CN112565076A - Method, device and system for forwarding critical path information based on ISIS protocol - Google Patents
Method, device and system for forwarding critical path information based on ISIS protocol Download PDFInfo
- Publication number
- CN112565076A CN112565076A CN201910850982.6A CN201910850982A CN112565076A CN 112565076 A CN112565076 A CN 112565076A CN 201910850982 A CN201910850982 A CN 201910850982A CN 112565076 A CN112565076 A CN 112565076A
- Authority
- CN
- China
- Prior art keywords
- isis
- node
- control information
- signaling control
- pdu
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/34—Source routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/06—Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a critical path information forwarding method, device and system based on an ISIS protocol, and relates to the field of IP network intellectualization. The method comprises the following steps: a first ISIS node receives ISIS signaling control information, wherein the ISIS signaling control information is encapsulated with key path information; after relevant information of the node in the ISIS signaling control information is removed, packaging the rest ISIS signaling control information in PDU (protocol data Unit), and sending the PDU to the next ISIS node according to the received critical path information; and if the next ISIS node is the end ISIS node, the end ISIS node processes the ISIS signaling control information in the received PDU and sends the processing result to the controller. The method and the device realize end-to-end quality assurance facing to key services.
Description
Technical Field
The present disclosure relates to the field of IP network intelligence, and in particular, to a critical path information forwarding method, device, and system based on an ISIS (Intermediate system to Intermediate system) protocol.
Background
An SDN (Software Defined Network) is a novel Network innovation architecture, and is an implementation manner of Network virtualization. Under the SDN architecture, the control plane and the data plane of the network equipment are separated, so that the flexible control of network flow is realized. However, in the related art, the end-to-end quality facing the critical service is not guaranteed.
Disclosure of Invention
The technical problem to be solved by the present disclosure is to provide a method, an apparatus and a system for forwarding critical path information based on an ISIS protocol, so as to achieve end-to-end quality assurance for critical services.
According to an aspect of the present disclosure, a critical path information forwarding method based on an ISIS protocol is provided, including: the method comprises the steps that a first intermediate system receives ISIS signaling control information from an ISIS node of the intermediate system, wherein the ISIS signaling control information is encapsulated with key path information; after removing the relevant information of the node in the ISIS signaling control information, packaging the rest ISIS signaling control information in a Packet Data Unit (PDU), and sending the PDU to the next ISIS node according to the received critical path information; and if the next ISIS node is the end ISIS node, the end ISIS node processes the ISIS signaling control information in the received PDU and sends the processing result to the controller.
In some embodiments, if the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by the controller; and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
In some embodiments, the PDU includes a path identification field, a control field, a system identification field, and reserved bits; wherein, the path identification field is used for identifying the variable of the end-to-end path; the control field is used for identifying a label corresponding to an outgoing interface from the current ISIS node to the last intermediate ISIS node or an IP address of the next ISIS node, and identifying a controller address corresponding to the end ISIS node; the system identification field is used to identify the ISIS node on the end-to-end path.
In some embodiments, if a first ISIS node of two adjacent ISIS nodes is located at a first level and a second ISIS node is located at a second level, the border router of the first level converts the first level PDUs into second level PDUs; if the first ISIS node of the two adjacent ISIS nodes is located at the second level and the second ISIS node is located at the first level, the border router of the first level converts the second level PDU into the first level PDU.
In some embodiments, the first ISIS node establishes a mapping table to reach the next ISIS node according to the received critical path information; and after the ISIS signaling control information is transmitted, forwarding the flow data to the next ISIS node according to the mapping table.
In some embodiments, the critical path information received by the starting ISIS node from the controller includes a path identifier, a control flag bit, identifiers of the ISIS nodes sequentially arranged from the starting ISIS node to the end ISIS node, labels corresponding to the outgoing interfaces of the starting ISIS node and each intermediate ISIS node or IP addresses of the next ISIS node, and a controller address corresponding to the end ISIS node.
In some embodiments, the starting ISIS node and each intermediate ISIS node remove the relevant information of the node in the ISIS signaling control information when determining that the first ISIS node identifier in the ISIS signaling control information is the self identifier; and under the condition that the end ISIS node determines that the first ISIS node in the PDU-encapsulated ISIS signaling control information sent by the last ISIS node is identified as the self-identification, the end ISIS node removes the relevant information of the end ISIS signaling control information of the end ISIS node, and returns a processing result to the corresponding controller according to the address of the controller.
According to another aspect of the present disclosure, a critical path information forwarding apparatus based on ISIS protocol is further provided, including: the first intermediate system to intermediate system ISIS node is configured to receive ISIS signaling control information, and the ISIS signaling control information is encapsulated with key path information; after removing the relevant information of the node in the ISIS signaling control information, packaging the rest ISIS signaling control information in a Packet Data Unit (PDU), and sending the PDU to the next ISIS node according to the received critical path information; and the end ISIS node is configured to process ISIS signaling control information in the received PDU and send a processing result to the controller.
In some embodiments, if the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by the controller; and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
In some embodiments, the PDU includes a path identification field, a control field, a system identification field, and reserved bits; wherein, the path identification field is used for identifying the variable of the end-to-end path; the control field is used for identifying a label corresponding to an output interface from the current ISIS node to the last intermediate ISIS node or an IP address of the next ISIS node and a controller address corresponding to the end ISIS node; the system identification field is used to identify the ISIS node on the end-to-end path.
According to another aspect of the present disclosure, a critical path information forwarding apparatus based on ISIS protocol is further provided, including: a memory; and a processor coupled to the memory, the processor configured to perform the method as described above based on instructions stored in the memory.
According to another aspect of the present disclosure, a critical path information forwarding system based on ISIS protocol is further provided, including: the key path information forwarding device based on the ISIS protocol; and the controller is configured to send ISIS signaling control information to the starting ISIS node and receive a processing result returned by the end ISIS node.
According to another aspect of the present disclosure, a computer-readable storage medium is also proposed, on which computer program instructions are stored, which instructions, when executed by a processor, implement the above-mentioned method.
According to the embodiment of the disclosure, the deployment and control of the end-to-end critical path are completed by expanding the ISIS protocol, and the end-to-end quality assurance facing the critical service is realized.
Other features of the present disclosure and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
fig. 1 is a flowchart illustrating some embodiments of a critical path information forwarding method based on the ISIS protocol according to the present disclosure.
Fig. 2 is a flowchart illustrating another embodiment of a critical path information forwarding method based on the ISIS protocol according to the present disclosure.
Fig. 3 is a schematic structural diagram of some embodiments of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure.
Fig. 4 is a schematic structural diagram of another embodiment of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure.
Fig. 5 is a schematic structural diagram of another embodiment of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure.
Fig. 6 is a schematic structural diagram of some embodiments of the critical path information forwarding system based on the ISIS protocol according to the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
For the purpose of promoting a better understanding of the objects, aspects and advantages of the present disclosure, reference is made to the following detailed description taken in conjunction with the accompanying drawings.
Fig. 1 is a flowchart illustrating some embodiments of a critical path information forwarding method based on the ISIS protocol according to the present disclosure.
In step 110, the first ISIS node receives ISIS signaling control information, in which critical path information is encapsulated. If the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by a controller; and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
As shown in table 1, in an MPLS (Multi-Protocol Label Switching) network, the critical Path information includes a Path ID (Path identifier), a control flag bit, identifiers of ISIS nodes sequentially arranged from a start ISIS node to an end ISIS node, labels corresponding to outgoing interfaces of the start ISIS node and the intermediate ISIS nodes, and a controller address corresponding to the end ISIS node.
TABLE 1
As shown in table 2, in the Native IP network, the critical Path information includes a Path ID, a control flag bit, identifiers of the ISIS nodes sequentially arranged from the start ISIS node to the end ISIS node, IP addresses of the start ISIS node and a next ISIS node corresponding to each intermediate ISIS node, and a controller address corresponding to the end ISIS node.
Path ID/control flag bit |
Initial ISIS node identification |
Next hop IP address to end ISIS node |
Second ISIS node identification |
Next hop IP address to end ISIS node |
…… |
…… |
End ISIS node identification |
Controller address |
TABLE 2
In step 120, after the first ISIS node removes the relevant information of the node in the ISIS signaling control information, the remaining ISIS signaling control information is encapsulated in a PDU (Packet Data Unit), and the PDU is sent to the next ISIS node according to the received critical path information.
In this embodiment, according to the transferred critical path information, a new ISIS TLV (Tag-Length-Value ), referred to as SSR (signaling forwarding based on SDN architecture) TLV is proposed, and the TLV is carried in a PDU.
TABLE 3
As shown in table 3, the TLV of the PDU mainly includes a Path ID field, a control field N/M/S, a System ID (System identification) field, and a Resv (reserved field). Wherein, Path ID identifies the variables of the end-to-end Path; and N/M/S is a control field, and each ISIS node determines the length and meaning of the field according to the control field, namely determines a label corresponding to an outgoing interface of each node or the IP address of the next ISIS node according to the control field. When S is equal to 1, the Label subsequently carries an MPLS Label, and the MPLS Label is 4 bytes long; when M is 1, the mark carries IPv4 address subsequently, and the length is 4 bytes; when N is 1, the identification carries IPv6 address subsequently, and the length is 16 bytes. The System ID is used to identify ISIS nodes on the end-to-end path and is 6 bytes in length. The controller address sub-TLV contains an IP address of the controller, for example, when Type is 1, Length is 4, and Value is an IPv4 address of the controller; when the Type is 2, the Length is 16, and Value is the IPv6 address of the controller. In addition, Post-Head Router refers to the next Router after the originating ISIS Router.
In step 130, if the next ISIS node is an end ISIS node, the end ISIS node processes the ISIS signaling control information in the received PDU and sends the processing result to the controller. And the end ISIS node can send the processing result to the corresponding controller according to the controller address.
In the embodiment, the deployment and control of the end-to-end critical path are completed by expanding the ISIS protocol, the end-to-end quality assurance facing the critical service is realized, and complicated calculation, resource reservation, state maintenance and the like are not required to be performed between nodes.
Fig. 2 is a flowchart illustrating another embodiment of a critical path information forwarding method based on the ISIS protocol according to the present disclosure.
In step 210, the initial ISIS node receives ISIS signaling control information sent by the controller, where the ISIS signaling control information is encapsulated with critical path information.
The controller calculates an end-to-end path meeting the key service requirement in real time on the basis of the network real-time state and the end-to-end service requirement.
In step 220, the starting ISIS node determines whether the first ISIS node identifier in the ISIS signaling control information sent by the controller is a self identifier, if so, step 230 is executed, otherwise, step 240 is executed.
In step 230, after the starting ISIS node removes the relevant information of the node in the ISIS signaling control information, the remaining ISIS signaling control information is encapsulated in the PDU. PDUs may be delivered across the ISIS level.
The ISIS protocol is generally divided into two levels, Level 1 and Level 2, where Level 2 is a backbone area and Level 1 is an edge area. The signaling in both regions is implemented by PDUs. If a first ISIS node of two adjacent ISIS nodes is positioned at a first level and a second ISIS node is positioned at a second level, a boundary router of the first level converts the first-level PDU into a second-level PDU; if the first ISIS node of the two adjacent ISIS nodes is located at the second level and the second ISIS node is located at the first level, the border router of the first level converts the second level PDU into the first level PDU.
For example, when the initial ISIS router is located in Level 1 and the end ISIS router is located in Level 2, when the router located in Level 1 receives the ISIS signaling control information from the controller, the ISIS signaling control information may be transmitted in Level 1Area through Level 1PDU, and the border router located in Level 1 may convert the Level 1PDU into Level 2PDU, so that the ISIS signaling control information is transmitted in Level 2 Area.
For example, when the initial ISIS router is located in Level 2 and the end ISIS router is located in Level 1, when the router located in Level 2 receives ISI signaling control information from the controller, the ISIS signaling control information may be transmitted in Level 2Area through Level 2PDU, and the border router located in Level 1 may receive the ISIS signaling control information and convert the ISIS signaling control information into a default route based on Level 1, so that the ISIS signaling control information is transmitted in Level 1 Area.
In step 240, the ISIS signaling control information is discarded.
In step 250, after receiving the PDU sent by the previous ISIS node, the intermediate ISIS node determines whether the first ISIS node identifier in the ISIS signaling control information encapsulated by the PDU sent by the previous ISIS node is the self identifier, if so, step 260 is executed, otherwise, step 270 is executed.
In step 260, the intermediate ISIS node encapsulates the remaining ISIS signaling control information in PDU after removing the relevant information of this node.
In step 270, the PDU is discarded.
In step 280, it is determined whether the next ISIS node is an end node, if not, step 250 is performed, otherwise, step 290 is performed.
In step 290, the end ISIS node determines whether the first ISIS node identifier in the ISIS signaling control information encapsulated in the received PDU is its own identifier, if so, step 2100 is executed, otherwise, step 2110 is executed.
In step 2100, the result is fed back to the corresponding controller according to the controller address.
In step 2110, the PDU is discarded.
In step 2120, the initial ISIS node and each intermediate ISIS node establish a mapping table to the next ISIS node according to the received critical path information, respectively. Namely, a path forwarding table entry is formed according to the key path information.
In step 2130, the starting ISIS node and each intermediate ISIS node forward the traffic data to the next ISIS node in turn according to the established mapping table until the next ISIS node is the end ISIS node.
In this embodiment, based on an SSR mechanism, dynamic establishment and maintenance of an end-to-end path oriented to a critical service are implemented, and directional reliable forwarding transmission for a critical signaling under an SDN architecture can be implemented. By combining the global computing and traditional distributed forwarding advantages of the SDN framework, no complex interaction and confirmation mechanism is needed among network devices, and the network devices do not need to perform complex computing, resource reservation, state maintenance and the like based on a traditional flooding mechanism, so that the signaling processing pressure of the network devices based on the flooding mechanism can be greatly simplified. In addition, the controller only needs to interact with the starting ISIS node and the end ISIS node, and the pressure of the controller is reduced.
Fig. 3 is a schematic structural diagram of some embodiments of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure. The apparatus includes a first ISIS node 310 and an end ISIS node 320. The first ISIS node 310 may include a starting ISIS node 311, an intermediate ISIS node 312. There may be one or more intermediate ISIS nodes 312.
The first ISIS node 310 is configured to receive ISIS signaling control information in which critical path information is encapsulated; and after the relevant information of the node in the ISIS signaling control information is removed, packaging the rest ISIS signaling control information in the PDU, and sending the PDU to the next ISIS node according to the received critical path information.
If the first ISIS node 310 is an initial ISIS node, receiving ISIS signaling control information sent by the controller; if the first ISIS node 310 is an intermediate ISIS node, the ISIS signaling control information sent by the last ISIS node is received.
In some embodiments, the critical path information received by the starting ISIS node 311 from the controller includes a path identifier, a control flag bit, identifiers of the ISIS nodes sequentially arranged from the starting ISIS node to the end ISIS node, labels corresponding to the outgoing interfaces of the starting ISIS node and each intermediate ISIS node or IP addresses of the next ISIS node, and a controller address corresponding to the end ISIS node.
In some embodiments, the starting ISIS node 311 is configured to establish a mapping table to the next ISIS node according to the received critical path information, and forward the traffic data to the next ISIS node according to the mapping table after the ISIS control information is transmitted.
The intermediate ISIS node 312 is configured to receive the PDU sent by the previous ISIS node, package the remaining ISIS signaling control information in the PDU after removing the relevant information of the node, and send the PDU to the next ISIS node according to the PDU packaged critical path information sent by the previous ISIS node.
In some embodiments, the intermediate ISIS node 312 is further configured to establish a mapping table to the next ISIS node according to the received critical path information, and forward the traffic data to the next ISIS node according to the mapping table after the ISIS control information is transmitted.
The PDU comprises a path identification field, a control field, a system identification field and a reserved bit; wherein, the path identification field is used for identifying the variable of the end-to-end path; the control field is used for identifying a label corresponding to an output interface from the current ISIS node to the last intermediate ISIS node or an IP address of the next ISIS node and a controller address corresponding to the end ISIS node; the system identification field is used to identify the ISIS node on the end-to-end path.
If a first ISIS node of two adjacent ISIS nodes is positioned at a first level and a second ISIS node is positioned at a second level, a boundary router of the first level converts the first-level PDU into a second-level PDU; if the first ISIS node of the two adjacent ISIS nodes is located at the second level and the second ISIS node is located at the first level, the border router of the first level converts the second level PDU into the first level PDU.
The end ISIS node 320 is configured to process ISIS signaling control information in the received PDU and send the processing result to the controller.
In some embodiments, the end ISIS node 320 removes the relevant information of the node when determining that the first ISIS node identifier in the ISIS signaling control information encapsulated by the PDU sent by the last ISIS node is the self identifier, and returns the processing result to the corresponding controller according to the controller address.
In the above embodiment, by extending the ISIS protocol, end-to-end path control for the critical service can be realized, and it is not necessary that each data packet in the forwarding layer carries all path information sent by the controller, thereby realizing directional reliable forwarding transmission of the critical signaling.
Fig. 4 is a schematic structural diagram of another embodiment of the critical path information forwarding apparatus based on the ISIS protocol according to the present disclosure. The apparatus includes a memory 410 and a processor 420, wherein:
the memory 410 may be a magnetic disk, flash memory, or any other non-volatile storage medium. The memory is used for storing instructions in the embodiments corresponding to fig. 1 and 2. Processor 420 is coupled to memory 410 and may be implemented as one or more integrated circuits, such as a microprocessor or microcontroller. The processor 420 is configured to execute instructions stored in memory.
In some embodiments, as also shown in fig. 5, the apparatus 500 includes a memory 510 and a processor 520. Processor 520 is coupled to memory 510 by a BUS 530. The apparatus 500 may be further connected to an external storage device 550 through a storage interface 540 for accessing external data, and may be further connected to a network or another computer system (not shown) through a network interface 560, which will not be described in detail herein.
In this embodiment, the end-to-end path control facing the critical service is realized by storing a data instruction in the memory and processing the instruction by the processor.
Fig. 6 is a schematic structural diagram of some embodiments of the critical path information forwarding system based on the ISIS protocol according to the present disclosure. The system includes the above-mentioned ISIS protocol-based critical path information forwarding device 610 and a controller 620. The critical path information forwarding apparatus 610 based on the ISIS protocol includes a start ISIS node, a plurality of intermediate ISIS nodes, and an end ISIS node, where R1 is the start ISIS node, R6 is the end ISIS node, and other nodes are intermediate ISIS nodes. The controller 620 is configured to send ISIS signaling control information to the originating ISIS node and receive processing results returned by the ending ISIS node.
In the embodiment, complex interaction and confirmation mechanisms are not needed among the nodes, and the controller only needs to interact with the initial ISIS node and the end ISIS node, so that the pressure of the controller is reduced.
In further embodiments, a computer-readable storage medium has stored thereon computer program instructions which, when executed by a processor, implement the steps of the method in the embodiments corresponding to fig. 1 and 2. As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, apparatus, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Thus far, the present disclosure has been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.
Claims (13)
1. A critical path information forwarding method based on an ISIS protocol comprises the following steps:
receiving ISIS signaling control information from a first intermediate system to an ISIS node of the intermediate system, wherein the ISIS signaling control information is encapsulated with key path information;
after removing the relevant information of the node in the ISIS signaling control information, packaging the rest ISIS signaling control information in a Packet Data Unit (PDU), and sending the PDU to the next ISIS node according to the received critical path information;
and if the next ISIS node is the end ISIS node, the end ISIS node processes the ISIS signaling control information in the received PDU and sends the processing result to the controller.
2. The critical path information forwarding method based on the ISIS protocol according to claim 1,
if the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by the controller;
and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
3. The critical path information forwarding method based on the ISIS protocol according to claim 2,
the PDU comprises a path identification field, a control field, a system identification field and a reserved bit;
wherein the path identification field is used to identify a variable of an end-to-end path;
the control field is used for identifying a label corresponding to an output interface from the current ISIS node to the last intermediate ISIS node, or an IP address of the next ISIS node, and a controller address corresponding to the end ISIS node;
the system identification field is used to identify the ISIS node on the end-to-end path.
4. The ISIS protocol based critical path information forwarding method of claim 2, wherein the PDUs include a first-level PDU and a second-level PDU;
if a first ISIS node of two adjacent ISIS nodes is positioned at a first level and a second ISIS node is positioned at a second level, a boundary router of the first level converts the first-level PDU into a second-level PDU;
if the first ISIS node of the two adjacent ISIS nodes is located at the second level and the second ISIS node is located at the first level, the border router of the first level converts the second level PDU into the first level PDU.
5. The critical path information forwarding method based on the ISIS protocol according to any one of claims 2 to 4,
the first ISIS node establishes a mapping table reaching the next ISIS node according to the received critical path information;
and after the ISIS signaling control information is transmitted, forwarding the flow data to the next ISIS node according to the mapping table.
6. The critical path information forwarding method based on the ISIS protocol according to claim 5,
the critical path information received by the starting ISIS node from the controller comprises a path identifier, a control flag bit, identifiers of all ISIS nodes sequentially arranged from the starting ISIS node to the end ISIS node, labels corresponding to the output interfaces of the starting ISIS node and all intermediate ISIS nodes or IP addresses of the next ISIS node, and a controller address corresponding to the end ISIS node.
7. The critical path information forwarding method based on the ISIS protocol according to claim 6,
under the condition that the starting ISIS node and each intermediate ISIS node determine that the first ISIS node in the ISIS signaling control information is the self identifier, removing the related information of the node in the ISIS signaling control information;
and under the condition that the terminal ISIS node determines that the first ISIS node identifier in the ISIS signaling control information encapsulated by the PDU sent by the last ISIS node is the self identifier, the terminal ISIS node removes the relevant information of the node in the ISIS signaling control information and returns a processing result to the corresponding controller according to the address of the controller.
8. A critical path information forwarding device based on ISIS protocol comprises:
the first intermediate system to intermediate system ISIS node is configured to receive ISIS signaling control information, wherein the ISIS signaling control information is encapsulated with key path information; after removing the relevant information of the node in the ISIS signaling control information, packaging the rest ISIS signaling control information in a Packet Data Unit (PDU), and sending the PDU to the next ISIS node according to the received critical path information;
and the end ISIS node is configured to process ISIS signaling control information in the received PDU and send a processing result to the controller.
9. The ISIS protocol-based critical path information forwarding apparatus of claim 8, wherein,
if the first ISIS node is an initial ISIS node, receiving ISIS signaling control information sent by a controller;
and if the first ISIS node is the intermediate ISIS node, receiving ISIS signaling control information sent by the last ISIS node.
10. The ISIS protocol-based critical path information forwarding apparatus according to claim 8 or 9,
the PDU comprises a path identification field, a control field, a system identification field and a reserved bit;
wherein the path identification field is used to identify a variable of an end-to-end path;
the control field is used for identifying a label corresponding to an output interface from the current ISIS node to the last intermediate ISIS node, or an IP address of the next ISIS node, and a controller address corresponding to the end ISIS node;
the system identification field is used to identify the ISIS node on the end-to-end path.
11. A critical path information forwarding device based on ISIS protocol comprises:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of any of claims 1-7 based on instructions stored in the memory.
12. A critical path information forwarding system based on ISIS protocol comprises:
the ISIS protocol based critical path information forwarding apparatus of any of claims 8-11; and
and the controller is configured to send ISIS signaling control information to the starting ISIS node and receive a processing result returned by the end ISIS node.
13. A computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the method of any of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910850982.6A CN112565076A (en) | 2019-09-10 | 2019-09-10 | Method, device and system for forwarding critical path information based on ISIS protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910850982.6A CN112565076A (en) | 2019-09-10 | 2019-09-10 | Method, device and system for forwarding critical path information based on ISIS protocol |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112565076A true CN112565076A (en) | 2021-03-26 |
Family
ID=75028765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910850982.6A Pending CN112565076A (en) | 2019-09-10 | 2019-09-10 | Method, device and system for forwarding critical path information based on ISIS protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112565076A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120033663A1 (en) * | 2010-08-05 | 2012-02-09 | Cisco Technology, Inc., A Corporation Of California | Discovery of Services Provided by Application Nodes in a Network |
CN104081732A (en) * | 2012-01-27 | 2014-10-01 | 欧姆龙株式会社 | Data relay device, data transmission device, and network system |
WO2017035752A1 (en) * | 2015-08-31 | 2017-03-09 | 华为技术有限公司 | Data stream header compression and transmission method, system and controller and node |
CN107612835A (en) * | 2016-07-11 | 2018-01-19 | 中兴通讯股份有限公司 | The notifying method of information, the generation method of forwarding entry and device |
CN107666436A (en) * | 2016-07-27 | 2018-02-06 | 中兴通讯股份有限公司 | Message forwarding method and device |
CN108234312A (en) * | 2016-12-15 | 2018-06-29 | 中国电信股份有限公司 | A kind of traffic scheduling method, PCE and SDN network system |
CN109962850A (en) * | 2017-12-14 | 2019-07-02 | 中国电信股份有限公司 | The method and controller and computer readable storage medium of realization Segment routing |
-
2019
- 2019-09-10 CN CN201910850982.6A patent/CN112565076A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120033663A1 (en) * | 2010-08-05 | 2012-02-09 | Cisco Technology, Inc., A Corporation Of California | Discovery of Services Provided by Application Nodes in a Network |
CN104081732A (en) * | 2012-01-27 | 2014-10-01 | 欧姆龙株式会社 | Data relay device, data transmission device, and network system |
WO2017035752A1 (en) * | 2015-08-31 | 2017-03-09 | 华为技术有限公司 | Data stream header compression and transmission method, system and controller and node |
CN107612835A (en) * | 2016-07-11 | 2018-01-19 | 中兴通讯股份有限公司 | The notifying method of information, the generation method of forwarding entry and device |
CN107666436A (en) * | 2016-07-27 | 2018-02-06 | 中兴通讯股份有限公司 | Message forwarding method and device |
CN108234312A (en) * | 2016-12-15 | 2018-06-29 | 中国电信股份有限公司 | A kind of traffic scheduling method, PCE and SDN network system |
CN109962850A (en) * | 2017-12-14 | 2019-07-02 | 中国电信股份有限公司 | The method and controller and computer readable storage medium of realization Segment routing |
Non-Patent Citations (4)
Title |
---|
J. FARKAS等: "IS-IS Path Computation and Reservation draft-ietf-isis-pcr-04", 《IETF 》 * |
P.ANU: "Optimization of OSPF LSA Flooding Process using Clustering Technique", 《IEEE》 * |
刘海涛: "浅析内部网关协议IS-IS", 《邢台职业技术学院学报》 * |
王爱俊等: "广域网IPSDN控制器架构与关键技术研究", 《CNKI》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11177976B2 (en) | Method and device for automatically implementing IOAM encapsulation and storage medium | |
US11050664B2 (en) | Encapsulation method, device and node | |
CN105991437B (en) | Message forwarding processing method and device, controller and route forwarding equipment | |
US9178811B2 (en) | Method, apparatus and system for generating label forwarding table on ring topology | |
US10454711B2 (en) | Method for obtaining port path and apparatus | |
CN109962850B (en) | Method and controller for implementing segment routing and computer readable storage medium | |
WO2016198013A1 (en) | Packet transmission method and apparatus | |
EP4207685A1 (en) | Message header processing method and apparatus, storage medium and electronic device | |
CN109660460B (en) | BIER-TE information processing method, server and storage medium | |
US20170149685A1 (en) | Address information publishing method and apparatus | |
EP3065350B1 (en) | Link discovery method, system and device | |
US8824451B2 (en) | Method and system for establishing an associated bidirectional label-switched path | |
CN104363170A (en) | Data flow forwarding method and device in software defined network (SDN) | |
WO2015184771A1 (en) | Method and node device for operation, administration, and maintenance of service function chaining | |
EP3985941A2 (en) | Path switching method, device, and system | |
US10666550B2 (en) | Method for combating micro-looping during the convergence of switching tables | |
CN114205282A (en) | SRv6Policy scheduling method, system, router and controller | |
CN112558504B (en) | Method, device and system for forwarding critical path information based on OSPF protocol | |
US11489768B2 (en) | Method for creating inter-domain bidirectional tunnel, communication method and device, and storage medium | |
CN112565076A (en) | Method, device and system for forwarding critical path information based on ISIS protocol | |
CN112565084A (en) | PCEP-based critical path information forwarding method, device and system | |
CN114006860B (en) | User access method, system and device | |
CN111211978B (en) | Method and device for distributing expanded segment routing labels | |
CN110830373A (en) | Method and device for realizing QOS service quality differentiation of service in SDN network | |
CN113839868B (en) | SRv6 policy information control method, system and controller |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |