CN113364662A - Message processing method and device, storage medium and electronic equipment - Google Patents

Message processing method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN113364662A
CN113364662A CN202110736319.0A CN202110736319A CN113364662A CN 113364662 A CN113364662 A CN 113364662A CN 202110736319 A CN202110736319 A CN 202110736319A CN 113364662 A CN113364662 A CN 113364662A
Authority
CN
China
Prior art keywords
target
message
bum
vxlan
port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110736319.0A
Other languages
Chinese (zh)
Other versions
CN113364662B (en
Inventor
刘艳丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN202110736319.0A priority Critical patent/CN113364662B/en
Publication of CN113364662A publication Critical patent/CN113364662A/en
Application granted granted Critical
Publication of CN113364662B publication Critical patent/CN113364662B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Abstract

The embodiment of the application provides a message processing method, a message processing device, a storage medium and an electronic device, wherein the message processing method comprises the following steps: acquiring broadcast, unknown unicast and multicast BUM messages; the BUM message is obtained by de-encapsulating a virtual extensible local area network VXLAN message; carrying out Hash calculation on the BUM message to obtain a target Hash value; inquiring an information table according to the target hash value and a target VXLAN identification VNI corresponding to the BUM message to obtain an inquiry result; the information table is used for preventing a loop for forwarding the BUM message from being formed; and correspondingly processing the BUM message according to the query result. By means of the technical scheme, the problem that a BUM message forms a two-layer network loop in a VXLAN tunnel in the prior art can be solved.

Description

Message processing method and device, storage medium and electronic equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for processing a packet, a storage medium, and an electronic device.
Background
A Virtual Extensible Local Area Network (VXLAN) is a Network Virtualization technology belonging to three-Layer based Network Virtualization (NVO 3). And the method adopts a message encapsulation mode of MAC in UDP, constructs a large two-layer network across an IP network, and breaks through the limitation of the traditional network technology on the virtualization technology of the data center server.
Currently, although VXLAN tunnels can be established between different VXLAN Tunnel End Points (VTEPs), VXLAN tunnels in a logical two-layer Network of the same VXLAN Identifier (VNI) may form a loop, and Broadcast, Unknown Unicast, Multicast (BUM) messages may generate a Network storm in the two-layer loop, thereby causing Network congestion and affecting communication.
Disclosure of Invention
An object of the embodiments of the present application is to provide a message processing method, an apparatus, a storage medium, and an electronic device, so as to solve a problem in the prior art that a BUM message forms a two-layer network loop in a VXLAN tunnel.
In a first aspect, an embodiment of the present application provides a message processing method, where the message processing method includes: acquiring broadcast, unknown unicast and multicast BUM messages; the BUM message is obtained by de-encapsulating a virtual extensible local area network VXLAN message; carrying out Hash calculation on the BUM message to obtain a target Hash value; inquiring an information table according to the target hash value and a target VXLAN identification VNI corresponding to the BUM message to obtain an inquiry result; the information table is used for preventing a loop for forwarding the BUM message from being formed; and correspondingly processing the BUM message according to the query result.
Therefore, in the embodiment of the application, the BUM message is obtained by decapsulating the VXLAN message, performing hash calculation on the BUM message to obtain the target hash value, then querying an information table for preventing a loop for forwarding the BUM message from being formed according to the target hash value and the target VNI corresponding to the BUM message to obtain the query result, and finally performing corresponding processing on the BUM message according to the query result, so that the problem that the BUM message forms a two-layer network loop in the VXLAN tunnel can be solved, and the communication function of the BUM message cannot be affected.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; when the query result is determined to be the information of the target hash value, the target VNI and the target port recorded in the target table entry of the information table, the BUM message is correspondingly processed according to the query result, and the processing method comprises the following steps: and sending the BUM message through other ports except the target port of the target VTEP.
Therefore, in the embodiment of the present application, when it is determined that the target table entry records information of the target hash value, the target VNI, and the target port, it may be considered that the source end sends a duplicate packet, and the BUM packet may be flooded. If the message is determined to be an illegal malicious message through subsequent detection, the message can also be discarded.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; when the query result is determined that the target hash value and the target VNI are recorded in the target table entry of the information table and the port information and the target port information recorded in the target table entry are inconsistent, the corresponding processing is performed on the BUM packet according to the query result, including: and discarding the BUM message.
Therefore, in the embodiment of the present application, it is determined that a loop exists in the network through the query result, and if the current device receives a repeated BUM packet through the tunnel loop, the BUM packet can be discarded.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; when the query result is determined that the target hash value and the target VNI are not recorded in the information table, performing corresponding processing on the BUM message according to the query result, wherein the processing comprises: and adding the target hash value, the target VNI and the information of the target port into an information table as an entry, and sending the BUM message through other ports except the target port of the target VTEP.
In a second aspect, an embodiment of the present application provides a message processing apparatus, where the message processing apparatus includes: the acquisition module is used for acquiring broadcast, unknown unicast and multicast BUM messages; the BUM message is obtained by de-encapsulating a virtual extensible local area network VXLAN message; the calculation module is used for carrying out Hash calculation on the BUM message to obtain a target Hash value; the query module is used for querying an information table according to the target VXLAN identification VNI corresponding to the target hash value and the BUM message to obtain a query result; the information table is used for preventing a loop for forwarding the BUM message from being formed; and the processing module is used for carrying out corresponding processing on the BUM message according to the query result.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; and the processing module is specifically used for sending the BUM message through other ports except the target port of the target VTEP under the condition that the query result is determined that the target table entry of the information table records the information of the target hash value, the target VNI and the target port.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; and the processing module is specifically used for discarding the BUM message when the query result is determined that the target hash value and the target VNI are recorded in the target table entry of the information table and the port information and the target port information recorded in the target table entry are inconsistent.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; the processing module is specifically configured to: and under the condition that the query result is determined that the target hash value and the target VNI are not recorded in the information table, adding the information of the target hash value, the target VNI and the target port into the information table as an entry, and sending the BUM message through other ports except the target port of the target VTEP.
In a third aspect, an embodiment of the present application provides a storage medium, where a computer program is stored on the storage medium, and when the computer program is executed by a processor, the computer program performs the method according to the first aspect or any optional implementation manner of the first aspect.
In a fourth aspect, an embodiment of the present application provides an electronic device, including: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating via the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the method of the first aspect or any of the alternative implementations of the first aspect.
In a fifth aspect, the present application provides a computer program product which, when run on a computer, causes the computer to perform the method of the first aspect or any possible implementation manner of the first aspect.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a flowchart illustrating a message processing method according to an embodiment of the present application;
fig. 2 shows a specific flowchart of a message processing method according to an embodiment of the present application;
fig. 3 shows a schematic structural diagram of a VXLAN network provided in an embodiment of the present application;
fig. 4 shows a schematic structural diagram of another VXLAN network provided in an embodiment of the present application;
fig. 5 is a block diagram illustrating a structure of a message processing apparatus according to an embodiment of the present application;
fig. 6 shows a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
The VXLAN message can be subjected to tunnel encapsulation and decapsulation of the message through a VTEP, and can be subjected to two-layer switching and three-layer forwarding of the VXLAN message through a VXLAN gateway. And, a point-to-point VXLAN logical tunnel may be established between VTEPs. However, in a large two-layer network constructed across networks, a situation that a logical tunnel two-layer loop exists in the same VXLAN may occur, so that a network storm may occur in the BUM message in the two-layer loop, which causes network congestion and affects communication.
At present, in order to solve the problem that the BUM message forms a two-layer network loop in the VXLAN tunnel, the following two methods are disclosed in the prior art: the first method is to disable the VTEP from switching BUM messages received from the VXLAN tunnel to other VXLAN tunnels of the same VNI. Meanwhile, the influence on certain network topology environment caused by the neighbor agent can be solved. For example, Address Resolution Protocol (ARP) communication between a first virtual machine and a second virtual machine accessed from different VTEPs affects. That is, the method prohibits BUM message exchange between tunnels of the same VNI, and can complete point-to-point communication between related virtual machines by combining with a neighbor agent; the second method is to add a mark field in the message header of the VXLAN message or add the extension protocol information after the message header, and the receiving end can forward the non-unicast message to the specific interface after identifying, thereby avoiding the BUM message from flooding to other irrelevant VXLAN tunnels.
For the first method, although it can solve the problem that the BUM message forms a two-layer network loop in the VXLAN tunnel, the method cannot simultaneously meet the communication requirements of other non-ARP BUM messages, which may cause certain influence or limitation on network communication. Meanwhile, the BUM message bears certain auxiliary or direct functions in network communication, and the exchange of the BUM message between the same VXLAN tunnel cannot be simply prohibited as a solution; for the second method, since the method is to add a message extension field or an extension protocol, it has no friendly compatibility with the development of future Request For Comments (RFC) protocol.
Based on this, the embodiment of the present application skillfully provides a packet processing scheme, in which a BUM packet is obtained by decapsulating a VXLAN packet, then performing hash calculation on the BUM packet to obtain a target hash value, then querying an information table for preventing a loop for forwarding the BUM packet from being formed according to the target hash value and a target VNI corresponding to the BUM packet to obtain a query result, and finally performing corresponding processing on the BUM packet according to the query result, so that the problem that the BUM packet forms a two-layer network loop in a VXLAN tunnel can be solved, and a communication function of the BUM packet can not be affected.
Referring to fig. 1, fig. 1 is a flowchart illustrating a message processing method according to an embodiment of the present disclosure. The message processing method shown in fig. 1 includes the following steps:
step S110, the target VTEP acquires the BUM message. The BUM message is obtained by de-encapsulating the VXLAN message, and the VXLAN message is obtained through a target port of a target VTEP.
It should be understood that the specific message of the BUM message, the specific VTEP corresponding to the target VTEP, and the specific port corresponding to the target port may all be set according to actual requirements, and the embodiment of the present application is not limited thereto.
It should be understood that the BUM message may be an ARP message (e.g., an ARP request broadcast message, etc.) or a non-ARP message (e.g., a multicast Domain Name System (mDNS) message, etc.).
In order to facilitate understanding of the embodiments of the present application, the following description will be given by way of specific examples.
Specifically, the target VTEP receives the VXLAN message through a target port, and since the VXLAN message is encapsulated through the tunnel, the target VTEP can decapsulate the received VXLAN message to obtain the BUM message.
In addition, since the tunnel configuration information of each tunnel records a VNI, and the packet header of the VXLAN packet also includes a VNI, the VNI corresponding to the tunnel connected to the target port may be compared with the VNI in the header of the VXLAN packet, and if it is determined by the comparison that the VNI corresponding to the tunnel connected to the target port is identical with the VNI in the header of the VXLAN packet, the step S120 may be continuously executed; and if the VNI corresponding to the tunnel communicated with the target port is determined to be inconsistent with the VNI in the header of the VXLAN message through comparison, the BUM message can be discarded.
It should be noted here that VXLAN uses VNI as a unique identifier, one VNI is set in one VXLAN network segment, terminals in VXLAN in the same VNI belong to one broadcast domain, terminals in VXLAN in different VNIs cannot communicate directly, and communication needs to be achieved through a gateway.
It should be further noted that the reason why the hash calculation is performed on the BUM packet in the embodiment of the present application is that the BUM packet is not changed during the transmission process of the VXLAN packet in the tunnel, so that the hash calculation is performed on the BUM packet, and the hash value uniquely identifying the original BUM packet can be obtained.
And step S120, the target VTEP performs hash calculation on the BUM message to obtain a target hash value. The target hash value can uniquely identify the hash value of the original BUM message.
It should be understood that the specific process of the target VTEP for performing hash calculation on the BUM packet may be set according to actual requirements, and the embodiment of the present application is not limited thereto.
And step S130, the target VTEP queries an information table according to the target hash value and the target VNI corresponding to the BUM message to obtain a query result. The information table is used for preventing a loop for forwarding the BUM message from being formed.
It should be understood that the target VNI in step S130 may be a VNI in a header of the VXLAN packet, or a VNI recorded in tunnel configuration information of a tunnel connected to the target port.
It is also understood that the information table may include at least one entry, and each entry in the at least one entry contains information of a VNI, a hash value, and a port (or tunnel-in interface) that receives a VXLAN packet. The information of the port receiving the VXLAN message may include an identifier of the port, etc.
It should also be understood that the specific result corresponding to the query result may also be set according to actual requirements, and the embodiment of the present application is not limited thereto.
For example, in the case where the target VTEP determines that the target hash value and the target VNI are not recorded in the information table by the query, the query result is that the target hash value and the target VNI are not recorded in the information table.
For another example, when determining that the target hash value and the target VNI are recorded in the target entry of the information table by querying, the target VTEP may further determine whether the port information recorded in the target entry is consistent with the target port information (e.g., determine whether the port identifier recorded in the target entry is consistent with the target port identifier), and if determining that the port information recorded in the target entry is consistent with the target port information, the query result is that the VNI, the hash value, and the port information recorded in the target entry of the information table are consistent with the target hash value, the target VNI, and the target port information; if it is further determined that the port information recorded in the target entry is inconsistent with the target port information, the query result is that the VNI and the hash value recorded in the target entry of the information table are consistent with the target hash value and the target VNI, but the port information recorded in the target entry is inconsistent with the target port information.
And step S140, the target VTEP performs corresponding processing on the BUM message according to the query result.
It should be understood that, according to the query result, the specific process of the target VTEP for performing corresponding processing on the BUM packet may be set according to an actual requirement, and the embodiment of the present application is not limited thereto.
For example, when it is determined that the query result is that the target hash value and the target VNI are recorded in the target entry of the information table and the port information and the target port information recorded in the target entry are inconsistent, the performing, according to the query result, corresponding processing on the BUM packet includes: and discarding the BUM message.
For another example, when the query result is determined that the target hash value and the target VNI are not recorded in the information table, the BUM packet is correspondingly processed according to the query result, including: and adding the target hash value, the target VNI and the information of the target port into an information table as an entry, and sending the BUM message through other ports except the target port of the target VTEP.
For another example, in a case that the query result is determined that the target table entry of the information table records information of the target hash value, the target VNI, and the target port, the processing of the BUM packet is performed according to the query result, which includes: and sending the BUM message through other ports except the target port of the target VTEP.
It should be noted here that, if it is determined that the target table entry records information of the target hash value, the target VNI, and the target port, and it is determined through packet detection that the BUM packet is a packet that is repeatedly sent by the source end, the packet may be flooded; if the information of the target hash value, the target VNI and the target port is recorded in the target table entry and the BUM message is determined to be an illegal malicious message through message detection, the BUM message can be discarded. The message detection may be set according to actual requirements, and the embodiment of the present application is not limited to this.
For example, the BUM message may be detected by existing message detection tools to determine whether it is a malicious message.
For another example, it may be determined whether a source physical address, a source logical address, a destination physical address, and a destination logical address in the BUM message are consistent with a source physical address, a source logical address, a destination physical address, and a destination logical address of an authenticated message in the local communication protocol stack database, if so, the BUM message is considered to be a malicious message, and if not, the BUM message is a normal message.
It should be further noted that, the solution in the embodiment of the present application has no strong correlation with the VXLAN tunnel, and may be used in network solutions where other network environments and message characteristics are suitable and BUM communication needs to be suppressed for a two-layer logical loop or a physical loop.
Therefore, compared to the existing method of prohibiting the VTEP from switching the BUM packet received from the VXLAN tunnel to another VXLAN tunnel of the same VNI and implementing the two-layer point-to-point communication between the virtual machines connected via the VXLAN tunnel and in the same VXLAN network by means of the neighbor agent, the solution of the embodiment of the present application can be applied to all the BUM packets, so that the normal communication of all the BUM packets is not affected.
In addition, compared with the existing method for increasing the message extension field or the protocol extension, the VXLAN message is not changed in the embodiment of the application, so that the method has more openness for the future development of RFC. For example, it does not occupy the RESERVED field and RESERVED bit bits in RFC 7348; for another example, it does not add message extension field or extension protocol, etc., it can keep consistency with the RFC development, and can reserve open space, and can provide foundation for protocol consistency and message intercommunication of different manufacturers.
Referring to fig. 2, fig. 2 shows a specific flowchart of a message processing method according to an embodiment of the present application. The message processing method shown in fig. 2 includes the following steps:
step S210, the target VTEP acquires the BUM message and calculates the target hash value of the BUM message.
Specifically, the target VTEP may receive a target VXLAN packet from the VXLAN tunnel through the target port, and then the target VTEP may determine whether a VNI in a packet header of the target VXLAN packet is consistent with a VNI of the VXLAN tunnel, and if the VNI is determined to be consistent by the comparison, the target VTEP may determine that the target VTEP is a BUM packet of the VNI. Subsequently, a destination hash value of the BUM packet can be calculated.
Step S220, the target VTEP queries the information table according to the target hash value and the target VNI corresponding to the BUM packet to determine whether the target hash value and the target VNI are recorded in the information table. Each entry in the information table may include a VNI, a hash value of the packet, and information of the tunnel port.
If it is determined that the target hash value and the target VNI are not recorded in the information table, step S230 may be performed; if it is determined that the target hash value and the target VNI are recorded in the target entry of the information table, step S250 may be executed.
In step S230, the target VTEP adds the target hash value, the target VNI, and the target port information as one table entry to the information table.
Step S240, the target VTEP floods the BUM packet to other ports except the target port according to the two-layer switching principle. The other ports may include VXLAN Service Access Point (VSAP) and ports of other tunnels communicating with the target VTEP.
In step S250, the target VTEP determines whether the port information recorded in the target entry and the target port information are consistent.
If the target VTEP determines that the port information recorded in the target entry is consistent with the target port information and the BUM message is considered to be a duplicate message, step S240 may be executed; if the target VTEP determines that the port information recorded in the target entry and the target port information are not consistent, step S260 may be executed.
Step S260, the target VTEP discards the BUM message.
It should be noted here that if the target table entry records the target hash value and the target VNI, and the port information recorded in the target table entry is not consistent with the target port information (that is, the port recorded in the target table entry and the target port are not the same port), it may be said that a VXLAN loop may exist in the network, and the target VTEP receives a duplicate BUM packet through a tunnel loop in the network, and may discard the BUM packet.
It should be further noted that, if the target table entry records the target hash value and the target VNI, and the port information recorded in the target table entry is consistent with the target port information (that is, the port recorded in the target table entry and the target port are not the same port), it may be considered that the source end sends a repeated packet, and the packet may be flooded. However, if the BUM message is determined to be a malicious message by the detection, the message may be discarded.
Therefore, in the embodiment of the application, a target hash value capable of uniquely identifying the BUM message is obtained by performing hash calculation on the BUM message, and the information table is queried by combining the target hash value and the target VNI to which the target port belongs, and if the target hash value and the target VNI are not recorded in the information table, the target hash value, the target VNI and the information of the target port can be recorded in the information table, and the BUM message is flooded to other ports; if the target table entry of the information table records the target hash value and the target VNI and the port information recorded in the target table entry is inconsistent with the target port information, it can be said that a tunnel loop exists in the network, and the message traverses the network and enters the target VTEP device from the loop for the second time, so that the BUM message can be discarded, thereby achieving the effect of suppressing the second-layer loop of the BUM message.
Continuing with fig. 3, fig. 3 shows a schematic structural diagram of a VXLAN network according to an embodiment of the present application. As shown in fig. 3, the VXLAN network includes a first virtual machine VM1, VTEP1, VTEP2, VTEP3, and a second virtual machine VM 2. Among them, VM1 is connected with VSAP1 of VTEP1, and VTEP1 and VTEP2 are connected through tunnel 1, and VTEP1 and VTEP3 are connected through tunnel 2, and VTEP2 and VTEP3 are connected through tunnel 3, and VM2 and VSAP2 of VTEP2 are connected.
It is to be understood that VSAP1 may be considered a port of VTEP1 and correspondingly VSAP2 may be considered a port of VTEP 2.
It will also be appreciated that a table of information is provided on VTEP1, and a table of information may also be provided on VTEP2, and a table of information may also be provided on VTEP 3. That is, the information tables may be provided on different VTEPs.
It should be noted that the introduction of the network in fig. 3 is described by taking as an example the VXLAN tunnel established between VTEP1, VTEP2, and VTEP3 for the same VNI and the first communication when VM1 and VM2 do not have ARP entries of each other. The method comprises the following specific steps:
first, the ARP request broadcast message starts from VM1 and enters VTEP1 through VSAP1, and then VTEP1 tunnel-encapsulates the ARP request broadcast message and floods the encapsulated VXLAN message to tunnel 1 and tunnel 2 of the same VNI.
Then, VTEP2 receives the VXLAN message from tunnel 1, decapsulates the VXLAN message, and determines whether the message is an ARP request broadcast message with VNI. And under the condition that the ARP request broadcast message is determined to be the same as the VNI, carrying out hash calculation on the ARP request broadcast message to obtain a target hash value. And the VTEP2 queries the information table with the target hash value and the target VNI, records the target VNI, the target hash value and information of the target port of the VTEP2 receiving the VXLAN packet into the information table of VTEP2 if it is determined that the information table does not record the target hash value and the target VNI as a result of the query, and then the VTEP2 floods the packet to VSAP2 and the port of tunnel 3 of the same VNI.
And, the ARP request broadcast message on VTEP2 that floods VSAP2 reaches destination VM 2.
In addition, after VTEP3 receives the VXLAN packet from VTEP1 to VTEP3 through tunnel 2, VTEP3 decapsulates the VXLAN packet and determines whether the packet is an ARP request broadcast packet of the same VNI. And under the condition that the ARP request broadcast message is determined to be the same as the VNI, carrying out hash calculation on the ARP request broadcast message to obtain a target hash value. And the VTEP3 queries the information table with the target hash value and the target VNI, records the target VNI, the target hash value and information of the target port of the VTEP3 receiving the VXLAN packet into the information table of VTEP3 if it is determined that the information table does not record the target hash value and the target VNI as a result of the query, and then the VTEP3 floods the packet to VSAP2 and the port of tunnel 3 of the same VNI.
Furthermore, after VTEP2 receives the VXLAN packet from VTEP3 from tunnel 3, VTEP2 decapsulates the VXLAN packet and determines whether the packet is an ARP request broadcast packet of the VNI. And under the condition that the ARP request broadcast message is determined to be the same as the VNI, carrying out hash calculation on the ARP request broadcast message to obtain a target hash value. And the VTEP2 queries the information table with two elements, namely the target hash value and the target VNI, and finds that the information table records a target entry whose port is the port of tunnel 1, and the VNI in the target entry is the same as the target VNI, and the hash value in the target entry is the same as the target hash value, then VTEP2 discards the ARP request broadcast packet.
Furthermore, after VTEP3 receives the VXLAN packet from VTEP2 from tunnel 3, VTEP3 decapsulates the VXLAN packet and determines whether the packet is an ARP request broadcast packet of the VNI. And under the condition that the ARP request broadcast message is determined to be the same as the VNI, carrying out hash calculation on the ARP request broadcast message to obtain a target hash value. And the VTEP3 queries the information table with two elements, namely the target hash value and the target VNI, and finds that the information table records a target entry whose port is the port of the tunnel 2, and the VNI in the target entry is the same as the target VNI, and the hash value in the target entry is the same as the target hash value, then the VTEP3 discards the ARP request broadcast packet.
Therefore, by means of the technical scheme, the embodiment of the application can inhibit and block the BUM message loop on the logic two-layer loop of the VXLAN network.
Continuing with fig. 4, fig. 4 shows a schematic structural diagram of another VXLAN network provided in the embodiments of the present application. As shown in fig. 4, the VXLAN network may include a first virtual machine VM1, a second virtual machine VM2, a third virtual machine VM3, a VTEP1, a VTEP2, a VTEP3, and a VTEP 4. Among them, VTEP1 and VTEP2 may be connected through tunnel 1, and VTEP2 may be connected with VM1, and VTEP1 and VTEP3 may be connected through tunnel 2, and VTEP3 may be connected with VM2, and VTEP1 and VTEP4 may be connected through tunnel 3, and VTEP4 may be connected with VM 3.
It should be noted that VTEP1 may serve as a gateway for centralized VXLAN, and VTEP1 may establish a VXLAN tunnel with VNI of 100 with VTEP2 and VTEP3, respectively, and VTEP1 may also establish a VXLAN tunnel with VNI of 200 with VTEP 4. Here, the first communication when VM1 and VM2 do not have ARP entries of each other is described as an example. Specifically, the method comprises the following steps:
first, the ARP request broadcast message arrives at VTEP2 from VM1, and then VTEP2 tunnel-encapsulates the ARP request broadcast message and floods the encapsulated VXLAN message to tunnel 1 of the same VNI.
Subsequently, after the VTEP1 obtains the VXLAN packet through the target port of the tunnel 1, the VTEP1 decapsulates the VXLAN packet and determines whether the packet is an ARP request broadcast packet of the VNI. And under the condition that the ARP request broadcast message is determined to be the same as the VNI, carrying out hash calculation on the ARP request broadcast message to obtain a target hash value. And the VTEP1 queries the information table with the target hash value and the target VNI corresponding to the target port, records the target VNI, the target hash value and the target port information in the information table of the VTEP1 when it is determined that the query result is that the information table does not record the target hash value and the target VNI, and then the VTEP1 floods the packet to the port of the tunnel 2 of the same VNI.
Finally, the ARP request broadcast message passes through VTEP3 to reach the actual destination VM 2.
Therefore, by means of the above technical solution, the embodiment of the present application can implement single-point communication between network nodes belonging to the same VNI, different VTEP accesses, and connected through a tunnel without using a neighbor agent.
It should be understood that the above message processing method is only exemplary, and those skilled in the art may make various modifications according to the above method, and the solution after the modification also falls within the scope of the present application.
It should be noted that while the operations of the method of the present invention are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Rather, the steps depicted in the flowcharts may change the order of execution. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Referring to fig. 5, fig. 5 shows a block diagram of a message processing apparatus 500 according to an embodiment of the present application, and it should be understood that the message processing apparatus 500 can perform the steps in the foregoing method embodiment, and specific functions of the message processing apparatus 500 may be referred to the above description, and a detailed description is appropriately omitted here to avoid redundancy. The message processing apparatus 500 includes at least one software function module that can be stored in a memory in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the message processing apparatus 500. Specifically, the message processing apparatus 500 includes:
an obtaining module 510, configured to obtain broadcast, unknown unicast, and multicast BUM packets; the BUM message is obtained by de-encapsulating a virtual extensible local area network VXLAN message;
a calculating module 520, configured to perform hash calculation on the BUM packet to obtain a target hash value;
the query module 530 is configured to query the information table according to the target VXLAN identifier VNI corresponding to the target hash value and the BUM packet, and obtain a query result; the information table is used for preventing a loop for forwarding the BUM message from being formed;
and the processing module 540 is configured to perform corresponding processing on the BUM packet according to the query result.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; the processing module 540 is specifically configured to send the BUM packet through the other ports of the target VTEP except the target port when it is determined that the query result is that the target table entry of the information table records the information of the target hash value, the target VNI, and the target port.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; the processing module 540 is specifically configured to discard the BUM packet when it is determined that the query result is that the target hash value and the target VNI are recorded in the target entry of the information table and the port information and the target port information recorded in the target entry are inconsistent.
In one possible embodiment, the VXLAN message is obtained through a target port of a target VXLAN tunnel terminal VTEP; the processing module 540 is specifically configured to: and under the condition that the query result is determined that the target hash value and the target VNI are not recorded in the information table, adding the information of the target hash value, the target VNI and the target port into the information table as an entry, and sending the BUM message through other ports except the target port of the target VTEP.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method, and will not be described in too much detail herein.
Referring to fig. 6, fig. 6 shows a block diagram of an electronic device 600 according to an embodiment of the present disclosure. As shown in fig. 6, electronic device 600 may include a processor 610, a communication interface 620, a memory 630, and at least one communication bus 640. Wherein communication bus 640 is used to enable direct, coupled communication of these components. The communication interface 620 of the device in the embodiment of the present application is used for performing signaling or data communication with other node devices. The processor 610 may be an integrated circuit chip having signal processing capabilities. The Processor 610 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor 610 may be any conventional processor or the like.
The Memory 630 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 630 stores computer readable instructions that, when executed by the processor 610, the electronic device 600 may perform the various steps involved in the above-described method embodiments.
The electronic device 600 may further include a memory controller, an input-output unit, an audio unit, a display unit 8.
The memory 630, the memory controller, the processor 610, the peripheral interface, the input/output unit, the audio unit, and the display unit are electrically connected to each other directly or indirectly to realize data transmission or interaction. For example, these components may be electrically coupled to each other via one or more communication buses 640. The processor 610 is configured to execute executable modules stored in the memory 630, such as software functional modules or computer programs included in the electronic device 600. Also, the electronic device 600 is configured to perform the following method: acquiring broadcast, unknown unicast and multicast BUM messages; the BUM message is obtained by de-encapsulating a virtual extensible local area network VXLAN message; performing hash calculation on the BUM message to obtain a target hash value; inquiring an information table according to the target hash value and a target VXLAN identification VNI corresponding to the BUM message to obtain an inquiry result; the information table is used for preventing a loop for forwarding the BUM message from being formed; and correspondingly processing the BUM message according to the query result.
The input and output unit is used for providing input data for a user to realize the interaction of the user and the server (or the local terminal). The input/output unit may be, but is not limited to, a mouse, a keyboard, and the like.
The audio unit provides an audio interface to the user, which may include one or more microphones, one or more speakers, and audio circuitry.
The display unit provides an interactive interface (e.g. a user interface) between the electronic device and a user or for displaying image data to a user reference. In this embodiment, the display unit may be a liquid crystal display or a touch display. In the case of a touch display, the display can be a capacitive touch screen or a resistive touch screen, which supports single-point and multi-point touch operations. The support of single-point and multi-point touch operations means that the touch display can sense touch operations simultaneously generated from one or more positions on the touch display, and the sensed touch operations are sent to the processor for calculation and processing. The display unit may display the execution result of the respective steps executed by the processor 610.
The input and output unit is used for providing input data for a user to realize the interaction between the user and the processing terminal. The input/output unit may be, but is not limited to, a mouse, a keyboard, and the like.
It will be appreciated that the configuration shown in FIG. 6 is merely illustrative and that the electronic device 600 may include more or fewer components than shown in FIG. 6 or have a different configuration than shown in FIG. 6. The components shown in fig. 6 may be implemented in hardware, software, or a combination thereof.
The present application also provides a storage medium having a computer program stored thereon, which, when executed by a processor, performs the method of the method embodiments.
The present application also provides a computer program product which, when run on a computer, causes the computer to perform the method of the method embodiments.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the system described above may refer to the corresponding process in the foregoing method, and will not be described in too much detail herein.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A message processing method is characterized by comprising the following steps:
acquiring broadcast, unknown unicast and multicast BUM messages; the BUM message is obtained by de-encapsulating a virtual extensible local area network VXLAN message;
performing hash calculation on the BUM message to obtain a target hash value;
inquiring an information table according to the target hash value and a target VXLAN identification VNI corresponding to the BUM message to obtain an inquiry result; the information table is used for preventing a loop for forwarding the BUM message from being formed;
and correspondingly processing the BUM message according to the query result.
2. The message processing method according to claim 1, wherein the VXLAN message is obtained through a destination port of a destination VXLAN tunnel terminal VTEP;
wherein, in a case that it is determined that the query result is that the target hash value, the target VNI, and the target port information are recorded in the target entry of the information table, performing corresponding processing on the BUM packet according to the query result includes:
and sending the BUM message through other ports except the target port of the target VTEP.
3. The message processing method according to claim 1, wherein the VXLAN message is obtained through a destination port of a destination VXLAN tunnel terminal VTEP;
wherein, when it is determined that the query result is that the target hash value and the target VNI are recorded in the target entry of the information table and the port information and the target port information recorded in the target entry are inconsistent, performing corresponding processing on the BUM packet according to the query result includes:
and discarding the BUM message.
4. The message processing method according to claim 1, wherein the VXLAN message is obtained through a destination port of a destination VXLAN tunnel terminal VTEP;
wherein, when it is determined that the query result is that the target hash value and the target VNI are not recorded in the information table, the performing, according to the query result, corresponding processing on the BUM packet includes:
and adding the target hash value, the target VNI and the target port information as an item to the information table, and sending the BUM message through other ports except the target port of the target VTEP.
5. A message processing apparatus, comprising:
the acquisition module is used for acquiring broadcast, unknown unicast and multicast BUM messages; the BUM message is obtained by de-encapsulating a virtual extensible local area network VXLAN message;
the calculation module is used for carrying out Hash calculation on the BUM message to obtain a target Hash value;
the query module is used for querying an information table according to the target hash value and a target VXLAN identification VNI corresponding to the BUM message to obtain a query result; the information table is used for preventing a loop for forwarding the BUM message from being formed;
and the processing module is used for carrying out corresponding processing on the BUM message according to the query result.
6. The message processing apparatus of claim 5, wherein the VXLAN message is obtained through a destination port of a destination VXLAN tunnel termination VTEP;
the processing module is specifically configured to send the BUM packet through a port of the target VTEP other than the target port when it is determined that the query result is that the target hash value, the target VNI, and the target port information are recorded in the target entry of the information table.
7. The message processing apparatus of claim 5, wherein the VXLAN message is obtained through a destination port of a destination VXLAN tunnel termination VTEP;
the processing module is specifically configured to discard the BUM packet when it is determined that the query result is that the target hash value and the target VNI are recorded in the target entry of the information table and the port information recorded in the target entry and the target port information are inconsistent.
8. The message processing apparatus of claim 5, wherein the VXLAN message is obtained through a destination port of a destination VXLAN tunnel termination VTEP;
the processing module is specifically configured to: and when the query result is determined that the target hash value and the target VNI are not recorded in the information table, adding the information of the target hash value, the target VNI and the target port as an entry into the information table, and sending the BUM message through other ports of the target VTEP except the target port.
9. A storage medium having stored thereon a computer program for executing the message processing method according to any one of claims 1 to 4 when executed by a processor.
10. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating over the bus when the electronic device is operating, the machine-readable instructions when executed by the processor performing the message processing method of any of claims 1-4.
CN202110736319.0A 2021-06-30 2021-06-30 Message processing method and device, storage medium and electronic equipment Active CN113364662B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110736319.0A CN113364662B (en) 2021-06-30 2021-06-30 Message processing method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110736319.0A CN113364662B (en) 2021-06-30 2021-06-30 Message processing method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN113364662A true CN113364662A (en) 2021-09-07
CN113364662B CN113364662B (en) 2023-03-24

Family

ID=77537414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110736319.0A Active CN113364662B (en) 2021-06-30 2021-06-30 Message processing method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113364662B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783753A (en) * 2021-09-10 2021-12-10 北京云杉世纪网络科技有限公司 Loop detection method, device, equipment and storage medium
CN114253979A (en) * 2021-12-23 2022-03-29 北京百度网讯科技有限公司 Message processing method and device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104702506A (en) * 2013-12-09 2015-06-10 华为技术有限公司 Message transmission method, network node and message transmission system
CN106656722A (en) * 2016-12-12 2017-05-10 杭州迪普科技股份有限公司 VXLAN multicasting method and device
CN108306806A (en) * 2018-02-06 2018-07-20 新华三技术有限公司 A kind of message forwarding method and device
CN109194559A (en) * 2018-08-29 2019-01-11 迈普通信技术股份有限公司 Method of multicasting and VTEP equipment
CN111585863A (en) * 2020-06-11 2020-08-25 国家计算机网络与信息安全管理中心 Virtual extensible local area network message processing equipment and data processing method thereof
WO2020255150A1 (en) * 2019-06-21 2020-12-24 Telefonaktiebolaget Lm Ericsson (Publ) Method and system to transmit broadcast, unknown unicast, or multicast (bum) traffic for multiple ethernet virtual private network (evpn) instances (evis)
CN112291160A (en) * 2020-09-23 2021-01-29 浪潮思科网络科技有限公司 BUM message suppression method, device and medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104702506A (en) * 2013-12-09 2015-06-10 华为技术有限公司 Message transmission method, network node and message transmission system
CN106656722A (en) * 2016-12-12 2017-05-10 杭州迪普科技股份有限公司 VXLAN multicasting method and device
CN108306806A (en) * 2018-02-06 2018-07-20 新华三技术有限公司 A kind of message forwarding method and device
CN109194559A (en) * 2018-08-29 2019-01-11 迈普通信技术股份有限公司 Method of multicasting and VTEP equipment
WO2020255150A1 (en) * 2019-06-21 2020-12-24 Telefonaktiebolaget Lm Ericsson (Publ) Method and system to transmit broadcast, unknown unicast, or multicast (bum) traffic for multiple ethernet virtual private network (evpn) instances (evis)
CN111585863A (en) * 2020-06-11 2020-08-25 国家计算机网络与信息安全管理中心 Virtual extensible local area network message processing equipment and data processing method thereof
CN112291160A (en) * 2020-09-23 2021-01-29 浪潮思科网络科技有限公司 BUM message suppression method, device and medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783753A (en) * 2021-09-10 2021-12-10 北京云杉世纪网络科技有限公司 Loop detection method, device, equipment and storage medium
CN113783753B (en) * 2021-09-10 2022-08-16 北京云杉世纪网络科技有限公司 Loop detection method, device, equipment and storage medium
CN114253979A (en) * 2021-12-23 2022-03-29 北京百度网讯科技有限公司 Message processing method and device and electronic equipment
CN114253979B (en) * 2021-12-23 2023-10-03 北京百度网讯科技有限公司 Message processing method and device and electronic equipment

Also Published As

Publication number Publication date
CN113364662B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
WO2018040530A1 (en) Method and apparatus for determining virtual machine migration
EP3720066A1 (en) Packet sending and processing method and apparatus, pe node, and node
CN113364662B (en) Message processing method and device, storage medium and electronic equipment
WO2018120798A1 (en) Vxlan packet processing method, device and system
US20160308825A1 (en) Detection of a misconfigured duplicate ip address in a distributed data center network fabric
CN109729012B (en) Unicast message transmission method and device
WO2020156166A1 (en) Packet processing method and device
TW201220791A (en) Enhancing DS-Lite with private IPv4 reachability
CN106921578B (en) Method and device for generating forwarding table item
CN106982163B (en) Method and gateway for acquiring route on demand
EP3823225A1 (en) Communication method, communication device and communication system
CN107547407B (en) Message transmission method, device and implementation device
JP2019515555A (en) Anonymous Identification Information and Protocol of Identification Information Oriented Network
WO2021083332A1 (en) Method, apparatus and system for sending message
JP5826320B2 (en) Network location service
JP7469479B2 (en) Packet transmission method, routing entry generation method, device, and storage medium
CN113132202B (en) Message transmission method and related equipment
CN110768901B (en) Route issuing method, route selection method, related device and system
US11711243B2 (en) Packet processing method and gateway device
EP3806404A1 (en) Communication method, device and system for avoiding loop
WO2022083563A1 (en) Link detection method, link detection apparatus, terminal device and storage medium
CN107896188B (en) Data forwarding method and device
CN112787934A (en) Method, device and equipment for load sharing in bit index explicit replication network
WO2019196914A1 (en) Method for discovering forwarding path, and related device thereof
CN108306825B (en) Equivalent forwarding table item generation method and VTEP device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant