WO2021115162A1 - Link protection method, device, ingress node, and storage medium - Google Patents

Link protection method, device, ingress node, and storage medium Download PDF

Info

Publication number
WO2021115162A1
WO2021115162A1 PCT/CN2020/133139 CN2020133139W WO2021115162A1 WO 2021115162 A1 WO2021115162 A1 WO 2021115162A1 CN 2020133139 W CN2020133139 W CN 2020133139W WO 2021115162 A1 WO2021115162 A1 WO 2021115162A1
Authority
WO
WIPO (PCT)
Prior art keywords
path
value
forwarding
state table
state
Prior art date
Application number
PCT/CN2020/133139
Other languages
French (fr)
Chinese (zh)
Inventor
宋学德
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2021115162A1 publication Critical patent/WO2021115162A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/06Deflection routing, e.g. hot-potato routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

Definitions

  • This application relates to a wireless communication network, for example, to a link protection method, device, ingress node, and storage medium.
  • Segment Routing is a protocol designed based on the concept of source routing to forward data packets on the network. It can control the real-time fast forwarding of data by specifying a set of ordered instruction lists at the ingress node. It is widely used in current communication systems. As the requirements for ultra-large bandwidth and ultra-low delay in communication systems become more and more stringent, how to ensure the stability of SR tunnels has become the current focus of discussion.
  • the present application provides a link protection method, device, ingress node, and storage medium, which can realize multi-level carrier-grade performance protection of the link, and ensure the stability and timeliness of the system.
  • the embodiment of the application provides a link protection method, including: confirming the state value in the first forwarding state table; if the state value in the first forwarding state table is the first invalid value, confirming the state value in the second forwarding state table Status value, the first invalid value indicates that the first path has failed; if the status value in the second forwarding status table is the second invalid value, the data is sent through the third path or the fourth path, and the second invalid value indicates the second path
  • the second path is the backup path of the first path;
  • the third path and the fourth path are the backup paths of the second path, and the first path, the second path, the third path, and the fourth path are all segmented routes -The label forwarding path LSP of the traffic engineering SR-TE tunnel.
  • the embodiment of the present application provides a link protection device, including: a confirmation module and a sending module; the confirmation module is set to confirm the state value in the first forwarding state table; if the state value in the first forwarding state table is first invalid Value, the state value in the second forwarding state table is confirmed. The first invalid value indicates that the first path has failed; the sending module is set to pass the third invalid value if the state value in the second forwarding state table is the second invalid value.
  • the path or the fourth path sends data, the second invalid value indicates that the second path has failed, and the second path is the backup path of the first path; the third path and the fourth path are both backup paths of the second path, and the first path,
  • the second path, the third path, and the fourth path are all segment routing-traffic engineering SR-TE tunnel label forwarding path LSPs.
  • An embodiment of the present application provides an entry node including a processor, and the processor is configured to implement the method of any one of the foregoing embodiments when a computer program is executed.
  • the embodiments of the present application also provide a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, the method of any of the foregoing embodiments is implemented.
  • FIG. 1 is a schematic diagram of data forwarding in an SR-TE tunnel provided by an embodiment of the application
  • FIG. 2 is a schematic diagram of an SR-TE primary path and a backup path provided by an embodiment of this application;
  • FIG. 3 is a schematic diagram of a link protection group provided by an embodiment of this application.
  • FIG. 4 is a schematic flowchart of a link protection method based on the link networking shown in FIG. 3 according to an embodiment of the application;
  • FIG. 5 is a schematic flowchart of another link protection method based on the link networking shown in FIG. 3 according to an embodiment of the application;
  • FIG. 6 is a schematic diagram of a link networking provided by an embodiment of the application.
  • FIG. 7 is a schematic structural diagram of a link protection device provided by an embodiment of this application.
  • FIG. 8 is a schematic structural diagram of another link protection device provided by an embodiment of this application.
  • FIG. 9 is a schematic structural diagram of an ingress node provided by an embodiment of this application.
  • the bearer network needs to provide a transmission channel with ultra-large bandwidth and ultra-low latency.
  • the use of SR forwarding technology can reduce the complexity of network connections and make the service path easier to maintain. Supports flexible scheduling under massive 5G network connections.
  • the SR forwarding technology is widely used by operators as one of the necessary technologies for software-defined network (Software-Defined Network, SDN) deployment.
  • Segment Routing-Traffic Engineering (SR-TE) tunnel is a new type of TE tunnel technology that uses SR as a control protocol.
  • SR-TE refers to a tunnel created using the SR protocol based on the constraint attributes of TE.
  • the controller is responsible for calculating the forwarding path of the tunnel, and delivering the label stack strictly corresponding to the path to the forwarder.
  • the repeater can control the transmission path of data in the network according to the label stack.
  • Fig. 1 is a schematic diagram of data forwarding in an SR-TE tunnel according to an embodiment.
  • the ingress node is node 0, the egress node is node 5, and node 1, node 2, node 3, and node 4 are intermediate nodes.
  • the forwarding path calculated by the controller is (30001, 30102, 30204, 30405), where 3 is the prefix of the tunnel, 1.1.1.5 is the Internet Protocol (IP) address, and 30001 represents the data slave node 0 Sent to node 1, 30102 represents data sent from node 1 to node 2, 30204 represents data sent from node 2 to node 4, and 30405 represents data sent from node 4 to node 5.
  • IP Internet Protocol
  • the forwarding path is strictly formulated by the controller according to the needs, and different transmission channels are allocated through reasonable planning of services, so as to realize the efficient use of bandwidth resources and the simplified management of network connections.
  • FIG. 2 is a schematic diagram of an SR-TE primary path and a backup path according to an embodiment.
  • the ingress node is node 0, the egress node is node 2, and node 1, node 3, node 4, and node 5 are intermediate nodes.
  • the main path is the path from node 0 to node 1 to node 2
  • the backup path It is the path from node 0 to node 3 to node 4 to node 5 to node 2.
  • the embodiments of the present application provide a mobile communication network (including but not limited to the fifth-generation mobile communication network (5th-Generation, 5G)).
  • the network architecture of the network may include core network equipment (for example, Unified Data Management (Unified Data Management)). , UDM equipment), network-side equipment (such as one or more types of base stations, transmission nodes, access points (Access Point, AP), relays, Node B (NB), terrestrial radio access ( Universal Terrestrial Radio Access (UTRA), Evolved Terrestrial Radio Access (Evolved Universal Terrestrial Radio Access, EUTRA, etc.) and terminal equipment (User Equipment (UE), user equipment data card, relay, mobile Equipment, etc.).
  • core network equipment for example, Unified Data Management (Unified Data Management)
  • UDM equipment network-side equipment
  • network-side equipment such as one or more types of base stations, transmission nodes, access points (Access Point, AP), relays, Node B (NB), terrestrial radio access ( Universal Terrestrial Radio Access (UTRA), Evol
  • a link protection method, device, ingress node, and storage medium that can run on the above-mentioned network architecture are provided, which can realize multi-level carrier-level performance protection of the link, and ensure the stability and stability of the system. Timeliness.
  • the operating environment of the foregoing link protection method provided in the embodiments of the present application is not limited to the foregoing network architecture.
  • system and "network” in this application are often used interchangeably in this application.
  • the following embodiments of the present application can be implemented individually, and the various embodiments can also be implemented in combination with each other, which is not specifically limited by the embodiments of the present application.
  • Fig. 3 is a schematic diagram of a link protection group provided by an embodiment.
  • the link networking includes at least four paths.
  • four paths are taken as an example.
  • the four paths are the first path, the second path, the third path, and the fourth path.
  • the first path and the second path constitute the first protection group 1
  • the second path is the backup path of the first path
  • the second path, the third path, and the fourth path constitute the second protection group 2
  • the third path and the fourth path The four paths are all backup paths of the second path.
  • the third path and the fourth path may also form the second protection group 3, and the fourth path is a backup path of the third path.
  • the data bearer priority of the first protection group 1 is higher than the data bearer priority of the second protection group 2
  • the data bearer priority of the second protection group 2 is higher than the data bearer priority of the third protection group 3.
  • FIG. 4 is a schematic flowchart of a link protection method based on the link networking shown in FIG. 3 according to an embodiment. As shown in FIG. 4, the method provided in this embodiment is applicable to ingress nodes, and the method includes the following steps .
  • Data sent through the SR-TE tunnel goes to the first protection group 1 by default, and the ingress node first needs to confirm whether the current data is sent on the first path or the second path. That is, the ingress node confirms the state value in the first forwarding state table of the first protection group 1.
  • the state value in the first forwarding state table is the first valid value
  • the first valid value indicates that the first path has not failed
  • the data By default, the data is sent on the first path
  • the state value in the first forwarding state table is the first invalid value
  • the first invalid value indicates that the first path has failed
  • the data is sent on the second path by default.
  • the first path is the main path
  • the second path is the backup path.
  • the state value in the first forwarding state table defaults to the first valid value, and the ingress node can detect the first path according to the fast link detection technology; if the first path fails, the first forwarding The state value in the state table is switched from the first valid value to the first invalid value.
  • the first valid value is usually 0, that is, when the first valid value is 0, it means that the first path is not faulty; the first invalid value is usually 1, that is, when the first invalid value is 1, it means that the first path is faulty.
  • the values of the first valid value and the first invalid value can be set according to actual conditions.
  • the first valid value can also be set to 1, that is, when the first valid value is 1, it means that the first path has failed. A failure occurs; the first invalid value is 0, that is, when the first invalid value is 0, it means that the first path has a failure.
  • the fast link detection technology can be, but is not limited to, Bidirectional Forwarding Detection (BFD) technology or Seamless Bidirectional Forwarding Detection (SBFD) technology, such as label forwarding path-bidirectional forwarding detection (Label Switching Path-Bidirectional Forwarding Detection, LSP-BFD) technology or Traffic Engineering-Bidirectional Forwarding Detection (Traffic Engineering-Bidirectional Forwarding Detection, TE-BFD) technology.
  • BFD Bidirectional Forwarding Detection
  • SBFD Seamless Bidirectional Forwarding Detection
  • LSP-BFD Label Switching Path-Bidirectional Forwarding Detection
  • Traffic Engineering-Bidirectional Forwarding Detection Traffic Engineering-Bidirectional Forwarding Detection
  • the LSP-BFD technology can be used to detect whether the LSP path fails.
  • the LSP-BFD technology sends detection messages periodically. If a reply message to the detection message is not received after a certain number of times the detection message is sent, it is considered that the detection path is faulty.
  • TE-BFD technology can be used to detect whether a TE path fails.
  • TE-BFD technology can include BFD for TE Tunnel and BFD for TE CR-LSP.
  • BFD detects the connectivity of a data protocol (data protocol) on the same path between two systems , This path can be a physical link or a logical link, including TE tunnels.
  • SBFD technology is a simplified mechanism of BFD technology. SBFD simplifies the state machine of BFD, shortens the negotiation time, improves the flexibility of the entire network, and can support SR tunnel detection.
  • SBFD technology is applied to SR scenario detection, there are mainly two scenarios, SBFD for SR LSP and SBFD for SR-TE LSP.
  • SBFD for SR LSP there are mainly two scenarios, SBFD for SR LSP and SBFD for SR-TE LSP.
  • the path from the SBFD initiator to the reflector uses Multi-Protocol Label Switching (MPLS) label forwarding, and the reflector uses a multi-hop IP path toward the return path of the initiator.
  • MPLS Multi-Protocol Label Switching
  • the second protection group 2 After the first path fails, the second protection group 2 is taken, and the ingress node needs to confirm whether the current data is sent on the second path, or on the third path or the fourth path. That is, the ingress node confirms the state value in the second forwarding state table of the second protection group 2.
  • the state value in the second forwarding state table is the second valid value
  • the second valid value indicates that the second path has not failed, and the data
  • the data is sent on the second path;
  • the state value in the second forwarding state table is the second invalid value
  • the second invalid value indicates that the second path fails, and the data is sent on the third path or the fourth path by default.
  • the second path is a backup path
  • the third path and the fourth path are backup paths of the backup path (for ease of distinction, hereinafter referred to as sub-backup paths).
  • the state value in the second forwarding state table defaults to the second valid value, and the ingress node can detect the second path according to the fast link detection technology; if the second path fails, the second forwarding The status value in the status table is switched from the second valid value to the second invalid value.
  • the second valid value is usually 0, that is, when the second valid value is 0, it means that the second path is not faulty; the second invalid value is usually 1, that is, when the second invalid value is 1, it means that the second path is faulty.
  • the values of the second effective value and the second invalid value can be set according to actual conditions.
  • the second effective value can also be set to 1, that is, when the second effective value is 1, it means that the second path has failed. A failure occurs; the second invalid value is 0, that is, when the second invalid value is 0, it means that the second path has a failure.
  • the state value in the second forwarding state table is the second invalid value, send the data through the third path or the fourth path.
  • the second invalid value indicates that the second path has failed, and the second path is a backup of the first path.
  • Path; the third path and the fourth path are the backup paths of the second path, the first path, the second path, the third path, and the fourth path are all segment routing-traffic engineering SR-TE tunnel label forwarding paths ( Label Switching Path, LSP).
  • the ingress node selects any path from the third path or the fourth path to send data, thereby forming a three-level carrier-grade performance protection for the link.
  • FIG. 5 is a schematic flowchart of another link protection method based on the link networking shown in FIG. 3 provided by an embodiment, in which how the ingress node moves from the third path or the fourth path Selecting a path to send data is described in Figure 5.
  • the method provided in this embodiment is applicable to an ingress node, and the method includes the following steps.
  • Data sent through the SR-TE tunnel goes to the first protection group 1 by default, and the ingress node first needs to confirm whether the current data is sent on the first path or the second path.
  • the first path is the main path
  • the second path is the backup path.
  • S220 If the state value in the first forwarding state table is the first valid value, send the data through the first path.
  • the first valid value indicates that the first path has not failed.
  • the second protection group 2 is taken, and the ingress node needs to confirm whether the current data is sent on the second path, or on the third path or the fourth path.
  • the second path is a backup path
  • the third path and the fourth path are sub-backup paths.
  • the second valid value indicates that the second path has not failed.
  • the ingress node can set priorities for the third path and the fourth path, so that the priority of the third path is higher than the priority of the fourth path, that is, the fourth path is the backup path of the third path, and in principle, the ingress node prefers the first path Three paths send data. Therefore, the third path may be referred to as the preferred sub-backup path, and the fourth path may be referred to as the second-selected sub-backup path.
  • the ingress node needs to confirm the state value in the third forwarding state table of the third protection group 3.
  • the state value in the third forwarding state table is the third valid value
  • the third is valid The value indicates that the third path has not failed and the data is sent on the third path;
  • the state value in the third forwarding state table is the third invalid value
  • the third invalid value indicates that the third path has failed, and the data is on the fourth path Send on.
  • the state value in the third forwarding state table defaults to the third valid value, and the ingress node can detect the third path according to the fast link detection technology; if the third path fails, the third forwarding The status value in the status table is switched from the third valid value to the third invalid value.
  • the third valid value is usually 0, that is, when the third valid value is 0, it means that the third path is not faulty; the third invalid value is usually 1, that is, when the third invalid value is 1, it means that the third path is faulty.
  • the values of the third effective value and the third invalid value can be set according to the actual situation.
  • the third effective value can also be set to 1, that is, when the third effective value is 1, it means that the third path has failed. A failure occurs; the third invalid value is 0, that is, when the third invalid value is 0, it means that the third path has a failure.
  • the multi-level protection group is reasonably designed, and when the link has multiple points of failure, the state value in the forwarding state table is directly switched, which greatly reduces the computing occupancy of the device when the physical link state changes Time allows the device to have more time to process other services, which effectively guarantees the performance requirements of upper-level services. In this way, the multi-level carrier-level performance protection of the link is realized, and the stability and timeliness of the system are ensured.
  • FIG. 6 is a schematic diagram of link networking provided by an embodiment.
  • the ingress node is node S
  • the egress node is node D
  • node A, node B, node C, node E, and node F are other nodes.
  • the main path is node S-node A-node B-node D (hereinafter referred to as SABD)
  • the backup path is node S-node D (hereinafter referred to as SD)
  • the preferred sub-backup path is node S-node B-node D (Hereinafter referred to as SBD)
  • the secondary backup path is node S-node A-node D (hereinafter referred to as SAD).
  • the embodiment of the application provides a link protection method, including: confirming the state value in the first forwarding state table; if the state value in the first forwarding state table is the first invalid value, confirming the state value in the second forwarding state table Status value, the first invalid value indicates that the first path has failed; if the status value in the second forwarding status table is the second invalid value, the data is sent through the third path or the fourth path, and the second invalid value indicates the second path
  • the second path is the backup path of the first path; the third path and the fourth path are the backup paths of the second path, and the first path, the second path, the third path, and the fourth path are all SR-TE LSP of the tunnel.
  • the application can realize multi-level carrier-level performance protection of the link, which ensures the stability and timeliness of the system.
  • FIG. 7 is a schematic structural diagram of a link protection device provided by an embodiment.
  • the link protection device may be configured in an ingress node. As shown in FIG. 7, it includes: a confirmation module 10 and a sending module 11.
  • the confirming module 10 is configured to confirm the state value in the first forwarding state table; if the state value in the first forwarding state table is the first invalid value, confirm the state value in the second forwarding state table, and the first invalid value indicates The first path fails;
  • the sending module 11 is configured to send data through the third path or the fourth path if the state value in the second forwarding state table is the second invalid value.
  • the second invalid value indicates that the second path has failed, and the second path is the first
  • the backup path of the first path; the third path and the fourth path are the backup paths of the second path, and the first path, the second path, the third path, and the fourth path are all segment routing-traffic engineering SR-TE tunnels Label forwarding path LSP.
  • the link protection device provided in this embodiment implements the link protection method of the foregoing embodiment.
  • the implementation principle and technical effect of the link protection device provided in this embodiment are similar, and will not be repeated here.
  • FIG. 8 is a schematic structural diagram of another link protection device provided by an embodiment, and further includes: a detection module 12 and a switching module 13.
  • the detection module 12 is configured to detect whether the first path fails according to the link detection technology
  • the switching module 13 is configured to switch the state value in the first forwarding state table from the first valid value to the first invalid value if the first path fails, and the first valid value indicates that the first path does not fail.
  • the detection module 12 is further configured to detect whether the second path fails according to the link detection technology
  • the switching module 13 is further configured to switch the state value in the second forwarding state table from the second valid value to the second invalid value if the second path fails, and the second valid value indicates that the second path does not fail.
  • the confirmation module 10 is further configured to confirm that the priority of the third path is higher than the priority of the fourth path; and confirm the state value in the third forwarding state table;
  • the sending module 11 is further configured to select the third path to send data if the state value in the third forwarding state table is the third valid value, and the third valid value indicates that the third path is not faulty; if the state value in the third forwarding state table If the status value of is the third invalid value, the fourth path is selected to send data, and the third invalid value indicates that the third path has failed.
  • the detection module 12 is further configured to detect whether the third path fails according to the link detection technology
  • the switching module 13 is further configured to switch the state value in the third forwarding state table from the third valid value to the third invalid value if the third path fails.
  • the sending module 11 is further configured to send data through the first path if the state value in the first forwarding state table is the first valid value.
  • the sending module 11 is further configured to send data through the second path if the state value in the second forwarding state table is the second valid value.
  • FIG. 9 is a schematic structural diagram of an entry node provided by an embodiment.
  • the entry node includes a processor 60, a memory 61 and a communication interface 62; the number of processors 60 in the entry node may be one or more.
  • a processor 60 is taken as an example in FIG. 9; the processor 60, the memory 61, and the communication interface 62 in the ingress node may be connected by a bus or other methods.
  • the bus represents one or more of several types of bus structures, including a memory bus or a memory controller, a peripheral bus, a graphics acceleration port, a processor, or a local bus using any bus structure among multiple bus structures.
  • the memory 61 can be configured to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the methods in the embodiments of the present application.
  • the processor 60 executes at least one functional application and data processing of the entry node by running the software programs, instructions, and modules stored in the memory 61, that is, realizes the above-mentioned link protection method.
  • the memory 61 may include a program storage area and a data storage area, where the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created according to the use of the entry node, and the like.
  • the memory 61 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other non-volatile solid-state storage devices.
  • the memory 61 may include a memory remotely provided with respect to the processor 60, and these remote memories may be connected to a Japanese invader node through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
  • the communication interface 62 can be configured to receive and send data.
  • the embodiment of the present application also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the computer storage medium of the embodiment of the present application may adopt any combination of one or more computer-readable media.
  • the computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium.
  • the computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above.
  • Computer-readable storage media include (non-exhaustive list): electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (Read-Only Memory) , ROM), Erasable Programmable Read-Only Memory (EPROM), flash memory, optical fiber, compact Disc Read-Only Memory (CD-ROM), optical storage devices , Magnetic storage devices, or any suitable combination of the above.
  • the computer-readable storage medium may be any tangible medium that contains or stores a program, and the program may be used by or in combination with an instruction execution system, apparatus, or device.
  • the computer-readable signal medium may include a data signal propagated in baseband or as a part of a carrier wave, and the computer-readable program code is carried in the data signal. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the computer-readable signal medium may also be any computer-readable medium other than the computer-readable storage medium, and the computer-readable medium may send, propagate, or transmit the program for use by or in combination with the instruction execution system, apparatus, or device .
  • the program code contained on the computer-readable medium can be transmitted by any suitable medium, including but not limited to wireless, wire, optical cable, radio frequency (RF), etc., or any suitable combination of the foregoing.
  • suitable medium including but not limited to wireless, wire, optical cable, radio frequency (RF), etc., or any suitable combination of the foregoing.
  • the computer program code used to perform the operations of the present disclosure can be written in one or more programming languages or a combination of multiple programming languages.
  • the programming languages include object-oriented programming languages-such as Java, Smalltalk, C++, Ruby, Go also includes conventional procedural programming languages-such as "C" language or similar programming languages.
  • the program code can be executed entirely on the user's computer, partly on the user's computer, executed as an independent software package, partly on the user's computer and partly executed on a remote computer, or entirely executed on the remote computer or server.
  • the remote computer can be connected to the user's computer through any kind of network-including Local Area Network (LAN) or Wide Area Network (WAN)-or it can be connected to an external computer (for example, use an Internet service provider to connect via the Internet).
  • LAN Local Area Network
  • WAN Wide Area Network
  • user terminal encompasses any suitable type of wireless user equipment, such as a mobile phone, a portable data processing device, a portable web browser, or a vehicle-mounted mobile station.
  • the various embodiments of the present application can be implemented in hardware or dedicated circuits, software, logic or any combination thereof.
  • some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor, or other computing device, although the present application is not limited thereto.
  • Computer program instructions can be assembly instructions, Instruction Set Architecture (ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or a source written in any combination of one or more programming languages Code or object code.
  • ISA Instruction Set Architecture
  • the block diagram of any logic flow in the drawings of the present application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions.
  • the computer program can be stored on the memory.
  • the memory can be of any type suitable for the local technical environment and can be implemented using any suitable data storage technology, such as but not limited to read only memory (ROM), random access memory (RAM), optical storage devices and systems (digital multi-function optical discs) (Digital Versatile Disc, DVD) or compact disc (Compact Disc, CD), etc.
  • Computer-readable media may include non-transitory storage media.
  • the data processor can be any type suitable for the local technical environment, such as but not limited to general-purpose computers, special-purpose computers, microprocessors, digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (ASICs) ), programmable logic devices (Field-Programmable Gate Array, FGPA), and processors based on multi-core processor architecture.
  • DSP Digital Signal Processing
  • ASICs application specific integrated circuits
  • FGPA programmable logic devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present application discloses a link protection method, a device, an ingress node and a storage medium. Said method comprises: confirming a state value in a first forwarding state table; if the state value in the first forwarding state table is a first invalid value, confirming a state value in a second forwarding state table, wherein the first invalid value indicates that a fault occurs on a first path; and if the state value in the second forwarding state table is a second invalid value, sending data by means of a third path or a fourth path, wherein the second invalid value indicates that a fault occurs on a second path, the second path being a backup path of the first path, the third path and the fourth path being both backup paths of the second path, and the first path, the second path, the third path, and the fourth path all being label switched paths (LSPs) of a segment routing-traffic engineering (SR-TE) tunnel.

Description

一种链路保护方法、装置,入口节点及存储介质Method and device for link protection, entry node and storage medium
相关申请的交叉引用Cross-references to related applications
本申请基于申请号为201911284848.0、申请日为2019年12月13日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以引入方式并入本申请。This application is filed based on a Chinese patent application with an application number of 201911284848.0 and an application date of December 13, 2019, and claims the priority of the Chinese patent application. The entire content of the Chinese patent application is hereby incorporated into this application by way of introduction.
技术领域Technical field
本申请涉及无线通信网络,例如涉及一种链路保护方法、装置,入口节点及存储介质。This application relates to a wireless communication network, for example, to a link protection method, device, ingress node, and storage medium.
背景技术Background technique
分段路由(Segment Routing,SR)是基于源路由理念而设计的在网络上转发数据包的一种协议,能够在入口节点通过指定一组有序的指令列表来控制数据的实时快速转发,被广泛使用在当前的通信系统中。随着对通信系统超大带宽、超低时延的要求越来越严格,如何保证SR隧道的稳定性成为当前的重点讨论方向。Segment Routing (SR) is a protocol designed based on the concept of source routing to forward data packets on the network. It can control the real-time fast forwarding of data by specifying a set of ordered instruction lists at the ingress node. It is widely used in current communication systems. As the requirements for ultra-large bandwidth and ultra-low delay in communication systems become more and more stringent, how to ensure the stability of SR tunnels has become the current focus of discussion.
发明内容Summary of the invention
本申请提供一种链路保护方法、装置,入口节点及存储介质,能够实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。The present application provides a link protection method, device, ingress node, and storage medium, which can realize multi-level carrier-grade performance protection of the link, and ensure the stability and timeliness of the system.
本申请实施例提供一种链路保护方法,包括:确认第一转发状态表中的状态值;若第一转发状态表中的状态值是第一无效值,则确认第二转发状态表中的状态值,第一无效值指示第一路径发生故障;若第二转发状态表中的状态值是第二无效值,则通过第三路径或者第四路径发送数据,第二无效值指示第二路径发生故障,第二路径为第一路径的备份路径;第三路径和第四路径均为第 二路径的备份路径,第一路径、第二路径、第三路径和第四路均为分段路由-流量工程SR-TE隧道的标签转发路径LSP。The embodiment of the application provides a link protection method, including: confirming the state value in the first forwarding state table; if the state value in the first forwarding state table is the first invalid value, confirming the state value in the second forwarding state table Status value, the first invalid value indicates that the first path has failed; if the status value in the second forwarding status table is the second invalid value, the data is sent through the third path or the fourth path, and the second invalid value indicates the second path When a failure occurs, the second path is the backup path of the first path; the third path and the fourth path are the backup paths of the second path, and the first path, the second path, the third path, and the fourth path are all segmented routes -The label forwarding path LSP of the traffic engineering SR-TE tunnel.
本申请实施例提供一种链路保护装置,包括:确认模块和发送模块;确认模块,设置为确认第一转发状态表中的状态值;若第一转发状态表中的状态值是第一无效值,则确认第二转发状态表中的状态值,第一无效值指示第一路径发生故障;发送模块,设置为若第二转发状态表中的状态值是第二无效值,则通过第三路径或者第四路径发送数据,第二无效值指示第二路径发生故障,第二路径为第一路径的备份路径;第三路径和第四路径均为第二路径的备份路径,第一路径、第二路径、第三路径和第四路均为分段路由-流量工程SR-TE隧道的标签转发路径LSP。The embodiment of the present application provides a link protection device, including: a confirmation module and a sending module; the confirmation module is set to confirm the state value in the first forwarding state table; if the state value in the first forwarding state table is first invalid Value, the state value in the second forwarding state table is confirmed. The first invalid value indicates that the first path has failed; the sending module is set to pass the third invalid value if the state value in the second forwarding state table is the second invalid value. The path or the fourth path sends data, the second invalid value indicates that the second path has failed, and the second path is the backup path of the first path; the third path and the fourth path are both backup paths of the second path, and the first path, The second path, the third path, and the fourth path are all segment routing-traffic engineering SR-TE tunnel label forwarding path LSPs.
本申请实施例提供一种入口节点,包括:处理器,处理器用于在执行计算机程序时实现上述任一实施例的方法。An embodiment of the present application provides an entry node including a processor, and the processor is configured to implement the method of any one of the foregoing embodiments when a computer program is executed.
本申请实施例还提供了一种计算机可读存储介质,存储有计算机程序,计算机程序被处理器执行时实现上述任一实施例的方法。The embodiments of the present application also provide a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, the method of any of the foregoing embodiments is implemented.
关于本申请的以上实施例和其他方面以及其实现方式,在附图说明、具体实施方式和权利要求中提供更多说明。Regarding the above embodiments and other aspects of the application and their implementation manners, more descriptions are provided in the description of the drawings, the specific implementation manners, and the claims.
附图说明Description of the drawings
图1为本申请实施例提供的一种SR-TE隧道数据转发示意图;FIG. 1 is a schematic diagram of data forwarding in an SR-TE tunnel provided by an embodiment of the application;
图2为本申请实施例提供的一种SR-TE主路径和备份路径示意图;FIG. 2 is a schematic diagram of an SR-TE primary path and a backup path provided by an embodiment of this application;
图3为本申请实施例提供的一种链路保护组示意图;FIG. 3 is a schematic diagram of a link protection group provided by an embodiment of this application;
图4为本申请实施例提供的一种基于图3所示链路组网的链路保护方法的流程示意图;FIG. 4 is a schematic flowchart of a link protection method based on the link networking shown in FIG. 3 according to an embodiment of the application;
图5为本申请实施例提供的另一种基于图3所示链路组网的链路保护方法的流程示意图;FIG. 5 is a schematic flowchart of another link protection method based on the link networking shown in FIG. 3 according to an embodiment of the application;
图6为本申请实施例提供的一种链路组网示意图;FIG. 6 is a schematic diagram of a link networking provided by an embodiment of the application;
图7为本申请实施例提供的一种链路保护装置的结构示意图;FIG. 7 is a schematic structural diagram of a link protection device provided by an embodiment of this application;
图8为本申请实施例提供的另一种链路保护装置的结构示意图;FIG. 8 is a schematic structural diagram of another link protection device provided by an embodiment of this application;
图9为本申请实施例提供的一种入口节点的结构示意图。FIG. 9 is a schematic structural diagram of an ingress node provided by an embodiment of this application.
具体实施方式Detailed ways
下文中将结合附图对本申请的实施例进行详细说明。Hereinafter, the embodiments of the present application will be described in detail with reference to the accompanying drawings.
在第五代移动通信网络(5th-Generation,5G)中,承载网需要提供超大带宽、超低时延的传输通道,使用SR转发技术可以降低网络连接的复杂度,使得业务路径更易维护,能支撑5G网路海量连接下的灵活调度。其中,SR转发技术作为软件定义网络(SoftwareDefinedNetwork,SDN)部署的必备技术之一被广泛的运营商应用。In the fifth-generation mobile communication network (5th-Generation, 5G), the bearer network needs to provide a transmission channel with ultra-large bandwidth and ultra-low latency. The use of SR forwarding technology can reduce the complexity of network connections and make the service path easier to maintain. Supports flexible scheduling under massive 5G network connections. Among them, the SR forwarding technology is widely used by operators as one of the necessary technologies for software-defined network (Software-Defined Network, SDN) deployment.
分段路由-流量工程(Segment Routing-Traffic Engineering,SR-TE)隧道是使用SR作为控制协议的一种新型TE隧道技术。SR-TE是指基于TE的约束属性,利用SR协议创建的隧道。控制器负责计算隧道的转发路径,并将与路径严格对应的标签栈下发给转发器。在SR-TE隧道的入口节点上,转发器根据标签栈,即可控制数据在网络中的传输路径。图1为一实施例提供的一种SR-TE隧道数据转发示意图。如图1所示,入口节点为节点0,出口节点为节点5,节点1、节点2、节点3和节点4为中间节点。控制器计算得出的转发路径为(30001,30102,30204,30405),其中,3为该隧道的前缀,1.1.1.5为网际互连协议(Internet Protocol,IP)地址,30001代表数据从节点0发送到节点1,30102代表数据从节点1发送到节点2,30204代表数据从节点2发送到节点4,30405代表数据从节点4发送到节点5。转发路径由控制器按需严格制定,通过合理规划业务分配不同传输通道,实现带宽资源的高效利用和网路连接的简化管理。Segment Routing-Traffic Engineering (SR-TE) tunnel is a new type of TE tunnel technology that uses SR as a control protocol. SR-TE refers to a tunnel created using the SR protocol based on the constraint attributes of TE. The controller is responsible for calculating the forwarding path of the tunnel, and delivering the label stack strictly corresponding to the path to the forwarder. At the entry node of the SR-TE tunnel, the repeater can control the transmission path of data in the network according to the label stack. Fig. 1 is a schematic diagram of data forwarding in an SR-TE tunnel according to an embodiment. As shown in Figure 1, the ingress node is node 0, the egress node is node 5, and node 1, node 2, node 3, and node 4 are intermediate nodes. The forwarding path calculated by the controller is (30001, 30102, 30204, 30405), where 3 is the prefix of the tunnel, 1.1.1.5 is the Internet Protocol (IP) address, and 30001 represents the data slave node 0 Sent to node 1, 30102 represents data sent from node 1 to node 2, 30204 represents data sent from node 2 to node 4, and 30405 represents data sent from node 4 to node 5. The forwarding path is strictly formulated by the controller according to the needs, and different transmission channels are allocated through reasonable planning of services, so as to realize the efficient use of bandwidth resources and the simplified management of network connections.
在SR网络中,通常会为重要业务配置一条具有服务质量(Quality of Service,QoS)保证的使用SR-TE技术的路径(简称主路径),同时,为了进一步保证业务的稳定性,也会额外配置一条热备份(Hot-Standy)的静态保护路径(简称备份路径)。当检测到主路径发生故障时,业务能快速切换到备份路径,保证业务不中断。图2为一实施例提供的一种SR-TE主路径和备份路径示意图。入口节点为节点0,出口节点为节点2,节点1、节点3、节点4和节点5为中间节点,如图2所示,主路径为由节点0-节点1-节点2的路径,备份路径为由节点0-节点3-节点4-节点5-节点2的路径。当主路径和备份路径均发生故障时(如图2所示,节点0-节点1的链路故障,节点4-节点5的链路故障),为了保证 数据仍然可以传输,现有的技术是通过上层协议(即控制器)计算逃生路径(也称为动态路径)(如图2中虚线所标注的路径)来实现业务流量的快速恢复,避免多点故障(也称为双断纤故障)。然而,上层协议计算逃生路径需要花费很长时间,远远达不到运营商要求的电信级保护要求。In an SR network, an important service is usually configured with a quality of service (Quality of Service, QoS) guarantee using SR-TE technology path (referred to as the main path), at the same time, in order to further ensure the stability of the business, there will be additional Configure a hot-standy static protection path (backup path for short). When a failure of the primary path is detected, services can be quickly switched to the backup path to ensure uninterrupted services. Figure 2 is a schematic diagram of an SR-TE primary path and a backup path according to an embodiment. The ingress node is node 0, the egress node is node 2, and node 1, node 3, node 4, and node 5 are intermediate nodes. As shown in Figure 2, the main path is the path from node 0 to node 1 to node 2, and the backup path It is the path from node 0 to node 3 to node 4 to node 5 to node 2. When both the primary path and the backup path fail (as shown in Figure 2, the link between node 0 and node 1 is down, and the link between node 4 and node 5 is down), in order to ensure that data can still be transmitted, the existing technology adopts The upper layer protocol (ie, the controller) calculates the escape path (also known as the dynamic path) (the path marked by the dashed line in Figure 2) to achieve rapid recovery of service traffic and avoid multi-point failures (also known as double-fiber failures). However, it takes a long time for the upper-layer protocol to calculate the escape path, which is far from reaching the carrier-grade protection requirements required by operators.
本申请实施例提供了一种移动通信网络(包括但不限于第五代移动通信网络(5th-Generation,5G)),该网络的网络架构可以包括核心网设备(例如统一数据管理(Unified Data Management,UDM)设备)、网络侧设备(例如一种或多种类型的基站,传输节点,接入节点(Access Point,AP),中继,节点B(Node B,NB),陆地无线电接入(Universal Terrestrial Radio Access,UTRA),演进型陆地无线电接入(Evolved Universal Terrestrial Radio Access,EUTRA)等)和终端设备(用户设备(User Equipment,UE),用户设备数据卡,中继(relay),移动设备等)。在本申请实施例中,提供一种可运行于上述网络架构的链路保护方法、装置,入口节点及存储介质,能够实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。本申请实施例中提供的上述链路保护方法的运行环境并不限于上述网络架构。The embodiments of the present application provide a mobile communication network (including but not limited to the fifth-generation mobile communication network (5th-Generation, 5G)). The network architecture of the network may include core network equipment (for example, Unified Data Management (Unified Data Management)). , UDM equipment), network-side equipment (such as one or more types of base stations, transmission nodes, access points (Access Point, AP), relays, Node B (NB), terrestrial radio access ( Universal Terrestrial Radio Access (UTRA), Evolved Terrestrial Radio Access (Evolved Universal Terrestrial Radio Access, EUTRA, etc.) and terminal equipment (User Equipment (UE), user equipment data card, relay, mobile Equipment, etc.). In the embodiments of the present application, a link protection method, device, ingress node, and storage medium that can run on the above-mentioned network architecture are provided, which can realize multi-level carrier-level performance protection of the link, and ensure the stability and stability of the system. Timeliness. The operating environment of the foregoing link protection method provided in the embodiments of the present application is not limited to the foregoing network architecture.
本申请中术语“系统”和“网络”在本申请中常被可互换使用。本申请下述各个实施例可以单独执行,各个实施例之间也可以相互结合执行,本申请实施例对此不作具体限制。The terms "system" and "network" in this application are often used interchangeably in this application. The following embodiments of the present application can be implemented individually, and the various embodiments can also be implemented in combination with each other, which is not specifically limited by the embodiments of the present application.
下面,对链路保护方法、装置及其技术效果进行描述。In the following, the link protection method, device and its technical effects will be described.
图3为一实施例提供的一种链路保护组示意图。如图3所示,链路组网包括至少四条路径,图3中以四条路径为例,该四条路径分别为第一路径、第二路径、第三路径和第四路径。其中,第一路径和第二路径构成第一保护组1,第二路径为第一路径的备份路径;第二路径和第三路径、第四路径构成第二保护组2,第三路径和第四路径均为第二路径的备份路径。可选的,第三路径和第四路径还可以构成第二保护组3,第四路径为第三路径的备份路径。第一保护组1的数据承载优先级高于第二保护组2的数据承载优先级,第二保护组2的数据承载优先级高于第三保护组3的数据承载优先级。Fig. 3 is a schematic diagram of a link protection group provided by an embodiment. As shown in FIG. 3, the link networking includes at least four paths. In FIG. 3, four paths are taken as an example. The four paths are the first path, the second path, the third path, and the fourth path. Among them, the first path and the second path constitute the first protection group 1, and the second path is the backup path of the first path; the second path, the third path, and the fourth path constitute the second protection group 2, and the third path and the fourth path The four paths are all backup paths of the second path. Optionally, the third path and the fourth path may also form the second protection group 3, and the fourth path is a backup path of the third path. The data bearer priority of the first protection group 1 is higher than the data bearer priority of the second protection group 2, and the data bearer priority of the second protection group 2 is higher than the data bearer priority of the third protection group 3.
图4为一实施例提供的一种基于图3所示链路组网的链路保护方法的流程示意图,如图4所示,本实施例提供的方法适用于入口节点,该方法包括如下 步骤。FIG. 4 is a schematic flowchart of a link protection method based on the link networking shown in FIG. 3 according to an embodiment. As shown in FIG. 4, the method provided in this embodiment is applicable to ingress nodes, and the method includes the following steps .
S110、确认第一转发状态表中的状态值。S110. Confirm the state value in the first forwarding state table.
数据通过SR-TE隧道发送默认走第一保护组1,入口节点首先需要确认当前数据是在第一路径上发送,还是在第二路径上发送。即入口节点确认第一保护组1的第一转发状态表中的状态值,当第一转发状态表中的状态值是第一有效值时,第一有效值指示第一路径未发生故障,数据默认在第一路径上发送;当第一转发状态表中的状态值是第一无效值时,第一无效值指示第一路径发生故障,数据默认在第二路径上发送。通常,第一路径为主路径,第二路径为备份路径。Data sent through the SR-TE tunnel goes to the first protection group 1 by default, and the ingress node first needs to confirm whether the current data is sent on the first path or the second path. That is, the ingress node confirms the state value in the first forwarding state table of the first protection group 1. When the state value in the first forwarding state table is the first valid value, the first valid value indicates that the first path has not failed, and the data By default, the data is sent on the first path; when the state value in the first forwarding state table is the first invalid value, the first invalid value indicates that the first path has failed, and the data is sent on the second path by default. Generally, the first path is the main path, and the second path is the backup path.
在一实施例中,第一转发状态表中的状态值默认为第一有效值,入口节点可以根据快速链路检测技术对第一路径进行检测;若第一路径发生故障,则将第一转发状态表中的状态值从第一有效值切换至第一无效值。第一有效值通常取0,即第一有效值为0时,代表第一路径未发生故障;第一无效值通常取1,即第一无效值为1时,代表第一路径发生故障。In an embodiment, the state value in the first forwarding state table defaults to the first valid value, and the ingress node can detect the first path according to the fast link detection technology; if the first path fails, the first forwarding The state value in the state table is switched from the first valid value to the first invalid value. The first valid value is usually 0, that is, when the first valid value is 0, it means that the first path is not faulty; the first invalid value is usually 1, that is, when the first invalid value is 1, it means that the first path is faulty.
可以理解的是,第一有效值和第一无效值的取值可以根据实际情况设定,例如,也可以设置第一有效值取1,即第一有效值为1时,代表第一路径未发生故障;第一无效值取0,即第一无效值为0时,代表第一路径发生故障。It is understandable that the values of the first valid value and the first invalid value can be set according to actual conditions. For example, the first valid value can also be set to 1, that is, when the first valid value is 1, it means that the first path has failed. A failure occurs; the first invalid value is 0, that is, when the first invalid value is 0, it means that the first path has a failure.
在一实施例中,快速链路检测技术可以但不限于双向转发检测(Bidirectional Forwarding Detection,BFD)技术或者无缝双向转发检测(Seamless Bidirectional Forwarding Detection,SBFD)技术,如标签转发路径-双向转发检测(Label Switching Path-Bidirectional Forwarding Detection,LSP-BFD)技术或者流量工程-双向转发检测(Traffic Engineering-Bidirectional Forwarding Detection,TE-BFD)技术。In one embodiment, the fast link detection technology can be, but is not limited to, Bidirectional Forwarding Detection (BFD) technology or Seamless Bidirectional Forwarding Detection (SBFD) technology, such as label forwarding path-bidirectional forwarding detection (Label Switching Path-Bidirectional Forwarding Detection, LSP-BFD) technology or Traffic Engineering-Bidirectional Forwarding Detection (Traffic Engineering-Bidirectional Forwarding Detection, TE-BFD) technology.
具体的,LSP-BFD技术可以用于检测LSP路径是否发生故障。LSP-BFD技术是通过周期性发送检测报文,如果在发送该检测报文一定次数后,仍没有接收到该检测报文的回复消息,就认为该检测路径存在故障。TE-BFD技术可以用于检测TE路径是否发生故障。TE-BFD技术可以包括BFD for TE Tunnel和BFD for TE CR-LSP两种方式,具体来说,BFD对两个系统间的、同一路径上的一种数据协议(data protocol)的连通性进行检测,这条路径可以是物理链 路或逻辑链路,其中包括TE隧道。Specifically, the LSP-BFD technology can be used to detect whether the LSP path fails. The LSP-BFD technology sends detection messages periodically. If a reply message to the detection message is not received after a certain number of times the detection message is sent, it is considered that the detection path is faulty. TE-BFD technology can be used to detect whether a TE path fails. TE-BFD technology can include BFD for TE Tunnel and BFD for TE CR-LSP. Specifically, BFD detects the connectivity of a data protocol (data protocol) on the same path between two systems , This path can be a physical link or a logical link, including TE tunnels.
SBFD技术是BFD技术的一种简化机制,SBFD简化了BFD的状态机,缩短了协商时间,提高了整个网络的灵活性,能够支撑SR隧道检测。SBFD技术应用到SR场景检测时,主要有SBFD for SR LSP和SBFD for SR-TE LSP两种场景。在SBFD检测SR场景,SBFD发起端到反射端路径走多协议标签交换(Multi-Protocol Label Switching,MPLS)标签转发,反射端向发起端回程路径走多跳IP路径。SBFD technology is a simplified mechanism of BFD technology. SBFD simplifies the state machine of BFD, shortens the negotiation time, improves the flexibility of the entire network, and can support SR tunnel detection. When SBFD technology is applied to SR scenario detection, there are mainly two scenarios, SBFD for SR LSP and SBFD for SR-TE LSP. In the SR scenario of SBFD detection, the path from the SBFD initiator to the reflector uses Multi-Protocol Label Switching (MPLS) label forwarding, and the reflector uses a multi-hop IP path toward the return path of the initiator.
S120、若第一转发状态表中的状态值是第一无效值,则确认第二转发状态表中的状态值,第一无效值指示第一路径发生故障。S120: If the state value in the first forwarding state table is the first invalid value, confirm the state value in the second forwarding state table, and the first invalid value indicates that the first path has failed.
在第一路径发生故障后,走第二保护组2,入口节点需要确认当前数据是在第二路径上发送,还是在第三路径或者第四路径上发送。即入口节点确认第二保护组2的第二转发状态表中的状态值,当第二转发状态表中的状态值是第二有效值时,第二有效值指示第二路径未发生故障,数据默认在第二路径上发送;当第二转发状态表中的状态值是第二无效值时,第二无效值指示第二路径发生故障,数据默认在第三路径或者第四路径上发送。通常,第二路径为备份路径,第三路径和第四路径为备份路径的备份路径(为了便于区分,后文称为子备份路径)。After the first path fails, the second protection group 2 is taken, and the ingress node needs to confirm whether the current data is sent on the second path, or on the third path or the fourth path. That is, the ingress node confirms the state value in the second forwarding state table of the second protection group 2. When the state value in the second forwarding state table is the second valid value, the second valid value indicates that the second path has not failed, and the data By default, the data is sent on the second path; when the state value in the second forwarding state table is the second invalid value, the second invalid value indicates that the second path fails, and the data is sent on the third path or the fourth path by default. Generally, the second path is a backup path, and the third path and the fourth path are backup paths of the backup path (for ease of distinction, hereinafter referred to as sub-backup paths).
在一实施例中,第二转发状态表中的状态值默认为第二有效值,入口节点可以根据快速链路检测技术对第二路径进行检测;若第二路径发生故障,则将第二转发状态表中的状态值从第二有效值切换至第二无效值。第二有效值通常取0,即第二有效值为0时,代表第二路径未发生故障;第二无效值通常取1,即第二无效值为1时,代表第二路径发生故障。In an embodiment, the state value in the second forwarding state table defaults to the second valid value, and the ingress node can detect the second path according to the fast link detection technology; if the second path fails, the second forwarding The status value in the status table is switched from the second valid value to the second invalid value. The second valid value is usually 0, that is, when the second valid value is 0, it means that the second path is not faulty; the second invalid value is usually 1, that is, when the second invalid value is 1, it means that the second path is faulty.
可以理解的是,第二有效值和第二无效值的取值可以根据实际情况设定,例如,也可以设置第二有效值取1,即第二有效值为1时,代表第二路径未发生故障;第二无效值取0,即第二无效值为0时,代表第二路径发生故障。It can be understood that the values of the second effective value and the second invalid value can be set according to actual conditions. For example, the second effective value can also be set to 1, that is, when the second effective value is 1, it means that the second path has failed. A failure occurs; the second invalid value is 0, that is, when the second invalid value is 0, it means that the second path has a failure.
S130、若第二转发状态表中的状态值是第二无效值,则通过第三路径或者第四路径发送数据,第二无效值指示第二路径发生故障,第二路径为第一路径的备份路径;第三路径和第四路径均为第二路径的备份路径,第一路径、第二路径、第三路径和第四路均为分段路由-流量工程SR-TE隧道的标签转发路径 (Label Switching Path,LSP)。S130. If the state value in the second forwarding state table is the second invalid value, send the data through the third path or the fourth path. The second invalid value indicates that the second path has failed, and the second path is a backup of the first path. Path; the third path and the fourth path are the backup paths of the second path, the first path, the second path, the third path, and the fourth path are all segment routing-traffic engineering SR-TE tunnel label forwarding paths ( Label Switching Path, LSP).
在第二路径也发生故障后,走第三保护组3。入口节点从第三路径或者第四路径中选择任一路径发送数据,从而形成对链路的三级电信级性能保护。After the second path also fails, go to the third protection group 3. The ingress node selects any path from the third path or the fourth path to send data, thereby forming a three-level carrier-grade performance protection for the link.
在上述实施例的基础上,图5为一实施例提供的另一种基于图3所示链路组网的链路保护方法的流程示意图,其中对入口节点如何从第三路径或者第四路径中选择路径发送数据进行了说明,如图5所示,本实施例提供的方法适用于入口节点,该方法包括如下步骤。On the basis of the above-mentioned embodiment, FIG. 5 is a schematic flowchart of another link protection method based on the link networking shown in FIG. 3 provided by an embodiment, in which how the ingress node moves from the third path or the fourth path Selecting a path to send data is described in Figure 5. As shown in FIG. 5, the method provided in this embodiment is applicable to an ingress node, and the method includes the following steps.
S210、确认第一转发状态表中的状态值。S210. Confirm the state value in the first forwarding state table.
数据通过SR-TE隧道发送默认走第一保护组1,入口节点首先需要确认当前数据是在第一路径上发送,还是在第二路径上发送。通常,第一路径为主路径,第二路径为备份路径。Data sent through the SR-TE tunnel goes to the first protection group 1 by default, and the ingress node first needs to confirm whether the current data is sent on the first path or the second path. Generally, the first path is the main path, and the second path is the backup path.
S220、若第一转发状态表中的状态值是第一有效值,则通过第一路径发送数据。S220: If the state value in the first forwarding state table is the first valid value, send the data through the first path.
第一有效值指示第一路径未发生故障。The first valid value indicates that the first path has not failed.
S230、若第一转发状态表中的状态值是第一无效值,则确认第二转发状态表中的状态值,第一无效值指示第一路径发生故障。S230. If the state value in the first forwarding state table is the first invalid value, confirm the state value in the second forwarding state table, and the first invalid value indicates that the first path has failed.
在第一路径发生故障后,走第二保护组2,入口节点需要确认当前数据是在第二路径上发送,还是在第三路径或者第四路径上发送。通常,第二路径为备份路径,第三路径和第四路径为子备份路径。After the first path fails, the second protection group 2 is taken, and the ingress node needs to confirm whether the current data is sent on the second path, or on the third path or the fourth path. Generally, the second path is a backup path, and the third path and the fourth path are sub-backup paths.
S240、若第二转发状态表中的状态值是第二有效值,则通过第二路径发送数据。S240: If the state value in the second forwarding state table is the second valid value, send the data through the second path.
第二有效值指示第二路径未发生故障。The second valid value indicates that the second path has not failed.
S250、若第二转发状态表中的状态值是第二无效值,则确认第三路径的优先级高于第四路径的优先级,第二无效值指示第二路径发生故障。S250: If the state value in the second forwarding state table is the second invalid value, confirm that the priority of the third path is higher than the priority of the fourth path, and the second invalid value indicates that the second path has failed.
在第二路径也发生故障后,走第三保护组3。入口节点可以为第三路径和第四路径设置优先级,使得第三路径的优先级高于第四路径的优先级,即第四路径为第三路径的备份路径,入口节点原则上优先选择第三路径发送数据。因此,第三路径可以称为优选子备份路径,第四路径可以称为次选子备份路径。After the second path also fails, go to the third protection group 3. The ingress node can set priorities for the third path and the fourth path, so that the priority of the third path is higher than the priority of the fourth path, that is, the fourth path is the backup path of the third path, and in principle, the ingress node prefers the first path Three paths send data. Therefore, the third path may be referred to as the preferred sub-backup path, and the fourth path may be referred to as the second-selected sub-backup path.
S260、确认第三转发状态表中的状态值。S260. Confirm the state value in the third forwarding state table.
由于第三路径也有可能发生故障,因此入口节点需要确认第三保护组3的第三转发状态表中的状态值,当第三转发状态表中的状态值是第三有效值时,第三有效值指示第三路径未发生故障,数据在第三路径上发送;当第三转发状态表中的状态值是第三无效值时,第三无效值指示第三路径发生故障,数据在第四路径上发送。Since the third path may also fail, the ingress node needs to confirm the state value in the third forwarding state table of the third protection group 3. When the state value in the third forwarding state table is the third valid value, the third is valid The value indicates that the third path has not failed and the data is sent on the third path; when the state value in the third forwarding state table is the third invalid value, the third invalid value indicates that the third path has failed, and the data is on the fourth path Send on.
在一实施例中,第三转发状态表中的状态值默认为第三有效值,入口节点可以根据快速链路检测技术对第三路径进行检测;若第三路径发生故障,则将第三转发状态表中的状态值从第三有效值切换至第三无效值。第三有效值通常取0,即第三有效值为0时,代表第三路径未发生故障;第三无效值通常取1,即第三无效值为1时,代表第三路径发生故障。In an embodiment, the state value in the third forwarding state table defaults to the third valid value, and the ingress node can detect the third path according to the fast link detection technology; if the third path fails, the third forwarding The status value in the status table is switched from the third valid value to the third invalid value. The third valid value is usually 0, that is, when the third valid value is 0, it means that the third path is not faulty; the third invalid value is usually 1, that is, when the third invalid value is 1, it means that the third path is faulty.
可以理解的是,第三有效值和第三无效值的取值可以根据实际情况设定,例如,也可以设置第三有效值取1,即第三有效值为1时,代表第三路径未发生故障;第三无效值取0,即第三无效值为0时,代表第三路径发生故障。It is understandable that the values of the third effective value and the third invalid value can be set according to the actual situation. For example, the third effective value can also be set to 1, that is, when the third effective value is 1, it means that the third path has failed. A failure occurs; the third invalid value is 0, that is, when the third invalid value is 0, it means that the third path has a failure.
S270、若第三转发状态表中的状态值是第三有效值,则选择第三路径发送数据,第三有效值指示第三路径未发生故障。S270: If the state value in the third forwarding state table is the third valid value, select the third path to send data, and the third valid value indicates that the third path does not have a failure.
S280、若第三转发状态表中的状态值是第三无效值,则选择第四路径发送数据,第三无效值指示第三路径发生故障。S280: If the state value in the third forwarding state table is the third invalid value, select the fourth path to send data, and the third invalid value indicates that the third path has a failure.
另外,在上述实施例的基础上,还可以继续对第四路径及其后续路径设置备份路径,形成新的保护组,以达到多级电信级性能保护。如此,根据核心层组网规划,合理设计多级保护组,在链路发生多点故障时,直接将转发状态表中的状态值进行切换,大大减少了物理链路状态变化时设备的计算占用时间,使设备可以有更多的时间进行其他业务的处理,有效的保障了上层业务的性能需求。从而实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。In addition, on the basis of the foregoing embodiment, it is also possible to continue to set backup paths for the fourth path and subsequent paths to form a new protection group to achieve multi-level carrier-level performance protection. In this way, according to the core layer network planning, the multi-level protection group is reasonably designed, and when the link has multiple points of failure, the state value in the forwarding state table is directly switched, which greatly reduces the computing occupancy of the device when the physical link state changes Time allows the device to have more time to process other services, which effectively guarantees the performance requirements of upper-level services. In this way, the multi-level carrier-level performance protection of the link is realized, and the stability and timeliness of the system are ensured.
示例性的,图6为一实施例提供的一种链路组网示意图。如图6所示,入口节点为节点S,出口节点为节点D,节点A、节点B、节点C、节点E和节点F为其他节点。主路径为节点S-节点A-节点B-节点D(下述简称S-A-B-D),备份路径为节点S-节点D(下述简称S-D),优选子备份路径为节点S-节点B-节点D(下述简称S-B-D),次选子备份路径为节点S-节点A-节点D(下述简称S-A-D)。S-D对S-A-B-D形成保护,S-B-D和S-A-D对S-D形成保护,S-A-D 对S-B-D形成保护,如此,四条路径形成对S到D链路的全链路保护,无论哪条链路故障,无论几个点同时出现故障,只要存在可达链路,就能实现电信级性能的保护。Exemplarily, FIG. 6 is a schematic diagram of link networking provided by an embodiment. As shown in Figure 6, the ingress node is node S, the egress node is node D, and node A, node B, node C, node E, and node F are other nodes. The main path is node S-node A-node B-node D (hereinafter referred to as SABD), the backup path is node S-node D (hereinafter referred to as SD), and the preferred sub-backup path is node S-node B-node D ( (Hereinafter referred to as SBD), and the secondary backup path is node S-node A-node D (hereinafter referred to as SAD). SD protects SABD, SBD and SAD protect SD, and SAD protects SBD. In this way, the four paths form full link protection for the S to D link, no matter which link fails, no matter how many points occur at the same time Failure, as long as there is a reachable link, the protection of carrier-class performance can be achieved.
本申请实施例提供一种链路保护方法,包括:确认第一转发状态表中的状态值;若第一转发状态表中的状态值是第一无效值,则确认第二转发状态表中的状态值,第一无效值指示第一路径发生故障;若第二转发状态表中的状态值是第二无效值,则通过第三路径或者第四路径发送数据,第二无效值指示第二路径发生故障,第二路径为第一路径的备份路径;第三路径和第四路径均为第二路径的备份路径,第一路径、第二路径、第三路径和第四路均为SR-TE隧道的LSP。本申请能够实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。The embodiment of the application provides a link protection method, including: confirming the state value in the first forwarding state table; if the state value in the first forwarding state table is the first invalid value, confirming the state value in the second forwarding state table Status value, the first invalid value indicates that the first path has failed; if the status value in the second forwarding status table is the second invalid value, the data is sent through the third path or the fourth path, and the second invalid value indicates the second path When a failure occurs, the second path is the backup path of the first path; the third path and the fourth path are the backup paths of the second path, and the first path, the second path, the third path, and the fourth path are all SR-TE LSP of the tunnel. The application can realize multi-level carrier-level performance protection of the link, which ensures the stability and timeliness of the system.
图7为一实施例提供的一种链路保护装置的结构示意图,该链路保护装置可以配置于入口节点中,如图7所示,包括:确认模块10和发送模块11。FIG. 7 is a schematic structural diagram of a link protection device provided by an embodiment. The link protection device may be configured in an ingress node. As shown in FIG. 7, it includes: a confirmation module 10 and a sending module 11.
确认模块10,设置为确认第一转发状态表中的状态值;若第一转发状态表中的状态值是第一无效值,则确认第二转发状态表中的状态值,第一无效值指示第一路径发生故障;The confirming module 10 is configured to confirm the state value in the first forwarding state table; if the state value in the first forwarding state table is the first invalid value, confirm the state value in the second forwarding state table, and the first invalid value indicates The first path fails;
发送模块11,设置为若第二转发状态表中的状态值是第二无效值,则通过第三路径或者第四路径发送数据,第二无效值指示第二路径发生故障,第二路径为第一路径的备份路径;第三路径和第四路径均为第二路径的备份路径,第一路径、第二路径、第三路径和第四路均为分段路由-流量工程SR-TE隧道的标签转发路径LSP。The sending module 11 is configured to send data through the third path or the fourth path if the state value in the second forwarding state table is the second invalid value. The second invalid value indicates that the second path has failed, and the second path is the first The backup path of the first path; the third path and the fourth path are the backup paths of the second path, and the first path, the second path, the third path, and the fourth path are all segment routing-traffic engineering SR-TE tunnels Label forwarding path LSP.
本实施例提供的链路保护装置为实现上述实施例的链路保护方法,本实施例提供的链路保护装置实现原理和技术效果类似,此处不再赘述。The link protection device provided in this embodiment implements the link protection method of the foregoing embodiment. The implementation principle and technical effect of the link protection device provided in this embodiment are similar, and will not be repeated here.
在一实施例中,结合图7,图8为一实施例提供的另一种链路保护装置的结构示意图,还包括:检测模块12和切换模块13。In an embodiment, in conjunction with FIG. 7, FIG. 8 is a schematic structural diagram of another link protection device provided by an embodiment, and further includes: a detection module 12 and a switching module 13.
检测模块12,设置为根据链路检测技术检测第一路径是否发生故障;The detection module 12 is configured to detect whether the first path fails according to the link detection technology;
切换模块13,设置为若第一路径发生故障,则将第一转发状态表中的状态值从第一有效值切换至第一无效值,第一有效值指示第一路径未发生故障。The switching module 13 is configured to switch the state value in the first forwarding state table from the first valid value to the first invalid value if the first path fails, and the first valid value indicates that the first path does not fail.
在一实施例中,检测模块12,还设置为根据链路检测技术检测第二路径是 否发生故障;In an embodiment, the detection module 12 is further configured to detect whether the second path fails according to the link detection technology;
切换模块13,还设置为若第二路径发生故障,则将第二转发状态表中的状态值从第二有效值切换至第二无效值,第二有效值指示第二路径未发生故障。The switching module 13 is further configured to switch the state value in the second forwarding state table from the second valid value to the second invalid value if the second path fails, and the second valid value indicates that the second path does not fail.
在一实施例中,确认模块10,还设置为确认第三路径的优先级高于第四路径的优先级;以及确认第三转发状态表中的状态值;In an embodiment, the confirmation module 10 is further configured to confirm that the priority of the third path is higher than the priority of the fourth path; and confirm the state value in the third forwarding state table;
发送模块11,还设置为若第三转发状态表中的状态值是第三有效值,则选择第三路径发送数据,第三有效值指示第三路径未发生故障;若第三转发状态表中的状态值是第三无效值,则选择第四路径发送数据,第三无效值指示第三路径发生故障。The sending module 11 is further configured to select the third path to send data if the state value in the third forwarding state table is the third valid value, and the third valid value indicates that the third path is not faulty; if the state value in the third forwarding state table If the status value of is the third invalid value, the fourth path is selected to send data, and the third invalid value indicates that the third path has failed.
在一实施例中,检测模块12,还设置为根据链路检测技术检测第三路径是否发生故障;In an embodiment, the detection module 12 is further configured to detect whether the third path fails according to the link detection technology;
切换模块13,还设置为若第三路径发生故障,则将第三转发状态表中的状态值从第三有效值切换至第三无效值。The switching module 13 is further configured to switch the state value in the third forwarding state table from the third valid value to the third invalid value if the third path fails.
在一实施例中,发送模块11,还设置为若第一转发状态表中的状态值是第一有效值,则通过第一路径发送数据。In an embodiment, the sending module 11 is further configured to send data through the first path if the state value in the first forwarding state table is the first valid value.
在一实施例中,发送模块11,还设置为若第二转发状态表中的状态值是第二有效值,则通过第二路径发送数据。In an embodiment, the sending module 11 is further configured to send data through the second path if the state value in the second forwarding state table is the second valid value.
本申请实施例还提供了一种入口节点,包括:处理器和与处理器通信连接的存储器,其中,存储器存储有计算机程序,该计算机程序在被处理器执行时实现如本申请任一实施例所提供的方法。图9为一实施例提供的一种入口节点的结构示意图,如图9所示,该入口节点包括处理器60、存储器61和通信接口62;入口节点中处理器60的数量可以是一个或多个,图9中以一个处理器60为例;入口节点中的处理器60、存储器61、通信接口62可以通过总线或其他方式连接,图9中以通过总线连接为例。总线表示几类总线结构中的一种或多种,包括存储器总线或者存储器控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。An embodiment of the present application further provides an entry node, including: a processor and a memory connected in communication with the processor, wherein the memory stores a computer program, and when the computer program is executed by the processor, implements the same as any one of the embodiments of the present application. The method provided. Figure 9 is a schematic structural diagram of an entry node provided by an embodiment. As shown in Figure 9, the entry node includes a processor 60, a memory 61 and a communication interface 62; the number of processors 60 in the entry node may be one or more. One, a processor 60 is taken as an example in FIG. 9; the processor 60, the memory 61, and the communication interface 62 in the ingress node may be connected by a bus or other methods. In FIG. 9, the connection by a bus is taken as an example. The bus represents one or more of several types of bus structures, including a memory bus or a memory controller, a peripheral bus, a graphics acceleration port, a processor, or a local bus using any bus structure among multiple bus structures.
存储器61作为一种计算机可读存储介质,可设置为存储软件程序、计算机可执行程序以及模块,如本申请实施例中的方法对应的程序指令/模块。处理器60通过运行存储在存储器61中的软件程序、指令以及模块,从而执行入口节 点的至少一种功能应用以及数据处理,即实现上述的链路保护方法。As a computer-readable storage medium, the memory 61 can be configured to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the methods in the embodiments of the present application. The processor 60 executes at least one functional application and data processing of the entry node by running the software programs, instructions, and modules stored in the memory 61, that is, realizes the above-mentioned link protection method.
存储器61可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据入口节点的使用所创建的数据等。此外,存储器61可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储器61可包括相对于处理器60远程设置的存储器,这些远程存储器可以通过网络连接至日寇节点。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 61 may include a program storage area and a data storage area, where the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created according to the use of the entry node, and the like. In addition, the memory 61 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other non-volatile solid-state storage devices. In some examples, the memory 61 may include a memory remotely provided with respect to the processor 60, and these remote memories may be connected to a Japanese invader node through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
通信接口62可设置为数据的接收与发送。The communication interface 62 can be configured to receive and send data.
本申请实施例还提供了一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现如本申请任一实施例所提供的方法。The embodiment of the present application also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, the method as provided in any embodiment of the present application is implemented.
本申请实施例的计算机存储介质,可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质包括(非穷举的列表):具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、可擦式可编程只读存储器(Electrically Erasable,ProgrammableRead-Only Memory,EPROM)、闪存、光纤、便携式紧凑磁盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本申请中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。The computer storage medium of the embodiment of the present application may adopt any combination of one or more computer-readable media. The computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium. The computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above. Computer-readable storage media include (non-exhaustive list): electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (Read-Only Memory) , ROM), Erasable Programmable Read-Only Memory (EPROM), flash memory, optical fiber, compact Disc Read-Only Memory (CD-ROM), optical storage devices , Magnetic storage devices, or any suitable combination of the above. In this application, the computer-readable storage medium may be any tangible medium that contains or stores a program, and the program may be used by or in combination with an instruction execution system, apparatus, or device.
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,数据信号中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器 件使用或者与其结合使用的程序。The computer-readable signal medium may include a data signal propagated in baseband or as a part of a carrier wave, and the computer-readable program code is carried in the data signal. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing. The computer-readable signal medium may also be any computer-readable medium other than the computer-readable storage medium, and the computer-readable medium may send, propagate, or transmit the program for use by or in combination with the instruction execution system, apparatus, or device .
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括——但不限于无线、电线、光缆、射频(Radio Frequency,RF)等等,或者上述的任意合适的组合。The program code contained on the computer-readable medium can be transmitted by any suitable medium, including but not limited to wireless, wire, optical cable, radio frequency (RF), etc., or any suitable combination of the foregoing.
可以以一种或多种程序设计语言或多种程序设计语言组合来编写用于执行本公开操作的计算机程序代码,程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++、Ruby、Go,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(Local Area Network,LAN)或广域网(Wide Area Network,WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。The computer program code used to perform the operations of the present disclosure can be written in one or more programming languages or a combination of multiple programming languages. The programming languages include object-oriented programming languages-such as Java, Smalltalk, C++, Ruby, Go also includes conventional procedural programming languages-such as "C" language or similar programming languages. The program code can be executed entirely on the user's computer, partly on the user's computer, executed as an independent software package, partly on the user's computer and partly executed on a remote computer, or entirely executed on the remote computer or server. In the case of a remote computer, the remote computer can be connected to the user's computer through any kind of network-including Local Area Network (LAN) or Wide Area Network (WAN)-or it can be connected to an external computer ( For example, use an Internet service provider to connect via the Internet).
本领域内的技术人员应明白,术语用户终端涵盖任何适合类型的无线用户设备,例如移动电话、便携数据处理装置、便携网络浏览器或车载移动台。Those skilled in the art should understand that the term user terminal encompasses any suitable type of wireless user equipment, such as a mobile phone, a portable data processing device, a portable web browser, or a vehicle-mounted mobile station.
一般来说,本申请的多种实施例可以在硬件或专用电路、软件、逻辑或其任何组合中实现。例如,一些方面可以被实现在硬件中,而其它方面可以被实现在可以被控制器、微处理器或其它计算装置执行的固件或软件中,尽管本申请不限于此。In general, the various embodiments of the present application can be implemented in hardware or dedicated circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor, or other computing device, although the present application is not limited thereto.
本申请的实施例可以通过移动装置的数据处理器执行计算机程序指令来实现,例如在处理器实体中,或者通过硬件,或者通过软件和硬件的组合。计算机程序指令可以是汇编指令、指令集架构(InstructionSetArchitecture,ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码。The embodiments of the present application may be implemented by executing computer program instructions by a data processor of a mobile device, for example, in a processor entity, or by hardware, or by a combination of software and hardware. Computer program instructions can be assembly instructions, Instruction Set Architecture (ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or a source written in any combination of one or more programming languages Code or object code.
本申请附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于 只读存储器(ROM)、随机访问存储器(RAM)、光存储器装置和系统(数码多功能光碟(Digital Versatile Disc,DVD)或光盘(Compact Disc,CD))等。计算机可读介质可以包括非瞬时性存储介质。数据处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑器件((Field-Programmable Gate Array,FGPA)以及基于多核处理器架构的处理器。The block diagram of any logic flow in the drawings of the present application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions. The computer program can be stored on the memory. The memory can be of any type suitable for the local technical environment and can be implemented using any suitable data storage technology, such as but not limited to read only memory (ROM), random access memory (RAM), optical storage devices and systems (digital multi-function optical discs) (Digital Versatile Disc, DVD) or compact disc (Compact Disc, CD), etc. Computer-readable media may include non-transitory storage media. The data processor can be any type suitable for the local technical environment, such as but not limited to general-purpose computers, special-purpose computers, microprocessors, digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (ASICs) ), programmable logic devices (Field-Programmable Gate Array, FGPA), and processors based on multi-core processor architecture.

Claims (10)

  1. 一种链路保护方法,包括:A link protection method includes:
    确认第一转发状态表中的状态值;Confirm the state value in the first forwarding state table;
    若所述第一转发状态表中的状态值是第一无效值,则确认第二转发状态表中的状态值,所述第一无效值指示第一路径发生故障;If the state value in the first forwarding state table is the first invalid value, confirm the state value in the second forwarding state table, and the first invalid value indicates that the first path has failed;
    若所述第二转发状态表中的状态值是第二无效值,则通过第三路径或者第四路径发送数据,所述第二无效值指示第二路径发生故障,所述第二路径为所述第一路径的备份路径;所述第三路径和所述第四路径均为所述第二路径的备份路径,所述第一路径、所述第二路径、所述第三路径和所述第四路均为分段路由-流量工程SR-TE隧道的标签转发路径LSP。If the state value in the second forwarding state table is the second invalid value, the data is sent through the third path or the fourth path. The second invalid value indicates that the second path fails, and the second path is The backup path of the first path; the third path and the fourth path are both backup paths of the second path, and the first path, the second path, the third path, and the The fourth path is the label forwarding path LSP of the segment routing-traffic engineering SR-TE tunnel.
  2. 根据权利要求1所述的方法,其中,还包括:The method according to claim 1, further comprising:
    根据链路检测技术检测所述第一路径是否发生故障;Detecting whether the first path fails according to the link detection technology;
    若所述第一路径发生故障,则将所述第一转发状态表中的状态值从第一有效值切换至所述第一无效值,所述第一有效值指示第一路径未发生故障。If the first path fails, the state value in the first forwarding state table is switched from the first valid value to the first invalid value, and the first valid value indicates that the first path does not fail.
  3. 根据权利要求1所述的方法,其中,还包括:The method according to claim 1, further comprising:
    根据链路检测技术检测所述第二路径是否发生故障;Detecting whether the second path fails according to the link detection technology;
    若所述第二路径发生故障,则将所述第二转发状态表中的状态值从第二有效值切换至所述第二无效值,所述第二有效值指示第二路径未发生故障。If the second path fails, the state value in the second forwarding state table is switched from the second valid value to the second invalid value, and the second valid value indicates that the second path does not have a failure.
  4. 根据权利要求1所述的方法,其中,所述通过第三路径或者第四路径发送数据,包括:The method according to claim 1, wherein the sending data through the third path or the fourth path comprises:
    确认所述第三路径的优先级高于所述第四路径的优先级;Confirming that the priority of the third path is higher than the priority of the fourth path;
    确认第三转发状态表中的状态值;Confirm the state value in the third forwarding state table;
    若第三转发状态表中的状态值是第三有效值,则选择所述第三路径发送所述数据,所述第三有效值指示所述第三路径未发生故障;If the state value in the third forwarding state table is the third valid value, the third path is selected to send the data, and the third valid value indicates that the third path has not failed;
    若第三转发状态表中的状态值是第三无效值,则选择所述第四路径发送所述数据,所述第三无效值指示所述第三路径发生故障。If the state value in the third forwarding state table is the third invalid value, the fourth path is selected to send the data, and the third invalid value indicates that the third path has failed.
  5. 根据权利要求4所述的方法,其中,还包括:The method according to claim 4, further comprising:
    根据链路检测技术检测所述第三路径是否发生故障;Detecting whether the third path fails according to the link detection technology;
    若所述第三路径发生故障,则将所述第三转发状态表中的状态值从第三有效值切换至所述第三无效值。If the third path fails, the state value in the third forwarding state table is switched from the third valid value to the third invalid value.
  6. 根据权利要求1所述的方法,其中,还包括:The method according to claim 1, further comprising:
    若所述第一转发状态表中的状态值是第一有效值,则通过所述第一路径发送数据。If the state value in the first forwarding state table is the first valid value, data is sent through the first path.
  7. 根据权利要求1所述的方法,其中,还包括:The method according to claim 1, further comprising:
    若所述第二转发状态表中的状态值是第二有效值,则通过所述第二路径发送数据。If the state value in the second forwarding state table is the second valid value, data is sent through the second path.
  8. 一种链路保护装置,包括:确认模块和发送模块;A link protection device includes: a confirmation module and a sending module;
    所述确认模块,设置为确认第一转发状态表中的状态值;若所述第一转发状态表中的状态值是第一无效值,则确认第二转发状态表中的状态值,所述第一无效值指示第一路径发生故障;The confirmation module is configured to confirm the state value in the first forwarding state table; if the state value in the first forwarding state table is the first invalid value, confirm the state value in the second forwarding state table, The first invalid value indicates that the first path has failed;
    所述发送模块,设置为若所述第二转发状态表中的状态值是第二无效值,则通过第三路径或者第四路径发送数据,所述第二无效值指示第二路径发生故障,所述第二路径为所述第一路径的备份路径;所述第三路径和所述第四路径均为所述第二路径的备份路径,所述第一路径、所述第二路径、所述第三路径和所述第四路均为分段路由-流量工程SR-TE隧道的标签转发路径LSP。The sending module is configured to send data through the third path or the fourth path if the state value in the second forwarding state table is a second invalid value, and the second invalid value indicates that the second path has failed, The second path is a backup path of the first path; the third path and the fourth path are both backup paths of the second path, and the first path, the second path, and the The third path and the fourth path are both segment routing-traffic engineering SR-TE tunnel label forwarding path LSPs.
  9. 一种入口节点,包括:处理器和与所述处理器通信连接的存储器,其中,所述存储器存储有计算机程序,所述计算机程序在被所述处理器执行时实现如权利要求1-7中任一所述的链路保护方法。An entry node, comprising: a processor and a memory communicatively connected with the processor, wherein the memory stores a computer program, and the computer program is implemented by the processor as in claims 1-7 Any of the link protection methods described above.
  10. 一种计算机可读存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-7中任一所述的链路保护方法。A computer-readable storage medium that stores a computer program, which, when executed by a processor, implements the link protection method according to any one of claims 1-7.
PCT/CN2020/133139 2019-12-13 2020-12-01 Link protection method, device, ingress node, and storage medium WO2021115162A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911284848.0 2019-12-13
CN201911284848.0A CN112995026A (en) 2019-12-13 2019-12-13 Link protection method, device, entry node and storage medium

Publications (1)

Publication Number Publication Date
WO2021115162A1 true WO2021115162A1 (en) 2021-06-17

Family

ID=76329436

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/133139 WO2021115162A1 (en) 2019-12-13 2020-12-01 Link protection method, device, ingress node, and storage medium

Country Status (2)

Country Link
CN (1) CN112995026A (en)
WO (1) WO2021115162A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101060497A (en) * 2007-06-11 2007-10-24 杭州华三通信技术有限公司 A traffic engineering tunnel creating method and device
CN101552715A (en) * 2008-03-31 2009-10-07 华为技术有限公司 Method, node and system for establishing backup label switching path
CN102035681A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Link protection method and system for virtual private network
US20150326505A1 (en) * 2014-05-06 2015-11-12 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Logical switch architecture for network virtualization
CN107306197A (en) * 2016-04-20 2017-10-31 中兴通讯股份有限公司 A kind of method and device of protecting tunnel

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100428778B1 (en) * 2002-02-20 2004-04-28 삼성전자주식회사 method for CR-LSP path protection in Multi Protocol Label Switching system and the recorded media thereof
CN102740175B (en) * 2012-06-12 2014-09-24 武汉邮电科学研究院 Method for protecting and recovering cross-domain end-to-end label switched path

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101060497A (en) * 2007-06-11 2007-10-24 杭州华三通信技术有限公司 A traffic engineering tunnel creating method and device
CN101552715A (en) * 2008-03-31 2009-10-07 华为技术有限公司 Method, node and system for establishing backup label switching path
CN102035681A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Link protection method and system for virtual private network
US20150326505A1 (en) * 2014-05-06 2015-11-12 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Logical switch architecture for network virtualization
CN107306197A (en) * 2016-04-20 2017-10-31 中兴通讯股份有限公司 A kind of method and device of protecting tunnel

Also Published As

Publication number Publication date
CN112995026A (en) 2021-06-18

Similar Documents

Publication Publication Date Title
EP3591912B1 (en) Evpn packet processing method, device and system
US10587494B2 (en) Network control method and apparatus
US20240172035A1 (en) Integrated Backhaul Transport for 5Gs
US20230344754A1 (en) Message indication method and apparatus, and device and storage medium
WO2021258823A1 (en) Path creation method, apparatus and system
JP2017516424A (en) On-demand network service in 5th generation mobile networks
KR20220152243A (en) Data packet transmission method and device, communication node, and storage medium
WO2021057962A1 (en) Tunnel configuration method, apparatus and system, and device and storage medium
EP3713160B1 (en) Packet transmission method and apparatus
EP3979576A1 (en) Packet forwarding method, device, and computer-readable storage medium
EP3029883B1 (en) Network protection method and apparatus, next-ring node, and system
WO2020200434A1 (en) Local user plane function control
CN114448877B (en) Path switching method, device and system
JP2021534669A (en) Packet processing method and gateway device
WO2021109997A1 (en) Anti-fiber breakage method and device for segment routing tunnel, ingress node and storage medium
JP2022068125A (en) Method for controlling traffic forwarding, device, and system
WO2013013642A1 (en) Method for processing inter-loop service and crossing node
KR20140124116A (en) Apparatus and method for optimizing data-path in mobile communication network
US11979310B2 (en) Signal translation and protection in a hybrid network environment
US8923303B2 (en) Method, system and installation for forwarding data transmission frames
KR20230091908A (en) Method and Apparatus for Packet Rerouting
WO2021115162A1 (en) Link protection method, device, ingress node, and storage medium
EP3537671B1 (en) Protection switching method and system, and nodes
EP4329374A1 (en) Communication processing method and related device
WO2021077972A1 (en) Packet forwarding method, device, and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20900047

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20900047

Country of ref document: EP

Kind code of ref document: A1