CN112565076A - Method, device and system for forwarding critical path information based on ISIS protocol - Google Patents

Method, device and system for forwarding critical path information based on ISIS protocol Download PDF

Info

Publication number
CN112565076A
CN112565076A CN201910850982.6A CN201910850982A CN112565076A CN 112565076 A CN112565076 A CN 112565076A CN 201910850982 A CN201910850982 A CN 201910850982A CN 112565076 A CN112565076 A CN 112565076A
Authority
CN
China
Prior art keywords
isis
node
control information
signaling control
pdu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910850982.6A
Other languages
Chinese (zh)
Inventor
王爱俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201910850982.6A priority Critical patent/CN112565076A/en
Publication of CN112565076A publication Critical patent/CN112565076A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/06Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a critical path information forwarding method, device and system based on an ISIS protocol, and relates to the field of IP network intellectualization. The method comprises the following steps: a first ISIS node receives ISIS signaling control information, wherein the ISIS signaling control information is encapsulated with key path information; after relevant information of the node in the ISIS signaling control information is removed, packaging the rest ISIS signaling control information in PDU (protocol data Unit), and sending the PDU to the next ISIS node according to the received critical path information; and if the next ISIS node is the end ISIS node, the end ISIS node processes the ISIS signaling control information in the received PDU and sends the processing result to the controller. The method and the device realize end-to-end quality assurance facing to key services.

Description

Method, device and system for forwarding critical path information based on ISIS protocol
Technical Field
The present disclosure relates to the field of IP network intelligence, and in particular, to a critical path information forwarding method, device, and system based on an ISIS (Intermediate system to Intermediate system) protocol.
Background
An SDN (Software Defined Network) is a novel Network innovation architecture, and is an implementation manner of Network virtualization. Under the SDN architecture, the control plane and the data plane of the network equipment are separated, so that the flexible control of network flow is realized. However, in the related art, the end-to-end quality facing the critical service is not guaranteed.
Disclosure of Invention
The technical problem to be solved by the present disclosure is to provide a method, an apparatus and a system for forwarding critical path information based on an ISIS protocol, so as to achieve end-to-end quality assurance for critical services.
According to an aspect of the present disclosure, a critical path information forwarding method based on an ISIS protocol is provided, including: the method comprises the steps that a first intermediate system receives ISIS signaling control information from an ISIS node of the intermediate system, wherein the ISIS signaling control information is encapsulated with key path information; after removing the relevant information of the node in the ISIS signaling control information, packaging the rest ISIS signaling control information in a Packet Data Unit (PDU), and sending the PDU to the next ISIS node according to the received critical path information; and if the next ISIS node is the end ISIS node, the end ISIS node processes the ISIS signaling control information in the received PDU and sends the processing result to the controller.
In some embodiments, if the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by the controller; and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
In some embodiments, the PDU includes a path identification field, a control field, a system identification field, and reserved bits; wherein, the path identification field is used for identifying the variable of the end-to-end path; the control field is used for identifying a label corresponding to an outgoing interface from the current ISIS node to the last intermediate ISIS node or an IP address of the next ISIS node, and identifying a controller address corresponding to the end ISIS node; the system identification field is used to identify the ISIS node on the end-to-end path.
In some embodiments, if a first ISIS node of two adjacent ISIS nodes is located at a first level and a second ISIS node is located at a second level, the border router of the first level converts the first level PDUs into second level PDUs; if the first ISIS node of the two adjacent ISIS nodes is located at the second level and the second ISIS node is located at the first level, the border router of the first level converts the second level PDU into the first level PDU.
In some embodiments, the first ISIS node establishes a mapping table to reach the next ISIS node according to the received critical path information; and after the ISIS signaling control information is transmitted, forwarding the flow data to the next ISIS node according to the mapping table.
In some embodiments, the critical path information received by the starting ISIS node from the controller includes a path identifier, a control flag bit, identifiers of the ISIS nodes sequentially arranged from the starting ISIS node to the end ISIS node, labels corresponding to the outgoing interfaces of the starting ISIS node and each intermediate ISIS node or IP addresses of the next ISIS node, and a controller address corresponding to the end ISIS node.
In some embodiments, the starting ISIS node and each intermediate ISIS node remove the relevant information of the node in the ISIS signaling control information when determining that the first ISIS node identifier in the ISIS signaling control information is the self identifier; and under the condition that the end ISIS node determines that the first ISIS node in the PDU-encapsulated ISIS signaling control information sent by the last ISIS node is identified as the self-identification, the end ISIS node removes the relevant information of the end ISIS signaling control information of the end ISIS node, and returns a processing result to the corresponding controller according to the address of the controller.
According to another aspect of the present disclosure, a critical path information forwarding apparatus based on ISIS protocol is further provided, including: the first intermediate system to intermediate system ISIS node is configured to receive ISIS signaling control information, and the ISIS signaling control information is encapsulated with key path information; after removing the relevant information of the node in the ISIS signaling control information, packaging the rest ISIS signaling control information in a Packet Data Unit (PDU), and sending the PDU to the next ISIS node according to the received critical path information; and the end ISIS node is configured to process ISIS signaling control information in the received PDU and send a processing result to the controller.
In some embodiments, if the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by the controller; and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
In some embodiments, the PDU includes a path identification field, a control field, a system identification field, and reserved bits; wherein, the path identification field is used for identifying the variable of the end-to-end path; the control field is used for identifying a label corresponding to an output interface from the current ISIS node to the last intermediate ISIS node or an IP address of the next ISIS node and a controller address corresponding to the end ISIS node; the system identification field is used to identify the ISIS node on the end-to-end path.
According to another aspect of the present disclosure, a critical path information forwarding apparatus based on ISIS protocol is further provided, including: a memory; and a processor coupled to the memory, the processor configured to perform the method as described above based on instructions stored in the memory.
According to another aspect of the present disclosure, a critical path information forwarding system based on ISIS protocol is further provided, including: the key path information forwarding device based on the ISIS protocol; and the controller is configured to send ISIS signaling control information to the starting ISIS node and receive a processing result returned by the end ISIS node.
According to another aspect of the present disclosure, a computer-readable storage medium is also proposed, on which computer program instructions are stored, which instructions, when executed by a processor, implement the above-mentioned method.
According to the embodiment of the disclosure, the deployment and control of the end-to-end critical path are completed by expanding the ISIS protocol, and the end-to-end quality assurance facing the critical service is realized.
Other features of the present disclosure and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
fig. 1 is a flowchart illustrating some embodiments of a critical path information forwarding method based on the ISIS protocol according to the present disclosure.
Fig. 2 is a flowchart illustrating another embodiment of a critical path information forwarding method based on the ISIS protocol according to the present disclosure.
Fig. 3 is a schematic structural diagram of some embodiments of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure.
Fig. 4 is a schematic structural diagram of another embodiment of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure.
Fig. 5 is a schematic structural diagram of another embodiment of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure.
Fig. 6 is a schematic structural diagram of some embodiments of the critical path information forwarding system based on the ISIS protocol according to the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
For the purpose of promoting a better understanding of the objects, aspects and advantages of the present disclosure, reference is made to the following detailed description taken in conjunction with the accompanying drawings.
Fig. 1 is a flowchart illustrating some embodiments of a critical path information forwarding method based on the ISIS protocol according to the present disclosure.
In step 110, the first ISIS node receives ISIS signaling control information, in which critical path information is encapsulated. If the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by a controller; and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
As shown in table 1, in an MPLS (Multi-Protocol Label Switching) network, the critical Path information includes a Path ID (Path identifier), a control flag bit, identifiers of ISIS nodes sequentially arranged from a start ISIS node to an end ISIS node, labels corresponding to outgoing interfaces of the start ISIS node and the intermediate ISIS nodes, and a controller address corresponding to the end ISIS node.
Figure BDA0002196925410000051
Figure BDA0002196925410000061
TABLE 1
As shown in table 2, in the Native IP network, the critical Path information includes a Path ID, a control flag bit, identifiers of the ISIS nodes sequentially arranged from the start ISIS node to the end ISIS node, IP addresses of the start ISIS node and a next ISIS node corresponding to each intermediate ISIS node, and a controller address corresponding to the end ISIS node.
Path ID/control flag bit
Initial ISIS node identification
Next hop IP address to end ISIS node
Second ISIS node identification
Next hop IP address to end ISIS node
……
……
End ISIS node identification
Controller address
TABLE 2
In step 120, after the first ISIS node removes the relevant information of the node in the ISIS signaling control information, the remaining ISIS signaling control information is encapsulated in a PDU (Packet Data Unit), and the PDU is sent to the next ISIS node according to the received critical path information.
In this embodiment, according to the transferred critical path information, a new ISIS TLV (Tag-Length-Value ), referred to as SSR (signaling forwarding based on SDN architecture) TLV is proposed, and the TLV is carried in a PDU.
Figure BDA0002196925410000071
TABLE 3
As shown in table 3, the TLV of the PDU mainly includes a Path ID field, a control field N/M/S, a System ID (System identification) field, and a Resv (reserved field). Wherein, Path ID identifies the variables of the end-to-end Path; and N/M/S is a control field, and each ISIS node determines the length and meaning of the field according to the control field, namely determines a label corresponding to an outgoing interface of each node or the IP address of the next ISIS node according to the control field. When S is equal to 1, the Label subsequently carries an MPLS Label, and the MPLS Label is 4 bytes long; when M is 1, the mark carries IPv4 address subsequently, and the length is 4 bytes; when N is 1, the identification carries IPv6 address subsequently, and the length is 16 bytes. The System ID is used to identify ISIS nodes on the end-to-end path and is 6 bytes in length. The controller address sub-TLV contains an IP address of the controller, for example, when Type is 1, Length is 4, and Value is an IPv4 address of the controller; when the Type is 2, the Length is 16, and Value is the IPv6 address of the controller. In addition, Post-Head Router refers to the next Router after the originating ISIS Router.
In step 130, if the next ISIS node is an end ISIS node, the end ISIS node processes the ISIS signaling control information in the received PDU and sends the processing result to the controller. And the end ISIS node can send the processing result to the corresponding controller according to the controller address.
In the embodiment, the deployment and control of the end-to-end critical path are completed by expanding the ISIS protocol, the end-to-end quality assurance facing the critical service is realized, and complicated calculation, resource reservation, state maintenance and the like are not required to be performed between nodes.
Fig. 2 is a flowchart illustrating another embodiment of a critical path information forwarding method based on the ISIS protocol according to the present disclosure.
In step 210, the initial ISIS node receives ISIS signaling control information sent by the controller, where the ISIS signaling control information is encapsulated with critical path information.
The controller calculates an end-to-end path meeting the key service requirement in real time on the basis of the network real-time state and the end-to-end service requirement.
In step 220, the starting ISIS node determines whether the first ISIS node identifier in the ISIS signaling control information sent by the controller is a self identifier, if so, step 230 is executed, otherwise, step 240 is executed.
In step 230, after the starting ISIS node removes the relevant information of the node in the ISIS signaling control information, the remaining ISIS signaling control information is encapsulated in the PDU. PDUs may be delivered across the ISIS level.
The ISIS protocol is generally divided into two levels, Level 1 and Level 2, where Level 2 is a backbone area and Level 1 is an edge area. The signaling in both regions is implemented by PDUs. If a first ISIS node of two adjacent ISIS nodes is positioned at a first level and a second ISIS node is positioned at a second level, a boundary router of the first level converts the first-level PDU into a second-level PDU; if the first ISIS node of the two adjacent ISIS nodes is located at the second level and the second ISIS node is located at the first level, the border router of the first level converts the second level PDU into the first level PDU.
For example, when the initial ISIS router is located in Level 1 and the end ISIS router is located in Level 2, when the router located in Level 1 receives the ISIS signaling control information from the controller, the ISIS signaling control information may be transmitted in Level 1Area through Level 1PDU, and the border router located in Level 1 may convert the Level 1PDU into Level 2PDU, so that the ISIS signaling control information is transmitted in Level 2 Area.
For example, when the initial ISIS router is located in Level 2 and the end ISIS router is located in Level 1, when the router located in Level 2 receives ISI signaling control information from the controller, the ISIS signaling control information may be transmitted in Level 2Area through Level 2PDU, and the border router located in Level 1 may receive the ISIS signaling control information and convert the ISIS signaling control information into a default route based on Level 1, so that the ISIS signaling control information is transmitted in Level 1 Area.
In step 240, the ISIS signaling control information is discarded.
In step 250, after receiving the PDU sent by the previous ISIS node, the intermediate ISIS node determines whether the first ISIS node identifier in the ISIS signaling control information encapsulated by the PDU sent by the previous ISIS node is the self identifier, if so, step 260 is executed, otherwise, step 270 is executed.
In step 260, the intermediate ISIS node encapsulates the remaining ISIS signaling control information in PDU after removing the relevant information of this node.
In step 270, the PDU is discarded.
In step 280, it is determined whether the next ISIS node is an end node, if not, step 250 is performed, otherwise, step 290 is performed.
In step 290, the end ISIS node determines whether the first ISIS node identifier in the ISIS signaling control information encapsulated in the received PDU is its own identifier, if so, step 2100 is executed, otherwise, step 2110 is executed.
In step 2100, the result is fed back to the corresponding controller according to the controller address.
In step 2110, the PDU is discarded.
In step 2120, the initial ISIS node and each intermediate ISIS node establish a mapping table to the next ISIS node according to the received critical path information, respectively. Namely, a path forwarding table entry is formed according to the key path information.
In step 2130, the starting ISIS node and each intermediate ISIS node forward the traffic data to the next ISIS node in turn according to the established mapping table until the next ISIS node is the end ISIS node.
In this embodiment, based on an SSR mechanism, dynamic establishment and maintenance of an end-to-end path oriented to a critical service are implemented, and directional reliable forwarding transmission for a critical signaling under an SDN architecture can be implemented. By combining the global computing and traditional distributed forwarding advantages of the SDN framework, no complex interaction and confirmation mechanism is needed among network devices, and the network devices do not need to perform complex computing, resource reservation, state maintenance and the like based on a traditional flooding mechanism, so that the signaling processing pressure of the network devices based on the flooding mechanism can be greatly simplified. In addition, the controller only needs to interact with the starting ISIS node and the end ISIS node, and the pressure of the controller is reduced.
Fig. 3 is a schematic structural diagram of some embodiments of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure. The apparatus includes a first ISIS node 310 and an end ISIS node 320. The first ISIS node 310 may include a starting ISIS node 311, an intermediate ISIS node 312. There may be one or more intermediate ISIS nodes 312.
The first ISIS node 310 is configured to receive ISIS signaling control information in which critical path information is encapsulated; and after the relevant information of the node in the ISIS signaling control information is removed, packaging the rest ISIS signaling control information in the PDU, and sending the PDU to the next ISIS node according to the received critical path information.
If the first ISIS node 310 is an initial ISIS node, receiving ISIS signaling control information sent by the controller; if the first ISIS node 310 is an intermediate ISIS node, the ISIS signaling control information sent by the last ISIS node is received.
In some embodiments, the critical path information received by the starting ISIS node 311 from the controller includes a path identifier, a control flag bit, identifiers of the ISIS nodes sequentially arranged from the starting ISIS node to the end ISIS node, labels corresponding to the outgoing interfaces of the starting ISIS node and each intermediate ISIS node or IP addresses of the next ISIS node, and a controller address corresponding to the end ISIS node.
In some embodiments, the starting ISIS node 311 is configured to establish a mapping table to the next ISIS node according to the received critical path information, and forward the traffic data to the next ISIS node according to the mapping table after the ISIS control information is transmitted.
The intermediate ISIS node 312 is configured to receive the PDU sent by the previous ISIS node, package the remaining ISIS signaling control information in the PDU after removing the relevant information of the node, and send the PDU to the next ISIS node according to the PDU packaged critical path information sent by the previous ISIS node.
In some embodiments, the intermediate ISIS node 312 is further configured to establish a mapping table to the next ISIS node according to the received critical path information, and forward the traffic data to the next ISIS node according to the mapping table after the ISIS control information is transmitted.
The PDU comprises a path identification field, a control field, a system identification field and a reserved bit; wherein, the path identification field is used for identifying the variable of the end-to-end path; the control field is used for identifying a label corresponding to an output interface from the current ISIS node to the last intermediate ISIS node or an IP address of the next ISIS node and a controller address corresponding to the end ISIS node; the system identification field is used to identify the ISIS node on the end-to-end path.
If a first ISIS node of two adjacent ISIS nodes is positioned at a first level and a second ISIS node is positioned at a second level, a boundary router of the first level converts the first-level PDU into a second-level PDU; if the first ISIS node of the two adjacent ISIS nodes is located at the second level and the second ISIS node is located at the first level, the border router of the first level converts the second level PDU into the first level PDU.
The end ISIS node 320 is configured to process ISIS signaling control information in the received PDU and send the processing result to the controller.
In some embodiments, the end ISIS node 320 removes the relevant information of the node when determining that the first ISIS node identifier in the ISIS signaling control information encapsulated by the PDU sent by the last ISIS node is the self identifier, and returns the processing result to the corresponding controller according to the controller address.
In the above embodiment, by extending the ISIS protocol, end-to-end path control for the critical service can be realized, and it is not necessary that each data packet in the forwarding layer carries all path information sent by the controller, thereby realizing directional reliable forwarding transmission of the critical signaling.
Fig. 4 is a schematic structural diagram of another embodiment of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure. The apparatus includes a memory 410 and a processor 420, wherein:
the memory 410 may be a magnetic disk, flash memory, or any other non-volatile storage medium. The memory is used for storing instructions in the embodiments corresponding to fig. 1 and 2. Processor 420 is coupled to memory 410 and may be implemented as one or more integrated circuits, such as a microprocessor or microcontroller. The processor 420 is configured to execute instructions stored in memory.
In some embodiments, as also shown in fig. 5, the apparatus 500 includes a memory 510 and a processor 520. Processor 520 is coupled to memory 510 by a BUS 530. The apparatus 500 may be further connected to an external storage device 550 through a storage interface 540 for accessing external data, and may be further connected to a network or another computer system (not shown) through a network interface 560, which will not be described in detail herein.
In this embodiment, the end-to-end path control facing the critical service is realized by storing a data instruction in the memory and processing the instruction by the processor.
Fig. 6 is a schematic structural diagram of some embodiments of the critical path information forwarding system based on the ISIS protocol according to the present disclosure. The system includes the above-mentioned ISIS protocol-based critical path information forwarding device 610 and a controller 620. The critical path information forwarding apparatus 610 based on the ISIS protocol includes a start ISIS node, a plurality of intermediate ISIS nodes, and an end ISIS node, where R1 is the start ISIS node, R6 is the end ISIS node, and other nodes are intermediate ISIS nodes. The controller 620 is configured to send ISIS signaling control information to the originating ISIS node and receive processing results returned by the ending ISIS node.
In the embodiment, complex interaction and confirmation mechanisms are not needed among the nodes, and the controller only needs to interact with the initial ISIS node and the end ISIS node, so that the pressure of the controller is reduced.
In further embodiments, a computer-readable storage medium has stored thereon computer program instructions which, when executed by a processor, implement the steps of the method in the embodiments corresponding to fig. 1 and 2. As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, apparatus, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Thus far, the present disclosure has been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (13)

1. A critical path information forwarding method based on an ISIS protocol comprises the following steps:
receiving ISIS signaling control information from a first intermediate system to an ISIS node of the intermediate system, wherein the ISIS signaling control information is encapsulated with key path information;
after removing the relevant information of the node in the ISIS signaling control information, packaging the rest ISIS signaling control information in a Packet Data Unit (PDU), and sending the PDU to the next ISIS node according to the received critical path information;
and if the next ISIS node is the end ISIS node, the end ISIS node processes the ISIS signaling control information in the received PDU and sends the processing result to the controller.
2. The critical path information forwarding method based on the ISIS protocol according to claim 1,
if the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by the controller;
and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
3. The critical path information forwarding method based on the ISIS protocol according to claim 2,
the PDU comprises a path identification field, a control field, a system identification field and a reserved bit;
wherein the path identification field is used to identify a variable of an end-to-end path;
the control field is used for identifying a label corresponding to an output interface from the current ISIS node to the last intermediate ISIS node, or an IP address of the next ISIS node, and a controller address corresponding to the end ISIS node;
the system identification field is used to identify the ISIS node on the end-to-end path.
4. The ISIS protocol based critical path information forwarding method of claim 2, wherein the PDUs include a first-level PDU and a second-level PDU;
if a first ISIS node of two adjacent ISIS nodes is positioned at a first level and a second ISIS node is positioned at a second level, a boundary router of the first level converts the first-level PDU into a second-level PDU;
if the first ISIS node of the two adjacent ISIS nodes is located at the second level and the second ISIS node is located at the first level, the border router of the first level converts the second level PDU into the first level PDU.
5. The critical path information forwarding method based on the ISIS protocol according to any one of claims 2 to 4,
the first ISIS node establishes a mapping table reaching the next ISIS node according to the received critical path information;
and after the ISIS signaling control information is transmitted, forwarding the flow data to the next ISIS node according to the mapping table.
6. The critical path information forwarding method based on the ISIS protocol according to claim 5,
the critical path information received by the starting ISIS node from the controller comprises a path identifier, a control flag bit, identifiers of all ISIS nodes sequentially arranged from the starting ISIS node to the end ISIS node, labels corresponding to the output interfaces of the starting ISIS node and all intermediate ISIS nodes or IP addresses of the next ISIS node, and a controller address corresponding to the end ISIS node.
7. The critical path information forwarding method based on the ISIS protocol according to claim 6,
under the condition that the starting ISIS node and each intermediate ISIS node determine that the first ISIS node in the ISIS signaling control information is the self identifier, removing the related information of the node in the ISIS signaling control information;
and under the condition that the terminal ISIS node determines that the first ISIS node identifier in the ISIS signaling control information encapsulated by the PDU sent by the last ISIS node is the self identifier, the terminal ISIS node removes the relevant information of the node in the ISIS signaling control information and returns a processing result to the corresponding controller according to the address of the controller.
8. A critical path information forwarding device based on ISIS protocol comprises:
the first intermediate system to intermediate system ISIS node is configured to receive ISIS signaling control information, wherein the ISIS signaling control information is encapsulated with key path information; after removing the relevant information of the node in the ISIS signaling control information, packaging the rest ISIS signaling control information in a Packet Data Unit (PDU), and sending the PDU to the next ISIS node according to the received critical path information;
and the end ISIS node is configured to process ISIS signaling control information in the received PDU and send a processing result to the controller.
9. The ISIS protocol-based critical path information forwarding apparatus of claim 8, wherein,
if the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by a controller;
and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
10. The ISIS protocol-based critical path information forwarding apparatus according to claim 8 or 9,
the PDU comprises a path identification field, a control field, a system identification field and a reserved bit;
wherein the path identification field is used to identify a variable of an end-to-end path;
the control field is used for identifying a label corresponding to an output interface from the current ISIS node to the last intermediate ISIS node, or an IP address of the next ISIS node, and a controller address corresponding to the end ISIS node;
the system identification field is used to identify the ISIS node on the end-to-end path.
11. A critical path information forwarding device based on ISIS protocol comprises:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of any of claims 1-7 based on instructions stored in the memory.
12. A critical path information forwarding system based on ISIS protocol comprises:
the ISIS protocol based critical path information forwarding apparatus of any of claims 8-11; and
and the controller is configured to send ISIS signaling control information to the starting ISIS node and receive a processing result returned by the end ISIS node.
13. A computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the method of any of claims 1 to 7.
CN201910850982.6A 2019-09-10 2019-09-10 Method, device and system for forwarding critical path information based on ISIS protocol Pending CN112565076A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910850982.6A CN112565076A (en) 2019-09-10 2019-09-10 Method, device and system for forwarding critical path information based on ISIS protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910850982.6A CN112565076A (en) 2019-09-10 2019-09-10 Method, device and system for forwarding critical path information based on ISIS protocol

Publications (1)

Publication Number Publication Date
CN112565076A true CN112565076A (en) 2021-03-26

Family

ID=75028765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910850982.6A Pending CN112565076A (en) 2019-09-10 2019-09-10 Method, device and system for forwarding critical path information based on ISIS protocol

Country Status (1)

Country Link
CN (1) CN112565076A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120033663A1 (en) * 2010-08-05 2012-02-09 Cisco Technology, Inc., A Corporation Of California Discovery of Services Provided by Application Nodes in a Network
CN104081732A (en) * 2012-01-27 2014-10-01 欧姆龙株式会社 Data relay device, data transmission device, and network system
WO2017035752A1 (en) * 2015-08-31 2017-03-09 华为技术有限公司 Data stream header compression and transmission method, system and controller and node
CN107612835A (en) * 2016-07-11 2018-01-19 中兴通讯股份有限公司 The notifying method of information, the generation method of forwarding entry and device
CN107666436A (en) * 2016-07-27 2018-02-06 中兴通讯股份有限公司 Message forwarding method and device
CN108234312A (en) * 2016-12-15 2018-06-29 中国电信股份有限公司 A kind of traffic scheduling method, PCE and SDN network system
CN109962850A (en) * 2017-12-14 2019-07-02 中国电信股份有限公司 The method and controller and computer readable storage medium of realization Segment routing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120033663A1 (en) * 2010-08-05 2012-02-09 Cisco Technology, Inc., A Corporation Of California Discovery of Services Provided by Application Nodes in a Network
CN104081732A (en) * 2012-01-27 2014-10-01 欧姆龙株式会社 Data relay device, data transmission device, and network system
WO2017035752A1 (en) * 2015-08-31 2017-03-09 华为技术有限公司 Data stream header compression and transmission method, system and controller and node
CN107612835A (en) * 2016-07-11 2018-01-19 中兴通讯股份有限公司 The notifying method of information, the generation method of forwarding entry and device
CN107666436A (en) * 2016-07-27 2018-02-06 中兴通讯股份有限公司 Message forwarding method and device
CN108234312A (en) * 2016-12-15 2018-06-29 中国电信股份有限公司 A kind of traffic scheduling method, PCE and SDN network system
CN109962850A (en) * 2017-12-14 2019-07-02 中国电信股份有限公司 The method and controller and computer readable storage medium of realization Segment routing

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
J. FARKAS等: "IS-IS Path Computation and Reservation draft-ietf-isis-pcr-04", 《IETF 》 *
P.ANU: "Optimization of OSPF LSA Flooding Process using Clustering Technique", 《IEEE》 *
刘海涛: "浅析内部网关协议IS-IS", 《邢台职业技术学院学报》 *
王爱俊等: "广域网IPSDN控制器架构与关键技术研究", 《CNKI》 *

Similar Documents

Publication Publication Date Title
US11177976B2 (en) Method and device for automatically implementing IOAM encapsulation and storage medium
US11050664B2 (en) Encapsulation method, device and node
CN105991437B (en) Message forwarding processing method and device, controller and route forwarding equipment
US9178811B2 (en) Method, apparatus and system for generating label forwarding table on ring topology
US10454711B2 (en) Method for obtaining port path and apparatus
CN109962850B (en) Method and controller for implementing segment routing and computer readable storage medium
WO2016198013A1 (en) Packet transmission method and apparatus
EP4207685A1 (en) Message header processing method and apparatus, storage medium and electronic device
CN109660460B (en) BIER-TE information processing method, server and storage medium
US20170149685A1 (en) Address information publishing method and apparatus
EP3065350B1 (en) Link discovery method, system and device
US8824451B2 (en) Method and system for establishing an associated bidirectional label-switched path
CN104363170A (en) Data flow forwarding method and device in software defined network (SDN)
WO2015184771A1 (en) Method and node device for operation, administration, and maintenance of service function chaining
EP3985941A2 (en) Path switching method, device, and system
US10666550B2 (en) Method for combating micro-looping during the convergence of switching tables
CN114205282A (en) SRv6Policy scheduling method, system, router and controller
CN112558504B (en) Method, device and system for forwarding critical path information based on OSPF protocol
US11489768B2 (en) Method for creating inter-domain bidirectional tunnel, communication method and device, and storage medium
CN112565076A (en) Method, device and system for forwarding critical path information based on ISIS protocol
CN112565084A (en) PCEP-based critical path information forwarding method, device and system
CN114006860B (en) User access method, system and device
CN111211978B (en) Method and device for distributing expanded segment routing labels
CN110830373A (en) Method and device for realizing QOS service quality differentiation of service in SDN network
CN113839868B (en) SRv6 policy information control method, system and controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination