WO2017215376A1 - Multi-segment pseudo wire detection method and network element - Google Patents

Multi-segment pseudo wire detection method and network element Download PDF

Info

Publication number
WO2017215376A1
WO2017215376A1 PCT/CN2017/083808 CN2017083808W WO2017215376A1 WO 2017215376 A1 WO2017215376 A1 WO 2017215376A1 CN 2017083808 W CN2017083808 W CN 2017083808W WO 2017215376 A1 WO2017215376 A1 WO 2017215376A1
Authority
WO
WIPO (PCT)
Prior art keywords
detection
packet
identification information
identity
message
Prior art date
Application number
PCT/CN2017/083808
Other languages
French (fr)
Chinese (zh)
Inventor
姜冰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017215376A1 publication Critical patent/WO2017215376A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Definitions

  • the present application relates to, but is not limited to, the field of communication technologies, and in particular, to a multi-segment pseudowire detection method and a network element.
  • MS-PW Multi-Segment Pseudo-Wire
  • source PE Provider Edge
  • PW Pseudo-Wire
  • S-PE Switch Provider Edge
  • BFD Bidirectional forwarding detection
  • the device 1 and the device 2 are connected to each other through the point-of-sale vendor device, and the device 3 is connected.
  • the device 1 and the device 3 and the device 2 and the device 3 establish a pseudowire service, and both configure a BFD detection mechanism.
  • BFD is used in the asynchronous mode. In this mode, the two nodes of the network periodically send BFD control packets. If the BFD control packet is not received within the detection time, the corresponding BFD control packet is considered to be corresponding. The link has failed.
  • the process of detecting the link of the MS-PW by BFD is as follows: The link established by the two nodes is a link that is dynamically triggered. Before the session is established, the devices at both ends send the remote identifier to 0.
  • the device 1 sends the packet A to the device 2, the remote identifier field of the packet A is 0, and the local identifier field is the local identifier assigned by the system to the device 1, if it is 12;
  • the device 3 sends the packet A to the device 2, and after receiving the packet A, the device 2 checks the local identifier of the packet A, and finds that the local identifier is 12, so the identifier 12 is learned. but Yes, because the device 3 is directly connected to the device 2, and the device 1 is connected to the device 2 through the device 3, there is often a situation in which the device 2 mistakes the device 3 as being sent by the device 3 after receiving the message A. Therefore, it is erroneously considered that the identifier 12 corresponds to the device 3, thereby causing the packet to be incorrectly associated with the pseudo line segment.
  • the source of the packet cannot be distinguished, and the pseudo-line segment is associated with the error of the packet, causing errors in the detection result and causing oscillations.
  • the multi-segment pseudowire detection method and the network element provided by the embodiment of the present invention can accurately distinguish the source of the detection message.
  • An embodiment of the present invention provides a multi-segment pseudowire detection method, including:
  • the embodiment of the invention further provides a network element, including a message sending module, a message receiving module and a processing module;
  • the packet sending module is configured to send a first detection packet to the receiving device, where the first detection packet includes first identity information of the sending device;
  • the packet receiving module is configured to receive a second detection packet sent by the receiving device
  • the processing module is configured to: extract second identity information in the second detection packet, and determine identity of the receiving device according to the second identity information.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the multi-segment pseudo line detection method of any one of the foregoing.
  • the transmitting end device sends the first detection packet to the receiving end device, where the first detection packet includes the first identity of the sending end device. And identifying the information, and receiving the second detection packet sent by the receiving device, the sending device extracting the second identity information from the second detection packet, and determining the identity of the receiving device according to the second identity information.
  • the method in the embodiment of the present invention does not need to determine the identity of the sender of the message by means of learning, but uniquely determines the identity of the receiver according to the second identity information, thereby knowing that the second detection packet is received from the receiver.
  • the end device determines the link between the receiving end device and the transmitting end device as a detecting link. To accurately distinguish the source of the detection message, the link detection of the current multi-segment pseudowire is more accurate, and the detection error is reduced.
  • 1 is a schematic diagram of networking
  • FIG. 2 is a flowchart of a method for detecting a multi-segment pseudowire according to Embodiment 1 of the present invention
  • FIG. 3 is a schematic structural diagram of a network element according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic diagram of an exemplary networking of Embodiment 2 of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • This embodiment provides a multi-segment pseudowire detection method. Referring to FIG. 2, the method includes:
  • the sending end device sends a first detection packet to the receiving end device, where the first detection packet includes first identifier information of the sending end device.
  • the sending end device receives the second detection packet sent by the receiving end device, where the second The detection message includes second identification information of the receiving device;
  • S203 The sending end device extracts the second identity identification information in the second detection packet, and determines the identity of the receiving device.
  • step S201 and step S202 are performed, there is no requirement of a sequence relationship between the two steps, and step S202 may be performed first or step S201 may be performed first.
  • the first detection message includes first identity identification information, where the first identity identification information can uniquely identify the identity of the sender device in the network, so that the receiver device receives the first detection report. After the text, the identity of the sender device can be identified.
  • the form of the first identification information may be various, as long as it can be uniquely identified in the network, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself. For example, it can be an IP address.
  • the first identity identification information may be configured by the staff member on the device in advance, or the staff member may set a certain configuration rule.
  • the device automatically completes the pair. The assignment of its own first identity information.
  • the sending device may obtain the first identity information of the device, and then encapsulate the first identity information into the first detection packet.
  • the first detection packet may be a BFD packet.
  • the BFD packet is encapsulated with an IP header.
  • the IP address can be encapsulated in the source IP address field in the IP header. In this way, additional fields can be added and the overhead can be increased.
  • the purpose of accurately transmitting the first identification information is achieved.
  • the first detection packet is then sent to the peer device.
  • the receiving end device After receiving the first detection packet, the receiving end device parses the first detection packet, obtains the first identity identification information, and identifies that the first detection packet is sent according to the first identity identification information. The device, so that the link actually detected by the first detection data packet is a link between the first detection message sending device and itself.
  • the receiving device also sends a second detection packet to the first detection packet sending device.
  • the first detection packet sending device performs the step S202, and the second detection packet sent by the receiving device, and the second detection packet includes the second identification information.
  • the system of the receiving device also assigns itself to the second identity information for unique identifier identity in the network.
  • the form may be the same as the first identification information, for example, may be a number arranged according to a certain rule. It can also be an identifier that has a special meaning in itself, for example, it can be an IP address. It can be configured by the staff in advance on the peer device, or the staff can set a certain configuration rule.
  • the peer device automatically completes the second identity identification information of the user. distribution.
  • the peer device obtains its own second identity information, and encapsulates the second identity information into a second detection packet.
  • the second detection packet may be a BFD packet.
  • the BFD packet is encapsulated with an IP header.
  • the IP address is used as the second identifier, the IP address can be encapsulated in the source IP address field in the IP header. Then, the second detection packet is sent to the sending device of the first detection packet.
  • the sending end device After receiving the second detection packet, the sending end device performs step S203, and determines, according to the second identity identification information, which device is the device of the receiving end device, and determines which link is between the two devices. The link between the two is also the detection link.
  • the transmitting device further determines whether the received second detection packet needs to be forwarded, and if it is determined that forwarding is needed, it is forwarded.
  • the target detection information in the second detection packet is obtained, and the target path is determined according to the target object identification information, and the second detection and forwarding message is generated, and the second detection and forwarding message also carries the second identity identification information. Then, the second detection and forwarding packet is forwarded through the target path.
  • the above-mentioned multi-segment pseudo-line detection method can be applied to a network loaded with an MS-PW service, and the multi-segment pseudo-line detection method in this embodiment is used to assign identity identification information uniquely identifying the identity of the device to each device, and the detection is performed.
  • the identity information is carried in the forwarding process, that is, the identification information is carried in a detection packet from the generation to the destination end.
  • the identity information is not changed, so that when the destination receives the detection packet, the destination can easily and accurately identify which device the detection packet is generated, thereby determining which links they have experienced and the links they have passed. It is the link being detected.
  • the judgment of the detection link is more accurate, the implementation is simple, and the use is convenient.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the network element includes a message sending module 31, a message receiving module 32, and a processing module 33.
  • the packet sending module 31 is configured to send the first detection packet to the peer device, where the first detection packet is sent.
  • the first identity identification information may be used to identify the identity of the network element in the network.
  • the receiving device may identify the identity of the network element after receiving the first detection packet.
  • the form of the first identification information may be various, as long as it can be uniquely identified in the network, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself. For example, it can be an IP address.
  • the first identity information may be configured by the staff member on the device in advance, or the staff may set a certain configuration rule. When the multi-segment pseudowire detection method is enabled, the network element automatically completes the first identity of the user. Distribution of information.
  • the network element may further include an encapsulating module, and the encapsulating module obtains the first identity information of the first identity information, and then the first identity information is encapsulated into the first detection packet, and the packet sending module 31 sends the first identity information to the peer device.
  • the first detection packet may be a BFD packet.
  • the BFD packet is encapsulated with an IP header.
  • the IP address can be encapsulated in the source IP address field in the IP header.
  • the packet receiving module 32 is configured to receive the second detection packet sent by the receiving device, and include the second identification information in the second detection packet.
  • the system of the receiving device also assigns itself to the second identity information for unique identifier identity in the network.
  • the form may be the same as the first identification information, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself, for example, may be an IP address.
  • the configuration may be configured by the staff on the receiving device in advance, or the staff may set a certain configuration rule. When the multi-segment pseudowire detection method is enabled, the receiving device automatically completes the second identity information of the user. distribution.
  • the receiving device obtains the second identity information of the device and encapsulates the second identity information into the second detection packet.
  • the second detection packet may be a BFD packet.
  • the BFD packet is encapsulated with an IP header.
  • the IP address can be encapsulated in the source IP address field in the IP header.
  • the second detection packet is then sent to the network element.
  • the processing module 33 parses the second detection packet received by the packet receiving module 31, acquires the second identity identification information, and identifies the identity of the receiving device according to the second identity identification information, thereby determining the relationship between the two. link.
  • the network element further includes a judgment processing module 34 configured to determine whether it is necessary to receive the second check.
  • the packet is forwarded, and if it is determined that forwarding is required, it is forwarded.
  • the determination processing module 34 acquires the target object identification information in the second detection message, determines the target path according to the target object identification information, and generates a second detection and forwarding message, where the second detection and forwarding message also carries the second identity identifier. information. Then, the second detection and forwarding packet is forwarded through the target path.
  • the target identifier information may be a target label value carried by the BFD detection packet, where the target label value is used to point to the label value of the target device, and the sending end is used.
  • the device itself saves the label table.
  • the sender device can query the content of the next step corresponding to the entry of the target tag value from its own tag table. If the content of the next step needs to be forwarded, the judgment process is performed.
  • Module 34 forwards the message.
  • the second detection packet is parsed and re-encapsulated, but the content of the packet is not changed, and the second detection and forwarding packet is generated, and the second identity is still carried in the second detection and forwarding packet. Identification information.
  • the network element in this embodiment may be a common PE or an S-PE.
  • the network element does not have the function of forwarding the detection packet, and can only send the detection packet and receive the detection packet. And determining the detection link according to the identity identification information in the received detection packet, and completing the link switching when the link is found to be faulty;
  • the network element is the S-PE, the not only can send the detection packet and The detection packet is received, and the detection link is determined according to the identity identification information in the received detection packet, and the detection packet can be forwarded when needed.
  • the functions of the modules of the network element, the packet sending module 31, the message receiving module 32, the processing module 33, the encapsulating module and the judging processing module 34 in this embodiment can be implemented by the processor of the network element.
  • FIG. 4 is a schematic diagram of a PW network composed of network elements in this embodiment.
  • the network element 1, the network element 2, the network element 3, and the network element 4 are sequentially connected.
  • a PW service is configured on each link.
  • the MS-PW is configured on each device.
  • the BFD detection mechanism is enabled on all NEs.
  • the IP address is used as the identity information of each device, where the IP address of the network element 1 is 1.1.1.1; the IP address of the network element 2 is 2.2.2.2; the IP address of the network element 3 is 3.3.3.3; The IP address is 4.4.4.4.
  • the IP address of each NE is not mandatory according to the above configuration.
  • the configuration staff will be flexible.
  • the BFD detection link between the network element 1 and the network element 2 is the link 1; the BFD detection link between the network element 2 and the network element 3 is the link 2; and the BFD detection between the network element 3 and the network element 4
  • the link is link 3; the BFD detection link between network element 1 and network element 4 is link 4.
  • the network element 1 generates a detection packet, and the detection packet carries its own IP address 1.1.1.1; it is sent to the network element 2; the detection packet sent to the network element 2 is directly reached through the link 1.
  • the network element 2, the network element 2 parses the detection packet, and obtains the IP address thereof as 1.1.1.1; then it is identified that the detection packet is the network element 1, and then it is determined that the transmission is completed through the link 1, thereby determining The interaction between the two is for the detection of link 1.
  • the network element 2 generates a detection packet, and the detection packet carries its own IP address 2.2.2.2; it is sent to the network element 3; the detection packet sent to the network element 3 is directly reached through the link 2
  • the network element 3, the network element 3 parses the detection packet, and obtains the IP address thereof as 2.2.2.2; then it is identified that the detection packet is the network element 2, and then it is determined that the transmission is completed through the link 2, thereby determining The interaction between the two is for the detection of link 2.
  • the network element 3 generates a detection packet, and the detection packet carries its own IP address 3.3.3.3; it is sent to the network element 4; the detection packet sent to the network element 4 is directly reached through the link 3.
  • the network element 4, the network element 4 parses the detection packet, and obtains the IP address thereof as 3.3.3.3; then it is identified that the network element 3 is sent by the detection packet, and then it is determined that the transmission is completed through the link 3, thereby determining The interaction between the two is for the detection of link 3.
  • the network element 1 generates a detection packet, and the detection packet carries its own IP address 1.1.1.1; it is sent to the network element 4; the detection packet sent to the network element 4 passes through the network through the link 4.
  • the element 2 and the network element 3 arrive at the network element 4, and the network element 4 parses the detection packet, and obtains the IP address thereof as 1.1.1.1; then it identifies that the detection packet is the network element 4, and then determines that it is through the link. 4 The transmission is completed, thereby determining that the interaction between the two is for the detection of the link 4.
  • the detected link when detecting the multi-segment pseudowire, the detected link can be quickly and accurately located, the detection efficiency is improved, and the erroneous connection is detected to avoid false handover.
  • the modules or steps of the above embodiments of the present invention can be implemented by a general-purpose computing device. They can be centralized on a single computing device or distributed over a network of multiple computing devices, which can be implemented in program code executable by the computing device so that they can be stored in a computer storage medium (ROM/RAM) , in a magnetic disk, in an optical disk, are performed by a computing device, and in some cases, the steps shown or described may be performed in an order different from that herein, or they may be separately fabricated into individual integrated circuit modules, or Multiple of these modules or steps are fabricated as a single integrated circuit module. Therefore, embodiments of the invention are not limited to any particular combination of hardware and software.
  • the method in the embodiment of the present invention does not need to determine the identity of the sender of the message by means of learning, but uniquely determines the identity of the receiver according to the second identity information, thereby knowing that the second detection packet is received from the receiver.
  • the end device determines that the link between the receiving end device and the transmitting end device is a detecting link, so as to accurately distinguish the source of the detecting message, and the link detection of the current multi-segment pseudowire is more accurate, and the detection error is reduced.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed are a multi-segment pseudo wire detection method and a network element. The method comprises: a sending end device sending a first detection packet to a receiving end device, wherein the first detection packet comprises first identity identification information about the sending end device, and receiving a second detection packet sent by the receiving end device; and the sending end device extracting second identity identification information from the second detection packet, and determining the identity of the receiving end device according to the second identity identification information.

Description

一种多段伪线检测方法和网元Multi-segment pseudo line detection method and network element 技术领域Technical field
本申请涉及但不限于通信技术领域,尤指一种多段伪线检测方法和网元。The present application relates to, but is not limited to, the field of communication technologies, and in particular, to a multi-segment pseudowire detection method and a network element.
背景技术Background technique
MS-PW(Multi-Segment Pseudo-Wire,多段伪线技术)起源于边缘到边缘伪线仿真的应用模型,允许源PE(Provider Edge,供应商边缘设备)与目的PE之间存在分段的多跳PW(Pseudo-Wire,伪线),通过S-PE(Switch Provider Edge,交换点供应商设备)将两侧的单段PW连接起来,适用于不能在源PE和目的PE之间直接建立单段伪线的场景,满足了网络分层,跨本地网,跨运营商,跨控制平面的应用需求,提升网络可扩展性。MS-PW (Multi-Segment Pseudo-Wire) originates from the application model of edge-to-edge pseudowire simulation, allowing multiple fragmentation between source PE (Provider Edge, Vendor Edge Device) and destination PE. PW (Pseudo-Wire) is used to connect single-segment PWs on both sides of the S-PE (Switch Provider Edge). It is not applicable to directly establish a single between the source PE and the destination PE. The scenario of segment pseudowires satisfies the requirements of network layering, cross-local network, cross-operator, and application across control planes to improve network scalability.
BFD(Bidirectional Forwarding Detection,双向转发检测)被广泛应用于PW上来对PW链路上的故障进行检测,随着对MS-PW的发展及其应用的越来越广泛,更多的相关技术人员利用BFD的特性将其应用于MS-PW来检测MS-PW链路的故障。MS-PW与单段PW相比,其链路相对复杂,在进行故障检测的过程也自然不同。Bidirectional forwarding detection (BFD) is widely used on PW to detect faults on PW links. With the development of MS-PW and its application, more relevant technicians use it. The characteristics of BFD are applied to the MS-PW to detect the failure of the MS-PW link. Compared with a single-stage PW, the MS-PW has a relatively complex link, and the process of fault detection is naturally different.
请参考图1,设备1和设备2通过交换点供应商设备,设备3连接起来,在设备1与设备3以及设备2与设备3之间建立伪线业务,并且都配置BFD检测机制。在PW上进行过BFD检测时,BFD采用异步模式,在此模式下,网络节点双方会周期性地发送BFD控制报文,如果在检测时间内没有收到对端的BFD控制报文则认为对应的链路出现故障。采用BFD对MS-PW的链路进行检测的过程如下:节点双方建立的链路是动态触发建立的链路,在开始会话建立过程之前,两端设备都会向对端发送远端标识为0的报文,例如,设备1向设备2发送报文A,该报文A的远端标识字段为0,本端标识字段为系统为设备1分配的本端标识符,假如为12;设备1通过设备3将该报文A发送给设备2,设备2接收到该报文A后,查看该报文A的本端标识符,发现其本端标识符为12,于是学习到该标识符12,但 是,因为设备3直接连接设备2,而设备1通过设备3来连接设备2,所以往往存在这样的状况,设备2在收到该报文A后,将其误认为是由设备3发送过来的,于是错误的认为标识符12就对应设备3,从而导致报文错误的关联了伪线段。Referring to FIG. 1, the device 1 and the device 2 are connected to each other through the point-of-sale vendor device, and the device 3 is connected. The device 1 and the device 3 and the device 2 and the device 3 establish a pseudowire service, and both configure a BFD detection mechanism. BFD is used in the asynchronous mode. In this mode, the two nodes of the network periodically send BFD control packets. If the BFD control packet is not received within the detection time, the corresponding BFD control packet is considered to be corresponding. The link has failed. The process of detecting the link of the MS-PW by BFD is as follows: The link established by the two nodes is a link that is dynamically triggered. Before the session is established, the devices at both ends send the remote identifier to 0. For example, the device 1 sends the packet A to the device 2, the remote identifier field of the packet A is 0, and the local identifier field is the local identifier assigned by the system to the device 1, if it is 12; The device 3 sends the packet A to the device 2, and after receiving the packet A, the device 2 checks the local identifier of the packet A, and finds that the local identifier is 12, so the identifier 12 is learned. but Yes, because the device 3 is directly connected to the device 2, and the device 1 is connected to the device 2 through the device 3, there is often a situation in which the device 2 mistakes the device 3 as being sent by the device 3 after receiving the message A. Therefore, it is erroneously considered that the identifier 12 corresponds to the device 3, thereby causing the packet to be incorrectly associated with the pseudo line segment.
综上所述,采用BFD检测机制来对MS-PW进行检测时,存在无法区分报文的来源,导致报文错误的关联伪线段,引起检测结果错误,产生震荡等问题。In summary, when the BFD detection mechanism is used to detect the MS-PW, the source of the packet cannot be distinguished, and the pseudo-line segment is associated with the error of the packet, causing errors in the detection result and causing oscillations.
发明概述Summary of invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
本发明实施例提供的多段伪线检测方法和网元,可以准确区分检测报文来源。The multi-segment pseudowire detection method and the network element provided by the embodiment of the present invention can accurately distinguish the source of the detection message.
本发明实施例提供一种多段伪线检测方法,包括:An embodiment of the present invention provides a multi-segment pseudowire detection method, including:
向接收端设备发送第一检测报文,所述第一检测报文包括发送端设备的第一身份标识信息;Sending a first detection packet to the receiving device, where the first detection packet includes first identity information of the sending device;
接收所述接收端设备发送的第二检测报文;Receiving a second detection packet sent by the receiving device;
提取所述第二检测报文中的第二身份标识信息,根据所述第二身份标识信息确定接收端设备身份。Extracting the second identity identification information in the second detection packet, and determining the identity of the receiving device according to the second identity identification information.
本发明实施例还提供一种网元,包括报文发送模块、报文接收模块和处理模块;The embodiment of the invention further provides a network element, including a message sending module, a message receiving module and a processing module;
所述报文发送模块:设置为向接收端设备发送第一检测报文,所述第一检测报文包括发送端设备的第一身份标识信息;The packet sending module is configured to send a first detection packet to the receiving device, where the first detection packet includes first identity information of the sending device;
所述报文接收模块:设置为接收所述接收端设备发送的第二检测报文;The packet receiving module is configured to receive a second detection packet sent by the receiving device;
所述处理模块:设置为提取所述第二检测报文中的第二身份标识信息,根据所述第二身份标识信息确定接收端设备身份。 The processing module is configured to: extract second identity information in the second detection packet, and determine identity of the receiving device according to the second identity information.
本发明实施例还提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行前述的任一项的多段伪线检测方法。The embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the multi-segment pseudo line detection method of any one of the foregoing.
根据本发明实施例提供的多段伪线检测方法、网元以及计算机存储介质,发送端设备向接收端设备发送第一检测报文,在该第一检测报文中包括发送端设备的第一身份标识信息,并且接收到接收端设备发送的第二检测报文,发送端设备从第二检测报文中提取出第二身份标识信息,根据该第二身份标识信息确定接收端设备身份。采用本发明实施例中的方式,不需要通过学习的方式来确定报文发送方的身份,而是根据第二身份标识信息唯一确定接收端的身份,从而知道,该第二检测报文来源于接收端设备,从而确定接收端设备和发送端设备之间的链路为检测链路。达到准确区分检测报文来源,对当前多段伪线的链路检测更为精确,减少检测失误的效果。According to the multi-segment pseudo-line detection method, the network element, and the computer storage medium provided by the embodiment of the present invention, the transmitting end device sends the first detection packet to the receiving end device, where the first detection packet includes the first identity of the sending end device. And identifying the information, and receiving the second detection packet sent by the receiving device, the sending device extracting the second identity information from the second detection packet, and determining the identity of the receiving device according to the second identity information. The method in the embodiment of the present invention does not need to determine the identity of the sender of the message by means of learning, but uniquely determines the identity of the receiver according to the second identity information, thereby knowing that the second detection packet is received from the receiver. The end device determines the link between the receiving end device and the transmitting end device as a detecting link. To accurately distinguish the source of the detection message, the link detection of the current multi-segment pseudowire is more accurate, and the detection error is reduced.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图概述BRIEF abstract
图1为一种组网示意图;1 is a schematic diagram of networking;
图2为本发明实施例一的多段伪线检测方法流程图;2 is a flowchart of a method for detecting a multi-segment pseudowire according to Embodiment 1 of the present invention;
图3为本发明实施例二的网元结构示意图;3 is a schematic structural diagram of a network element according to Embodiment 2 of the present invention;
图4为本发明实施例二的示例组网示意图。FIG. 4 is a schematic diagram of an exemplary networking of Embodiment 2 of the present invention.
详述Detailed
下面通过实施方式结合附图对本发明实施例作进一步详细说明。The embodiments of the present invention are further described in detail below with reference to the accompanying drawings.
实施例一:Embodiment 1:
本实施例提供一种多段伪线检测方法,请参考图2,该方法包括:This embodiment provides a multi-segment pseudowire detection method. Referring to FIG. 2, the method includes:
S201:发送端设备向接收端设备发送第一检测报文,该第一检测报文包括发送端设备的第一身份识别信息;S201: The sending end device sends a first detection packet to the receiving end device, where the first detection packet includes first identifier information of the sending end device.
S202:发送端设备接收所述接收端设备发送的第二检测报文,该第二 检测报文包括接收端设备的第二身份识别信息;S202: The sending end device receives the second detection packet sent by the receiving end device, where the second The detection message includes second identification information of the receiving device;
S203:发送端设备提取第二检测报文中的第二身份标识信息,并确定接收端设备身份。S203: The sending end device extracts the second identity identification information in the second detection packet, and determines the identity of the receiving device.
在本实施中,执行步骤S201和步骤S202时,两个步骤之间并没有先后关系的要求,可以先执行步骤S202也可以先执行步骤S201。在步骤S201中,第一检测报文中包括第一身份识别信息,该第一身份识别信息可以在网络中对发送端设备的身份进行唯一标识;以便于接收端设备在接收到第一检测报文后,可以识别出发送端设备的身份。该第一身份识别信息的形式可以多种多样,只要其能在网络中能被唯一标识即可,例如,可以是按照某种规律排列的数字,也可以是本身就具有某种特殊意义的标识,例如,可以是IP地址。该第一身份标识信息可以由工作人员事先在设备上配置,也可以是工作人员设置好某种配置规则,当在启用该多段伪线检测方法的时候(执行步骤S201之前),设备自动完成对自身第一身份标识信息的分配。In this implementation, when step S201 and step S202 are performed, there is no requirement of a sequence relationship between the two steps, and step S202 may be performed first or step S201 may be performed first. In the step S201, the first detection message includes first identity identification information, where the first identity identification information can uniquely identify the identity of the sender device in the network, so that the receiver device receives the first detection report. After the text, the identity of the sender device can be identified. The form of the first identification information may be various, as long as it can be uniquely identified in the network, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself. For example, it can be an IP address. The first identity identification information may be configured by the staff member on the device in advance, or the staff member may set a certain configuration rule. When the multi-segment pseudowire detection method is enabled (before step S201 is performed), the device automatically completes the pair. The assignment of its own first identity information.
发送端设备可以获取自身的第一身份标识信息,然后将该第一身份标识信息封装至第一检测报文,在一种实施方式中,该第一检测报文可以是BFD报文。BFD报文内部封装有IP头,当使用IP地址作为第一身份标识信息,可以将IP地址封装在IP头内的源IP地址字段,采用这种方式,可以不用增加额外的字段,增加开销,同时达到准确发送第一身份识别信息的目的。然后将该第一检测报文发送给对端设备。The sending device may obtain the first identity information of the device, and then encapsulate the first identity information into the first detection packet. In an implementation manner, the first detection packet may be a BFD packet. The BFD packet is encapsulated with an IP header. When the IP address is used as the first identity information, the IP address can be encapsulated in the source IP address field in the IP header. In this way, additional fields can be added and the overhead can be increased. At the same time, the purpose of accurately transmitting the first identification information is achieved. The first detection packet is then sent to the peer device.
接收端端设备在接收到该第一检测报文后,对该第一检测报文进行解析,获取其中的第一身份识别信息,根据该第一身份识别信息识别出发送该第一检测报文的设备,从而知道该第一检测数据包实际检测的链路是该第一检测报文发送设备与自身之间的链路。After receiving the first detection packet, the receiving end device parses the first detection packet, obtains the first identity identification information, and identifies that the first detection packet is sent according to the first identity identification information. The device, so that the link actually detected by the first detection data packet is a link between the first detection message sending device and itself.
接收端设备也向第一检测报文发送设备发送第二检测报文。第一检测报文发送设备执行步骤S202,接收端设备发送的第二检测报文,同样的,在该第二检测报文中,包括第二身份识别信息。接收端设备的系统也会为其自身分配用于在网络中能唯一识别器身份的第二身份标识信息。其形式可以与第一身份识别信息相同,例如,可以是按照某种规律排列的数字, 也可以是本身就具有某种特殊意义的标识,例如,可以是IP地址。其可以由工作人员事先在对端设备上配置,也可以是工作人员设置好某种配置规则,当在启用该多段伪线检测方法的时候,对端设备自动完成对自身第二身份标识信息的分配。对端设备获取自身的第二身份标识信息,并将该第二身份标识信息封装至第二检测报文,在一种实施方式中,该第二检测报文可以是BFD报文。BFD报文内部封装有IP头,当使用IP地址作为第二身份标识信息,可以将IP地址封装在IP头内的源IP地址字段。然后将该二检测报文发送给上述第一检测报文的发送设备。The receiving device also sends a second detection packet to the first detection packet sending device. The first detection packet sending device performs the step S202, and the second detection packet sent by the receiving device, and the second detection packet includes the second identification information. The system of the receiving device also assigns itself to the second identity information for unique identifier identity in the network. The form may be the same as the first identification information, for example, may be a number arranged according to a certain rule. It can also be an identifier that has a special meaning in itself, for example, it can be an IP address. It can be configured by the staff in advance on the peer device, or the staff can set a certain configuration rule. When the multi-segment pseudowire detection method is enabled, the peer device automatically completes the second identity identification information of the user. distribution. The peer device obtains its own second identity information, and encapsulates the second identity information into a second detection packet. In an implementation manner, the second detection packet may be a BFD packet. The BFD packet is encapsulated with an IP header. When the IP address is used as the second identifier, the IP address can be encapsulated in the source IP address field in the IP header. Then, the second detection packet is sent to the sending device of the first detection packet.
发送端设备接收到该第二检测报文后,执行步骤S203,根据该第二身份识别信息确定接收端设备的身份,是哪一台设备,从而确定二者之间的链路是哪一条,二者之间的链路也即是检测链路。After receiving the second detection packet, the sending end device performs step S203, and determines, according to the second identity identification information, which device is the device of the receiving end device, and determines which link is between the two devices. The link between the two is also the detection link.
在本实施例中,发送端设备还会判断是否需要对接收到的第二检测报文进行转发,如果判断出需要进行转发的时候,就将其转发。其中,其获取第二检测报文中的目标对象识别信息,根据目标对象识别信息确定目标路径,生成第二检测转发报文,该第二检测转发报文也携带该第二身份标识信息。然后将该第二检测转发报文通过该目标路径进行转发。In this embodiment, the transmitting device further determines whether the received second detection packet needs to be forwarded, and if it is determined that forwarding is needed, it is forwarded. The target detection information in the second detection packet is obtained, and the target path is determined according to the target object identification information, and the second detection and forwarding message is generated, and the second detection and forwarding message also carries the second identity identification information. Then, the second detection and forwarding packet is forwarded through the target path.
上述多段伪线检测方法可以适用于负载有MS-PW业务的网络,采用本实施例中的多段伪线检测方法,为各设备分别分配在网络中唯一标识自己身份的身份标识信息,在发送检测报文的时候携带该身份标识信息,如果需要转发的时候,转发过程中也携带该身份标识信息,也就是说,在一个检测报文从其产生到抵达目的端一直携带该身份识别信息,该身份识别信息不被更改,这样目的端在接收到该检测报文的时候,可以轻松准确的识别出该检测报文由哪个设备产生,从而确定其经历了哪些链路,其经过的这些链路正是正在被检测的链路。使得检测链路的判断更加准确,实现方式简单,使用方便。The above-mentioned multi-segment pseudo-line detection method can be applied to a network loaded with an MS-PW service, and the multi-segment pseudo-line detection method in this embodiment is used to assign identity identification information uniquely identifying the identity of the device to each device, and the detection is performed. When the packet is to be forwarded, the identity information is carried in the forwarding process, that is, the identification information is carried in a detection packet from the generation to the destination end. The identity information is not changed, so that when the destination receives the detection packet, the destination can easily and accurately identify which device the detection packet is generated, thereby determining which links they have experienced and the links they have passed. It is the link being detected. The judgment of the detection link is more accurate, the implementation is simple, and the use is convenient.
实施例二:Embodiment 2:
本实施例提供一种网元,请参考图3,该网元包括报文发送模块31、报文接收模块32和处理模块33。This embodiment provides a network element. Referring to FIG. 3, the network element includes a message sending module 31, a message receiving module 32, and a processing module 33.
报文发送模块31设置为向对端设备发送第一检测报文,第一检测报文 中包括第一身份识别信息,该第一身份识别信息可以在网络中对网元的身份进行唯一标识;以便于接收端设备在接收到第一检测报文后,可以识别出网元的身份。该第一身份识别信息的形式可以多种多样,只要其能在网络中能被唯一标识即可,例如,可以是按照某种规律排列的数字,也可以是本身就具有某种特殊意义的标识,例如,可以是IP地址。该第一身份标识信息可以由工作人员事先在设备上配置,也可以是工作人员设置好某种配置规则,当在启用该多段伪线检测方法的时候,网元自动完成对自身第一身份标识信息的分配。The packet sending module 31 is configured to send the first detection packet to the peer device, where the first detection packet is sent. The first identity identification information may be used to identify the identity of the network element in the network. The receiving device may identify the identity of the network element after receiving the first detection packet. The form of the first identification information may be various, as long as it can be uniquely identified in the network, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself. For example, it can be an IP address. The first identity information may be configured by the staff member on the device in advance, or the staff may set a certain configuration rule. When the multi-segment pseudowire detection method is enabled, the network element automatically completes the first identity of the user. Distribution of information.
网元还可包括封装模块,封装模块获取自身的第一身份标识信息,然后将该第一身份标识信息封装至第一检测报文,报文发送模块31将其发送给对端设备。在一种实施方式中,该第一检测报文可以是BFD报文。BFD报文内部封装有IP头,当使用IP地址作为第一身份标识信息,可以将IP地址封装在IP头内的源IP地址字段。The network element may further include an encapsulating module, and the encapsulating module obtains the first identity information of the first identity information, and then the first identity information is encapsulated into the first detection packet, and the packet sending module 31 sends the first identity information to the peer device. In an embodiment, the first detection packet may be a BFD packet. The BFD packet is encapsulated with an IP header. When the IP address is used as the first identity information, the IP address can be encapsulated in the source IP address field in the IP header.
报文接收模块32设置为对接收端设备发送的第二检测报文进行接收,在该第二检测报文中,包括第二身份识别信息。接收端设备的系统也会为其自身分配用于在网络中能唯一识别器身份的第二身份标识信息。其形式可以与第一身份识别信息相同,例如,可以是按照某种规律排列的数字,也可以是本身就具有某种特殊意义的标识,例如,可以是IP地址。其可以由工作人员事先在接收端设备上配置,也可以是工作人员设置好某种配置规则,当在启用该多段伪线检测方法的时候,接收端设备自动完成对自身第二身份标识信息的分配。接收端设备获取自身的第二身份标识信息,并将该第二身份标识信息封装至第二检测报文,在一种实施方式中,该第二检测报文可以是BFD报文。BFD报文内部封装有IP头,当使用IP地址作为第二身份标识信息,可以将IP地址封装在IP头内的源IP地址字段。然后将该二检测报文发送给上述网元。The packet receiving module 32 is configured to receive the second detection packet sent by the receiving device, and include the second identification information in the second detection packet. The system of the receiving device also assigns itself to the second identity information for unique identifier identity in the network. The form may be the same as the first identification information, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself, for example, may be an IP address. The configuration may be configured by the staff on the receiving device in advance, or the staff may set a certain configuration rule. When the multi-segment pseudowire detection method is enabled, the receiving device automatically completes the second identity information of the user. distribution. The receiving device obtains the second identity information of the device and encapsulates the second identity information into the second detection packet. In an implementation manner, the second detection packet may be a BFD packet. The BFD packet is encapsulated with an IP header. When the IP address is used as the second identifier, the IP address can be encapsulated in the source IP address field in the IP header. The second detection packet is then sent to the network element.
处理模块33对报文接收模块31接收到的第二检测报文进行解析,获取其中的第二身份识别信息,根据该第二身份识别信息识别接收端设备的身份,从而确定二者之间的链路。The processing module 33 parses the second detection packet received by the packet receiving module 31, acquires the second identity identification information, and identifies the identity of the receiving device according to the second identity identification information, thereby determining the relationship between the two. link.
网元还包括判断处理模块34,设置为判断是否需要对接收到的第二检 测报文进行转发,如果判断出需要进行转发的时候,就将其转发。其中,判断处理模块34获取第二检测报文中的目标对象识别信息,根据目标对象识别信息确定目标路径,生成第二检测转发报文,该第二检测转发报文也携带该第二身份标识信息。然后将该第二检测转发报文通过该目标路径进行转发。The network element further includes a judgment processing module 34 configured to determine whether it is necessary to receive the second check. The packet is forwarded, and if it is determined that forwarding is required, it is forwarded. The determination processing module 34 acquires the target object identification information in the second detection message, determines the target path according to the target object identification information, and generates a second detection and forwarding message, where the second detection and forwarding message also carries the second identity identifier. information. Then, the second detection and forwarding packet is forwarded through the target path.
在一种实施例中,使用BFD来对MS-PW进行检测时,目标对象标识信息可以是BFD检测报文的携带的目标标签值,该目标标签值用于指向目标设备的标签值,发送端设备自身保存有标签表,发送端设备可以从自身的标签表中查询目标标签值所在条目对应的下一个步骤需要执行的内容,若下一个步骤的内容定义需要对报文进行转发,那么判断处理模块34就对报文进行转发。在进行转发的时候,会对该第二检测报文进行解析,重新封装,但是不改变报文的内容,生成第二检测转发报文,在该第二检测转发报文中仍然携带第二身份标识信息。In an embodiment, when the BFD is used to detect the MS-PW, the target identifier information may be a target label value carried by the BFD detection packet, where the target label value is used to point to the label value of the target device, and the sending end is used. The device itself saves the label table. The sender device can query the content of the next step corresponding to the entry of the target tag value from its own tag table. If the content of the next step needs to be forwarded, the judgment process is performed. Module 34 forwards the message. When the forwarding is performed, the second detection packet is parsed and re-encapsulated, but the content of the packet is not changed, and the second detection and forwarding packet is generated, and the second identity is still carried in the second detection and forwarding packet. Identification information.
本实施例中的网元可以是常用的PE,也可以是S-PE,当该网元为PE,则其不具备对检测报文的转发功能,只能发送检测报文和接收检测报文,并根据接收的检测报文中的身份标识信息,判断检测链路,当发现链路故障时,完成链路切换;当网元为S-PE的时候,其不仅可以完成发送检测报文和接收检测报文,根据接收的检测报文中的身份标识信息,判断检测链路,在需要的时候,还可以对检测报文进行转发。The network element in this embodiment may be a common PE or an S-PE. When the network element is a PE, the network element does not have the function of forwarding the detection packet, and can only send the detection packet and receive the detection packet. And determining the detection link according to the identity identification information in the received detection packet, and completing the link switching when the link is found to be faulty; when the network element is the S-PE, the not only can send the detection packet and The detection packet is received, and the detection link is determined according to the identity identification information in the received detection packet, and the detection packet can be forwarded when needed.
本实施例中网元的各个模块,报文发送模块31、报文接收模块32、处理模块33、封装模块以及判断处理模块34的功能都可以由网元的处理器来实现。The functions of the modules of the network element, the packet sending module 31, the message receiving module 32, the processing module 33, the encapsulating module and the judging processing module 34 in this embodiment can be implemented by the processor of the network element.
下面以示例,对本实施例中的网元做进一步说明,请参考图4,图4为采用本实施例中的网元组成的PW网络的示意图。网元1、网元2、网元3、网元4顺序连接。在各个链路上均配置有PW业务,各个设备之间形成MS-PW,针对所有网元都配置启用BFD检测机制。The following is a description of the network element in this embodiment. Referring to FIG. 4, FIG. 4 is a schematic diagram of a PW network composed of network elements in this embodiment. The network element 1, the network element 2, the network element 3, and the network element 4 are sequentially connected. A PW service is configured on each link. The MS-PW is configured on each device. The BFD detection mechanism is enabled on all NEs.
采用IP地址作为各个设备的身份标识信息,其中,网元1的IP地址为1.1.1.1;网元2的IP地址为2.2.2.2;网元3的IP地址为3.3.3.3;网元4的IP地址为4.4.4.4;各网元的IP地址并不强制按照上述配置方式,可以根据 配置人员意志灵活选择。网元1和网元2之间的BFD检测链路为链路1;网元2和网元3之间的BFD检测链路为链路2;网元3和网元4之间的BFD检测链路为链路3;网元1和网元4之间的BFD检测链路为链路4。The IP address is used as the identity information of each device, where the IP address of the network element 1 is 1.1.1.1; the IP address of the network element 2 is 2.2.2.2; the IP address of the network element 3 is 3.3.3.3; The IP address is 4.4.4.4. The IP address of each NE is not mandatory according to the above configuration. The configuration staff will be flexible. The BFD detection link between the network element 1 and the network element 2 is the link 1; the BFD detection link between the network element 2 and the network element 3 is the link 2; and the BFD detection between the network element 3 and the network element 4 The link is link 3; the BFD detection link between network element 1 and network element 4 is link 4.
网元1生成检测报文,可以在该检测报文中携带自身的IP地址1.1.1.1;将其发送给网元2;对于发送给网元2的检测报文,会通过链路1直接到达网元2,网元2解析检测报文,获取其中的IP地址为1.1.1.1;于是识别出发送该检测报文的是网元1,于是确定其是通过链路1完成发送的,从而判定,这二者之间的交互,是针对于链路1的检测。The network element 1 generates a detection packet, and the detection packet carries its own IP address 1.1.1.1; it is sent to the network element 2; the detection packet sent to the network element 2 is directly reached through the link 1. The network element 2, the network element 2 parses the detection packet, and obtains the IP address thereof as 1.1.1.1; then it is identified that the detection packet is the network element 1, and then it is determined that the transmission is completed through the link 1, thereby determining The interaction between the two is for the detection of link 1.
网元2生成检测报文,可以在该检测报文中携带自身的IP地址2.2.2.2;将其发送给网元3;对于发送给网元3的检测报文,会通过链路2直接到达网元3,网元3解析检测报文,获取其中的IP地址为2.2.2.2;于是识别出发送该检测报文的是网元2,于是确定其是通过链路2完成发送的,从而判定这二者之间的交互,是针对于链路2的检测。The network element 2 generates a detection packet, and the detection packet carries its own IP address 2.2.2.2; it is sent to the network element 3; the detection packet sent to the network element 3 is directly reached through the link 2 The network element 3, the network element 3 parses the detection packet, and obtains the IP address thereof as 2.2.2.2; then it is identified that the detection packet is the network element 2, and then it is determined that the transmission is completed through the link 2, thereby determining The interaction between the two is for the detection of link 2.
网元3生成检测报文,可以在该检测报文中携带自身的IP地址3.3.3.3;将其发送给网元4;对于发送给网元4的检测报文,会通过链路3直接到达网元4,网元4解析检测报文,获取其中的IP地址为3.3.3.3;于是识别出发送该检测报文的是网元3,于是确定其是通过链路3完成发送的,从而判定这二者之间的交互,是针对于链路3的检测。网元1生成检测报文,可以在该检测报文中携带自身的IP地址1.1.1.1;将其发送给网元4;对于发送给网元4的检测报文,会通过链路4经网元2和网元3到达网元4,网元4解析检测报文,获取其中的IP地址为1.1.1.1;于是识别出发送该检测报文的是网元4,于是确定其是通过链路4完成发送的,从而判定,这二者之间的交互,是针对于链路4的检测。The network element 3 generates a detection packet, and the detection packet carries its own IP address 3.3.3.3; it is sent to the network element 4; the detection packet sent to the network element 4 is directly reached through the link 3. The network element 4, the network element 4 parses the detection packet, and obtains the IP address thereof as 3.3.3.3; then it is identified that the network element 3 is sent by the detection packet, and then it is determined that the transmission is completed through the link 3, thereby determining The interaction between the two is for the detection of link 3. The network element 1 generates a detection packet, and the detection packet carries its own IP address 1.1.1.1; it is sent to the network element 4; the detection packet sent to the network element 4 passes through the network through the link 4. The element 2 and the network element 3 arrive at the network element 4, and the network element 4 parses the detection packet, and obtains the IP address thereof as 1.1.1.1; then it identifies that the detection packet is the network element 4, and then determines that it is through the link. 4 The transmission is completed, thereby determining that the interaction between the two is for the detection of the link 4.
对于网元2、网元3、网元4、网元1之间还存在许多其他的链路,在此并没有一一列举,对于其他链路的检测过程,与上述过程类似。There are many other links between the network element 2, the network element 3, the network element 4, and the network element 1. These are not enumerated here. The detection process for other links is similar to the above process.
采用本实施例的网元,在针对多段伪线进行检测时,可以快速准确的定位所检测的链路,提高检测效率,避免错误判断检链路而导致错误切换的情况。With the network element of this embodiment, when detecting the multi-segment pseudowire, the detected link can be quickly and accurately located, the detection efficiency is improved, and the erroneous connection is detected to avoid false handover.
上述本发明实施例的各模块或各步骤可以用通用的计算装置来实现, 它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在计算机存储介质(ROM/RAM、磁碟、光盘)中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。所以,本发明实施例不限制于任何特定的硬件和软件结合。The modules or steps of the above embodiments of the present invention can be implemented by a general-purpose computing device. They can be centralized on a single computing device or distributed over a network of multiple computing devices, which can be implemented in program code executable by the computing device so that they can be stored in a computer storage medium (ROM/RAM) , in a magnetic disk, in an optical disk, are performed by a computing device, and in some cases, the steps shown or described may be performed in an order different from that herein, or they may be separately fabricated into individual integrated circuit modules, or Multiple of these modules or steps are fabricated as a single integrated circuit module. Therefore, embodiments of the invention are not limited to any particular combination of hardware and software.
以上内容是结合实施方式对本发明实施例所作的进一步详细说明,不能认定本申请的实施只局限于这些说明。对于本申请所属技术领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干简单推演或替换,都应当视为属于本申请的保护范围。The above is a further detailed description of the embodiments of the present invention in connection with the embodiments, and the implementation of the present application is not limited to the description. It will be apparent to those skilled in the art that the present invention can be made in the form of the present invention without departing from the scope of the present invention.
工业实用性Industrial applicability
采用本发明实施例中的方式,不需要通过学习的方式来确定报文发送方的身份,而是根据第二身份标识信息唯一确定接收端的身份,从而知道,该第二检测报文来源于接收端设备,从而确定接收端设备和发送端设备之间的链路为检测链路,达到准确区分检测报文来源,对当前多段伪线的链路检测更为精确,减少检测失误的效果。 The method in the embodiment of the present invention does not need to determine the identity of the sender of the message by means of learning, but uniquely determines the identity of the receiver according to the second identity information, thereby knowing that the second detection packet is received from the receiver. The end device determines that the link between the receiving end device and the transmitting end device is a detecting link, so as to accurately distinguish the source of the detecting message, and the link detection of the current multi-segment pseudowire is more accurate, and the detection error is reduced.

Claims (11)

  1. 一种多段伪线检测方法,包括:A multi-segment pseudowire detection method includes:
    向接收端设备发送第一检测报文,所述第一检测报文包括发送端设备的第一身份标识信息;Sending a first detection packet to the receiving device, where the first detection packet includes first identity information of the sending device;
    接收所述接收端设备发送的第二检测报文;Receiving a second detection packet sent by the receiving device;
    提取所述第二检测报文中的第二身份标识信息,根据所述第二身份标识信息确定接收端设备身份。Extracting the second identity identification information in the second detection packet, and determining the identity of the receiving device according to the second identity identification information.
  2. 如权利要求1所述的多段伪线检测方法,还包括:根据所述第二检测报文判断是否需要进行报文转发,若是,则从所述第二检测报文中提取出目标对象识别信息,根据所述目标对象识别信息确定目标路径,并生成携带所述第二身份标识信息的第二检测转发报文,将所述第二检测转发报文通过所述目标路径进行转发。The multi-segment pseudo-line detection method according to claim 1, further comprising: determining, according to the second detection message, whether packet forwarding is required, and if yes, extracting target object identification information from the second detection message Determining a target path according to the target object identification information, and generating a second detection and forwarding message carrying the second identity identification information, and forwarding the second detection and forwarding message by using the target path.
  3. 如权利要求2所述的多段伪线检测方法,其中,根据所述第二检测报文判断是否需要进行报文转发包括:获取所述第二检测报文中的目标对象识别信息,根据所述目标对象识别信息判断该第二检测报文的目标对象是否是自身,若是,则不需要进行报文转发;若否,则需要进行报文转发。The multi-segment pseudo-line detection method according to claim 2, wherein determining whether to perform packet forwarding according to the second detection message comprises: acquiring target object identification information in the second detection message, according to the The target object identification information determines whether the target object of the second detection message is itself. If yes, the packet forwarding is not required; if not, the packet forwarding is required.
  4. 如权利要求1-3任一项所述的多段伪线检测方法,其中,所述第一检测报文和所述第二检测报文为双向转发检测协议报文。The method for detecting a multi-segment line according to any one of claims 1 to 3, wherein the first detection message and the second detection message are bidirectional forwarding detection protocol messages.
  5. 如权利要求4所述的多段伪线检测方法,其中,所述第一身份标识信息和所述第二身份标识信息分别封装在所述第一检测报文和所述第二检测报文的IP头内。The multi-segment pseudo-line detection method according to claim 4, wherein the first identity identification information and the second identity identification information are respectively encapsulated in IP addresses of the first detection packet and the second detection packet Inside the head.
  6. 如权利要求1-3任一项所述的多段伪线检测方法,其中,所述第一身份标识信息和所述第二身份标识信息为所述发送端设备和所述接收端设备的IP地址。The multi-segment pseudowire detection method according to any one of claims 1 to 3, wherein the first identity identification information and the second identity identification information are IP addresses of the sender device and the receiver device .
  7. 一种网元,包括报文发送模块、报文接收模块和处理模块;A network element includes a message sending module, a message receiving module, and a processing module;
    所述报文发送模块:设置为向接收端设备发送第一检测报文,所述第一检测报文包括发送端设备的第一身份标识信息; The packet sending module is configured to send a first detection packet to the receiving device, where the first detection packet includes first identity information of the sending device;
    所述报文接收模块:设置为接收所述接收端设备发送的第二检测报文;The packet receiving module is configured to receive a second detection packet sent by the receiving device;
    所述处理模块:设置为提取所述第二检测报文中的第二身份标识信息,根据所述第二身份标识信息确定接收端设备身份。The processing module is configured to: extract second identity information in the second detection packet, and determine identity of the receiving device according to the second identity information.
  8. 如权利要求7所述的网元,还包括判断处理模块,根据所述第二检测报文判断是否需要进行报文转发,若是,则从所述第二检测报文中提取出目标对象识别信息,根据所述目标对象识别信息确定目标路径,并生成携带所述第二身份标识信息的第二检测转发报文,将所述第二检测转发报文通过所述目标路径进行转发。The network element of claim 7, further comprising: a judgment processing module, determining, according to the second detection message, whether packet forwarding is required, and if yes, extracting target object identification information from the second detection packet Determining a target path according to the target object identification information, and generating a second detection and forwarding message carrying the second identity identification information, and forwarding the second detection and forwarding message by using the target path.
  9. 如权利要求8所述的网元,其中,所述判断处理模块设置为获取所述第二检测报文中的目标对象识别信息,根据所述目标对象识别信息判断该第二检测报文的目标对象是否是自身,若是,则不需要进行报文转发;若否,则需要进行报文转发。The network element according to claim 8, wherein the determining processing module is configured to acquire target object identification information in the second detection message, and determine a target of the second detection message according to the target object identification information Whether the object is itself, if it is, no packet forwarding is required; if not, packet forwarding is required.
  10. 如权利要求7-9任一项所述的网元,其中,所述第一检测报文和所述第二检测报文为双向转发检测协议报文。The network element according to any one of claims 7-9, wherein the first detection message and the second detection message are bidirectional forwarding detection protocol messages.
  11. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1-6任一项的多段伪线检测方法。 A computer readable storage medium storing computer executable instructions for performing the multi-segment pseudowire detection method of any of claims 1-6.
PCT/CN2017/083808 2016-06-16 2017-05-10 Multi-segment pseudo wire detection method and network element WO2017215376A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610430956.4A CN107517116B (en) 2016-06-16 2016-06-16 Multi-segment pseudo wire detection method and network element
CN201610430956.4 2016-06-16

Publications (1)

Publication Number Publication Date
WO2017215376A1 true WO2017215376A1 (en) 2017-12-21

Family

ID=60663953

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/083808 WO2017215376A1 (en) 2016-06-16 2017-05-10 Multi-segment pseudo wire detection method and network element

Country Status (2)

Country Link
CN (1) CN107517116B (en)
WO (1) WO2017215376A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389967A (en) * 2020-10-19 2022-04-22 南京中兴新软件有限责任公司 Link detection method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080279110A1 (en) * 2007-05-10 2008-11-13 Alcatel Lucent Method and system for verifying connectivity of multi-segment pseudo-wires
CN103491103A (en) * 2013-09-30 2014-01-01 福建星网锐捷网络有限公司 Multi-segment pseudo wire establishing method, system and device
CN104333872A (en) * 2014-10-29 2015-02-04 中国联合网络通信集团有限公司 Method and system for establishing session based on bidirectional forwarding detection technology
CN105141434A (en) * 2014-05-26 2015-12-09 华为技术有限公司 Fault detection method and device of service chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100396023C (en) * 2005-09-30 2008-06-18 华为技术有限公司 Multi-jumping pseudo-line fault detecting reporting and maintenance protocol controlling method
CN104468286A (en) * 2014-12-31 2015-03-25 迈普通信技术股份有限公司 Method and system for detecting multi-hop link

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080279110A1 (en) * 2007-05-10 2008-11-13 Alcatel Lucent Method and system for verifying connectivity of multi-segment pseudo-wires
CN103491103A (en) * 2013-09-30 2014-01-01 福建星网锐捷网络有限公司 Multi-segment pseudo wire establishing method, system and device
CN105141434A (en) * 2014-05-26 2015-12-09 华为技术有限公司 Fault detection method and device of service chain
CN104333872A (en) * 2014-10-29 2015-02-04 中国联合网络通信集团有限公司 Method and system for establishing session based on bidirectional forwarding detection technology

Also Published As

Publication number Publication date
CN107517116B (en) 2022-07-15
CN107517116A (en) 2017-12-26

Similar Documents

Publication Publication Date Title
US10965568B2 (en) Bit-forwarding ingress router, bit-forwarding router, and operation, administration and maintenance test method
EP3346661B1 (en) Path detection method and device
US10237173B2 (en) Target FEC (forwarding equivalence class) stack based FEC query in segment routing environments
WO2016058245A1 (en) Processing method and apparatus for operation, administration and maintenance (oam) message
WO2016008322A1 (en) Path connectivity test method and device
WO2015180559A1 (en) Fault detection method and apparatus for service chain
US20080101241A1 (en) Ethernet OAM at intermediate nodes in a PBT network
CN102571601B (en) A kind of method and label switched path equipment for ensureing two-way converting detection reliability
WO2018210213A1 (en) Method and device for implementing ioam packaging and storage medium
WO2016106743A1 (en) Method, device and system for performing bidirectional forwarding detection on aggregated link
CN103580894B (en) Method, equipment and the system of Operations, Administration and Maintenance OAM configurations
WO2017128901A1 (en) Forwarding control method and device
US8724451B2 (en) Method for protecting a pseudo-wire
Geib et al. A scalable and topology-aware MPLS data-plane monitoring system
CN113261246B (en) Method, device and system for reducing routing loop
CN112217685A (en) Tunnel detection method, terminal device, system, computer device and storage medium
WO2017215376A1 (en) Multi-segment pseudo wire detection method and network element
CN113950811B (en) Extending BGP protection for SR Path ingress protection
CN109412851B (en) Link layer path detection method, device and system
CN112737949B (en) Fault detection method and device, electronic equipment and computer readable medium
CN112511437B (en) Method for verifying service chain, transmitting node, forwarding node and service function node
WO2023236544A1 (en) Slice information verification method and apparatus
CN108111327A (en) Network operations management maintaining method and device
Kumar Internet Engineering Task Force (IETF) R. Geib, Ed. Request for Comments: 8403 Deutsche Telekom Category: Informational C. Filsfils
JP2015156562A (en) communication device, system and method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17812487

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17812487

Country of ref document: EP

Kind code of ref document: A1