost links for next key node, according to message Mark is forwarded processing to protocol massages;When message identification is that head node carries out BFD detections according to the double hair mechanism of message, send BFD messages in the message identification that carries.
In the device of above-mentioned detection link state, if there is at least two between intermediate node and next key node Equal-cost link whether there is equal-cost link, and equity then according to message identification to forwarding the protocol massages to detect on main path Valence link carries out BFD detections;Which can be caused by avoid wherein an equative route be interrupted with regard to carrying out active-standby path switching Switching concussion, improves the stability of network.
Present embodiments provide for a kind of routers corresponding with above method embodiment.Figure 12 is the router Structural schematic diagram, as shown in figure 12, the equipment include processor 1201 and memory 1202;Wherein, memory 1202 is for depositing One or more computer instruction is stored up, one or more computer instruction is executed by processor, to realize above-mentioned detection link shape The method of state.
Router shown in Figure 12 further includes bus 1203 and forwarding chip 1204, processor 1201, forwarding chip 1204 It is connected by bus 1203 with memory 1202.The router can be network edge device.
Wherein, memory 1202 may include high-speed random access memory (RAM, Random Access Memory), May also further include non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.Bus 1203 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data/address bus, control Bus etc..For ease of indicating, only indicated with a four-headed arrow in Figure 12, it is not intended that an only bus or a type Bus.
Forwarding chip 1204 will be sealed for being connect at least one user terminal and other network element by network interface The IPv4 messages or IPv6 messages installed is sent to the user terminal by network interface.
Processor 1201 may be a kind of IC chip, the processing capacity with signal.It is above-mentioned during realization Each step of method can be completed by the integrated logic circuit of the hardware in processor 1201 or the instruction of software form.On The processor 1201 stated can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), application-specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or Person other programmable logic device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute sheet Disclosed each method, step and logic diagram in invention embodiment.General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.The step of method in conjunction with disclosed in embodiment of the present invention, can direct body Be now that hardware decoding processor executes completion, or in decoding processor hardware and software module combine and execute completion.It is soft Part module can be located at random access memory, and flash memory, read-only memory, programmable read only memory or electrically erasable programmable are deposited In the storage medium of this fields such as reservoir, register maturation.The storage medium is located at memory 1202, and the reading of processor 1201 is deposited Information in reservoir 1202, in conjunction with its hardware complete aforementioned embodiments method the step of.
Embodiment of the present invention additionally provides a kind of machine readable storage medium, and machine readable storage medium storage is organic Device executable instruction, for the machine-executable instruction when being called and being executed by processor, machine-executable instruction promotes processor The method for realizing above-mentioned detection link state, specific implementation can be found in method embodiment, and details are not described herein.
The technique effect and preceding method of the router that embodiment of the present invention is provided, realization principle and generation are implemented Mode is identical, and to briefly describe, device embodiments part does not refer to place, can refer in corresponding in preceding method embodiment Hold.
In several embodiments provided herein, it should be understood that disclosed device and method can also lead to Other modes are crossed to realize.Device embodiments described above are only schematical, for example, the flow chart in attached drawing and Block diagram show the device of multiple embodiments according to the present invention, method and computer program product system in the cards Framework, function and operation.In this regard, each box in flowchart or block diagram can represent a module, program segment or generation A part for code, the part of the module, section or code include one or more for realizing defined logic function Executable instruction.It should also be noted that at some as in the realization method replaced, the function that is marked in box can also be with Occur different from the sequence marked in attached drawing.For example, two continuous boxes can essentially be basically executed in parallel, they Sometimes it can also execute in the opposite order, this is depended on the functions involved.It is also noted that block diagram and or flow chart In each box and the box in block diagram and or flow chart combination, the special of function or action as defined in executing can be used Hardware based system is realized, or can be realized using a combination of dedicated hardware and computer instructions.
In addition, each function module or unit in each embodiment of the present invention can integrate to form one solely Vertical part can also be modules individualism, can also two or more modules be integrated to form one it is independent Part.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer read/write memory medium.Based on this understanding, the technical solution of the disclosure is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) execute all or part of step of each embodiment the method for the disclosure Suddenly.And storage medium above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), is deposited mobile hard disk at random The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic disc or CD.
Finally it should be noted that:Embodiment described above, the only specific implementation mode of the disclosure, to illustrate this public affairs The technical solution opened, rather than its limitations, the protection domain of the disclosure are not limited thereto, although with reference to aforementioned embodiments pair The disclosure is described in detail, it will be understood by those of ordinary skill in the art that:Any technology for being familiar with the art Personnel can still modify to the technical solution recorded in aforementioned embodiments in the technical scope that the disclosure discloses Or variation or equivalent replacement of some of the technical features can be readily occurred in;And these modifications, variation or replacement, The spirit and scope for disclosure embodiment technical solution that it does not separate the essence of the corresponding technical solution, should all cover in this public affairs Within the protection domain opened.Therefore, the protection domain of the disclosure shall be subject to the protection scope of the claim.

Claims (14)

1. a kind of method of detection link state, which is characterized in that the method is applied to the head node in the tunnels IPV6SR, described Method includes:
It detects and whether there is equal-cost link on main path;
If there is equal-cost link, BFD detections are carried out according to the double hair mechanism of preset message;Wherein, the double hair mechanism of the message It indicates to send the BFD messages for carrying different message identifications;
If testing result is that the main path is reachable, the link state that the main path is arranged is UP.
2. according to the method described in claim 1, it is characterized in that, whether there is the step of equal-cost link on the detection main path Suddenly, including:
The first probe messages and the second probe messages are sent by the main path in the tunnels SR, wherein the first detection report The literary message identification carried with second probe messages is different, so that the non-key node in the tunnels SR is according to the report Text mark forwards first probe messages and second probe messages;
Receive corresponding first back message of first probe messages and corresponding second back message of the second probe messages;
If the next-hop that first back message and the second back message carry is different, determine on the main path exist etc. Valence link.
3. according to the method described in claim 2, it is characterized in that, reception first probe messages are first time corresponding The step of answering message and the second probe messages corresponding second back message, including:
If completing the transmission of first probe messages and the second probe messages, start timer;
Corresponding first back message of first probe messages and the second detection are received in the timing duration of the timer Corresponding second back message of message;
The method further includes:If only received in the timing duration of first timer first back message or Second back message carries out BFD detections, the message single-shot mechanism instruction BFD reports according to preset message single-shot mechanism Text carries identical message identification or does not carry message identification.
4. according to the method described in claim 1, it is characterized in that, described carry out BFD inspections according to the double hair mechanism of preset message The step of survey, including:
The first BFD messages and the 2nd BFD messages are sent by the main path, wherein the first BFD messages and described second BFD messages carry different message identifications, so that the non-key node in the tunnels SR is forwarded according to the message identification The first BFD messages and the 2nd BFD messages;
If receiving the BFD back messages that the main path returns in setting time, the reachable inspection of the main path is obtained Survey result.
5. method according to claim 2 or 4, which is characterized in that the message identification is set to SRH Flags words Section.
6. a kind of method of detection link state, which is characterized in that the method is applied to the intermediate node in the tunnels IPV6SR, The method includes:
Receive protocol massages, wherein the protocol massages include probe messages and BFD messages;
Check the message identification in the heading of the protocol massages and next key node;
If there are at least two equal-cost links between current intermediate node and next key node, according to the report Text mark is forwarded processing to the protocol massages;The message identification is that head node carries out BFD according to the double hair mechanism of message When detection, the message identification that is carried in the BFD messages of transmission.
7. a kind of device of detection link state, which is characterized in that described device is set to the head node in the tunnels IPV6SR, described Device includes:
Equal-cost link detection module whether there is equal-cost link for detecting on main path;
First BFD detection modules, for if there is equal-cost link, BFD detections to be carried out according to the double hair mechanism of preset message;Its In, the double hair mechanism instructions of the message send the BFD messages for carrying different message identifications;
Setup module, if being that the main path is reachable for testing result, the link state that the main path is arranged is UP.
8. device according to claim 7, which is characterized in that the equal-cost link detection module is additionally operable to:
The first probe messages and the second probe messages are sent by the main path in the tunnels SR, wherein the first detection report The literary message identification carried with second probe messages is different, so that the non-key node in the tunnels SR is according to the report Text mark forwards first probe messages and second probe messages;
Receive corresponding first back message of first probe messages and corresponding second back message of the second probe messages;
If the next-hop that first back message and the second back message carry is different, determine on the main path exist etc. Valence link.
9. device according to claim 8, which is characterized in that the equal-cost link detection module is additionally operable to:
If completing the transmission of first probe messages and the second probe messages, start timer;
Corresponding first back message of first probe messages and the second detection are received in the timing duration of the timer Corresponding second back message of message;
Described device further includes the 2nd BFD detection modules, if for only being received in the timing duration of first timer To first back message or second back message, BFD detections, the report are carried out according to preset message single-shot mechanism Literary single-shot mechanism instruction BFD messages carry identical message identification or do not carry message identification.
10. device according to claim 7, which is characterized in that the first BFD detection modules are additionally operable to:
The first BFD messages and the 2nd BFD messages are sent by the main path, wherein the first BFD messages and described second BFD messages carry different message identifications, so that the non-key node in the tunnels SR is forwarded according to the message identification The first BFD messages and the 2nd BFD messages;
If receiving the BFD back messages that the main path returns in setting time, the reachable inspection of the main path is obtained Survey result.
11. the device according to claim 8 or 10, which is characterized in that the message identification is set to SRH Flags Field.
12. a kind of device of detection link state, which is characterized in that described device is set to the middle node in the tunnels IPV6SR Point, described device include:
Message receiving module, for receiving protocol massages, wherein the protocol massages include probe messages and BFD messages;
Check module, the message identification in heading for checking the protocol massages and next key node;
Packet forwarding module, if for there is at least two etc. between current intermediate node and next key node Valence link is forwarded processing according to the message identification to the protocol massages;The message identification is head node according to report The message identification carried when Wen Shuanfa mechanism carries out BFD detections, in the BFD messages of transmission.
13. a kind of router, which is characterized in that including processor and machine readable storage medium, the machine readable storage is situated between Matter is stored with the machine-executable instruction that can be executed by the processor, and the processor executes the machine-executable instruction To realize claim 1 to 6 any one of them method.
14. a kind of machine readable storage medium, which is characterized in that the machine readable storage medium is stored with the executable finger of machine It enables, for the machine-executable instruction when being called and being executed by processor, the machine-executable instruction promotes the processor Realize claim 1 to 6 any one of them method.
CN201810528568.9A 2018-05-29 2018-05-29 Detect the method, apparatus and router of link state Pending CN108809759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810528568.9A CN108809759A (en) 2018-05-29 2018-05-29 Detect the method, apparatus and router of link state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810528568.9A CN108809759A (en) 2018-05-29 2018-05-29 Detect the method, apparatus and router of link state

Publications (1)

Publication Number Publication Date
CN108809759A true CN108809759A (en) 2018-11-13

Family

ID=64090789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810528568.9A Pending CN108809759A (en) 2018-05-29 2018-05-29 Detect the method, apparatus and router of link state

Country Status (1)

Country Link
CN (1) CN108809759A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981458A (en) * 2019-03-08 2019-07-05 华为技术有限公司 A kind of method, network node and the system of determining message forwarding path
CN110224886A (en) * 2019-05-31 2019-09-10 新华三技术有限公司 Tunnel method for detecting connectivity, device and network edge device
CN110535761A (en) * 2019-09-30 2019-12-03 北京华三通信技术有限公司 Message forwarding method and device
CN111385199A (en) * 2018-12-28 2020-07-07 瞻博网络公司 Compressed routing header
CN111490933A (en) * 2020-03-31 2020-08-04 新华三信息安全技术有限公司 Bidirectional forwarding detection switching method and edge device
CN111669422A (en) * 2019-03-08 2020-09-15 华为技术有限公司 Message transmission method and device
CN111917643A (en) * 2020-07-17 2020-11-10 中盈优创资讯科技有限公司 Seamless bidirectional forwarding detection method and device for segmented routing tunnel
WO2021036334A1 (en) * 2019-08-27 2021-03-04 南京中兴软件有限责任公司 Methods and apparatuses for sending and receiving segment routing traffic engineering policy, network element, and computer-readable storage medium
CN113037622A (en) * 2019-12-24 2021-06-25 华为数字技术(苏州)有限公司 System and method for preventing BFD oscillation
CN113489613A (en) * 2021-07-16 2021-10-08 锐捷网络股份有限公司 Message forwarding method and device
CN113542059A (en) * 2021-06-29 2021-10-22 新华三大数据技术有限公司 Segment routing multi-path BFD detection method, device and storage medium
CN113595897A (en) * 2021-08-13 2021-11-02 新华三信息安全技术有限公司 Path detection method and device
WO2022000264A1 (en) * 2020-06-30 2022-01-06 新华三技术有限公司 Fault detection method and apparatus, and pe device
WO2022063113A1 (en) * 2020-09-23 2022-03-31 华为技术有限公司 Method for selecting packet transmission path, and device and medium
CN115361305A (en) * 2022-07-22 2022-11-18 鹏城实验室 Network monitoring method, system, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480753A (en) * 2010-11-24 2012-05-30 中兴通讯股份有限公司 Link state detecting method and device
CN106549819A (en) * 2015-09-22 2017-03-29 华为技术有限公司 A kind of connective detection method, controller and equipment
CN106789438A (en) * 2016-12-29 2017-05-31 杭州迪普科技股份有限公司 A kind of device connectivity detection method and device
CN107342908A (en) * 2016-11-30 2017-11-10 新华三技术有限公司 A kind of method and apparatus for sending bidirectional forward detection report

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480753A (en) * 2010-11-24 2012-05-30 中兴通讯股份有限公司 Link state detecting method and device
CN106549819A (en) * 2015-09-22 2017-03-29 华为技术有限公司 A kind of connective detection method, controller and equipment
CN107342908A (en) * 2016-11-30 2017-11-10 新华三技术有限公司 A kind of method and apparatus for sending bidirectional forward detection report
CN106789438A (en) * 2016-12-29 2017-05-31 杭州迪普科技股份有限公司 A kind of device connectivity detection method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
何晓明等: "《电信科学》", 《电信科学》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11902153B1 (en) 2018-12-28 2024-02-13 Juniper Networks, Inc. Compressed routing header
CN111385199A (en) * 2018-12-28 2020-07-07 瞻博网络公司 Compressed routing header
CN111385199B (en) * 2018-12-28 2022-11-18 瞻博网络公司 Compressed routing header
US11956148B2 (en) 2019-03-08 2024-04-09 Huawei Technologies Co., Ltd. Packet transmission method and device
CN111669422B (en) * 2019-03-08 2022-03-11 华为技术有限公司 Message transmission method and device
CN111669422A (en) * 2019-03-08 2020-09-15 华为技术有限公司 Message transmission method and device
WO2020182085A1 (en) * 2019-03-08 2020-09-17 华为技术有限公司 Transmission method and device for message
CN109981458A (en) * 2019-03-08 2019-07-05 华为技术有限公司 A kind of method, network node and the system of determining message forwarding path
CN110224886A (en) * 2019-05-31 2019-09-10 新华三技术有限公司 Tunnel method for detecting connectivity, device and network edge device
WO2021036334A1 (en) * 2019-08-27 2021-03-04 南京中兴软件有限责任公司 Methods and apparatuses for sending and receiving segment routing traffic engineering policy, network element, and computer-readable storage medium
CN110535761A (en) * 2019-09-30 2019-12-03 北京华三通信技术有限公司 Message forwarding method and device
CN113037622B (en) * 2019-12-24 2024-01-05 华为数字技术(苏州)有限公司 System and method for preventing BFD from vibrating
CN113037622A (en) * 2019-12-24 2021-06-25 华为数字技术(苏州)有限公司 System and method for preventing BFD oscillation
CN111490933A (en) * 2020-03-31 2020-08-04 新华三信息安全技术有限公司 Bidirectional forwarding detection switching method and edge device
WO2022000264A1 (en) * 2020-06-30 2022-01-06 新华三技术有限公司 Fault detection method and apparatus, and pe device
CN111917643A (en) * 2020-07-17 2020-11-10 中盈优创资讯科技有限公司 Seamless bidirectional forwarding detection method and device for segmented routing tunnel
WO2022063113A1 (en) * 2020-09-23 2022-03-31 华为技术有限公司 Method for selecting packet transmission path, and device and medium
CN113542059B (en) * 2021-06-29 2022-08-30 新华三大数据技术有限公司 Segment routing multipath BFD detection method, device and storage medium
CN113542059A (en) * 2021-06-29 2021-10-22 新华三大数据技术有限公司 Segment routing multi-path BFD detection method, device and storage medium
CN113489613B (en) * 2021-07-16 2024-03-19 锐捷网络股份有限公司 Message forwarding method and device
CN113489613A (en) * 2021-07-16 2021-10-08 锐捷网络股份有限公司 Message forwarding method and device
CN113595897A (en) * 2021-08-13 2021-11-02 新华三信息安全技术有限公司 Path detection method and device
CN115361305B (en) * 2022-07-22 2023-09-26 鹏城实验室 Network monitoring method, system, terminal and storage medium
CN115361305A (en) * 2022-07-22 2022-11-18 鹏城实验室 Network monitoring method, system, terminal and storage medium

Similar Documents

Publication Publication Date Title
CN108809759A (en) Detect the method, apparatus and router of link state
US11533258B2 (en) In-situ passive performance measurement in a network environment
JP7479490B2 (en) Packet processing method and apparatus, network device, and storage medium
CN111953604B (en) Method and device for providing business service for business flow
US10063464B2 (en) Protection switched source routing
US11296972B2 (en) Scalable network path tracing
WO2019210769A1 (en) Explicit routing with network function encoding
US9800493B2 (en) Routing messages in a computer network using deterministic and probalistic source routes
US20220321449A1 (en) Centralized error telemetry using segment routing header tunneling
RU2493677C2 (en) Method and router for implementing mirroring
JP7468969B2 (en) Apparatus for use in a first network node and an apparatus for use in a controller
CN109039919B (en) Forwarding path determining method, device, system, computer equipment and storage medium
JP6443864B2 (en) Method, apparatus and system for implementing packet loss detection
CN112868214B (en) Coordinated load transfer OAM records within packets
WO2017000802A1 (en) Service fault location method and device
WO2015184771A1 (en) Method and node device for operation, administration, and maintenance of service function chaining
CN107547311B (en) Flow statistical method and device
US20220263746A1 (en) Method for monitoring running state of peer, apparatus, and storage medium
CN114189564A (en) Message transmission method, device and system
CN104506369A (en) Packet loss position detecting method and device
CN111147376B (en) Route updating method, device, equipment and medium
KR101566139B1 (en) Pseudowire extended group messaging in a packet switched network
Borokhovich et al. The show must go on: Fundamental data plane connectivity services for dependable SDNs
US20160156480A1 (en) Switching devices
CN111385195B (en) Information processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181113

RJ01 Rejection of invention patent application after publication