WO2024066964A1 - Implementation method and apparatus for ioam encapsulation of virtualized tunnel network - Google Patents

Implementation method and apparatus for ioam encapsulation of virtualized tunnel network Download PDF

Info

Publication number
WO2024066964A1
WO2024066964A1 PCT/CN2023/117054 CN2023117054W WO2024066964A1 WO 2024066964 A1 WO2024066964 A1 WO 2024066964A1 CN 2023117054 W CN2023117054 W CN 2023117054W WO 2024066964 A1 WO2024066964 A1 WO 2024066964A1
Authority
WO
WIPO (PCT)
Prior art keywords
ioam
information
message
encapsulation
tunnel
Prior art date
Application number
PCT/CN2023/117054
Other languages
French (fr)
Chinese (zh)
Inventor
杨裕栋
刘雪峰
陈爱东
毕以峰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024066964A1 publication Critical patent/WO2024066964A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Definitions

  • the embodiments of the present disclosure relate to the field of communication technology, and in particular to a method and device for implementing IOAM encapsulation of a virtualized tunnel network.
  • the switch is a bridge for network communication service interaction.
  • the stability of the switch can ensure the reliability of upper-layer service interaction. If a port of the switch fails, the services between virtual machines will be unable to communicate, which will have a great impact on the business.
  • in-band operation, administration, and maintenance (IOAM) technology can realize real-time perception and monitoring of the operating status of the switch network and is being widely used.
  • IOAM in-band operation, administration, and maintenance
  • virtual switches and physical switches are used as corresponding forwarding nodes to forward data streams, but the forwarding nodes communicate with each other using a tunnel network, and the virtual switches in the virtualized network only support tunnel message encapsulation but not IOAM encapsulation. After the virtual switch performs tunnel message encapsulation, the subsequent IOAM encapsulation of the physical switch cannot take effect, thereby making the virtualized network unable to realize the IOAM function.
  • the material switch in the virtualized network only supports parsing of the outer layer message but cannot parse the inner layer message.
  • the valid information forwarded by each forwarding node (for example: source MAC address, destination MAC address, source IP address, destination IP address, protocol number) is in the inner layer message. Since the physical switch cannot perform IOAM encapsulation and cannot parse the inner layer message, the virtualized network cannot realize the IOAM function.
  • the embodiments of the present disclosure provide a method, device, physical switch and storage medium for implementing IOAM encapsulation of a virtualized tunnel network, so as to at least solve the problem in the related art that the virtualized tunnel network cannot implement the IOAM function.
  • an embodiment of the present disclosure provides an implementation method of IOAM encapsulation of a virtualized tunnel network, which is applied to a first physical switch, comprising: receiving tunnel message information corresponding to a target data flow forwarded by a virtual switch, wherein the tunnel message information comprises inner message information and outer message information, wherein the inner message information stores first user configuration information corresponding to the target data flow, and the outer message information stores first user configuration information corresponding to the first user configuration information.
  • the method comprises the steps of: obtaining a data stream encoding and second user configuration information corresponding to the virtual switch; obtaining preset flag information, and selecting a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding; encapsulating the obtained IOAM information into the target IOAM encapsulation object, generating a first IOAM message, and forwarding the first IOAM message to a physical switch corresponding to a next-level forwarding node.
  • an embodiment of the present disclosure provides a device for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to a first physical switch, including:
  • a receiving module configured to receive tunnel message information corresponding to a target data flow forwarded by a virtual switch, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores first user configuration information corresponding to the target data flow, and the outer message information stores a data flow code corresponding to the first user configuration information and second user configuration information corresponding to the virtual switch;
  • a determination module configured to obtain preset flag information, and select a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding;
  • the encapsulation module is configured to encapsulate the acquired IOAM information into the target IOAM encapsulation object, generate a first IOAM message, and forward the first IOAM message to a physical switch corresponding to a next-level forwarding node.
  • an embodiment of the present disclosure provides a method for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to an intermediate physical switch, including: receiving a second IOAM message forwarded by a physical switch at a previous level, wherein an outer message corresponding to the second IOAM message stores first IOAM encapsulation information; obtaining the IOAM information collected by this node, and adding the IOAM information to the first IOAM encapsulation information, generating a corresponding third IOAM message, and forwarding the third IOAM message to the physical switch corresponding to the forwarding node at the next level.
  • an embodiment of the present disclosure provides a device for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to an intermediate physical switch, including:
  • a receiving module configured to receive a second IOAM message forwarded by a physical switch at a previous level, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information
  • the adding module is configured to obtain the IOAM information collected by the node, add the IOAM information to the first IOAM encapsulation information, generate a corresponding third IOAM message, and forward the third IOAM message to the physical switch corresponding to the next-level forwarding node.
  • the present disclosure provides a method for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to a terminal.
  • the method comprises: after receiving an IOAM decapsulation instruction sent by a preset analyzer, obtaining a fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information; removing the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forwarding the obtained tunnel message information to the virtual switch located at the next-level node.
  • an embodiment of the present disclosure provides a device for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to a last-position physical switch, including:
  • an acquisition module configured to acquire, after receiving the IOAM decapsulation instruction issued by the preset analyzer, a fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information;
  • a decapsulation module configured to remove the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forward the obtained tunnel message information to a virtual switch located at a subsequent node;
  • a physical switch comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory communicate with each other via the communication bus;
  • a memory arranged to store a computer program
  • the processor is configured to implement the steps of the method for implementing IOAM encapsulation of the virtualized tunnel network as described in any one of the embodiments of the first aspect, the third aspect and the fifth aspect when executing the program stored in the memory.
  • a computer-readable storage medium on which a computer program is stored.
  • the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in any one of the embodiments of the first aspect, the third aspect and the fifth aspect are implemented.
  • FIG1 is a flow chart of a method for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure
  • FIG2 is a flow chart of another method for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure
  • FIG3 is a flow chart of another method for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure
  • FIG4 is a schematic diagram of a virtualized tunnel network operation according to a preferred embodiment of the present disclosure.
  • FIG5 is a timing diagram of the operation of a virtualized tunnel network according to a preferred embodiment of the present disclosure
  • FIG6 is a schematic diagram of the structure of a device for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure
  • FIG. 7 is a schematic diagram of the structure of another device for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure
  • FIG. 8 is a schematic diagram of the structure of another device for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure
  • FIG. 9 is a schematic diagram of the structure of a physical switch provided in an embodiment of the present disclosure.
  • In-band Operation, Administration, and Maintenance is a new data communication network operation, administration, and maintenance (OAM) technology proposed by the industry.
  • the technology is currently in a rapid development stage under the joint promotion of the industry, and is being standardized by the Internet Engineering Task Force (IETF) of the International Organization for Standardization.
  • IETF Internet Engineering Task Force
  • in-band OAM is sent together with data packets, and no additional control plane packets are required to send OAM data.
  • In-band OAM is generally deployed in a specific domain.
  • IOAM can implement complex OAM such as multiple path tracking, path verification, and service level agreement (SLA) verification.
  • SLA service level agreement
  • FIG1 is a flow chart of a method for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure.
  • an embodiment of the present disclosure provides a method for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to a first physical switch, and the method includes the following steps:
  • Step S101 receiving tunnel message information corresponding to the target data flow forwarded by the virtual switch, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores first user configuration information corresponding to the target data flow, and the outer message information stores data flow coding corresponding to the first user configuration information and second user configuration information corresponding to the virtual switch.
  • the subject that executes the IOAM encapsulation method of the disclosed embodiment is the physical switch located at the first position in the virtualized tunnel network.
  • the virtual switch and the physical switch coexist and serve as corresponding forwarding nodes respectively.
  • the virtual switch and the physical switch are also connected to the analyzer for statistics and analysis of IOAM information for communication.
  • the analyzer can generate a data flow code flowid according to the five-tuple information in the received user configuration information (corresponding to the first user configuration information) according to the preset rules (for example, performing hash operation).
  • the generated data flow code matches the value of the Differentiated Services Code Point (DSCP) in the outer message information of the tunnel message.
  • DSCP Differentiated Services Code Point
  • the analyzer also generates flag information indicating that the flowid value matches the DSCP value (using FlowidMatchDscp table). ); in this embodiment, after the analyzer generates the flowid and the corresponding flag information, it will send the flag information to the first physical switch and the virtual switch located at the previous node of the first physical switch; in this embodiment, the analyzer uses a command line to store the flag information in the database of the virtual switch; the analyzer also sends the flowid to the corresponding virtual switch, and after the corresponding virtual switch receives the flag information, when encapsulating the tunnel message information, the received flowid is used as the DSCP value in the outer message of the tunnel message information, and is added to the outer message to generate the corresponding tunnel message information; after encapsulating the tunnel message information, the corresponding virtual switch sends the corresponding tunnel message information to the first physical switch; in this embodiment, the analyzer also sends an instruction to perform IOAM encapsulation to the first physical switch, and after receiving the
  • the data stream encoding is in the outer layer message information of the tunnel message information.
  • the data stream encoding is also a mapping of the first user configuration information (corresponding to a five-tuple information consisting of a source MAC address, a destination MAC address, a source IP address, a destination IP address and a protocol number) in the inner layer message of the tunnel message information and the IOAM message generated after the subsequent IOAM encapsulation is completed. Then, through the mapping of the inner and outer layer messages, the forwarded data flow and the operating status of the virtualized tunnel network are monitored.
  • the outer layer messages of the tunnel message information and the IOAM message information also include corresponding user configuration information (that is, the second user configuration information), which is used to characterize the configuration information corresponding to the virtual switch located at the previous level node of the first physical switch (for example: source MAC address, destination MAC address, source IP address, target IP address and protocol number), but the user configuration information corresponding to the outer layer message is not the configuration information corresponding to the data flow that the user needs to monitor.
  • the second user configuration information that is, the second user configuration information
  • the user configuration information corresponding to the outer layer message is not the configuration information corresponding to the data flow that the user needs to monitor.
  • Step S102 obtaining preset flag information, and selecting a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding.
  • the first physical switch after the first physical switch receives the tunnel message information after tunnel encapsulation, it first reads the stored flag information FlowidMatchDscp and determines the value of the FlowidMatchDscp. If the value of the FlowidMatchDscp is correct, the outer message information of the tunnel message information is directly parsed, and IOAM encapsulation is performed according to the dscp value of the IP layer in the outer message information, and IOAM information is added; if the value of the FlowidMatchDscp is wrong, the second user configuration information is directly encapsulated with IOAM.
  • Step S103 encapsulate the acquired IOAM information into a target IOAM encapsulation object, generate a first IOAM message, and forward the first IOAM message to a physical switch corresponding to a next-level forwarding node.
  • the first physical switch will collect or obtain the IOAM information corresponding to the forwarding node, which includes but is not limited to the input and output ports of the target data flow, forwarding delay, timestamp, queue depth information, and collection sequence number input device timestamp information.
  • the physical switch of the next-level forwarding node can be the middle physical switch of the virtualized tunnel network, or it can be the last physical switch in the virtualized tunnel network; when the physical switch of the next-level forwarding node is the middle physical switch, the IOAM information of this node is added, and then forwarded to the corresponding physical switch of the next-level forwarding node; when the physical switch of the next-level forwarding node is the last physical switch, IOAM decapsulation is performed, the IOAM information encapsulated and added by the first switch is removed, and the corresponding message is sent to the virtual switch of the next-level forwarding node.
  • tunnel message information corresponding to the target data flow forwarded by the virtual switch is received, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores the first user configuration information corresponding to the target data flow, and the outer message information stores the data flow code corresponding to the first user configuration information and the second user configuration information corresponding to the virtual switch; the preset flag information is obtained, and based on the verification result of the flag information, the target IOAM encapsulation object is selected from the data flow code and the second user configuration information, wherein the flag information is used to characterize the validity of the data flow code; the obtained IOAM information is encapsulated into the target IOAM encapsulation object, a first IOAM message is generated, and the first IOAM message is forwarded to the physical switch corresponding to the next-level forwarding node, so as to solve the problem that the virtualized tunnel network cannot realize the IOAM function in the related art, and IOAM encapsulation is realized in the virtualized tunnel network by
  • the following steps are further implemented: receiving the IOAM encapsulation instruction and the flag issued by the preset analyzer according to the preset network configuration protocol; information.
  • the network configuration protocol includes but is not limited to the Netconf protocol; in this embodiment, the analyzer sends an IOAM encapsulation instruction and flag information FlowidMatchDscp to the first physical switch, so that the first physical switch performs corresponding IOAM encapsulation by determining whether the flag information is a preset valid value.
  • the target IOAM encapsulation object is selected from the data stream encoding and the second user configuration information, which is implemented by the following steps:
  • Step 21 determine the parameter value of the flag information, and determine whether the parameter value is a preset valid value, wherein the preset valid value is used to characterize that the value of the data stream coding matches the differential service code point DSCP value in the outer message information, and the data stream coding is generated by a preset analyzer performing calculations on the multi-target information corresponding to the first user configuration information according to a preset calculation algorithm.
  • Step 22 When it is determined that the parameter value is a preset valid value, the data stream is encoded as a target IOAM encapsulation object.
  • Step 23 When it is determined that the parameter value is not a preset valid value, the second user configuration information is used as the target IOAM encapsulation object.
  • the first physical switch after the first physical switch receives the tunnel message information after tunnel encapsulation, it first reads the parameter value of the stored flag information FlowidMatchDscp, and determines whether the parameter value is a preset valid value (for example: true).
  • the data stream encoding is used as the target IOAM encapsulation corresponding to the target, that is, the outer message information of the tunnel message information is directly parsed, and the IOAM encapsulation is performed according to the dscp value of the IP layer in the outer message information, and the IOAM information is added; if the parameter value is not a preset valid value (for example: flase), the second user configuration information is used as the target IOAM encapsulation object, that is, the second user configuration information is directly encapsulated with IOAM.
  • a preset valid value for example: flase
  • the second user configuration information when used as the target IOAM encapsulation object, although the IOAM encapsulation is completed, it cannot be associated with the target data flow, so that the reported IOAM information cannot correctly feedback the network status corresponding to a forwarding node. For example: when the packet loss corresponding to the first physical switch is M, and when the second user configuration information is used for IOAM encapsulation, after the analyzer completes the analysis, the packet loss corresponding to the first physical switch will be N. This will cause incorrect monitoring and analysis of the virtualized tunnel network.
  • FIG. 2 is a flow chart of another method for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure.
  • an embodiment of the present disclosure provides a method for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to an intermediate physical switch. The method includes the following steps:
  • Step S201 Receive a second IOAM message forwarded by a physical switch at a previous stage, wherein the outer message corresponding to the second IOAM message stores first IOAM encapsulation information.
  • Step S202 Acquire the IOAM information collected by the node, add the IOAM information to the first IOAM encapsulation information, generate a corresponding third IOAM message, and forward the third IOAM message to the physical switch corresponding to the next-level forwarding node.
  • the previous-level physical switch can be a first-level physical switch or an intermediate-level physical switch; when it is the first-level physical switch, the second IOAM message received is an IOAM message generated by IOAM encapsulation and adding IOAM information to the first-level physical switch; when it is an intermediate-level physical switch, the second IOAM message received is an IOAM message generated by IOAM encapsulation and adding IOAM information to the first-level physical switch, with the IOAM information of the previous-level physical switch added to it.
  • the intermediate physical switch after receiving the corresponding IOAM message, adds the collected IOAM information to generate the corresponding IOAM message.
  • the intermediate physical switch after receiving the corresponding message forwarded by the physical switch at the previous level, the intermediate physical switch will determine whether there is a corresponding IOAM encapsulation in the corresponding message, that is, determine whether there is corresponding IOAM information. If so, the IOAM information corresponding to its own node is added. Otherwise, the virtualized tunnel network is determined to perform the IOAM function.
  • the second IOAM message forwarded by the physical switch of the previous level is received, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information; the IOAM information collected by the current node is obtained, and the IOAM information is added to the first IOAM encapsulation information, a corresponding third IOAM message is generated, and the third IOAM message is forwarded to the physical switch corresponding to the forwarding node of the next level, so as to solve the problem that the virtualized tunnel network in the related technology cannot realize the IOAM function, and achieve the beneficial effect of improving the IOAM for network fault location and processing capabilities.
  • FIG3 is a flow chart of another implementation method of IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure. As shown in FIG3, an implementation method of IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure is applied to the last physical switch, and the method includes the following steps:
  • Step S301 after receiving the IOAM decapsulation instruction sent by the preset analyzer, obtain the fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information.
  • Step S302 remove the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forward the obtained tunnel message information to the virtual switch located at the next-level node.
  • the physical switch corresponding to the previous-level forwarding node can be the first physical switch or the middle physical switch; in this embodiment, before the last physical switch performs IOAM decapsulation, the analyzer will send an IOAM decapsulation instruction to it, for example: through the netconf configuration method, send the IOAM decapsulation instruction; in this embodiment, the last physical switch performs IOAM decapsulation after receiving the fourth IOAM message, removes the IOAM information added by the first physical switch or the middle physical switch, and sends the tunnel message information generated after IOAM decapsulation to the virtual switch of the next-level node.
  • the fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node is obtained, wherein the outer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information; the second IOAM encapsulation information is removed from the outer message corresponding to the fourth IOAM message, and the obtained tunnel message information is forwarded to the virtual switch located at the next-level node, thereby realizing IOAM decapsulation of the virtualized tunnel network, solving the problem that the virtualized tunnel network cannot realize the IOAM function in the related technology, and achieving the beneficial effect of improving the IOAM for network fault location and processing capabilities.
  • FIG4 is a schematic diagram of the operation of the virtualized tunnel network in the preferred embodiment of the present disclosure
  • FIG5 is a timing diagram of the operation of the virtualized tunnel network in the preferred embodiment of the present disclosure.
  • the operations performed by each network element in the IOAM encapsulation of the virtualized tunnel network in the preferred embodiment of the present disclosure are described as follows:
  • the virtual switch and the physical switch coexist, and also include an analyzer, wherein the analyzer receives user configuration information, generates a flowid according to a certain rule based on the five-tuple information in the user configuration information (refer to the MAC, IP, TCP/UDP, and payload corresponding to the original information in FIG4 ), and the flowid needs to match the dscp value; the analyzer sends the flowid and dscp matching flag information to the virtual switch and the first physical switch; the virtual switch obtains the flowid and dscp matching flag information, adds the corresponding flowid as the dscp value to the outer message information of the tunnel message information, completes the tunnel message encapsulation and sends it to the first physical switch; the first physical switch performs IOAM encapsulation according to the dscp value in the outer message information (refer to the IP corresponding to the tunnel message encapsulation in FIG
  • Step 1 Analyzer receives the configuration information entered by the user, and generates a flowid value that meets the dscp range through a hash algorithm based on the five-tuple information mac address, ip address, and protocol number, ensuring that the flowids that exist at the same time are unique.
  • Step 2 Analyzer defines the flag information FlowidMatchDscp, and the analyzer sends the flag information FlowidMatchDscp to the virtual machine switch.
  • the analyzer sends the IOAM encapsulation and flag information to the first physical switch.
  • FlowidMatchDscp analyzer sends IOAM decapsulation to the last physical switch.
  • the analyzer sends the IOAM encapsulation instruction and the flag information FlowidMatchDscpanalyze through netconf; in this embodiment, if the value of the sent flag information FlowidMatchDscp is true, it means that the flowid and dscp values corresponding to the target data flow match.
  • Step 3 When the virtual switch receives the message, it needs to perform tunnel message encapsulation.
  • the virtual switch first reads the stored flag information FlowidMatchDscp and determines the value of the flag information FlowidMatchDscp. If it is true, the flowid value in the previous tunnel message is added as the dscp value to the outer IP layer of the tunnel message during encapsulation. If it is false, this operation is not required.
  • the first physical switch receives the tunnel message information after tunnel encapsulation. First, it reads the stored flag information FlowidMatchDscp and determines the value of the flag information FlowidMatchDscp. If it is true, it directly parses the outer message information of the tunnel message information, performs IOAM encapsulation according to the dscp value of the IP layer, and adds IOAM information; if it is false, it directly performs IOAM encapsulation on the five-tuple information of the outer message information of the tunnel message information.
  • Step 5 The intermediate physical switch is responsible for adding the IOAM information of the local node to the IOAM message from the encapsulation node and forwarding it.
  • Step 6 After receiving the corresponding IOAM message, the last physical switch performs IOAM decapsulation, removes the IOAM information added by the first switch, and sends the decapsulated tunnel message information to the subsequent virtual switch.
  • Step 7 The virtual switch decapsulates the tunnel message and removes the tunnel message information
  • Step 8 The first physical switch, the middle physical switch, and the last physical switch report IOAM collection information periodically.
  • the IOAM collection information includes the ingress and egress ports of the data flow, forwarding delay, timestamp, queue depth information, and the collection sequence number entry device timestamp.
  • Step 9 The analyzer receives the reported IOAM information and performs analysis and processing.
  • the embodiments of the present disclosure also provide an implementation device for IOAM encapsulation of a virtualized tunnel network, which is used to implement the above embodiments and preferred implementation modes, and will not be repeated hereafter.
  • the terms “module”, “unit”, “sub-unit”, etc. used below may implement a combination of software and/or hardware for a predetermined function.
  • the devices described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and conceivable.
  • FIG6 is a schematic diagram of the structure of a device for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure.
  • the device for implementing IOAM encapsulation of a virtualized tunnel network provided in this embodiment is applied to a first physical switch, and the device includes:
  • the receiving module 61 is configured to receive tunnel message information corresponding to the target data flow forwarded by the virtual switch, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores the first user configuration information corresponding to the target data flow, and the outer message information stores the data flow code corresponding to the first user configuration information and the second user configuration information corresponding to the virtual switch;
  • the determination module 62 is coupled to the receiving module 61 and configured to obtain preset flag information, and select a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding;
  • the encapsulation module 63 is coupled to the determination module 62 and is configured to encapsulate the acquired IOAM information into a target IOAM encapsulation object, generate a first IOAM message, and forward the first IOAM message to a physical switch corresponding to a next-level forwarding node.
  • tunnel message information corresponding to the target data flow forwarded by the virtual switch is received, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores the first user configuration information corresponding to the target data flow, and the outer message information stores the data flow code corresponding to the first user configuration information and the second user configuration information corresponding to the virtual switch; the preset flag information is obtained, and based on the verification result of the flag information, the target IOAM encapsulation object is selected from the data flow code and the second user configuration information, wherein the flag information is used to characterize the validity of the data flow code; the obtained IOAM information is encapsulated into the target IOAM encapsulation object, a first IOAM message is generated, and the first IOAM message is forwarded to the physical switch corresponding to the next-level forwarding node, so as to solve the problem that the virtualized tunnel network in the related technology cannot realize the IOAM function, and
  • the IOAM encapsulation implementation device of the virtualized tunnel network before receiving the tunnel message information corresponding to the target data flow forwarded by the virtual switch, the IOAM encapsulation implementation device of the virtualized tunnel network receives the IOAM encapsulation instruction and flag information issued by the preset analyzer according to the preset network configuration protocol.
  • the network configuration protocol includes the Netconf protocol.
  • the determination module 62 is further used to determine a parameter value of the flag information and to determine whether the parameter value is a preset valid value, wherein the preset valid value is used to characterize that the value of the data stream encoding matches the differential services code point DSCP value in the outer message information, and the data stream encoding is generated by a preset analyzer performing operations on the multi-target information corresponding to the first user configuration information according to a preset operation algorithm; when it is determined that the parameter value is a preset valid value, the data stream encoding is determined as the target IOAM encapsulation object; when it is determined that the parameter value is not a preset valid value, the second user configuration information is used as the target IOAM encapsulation object.
  • FIG. 7 is a schematic diagram of the structure of another device for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure.
  • the device for implementing IOAM encapsulation of a virtualized tunnel network provided in this embodiment is applied to an intermediate physical switch, and the device includes:
  • the receiving module 71 is configured to receive a second IOAM message forwarded by a physical switch at a previous stage, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information;
  • the adding module 72 is coupled to the receiving module 71, and is configured to obtain the IOAM information collected by the node, add the IOAM information to the first IOAM encapsulation information, generate a corresponding third IOAM message, and forward the third IOAM message to the physical switch corresponding to the next-level forwarding node.
  • a second IOAM message forwarded by a physical switch at the previous level is received, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information; the IOAM information collected by this node is obtained, and the IOAM information is added to the first IOAM encapsulation information to generate a corresponding third IOAM message, and the third IOAM message is forwarded to the physical switch corresponding to the next-level forwarding node, thereby solving the problem that the virtualized tunnel network in the related technology cannot realize the IOAM function, and achieving the beneficial effect of improving the IOAM for network fault location and processing capabilities.
  • FIG8 is a schematic diagram of the structure of another device for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure.
  • the device for implementing IOAM encapsulation of a virtualized tunnel network provided in this embodiment is applied to a last physical switch, and the device includes:
  • the acquisition module 81 is configured to acquire, after receiving the IOAM decapsulation instruction sent by the preset analyzer, the fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information;
  • the decapsulation module 82 is coupled to the acquisition module 81 and is configured to remove the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forward the obtained tunnel message information to the virtual switch located at the next-level node.
  • the fourth IOAM message forwarded by the physical switch corresponding to the previous level forwarding node is obtained, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information; the second IOAM encapsulation information is removed from the outer layer message corresponding to the fourth IOAM message, and the obtained tunnel message information is forwarded to the virtual switch located at the next level node, thereby realizing IOAM decapsulation of the virtualized tunnel network, solving the problem that the virtualized tunnel network cannot realize the IOAM function in the related technology, and achieving the beneficial effect of improving the IOAM for network fault location and processing capabilities.
  • FIG. 9 is a schematic diagram of the structure of a physical switch provided in an embodiment of the present disclosure.
  • the present disclosure embodiment provides A physical switch is provided, including a processor 91, a communication interface 92, a memory 93 and a communication bus 94, wherein the processor 91, the communication interface 92 and the memory 93 communicate with each other through the communication bus 94.
  • a memory 93 configured to store computer programs
  • the processor 91 is configured to implement the method steps in FIG. 1 , FIG. 2 and FIG. 3 when executing the program stored in the memory 93 .
  • the processor 91 in the physical switch implements the method steps in Figures 1, 2 and 3, and the technical effects brought about are consistent with the technical effects of the implementation method of IOAM encapsulation of the virtualized tunnel network in Figures 1, 2 and 3 executed in the above-mentioned embodiment, and will not be repeated here.
  • the communication bus mentioned in the above base station can be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus.
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the communication bus can be divided into an address bus, a data bus, a control bus, etc. For ease of representation, only one thick line is used in FIG9, but it does not mean that there is only one bus or one type of bus.
  • the communication interface is used for communication between the above terminal and other devices.
  • the memory may include a random access memory (RAM) or a non-volatile memory, such as at least one disk storage.
  • the memory may also be at least one storage device located away from the aforementioned processor.
  • processors can be general-purpose processors, including central processing units (CPU), network processors (NP), etc.; they can also be digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • CPU central processing units
  • NP network processors
  • DSP digital signal processors
  • ASIC application specific integrated circuits
  • FPGA field programmable gate arrays
  • the embodiments of the present disclosure also provide a computer-readable storage medium having a computer program stored thereon.
  • the computer program is executed by a processor, the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as provided in any of the aforementioned method embodiments are implemented.
  • a computer program product including instructions is also provided, which, when executed on a computer, enables the computer to execute the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in any of the above embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Embodiments of the present disclosure relate to an implementation method and apparatus for IOAM encapsulation of a virtualized tunnel network. The method comprises: receiving tunnel packet information corresponding to a target data stream forwarded by a virtual switch, wherein the tunnel packet information comprises inner packet information and outer packet information, the inner packet information stores first user configuration information corresponding to the target data stream, and the outer packet information stores a data stream code corresponding to the first user configuration information and second user configuration information corresponding to the virtual switch; obtaining preset mark information, and selecting a target IOAM encapsulation object from the data stream code and the second user configuration information on the basis of a verification result for the mark information; and encapsulating the obtained IOAM information to the target IOAM encapsulation object, generating a first IOAM packet, and forwarding the first IOAM packet to a physical switch corresponding to the next-level forwarding node.

Description

虚拟化隧道网络的IOAM封装的实现方法及装置Method and device for implementing IOAM encapsulation of virtualized tunnel network 技术领域Technical Field
本公开实施例涉及通信技术领域,尤其涉及一种虚拟化隧道网络的IOAM封装的实现方法及装置。The embodiments of the present disclosure relate to the field of communication technology, and in particular to a method and device for implementing IOAM encapsulation of a virtualized tunnel network.
背景技术Background technique
在相关技术中,采用虚机、虚拟网卡、虚拟交换机、物理网口、物理交换机构建对应的网络,交换机是网络通信业务交互的桥梁,交换机的稳定才能确保上层业务交互的可靠性,若交换机某个端口出故障,就会导致虚机之间的业务无法互通,对业务的影响较大。In related technologies, virtual machines, virtual network cards, virtual switches, physical network ports, and physical switches are used to build the corresponding network. The switch is a bridge for network communication service interaction. The stability of the switch can ensure the reliability of upper-layer service interaction. If a port of the switch fails, the services between virtual machines will be unable to communicate, which will have a great impact on the business.
相关技术中,带内操作管理和维护(In-band Operation,Administration,and Maintenance,简称IOAM)技术可以实现对交换机网络运行状态的实时感知和监控,正在被广泛使用;在相关技术的虚拟化网络中,采用虚拟交换机和物理交换机作为对应的转发节点对数据流进行转发,但转发节点与转发节点之间采用隧道网络进行通信,并且虚拟化网络中的虚拟交换机只支持隧道报文封装,不支持IOAM封装,在虚拟交换机执行隧道报文封装后,造成后续物理交换机进行IOAM封装也不能生效,进而使的虚拟化网络无法实现IOAM功能,同时,虚拟化网络中的物料交换机只支持对外层报文进行解析,无法对内层报文进行解析,而虚拟化网络通信中,各转发节点所转发的有效信息(例如:源MAC地址、目的MAC地址、源ip地址、目标ip地址、协议号)是在内层报文,因物理交换机无法对内层报文进行IOAM封装以及无法解析内层报文,亦使的虚拟化网络无法实现IOAM功能。In the related technologies, in-band operation, administration, and maintenance (IOAM) technology can realize real-time perception and monitoring of the operating status of the switch network and is being widely used. In the virtualized network of the related technologies, virtual switches and physical switches are used as corresponding forwarding nodes to forward data streams, but the forwarding nodes communicate with each other using a tunnel network, and the virtual switches in the virtualized network only support tunnel message encapsulation but not IOAM encapsulation. After the virtual switch performs tunnel message encapsulation, the subsequent IOAM encapsulation of the physical switch cannot take effect, thereby making the virtualized network unable to realize the IOAM function. At the same time, the material switch in the virtualized network only supports parsing of the outer layer message but cannot parse the inner layer message. In the virtualized network communication, the valid information forwarded by each forwarding node (for example: source MAC address, destination MAC address, source IP address, destination IP address, protocol number) is in the inner layer message. Since the physical switch cannot perform IOAM encapsulation and cannot parse the inner layer message, the virtualized network cannot realize the IOAM function.
针对相关技术中虚拟化隧道网络无法实现IOAM功能的问题,尚缺少较佳技术方案。Regarding the problem that the virtualized tunnel network in the related technology cannot realize the IOAM function, there is still a lack of better technical solutions.
发明内容Summary of the invention
本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现方法、装置、物理交换机及存储介质,以至少解决相关技术中虚拟化隧道网络无法实现IOAM功能的问题。The embodiments of the present disclosure provide a method, device, physical switch and storage medium for implementing IOAM encapsulation of a virtualized tunnel network, so as to at least solve the problem in the related art that the virtualized tunnel network cannot implement the IOAM function.
第一方面,本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现方法,应用于首位物理交换机,包括:接收由虚拟交换机所转发的目标数据流对应的隧道报文信息,其中,所述隧道报文信息包括内层报文信息和外层报文信息,所述内层报文信息存储存与所述目标数据流所对应的第一用户配置信息,所述外层报文信息存储有与所述第一用户配置信息对应 的数据流编码和所述虚拟交换机对应的第二用户配置信息;获取预设的标志信息,基于对所述标志信息的校验结果,从所述数据流编码和所述第二用户配置信息中选取目标IOAM封装对象,其中,所述标志信息用于表征所述数据流编码的有效性;将获取的IOAM信息封装至所述目标IOAM封装对象,生成第一IOAM报文,并将所述第一IOAM报文转发至后一级转发节点所对应的物理交换机。In a first aspect, an embodiment of the present disclosure provides an implementation method of IOAM encapsulation of a virtualized tunnel network, which is applied to a first physical switch, comprising: receiving tunnel message information corresponding to a target data flow forwarded by a virtual switch, wherein the tunnel message information comprises inner message information and outer message information, wherein the inner message information stores first user configuration information corresponding to the target data flow, and the outer message information stores first user configuration information corresponding to the first user configuration information. The method comprises the steps of: obtaining a data stream encoding and second user configuration information corresponding to the virtual switch; obtaining preset flag information, and selecting a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding; encapsulating the obtained IOAM information into the target IOAM encapsulation object, generating a first IOAM message, and forwarding the first IOAM message to a physical switch corresponding to a next-level forwarding node.
第二方面,本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现装置,应用于首位物理交换机,包括:In a second aspect, an embodiment of the present disclosure provides a device for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to a first physical switch, including:
接收模块,设置为接收由虚拟交换机所转发的目标数据流对应的隧道报文信息,其中,所述隧道报文信息包括内层报文信息和外层报文信息,所述内层报文信息存储存与所述目标数据流所对应的第一用户配置信息,所述外层报文信息存储有与所述第一用户配置信息对应的数据流编码和所述虚拟交换机对应的第二用户配置信息;A receiving module, configured to receive tunnel message information corresponding to a target data flow forwarded by a virtual switch, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores first user configuration information corresponding to the target data flow, and the outer message information stores a data flow code corresponding to the first user configuration information and second user configuration information corresponding to the virtual switch;
确定模块,设置为获取预设的标志信息,基于对所述标志信息的校验结果,从所述数据流编码和所述第二用户配置信息中选取目标IOAM封装对象,其中,所述标志信息用于表征所述数据流编码的有效性;a determination module, configured to obtain preset flag information, and select a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding;
封装模块,设置为将获取的IOAM信息封装至所述目标IOAM封装对象,生成第一IOAM报文,并将所述第一IOAM报文转发至后一级转发节点所对应的物理交换机。The encapsulation module is configured to encapsulate the acquired IOAM information into the target IOAM encapsulation object, generate a first IOAM message, and forward the first IOAM message to a physical switch corresponding to a next-level forwarding node.
第三方面,本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现方法,应用于中间物理交换机,包括:接收前一级的物理交换机所转发的第二IOAM报文,其中,所述第二IOAM报文对应的外层报文中存储有第一IOAM封装信息;获取本节点所采集的IOAM信息,并将所述IOAM信息添加至所述第一IOAM封装信息中,生成对应的第三IOAM报文,并将所述第三IOAM报文转发至后一级转发节点所对应的物理交换机。In a third aspect, an embodiment of the present disclosure provides a method for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to an intermediate physical switch, including: receiving a second IOAM message forwarded by a physical switch at a previous level, wherein an outer message corresponding to the second IOAM message stores first IOAM encapsulation information; obtaining the IOAM information collected by this node, and adding the IOAM information to the first IOAM encapsulation information, generating a corresponding third IOAM message, and forwarding the third IOAM message to the physical switch corresponding to the forwarding node at the next level.
第四方面,本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现装置,应用于中间物理交换机,包括:In a fourth aspect, an embodiment of the present disclosure provides a device for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to an intermediate physical switch, including:
接收模块,设置为接收前一级的物理交换机所转发的第二IOAM报文,其中,所述第二IOAM报文对应的外层报文中存储有第一IOAM封装信息;A receiving module, configured to receive a second IOAM message forwarded by a physical switch at a previous level, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information;
添加模块,设置为获取本节点所采集的IOAM信息,并将所述IOAM信息添加至所述第一IOAM封装信息中,生成对应的第三IOAM报文,并将所述第三IOAM报文转发至后一级转发节点所对应的物理交换机。The adding module is configured to obtain the IOAM information collected by the node, add the IOAM information to the first IOAM encapsulation information, generate a corresponding third IOAM message, and forward the third IOAM message to the physical switch corresponding to the next-level forwarding node.
第五方面,本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现方法,应用于末 位物理交换机,包括:在接收到预设分析器所下发的IOAM解封装指令之后,获取由前一级转发节点对应的物理交换机所转发的第四IOAM报文,其中,所述第四IOAM报文对应的外层报文中存储有对应的第二IOAM封装信息;将所述第二IOAM封装信息从所述第四IOAM报文对应的外层报文中去除,并将得到的隧道报文信息转发至位于后一级节点的虚拟交换机。In a fifth aspect, the present disclosure provides a method for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to a terminal. The method comprises: after receiving an IOAM decapsulation instruction sent by a preset analyzer, obtaining a fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information; removing the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forwarding the obtained tunnel message information to the virtual switch located at the next-level node.
第六方面,本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现装置,应用于末位物理交换机,包括:In a sixth aspect, an embodiment of the present disclosure provides a device for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to a last-position physical switch, including:
获取模块,设置为在接收到预设分析器所下发的IOAM解封装指令之后,获取由前一级转发节点对应的物理交换机所转发的第四IOAM报文,其中,所述第四IOAM报文对应的外层报文中存储有对应的第二IOAM封装信息;an acquisition module, configured to acquire, after receiving the IOAM decapsulation instruction issued by the preset analyzer, a fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information;
解封装模块,设置为将所述第二IOAM封装信息从所述第四IOAM报文对应的外层报文中去除,并将得到的隧道报文信息转发至位于后一级节点的虚拟交换机a decapsulation module configured to remove the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forward the obtained tunnel message information to a virtual switch located at a subsequent node;
第七方面,提供了一种物理交换机,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;In a seventh aspect, a physical switch is provided, comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory communicate with each other via the communication bus;
存储器,设置为存放计算机程序;a memory arranged to store a computer program;
处理器,设置为执行存储器上所存放的程序时,实现第一方面、第三方面及第五方面任一项实施例所述的虚拟化隧道网络的IOAM封装的实现方法的步骤。The processor is configured to implement the steps of the method for implementing IOAM encapsulation of the virtualized tunnel network as described in any one of the embodiments of the first aspect, the third aspect and the fifth aspect when executing the program stored in the memory.
第八方面,提供了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如实现第一方面、第三方面及第五方面任一项实施例所述的虚拟化隧道网络的IOAM封装的实现方法的步骤。In an eighth aspect, a computer-readable storage medium is provided, on which a computer program is stored. When the computer program is executed by a processor, the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in any one of the embodiments of the first aspect, the third aspect and the fifth aspect are implemented.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开实施例的原理。The accompanying drawings herein are incorporated in and constitute a part of the specification, illustrate embodiments consistent with the present disclosure, and together with the description, serve to explain the principles of the embodiments of the present disclosure.
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required for use in the embodiments or the description of the prior art will be briefly introduced below. Obviously, for ordinary technicians in this field, other drawings can be obtained based on these drawings without paying any creative labor.
图1为本公开实施例提供的一种虚拟化隧道网络的IOAM封装的实现方法的流程示意图;FIG1 is a flow chart of a method for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure;
图2为本公开实施例提供的另一种虚拟化隧道网络的IOAM封装的实现方法的流程示意图; FIG2 is a flow chart of another method for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure;
图3为本公开实施例提供的再一种虚拟化隧道网络的IOAM封装的实现方法的流程示意图;FIG3 is a flow chart of another method for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure;
图4是本公开优选实施例的虚拟化隧道网络工作示意图;FIG4 is a schematic diagram of a virtualized tunnel network operation according to a preferred embodiment of the present disclosure;
图5是本公开优选实施例的虚拟化隧道网络工作时序图;FIG5 is a timing diagram of the operation of a virtualized tunnel network according to a preferred embodiment of the present disclosure;
图6为本公开实施例提供的一种虚拟化隧道网络的IOAM封装的实现装置的结构示意图;FIG6 is a schematic diagram of the structure of a device for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure;
图7是本公开实施例提供的另一种虚拟化隧道网络的IOAM封装的实现装置的结构示意图;7 is a schematic diagram of the structure of another device for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure;
图8是本公开实施例提供的再一种虚拟化隧道网络的IOAM封装的实现装置的结构示意图;8 is a schematic diagram of the structure of another device for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure;
图9是本公开实施例提供的一种物理交换机的结构示意图。FIG. 9 is a schematic diagram of the structure of a physical switch provided in an embodiment of the present disclosure.
具体实施方式Detailed ways
为使本公开实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开的一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本公开保护的范围。In order to make the purpose, technical solution and advantages of the embodiments of the present disclosure clearer, the technical solution in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments are part of the embodiments of the present disclosure, not all of the embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by ordinary technicians in this field without making creative work are within the scope of protection of the present disclosure.
在对本公开实施例中进行描述之前,对本公开实施例所涉及的相关技术名称进行说明如下:Before describing the embodiments of the present disclosure, the names of related technologies involved in the embodiments of the present disclosure are explained as follows:
带内操作管理和维护(In-band Operation,Administration,and Maintenance,简称IOAM),是业界新提出的一种数据通信网络操作管理维护(OAM)技术,该技术目前在业界的共同推动下处于快速发展阶段,且正在国际标准化组织互联网工程任务组(Internet Engineering Task Force,简称IETF)开展标准化的工作;IETF提出的IOAM,带内OAM随着数据报文一起发送,不需要额外的控制面报文发送OAM数据,带内OAM一般是在一个特定的域内部署。IOAM可以实现多种路径跟踪、路径验证、服务等级协议(Service-LevelAgreement,简称SLA)验证等复杂的OAM。In-band Operation, Administration, and Maintenance (IOAM) is a new data communication network operation, administration, and maintenance (OAM) technology proposed by the industry. The technology is currently in a rapid development stage under the joint promotion of the industry, and is being standardized by the Internet Engineering Task Force (IETF) of the International Organization for Standardization. In the IOAM proposed by IETF, in-band OAM is sent together with data packets, and no additional control plane packets are required to send OAM data. In-band OAM is generally deployed in a specific domain. IOAM can implement complex OAM such as multiple path tracking, path verification, and service level agreement (SLA) verification.
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行描述。The technical solutions in the embodiments of the present disclosure will be described below in conjunction with the drawings in the embodiments of the present disclosure.
图1为本公开实施例提供的虚拟化隧道网络的IOAM封装的实现方法的流程示意图。如图1所示,本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现方法,应用于首位物理交换机,该方法包括如下步骤: FIG1 is a flow chart of a method for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure. As shown in FIG1 , an embodiment of the present disclosure provides a method for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to a first physical switch, and the method includes the following steps:
步骤S101,接收由虚拟交换机所转发的目标数据流对应的隧道报文信息,其中,隧道报文信息包括内层报文信息和外层报文信息,内层报文信息存储有与目标数据流所对应的第一用户配置信息,外层报文信息存储有与第一用户配置信息对应的数据流编码和虚拟交换机对应的第二用户配置信息。Step S101, receiving tunnel message information corresponding to the target data flow forwarded by the virtual switch, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores first user configuration information corresponding to the target data flow, and the outer message information stores data flow coding corresponding to the first user configuration information and second user configuration information corresponding to the virtual switch.
在本实施例中,执行本公开实施例的IOAM封装方法的主体为虚拟化隧道网络中位于首位的物理交换机,在本实施例中的虚拟化隧道网络中,虚拟交换机和物理交换机共存,并分别作为对应的转发节点,同时,虚拟交换机和物理交换机均还与对IOAM信息进行统计及分析的分析器进行通信连接,该分析器能根据接收到的用户配置信息(对应第一用户配置信息)中的五元组信息,按照预设规则(例如:进行hash运算)生成数据流编码flowid,生成的数据流编码是与隧道报文的外层报文信息中的差分服务代码点(Differentiated Services Code Point,简称DSCP)的值匹配的,同时,分析器还生成表征flowid与DSCP的值匹配的标志信息(用FlowidMatchDscp表示);在本实施例中,分析器在生成flowid和对应的标志信息后,会下发该标志信息到首位物理交换机和位于首位物理交换机前一级节点的虚拟交换机;在本实施例中,分析器采用命令行方式将该标志信息存到虚拟交换机的数据库中;分析器还将flowid下发给对应的虚拟交换机,在对应的虚拟交换机接收到该标志信息后,则在封装隧道报文信息时,将接收到的flowid作为隧道报文信息的外层报文中的DSCP值,添加至外层报文中,以生成对应的隧道报文信息;对应的虚拟交换机在封装隧道报文信息后,将对应的隧道报文信息发送至首位物理交换机;在本实施例中,分析器还会向首位物理交换机下发进行IOAM封装的指令,首位物理交换机在接收到该指令和该标志信息后,会对接收到的隧道报文信息进行IOAM封装。In this embodiment, the subject that executes the IOAM encapsulation method of the disclosed embodiment is the physical switch located at the first position in the virtualized tunnel network. In the virtualized tunnel network in this embodiment, the virtual switch and the physical switch coexist and serve as corresponding forwarding nodes respectively. At the same time, the virtual switch and the physical switch are also connected to the analyzer for statistics and analysis of IOAM information for communication. The analyzer can generate a data flow code flowid according to the five-tuple information in the received user configuration information (corresponding to the first user configuration information) according to the preset rules (for example, performing hash operation). The generated data flow code matches the value of the Differentiated Services Code Point (DSCP) in the outer message information of the tunnel message. At the same time, the analyzer also generates flag information indicating that the flowid value matches the DSCP value (using FlowidMatchDscp table). ); in this embodiment, after the analyzer generates the flowid and the corresponding flag information, it will send the flag information to the first physical switch and the virtual switch located at the previous node of the first physical switch; in this embodiment, the analyzer uses a command line to store the flag information in the database of the virtual switch; the analyzer also sends the flowid to the corresponding virtual switch, and after the corresponding virtual switch receives the flag information, when encapsulating the tunnel message information, the received flowid is used as the DSCP value in the outer message of the tunnel message information, and is added to the outer message to generate the corresponding tunnel message information; after encapsulating the tunnel message information, the corresponding virtual switch sends the corresponding tunnel message information to the first physical switch; in this embodiment, the analyzer also sends an instruction to perform IOAM encapsulation to the first physical switch, and after receiving the instruction and the flag information, the first physical switch will perform IOAM encapsulation on the received tunnel message information.
在本实施例中,数据流编码是处于隧道报文信息的外层报文信息中的,同时,数据流编码还是对处于隧道报文信息以及后续完成IOAM封装后生成的IOAM报文的内层报文中的第一用户配置信息(对应为由源MAC地址、目的MAC地址、源ip地址、目标ip地址及协议号组成的五元组信息)的映射,进而通过内外层报文的映射,从而对转发的数据流以及虚拟化隧道网络的运行状态进行监测。In this embodiment, the data stream encoding is in the outer layer message information of the tunnel message information. At the same time, the data stream encoding is also a mapping of the first user configuration information (corresponding to a five-tuple information consisting of a source MAC address, a destination MAC address, a source IP address, a destination IP address and a protocol number) in the inner layer message of the tunnel message information and the IOAM message generated after the subsequent IOAM encapsulation is completed. Then, through the mapping of the inner and outer layer messages, the forwarded data flow and the operating status of the virtualized tunnel network are monitored.
在本实施例中,隧道报文信息及IOAM报文信息的外层报文也是包括对应的用户配置信息(也就是第二用户配置信息),该用户配置信息用于表征位于首位物理交换机前一级节点的虚拟交换机对应的配置信息(例如:源MAC地址、目的MAC地址、源ip地址、目标ip地址及协议号),但外层报文对应的用户配置信息并非用户需求监测的数据流对应的配置信息。 In this embodiment, the outer layer messages of the tunnel message information and the IOAM message information also include corresponding user configuration information (that is, the second user configuration information), which is used to characterize the configuration information corresponding to the virtual switch located at the previous level node of the first physical switch (for example: source MAC address, destination MAC address, source IP address, target IP address and protocol number), but the user configuration information corresponding to the outer layer message is not the configuration information corresponding to the data flow that the user needs to monitor.
步骤S102,获取预设的标志信息,基于对标志信息的校验结果,从数据流编码和第二用户配置信息中选取目标IOAM封装对象,其中,标志信息用于表征数据流编码的有效性。Step S102, obtaining preset flag information, and selecting a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding.
在本实施例中,首位物理交换接收到隧道封装后的隧道报文信息后,首先,读取存储的标志信息FlowidMatchDscp,并判断该FlowidMatchDscp的值,如果该FlowidMatchDscp的值为正确,直接解析隧道报文信息的外层报文信息,并根据外层报文信息中的ip层的dscp值进行IOAM封装,添加IOAM信息;如果该FlowidMatchDscp的值为错误,则直接对第二用户配置信息进行IOAM封装。In this embodiment, after the first physical switch receives the tunnel message information after tunnel encapsulation, it first reads the stored flag information FlowidMatchDscp and determines the value of the FlowidMatchDscp. If the value of the FlowidMatchDscp is correct, the outer message information of the tunnel message information is directly parsed, and IOAM encapsulation is performed according to the dscp value of the IP layer in the outer message information, and IOAM information is added; if the value of the FlowidMatchDscp is wrong, the second user configuration information is directly encapsulated with IOAM.
步骤S103,将获取的IOAM信息封装至目标IOAM封装对象,生成第一IOAM报文,并将第一IOAM报文转发至后一级转发节点所对应的物理交换机。Step S103: encapsulate the acquired IOAM information into a target IOAM encapsulation object, generate a first IOAM message, and forward the first IOAM message to a physical switch corresponding to a next-level forwarding node.
在本实施例中,首位物理交换机会采集或获取本转发节点对应的IOAM信息,该IOAM信息包括但不限于目标数据流的出入端口、转发时延、时间戳、队列深度信息、采集序列号入设备时间戳信息。In this embodiment, the first physical switch will collect or obtain the IOAM information corresponding to the forwarding node, which includes but is not limited to the input and output ports of the target data flow, forwarding delay, timestamp, queue depth information, and collection sequence number input device timestamp information.
在本实施例中,在完成IOAM信息封装及生成IOAM报文后,转发至位于下一级的物理交换机;在本实施例中,下一级转发节点的物理交换机可以是虚拟化隧道网络的中间物理交换机,也可以是虚拟化隧道网络中的末尾物理交换机;当下一级转发节点的物理交换机为中间物理交换机时,则执行添加本节点的IOAM信息,然后转发至其对应的下一级转发节点的物理交换机;当下一级转发节点的物理交换机为末尾物理交换机时,则执行IOAM解封装,去除首位交换机封装及添加的IOAM信息,并向下一级转发节点的虚拟交换机发送对应的报文。In this embodiment, after completing the IOAM information encapsulation and generating the IOAM message, it is forwarded to the physical switch at the next level; in this embodiment, the physical switch of the next-level forwarding node can be the middle physical switch of the virtualized tunnel network, or it can be the last physical switch in the virtualized tunnel network; when the physical switch of the next-level forwarding node is the middle physical switch, the IOAM information of this node is added, and then forwarded to the corresponding physical switch of the next-level forwarding node; when the physical switch of the next-level forwarding node is the last physical switch, IOAM decapsulation is performed, the IOAM information encapsulated and added by the first switch is removed, and the corresponding message is sent to the virtual switch of the next-level forwarding node.
通过上述步骤S101至步骤S103,采用接收由虚拟交换机所转发的目标数据流对应的隧道报文信息,其中,隧道报文信息包括内层报文信息和外层报文信息,内层报文信息存储有与目标数据流所对应的第一用户配置信息,外层报文信息存储有与第一用户配置信息对应的数据流编码和虚拟交换机对应的第二用户配置信息;获取预设的标志信息,基于对标志信息的校验结果,从数据流编码和第二用户配置信息中选取目标IOAM封装对象,其中,标志信息用于表征数据流编码的有效性;将获取的IOAM信息封装至目标IOAM封装对象,生成第一IOAM报文,并将第一IOAM报文转发至后一级转发节点所对应的物理交换机,解决相关技术中虚拟化隧道网络无法实现IOAM功能的问题,通过使用内外层报文映射方式在虚拟化隧道网络中实现IOAM封装,实现提升IOAM用于网络故障定位和处理能力的有益效果。Through the above steps S101 to S103, tunnel message information corresponding to the target data flow forwarded by the virtual switch is received, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores the first user configuration information corresponding to the target data flow, and the outer message information stores the data flow code corresponding to the first user configuration information and the second user configuration information corresponding to the virtual switch; the preset flag information is obtained, and based on the verification result of the flag information, the target IOAM encapsulation object is selected from the data flow code and the second user configuration information, wherein the flag information is used to characterize the validity of the data flow code; the obtained IOAM information is encapsulated into the target IOAM encapsulation object, a first IOAM message is generated, and the first IOAM message is forwarded to the physical switch corresponding to the next-level forwarding node, so as to solve the problem that the virtualized tunnel network cannot realize the IOAM function in the related art, and IOAM encapsulation is realized in the virtualized tunnel network by using the inner and outer layer message mapping method, so as to achieve the beneficial effect of improving the IOAM for network fault location and processing capabilities.
在其中一些实施例中,在接收由虚拟交换机所转发的目标数据流对应的隧道报文信息之前,还实施如下步骤:接收由预设分析器按预设的网络配置协议下发的IOAM封装指令和标志 信息。In some embodiments, before receiving the tunnel message information corresponding to the target data flow forwarded by the virtual switch, the following steps are further implemented: receiving the IOAM encapsulation instruction and the flag issued by the preset analyzer according to the preset network configuration protocol; information.
在本实施例中,网络配置协议包括但不限于Netconf协议;在本实施例中,分析器给首位物理交换机下发IOAM封装指令和标志信息FlowidMatchDscp,以使首位物理交换机通过判断标志信息是否为预设有效值,从而进行对应的IOAM封装。In this embodiment, the network configuration protocol includes but is not limited to the Netconf protocol; in this embodiment, the analyzer sends an IOAM encapsulation instruction and flag information FlowidMatchDscp to the first physical switch, so that the first physical switch performs corresponding IOAM encapsulation by determining whether the flag information is a preset valid value.
在其中一些实施例中,基于对标志信息的校验结果,从数据流编码和第二用户配置信息中选取目标IOAM封装对象,通过如下步骤实现:In some embodiments, based on the verification result of the flag information, the target IOAM encapsulation object is selected from the data stream encoding and the second user configuration information, which is implemented by the following steps:
步骤21、确定标志信息的参数值,并判断参数值是否为预设有效值,其中,预设有效值用于表征数据流编码的值与外层报文信息中的差分服务代码点DSCP值相匹配,数据流编码是预设分析器对第一用户配置信息对应的多元目标信息按预设运算算法进行运算所生成的。Step 21, determine the parameter value of the flag information, and determine whether the parameter value is a preset valid value, wherein the preset valid value is used to characterize that the value of the data stream coding matches the differential service code point DSCP value in the outer message information, and the data stream coding is generated by a preset analyzer performing calculations on the multi-target information corresponding to the first user configuration information according to a preset calculation algorithm.
步骤22、在判断到参数值为预设有效值的情况下,确定数据流编码为目标IOAM封装对象。Step 22: When it is determined that the parameter value is a preset valid value, the data stream is encoded as a target IOAM encapsulation object.
步骤23、在判断到参数值不为预设有效值的情况下,以第二用户配置信息作为目标IOAM封装对象。Step 23: When it is determined that the parameter value is not a preset valid value, the second user configuration information is used as the target IOAM encapsulation object.
在本实施例中,首位物理交换接收到隧道封装后的隧道报文信息后,首先,读取存储的标志信息FlowidMatchDscp的参数值,并判断该参数值是否为预设有效值(例如:true),如果该参数值为预设有效值,以数据流编码为目标IOAM封装对应,也就是直接解析隧道报文信息的外层报文信息,并根据外层报文信息中的ip层的dscp值进行IOAM封装,添加IOAM信息;如果该参数值不为预设有效值(例如:flase),则以第二用户配置信息作为目标IOAM封装对象,也就是直接对第二用户配置信息进行IOAM封装。In this embodiment, after the first physical switch receives the tunnel message information after tunnel encapsulation, it first reads the parameter value of the stored flag information FlowidMatchDscp, and determines whether the parameter value is a preset valid value (for example: true). If the parameter value is the preset valid value, the data stream encoding is used as the target IOAM encapsulation corresponding to the target, that is, the outer message information of the tunnel message information is directly parsed, and the IOAM encapsulation is performed according to the dscp value of the IP layer in the outer message information, and the IOAM information is added; if the parameter value is not a preset valid value (for example: flase), the second user configuration information is used as the target IOAM encapsulation object, that is, the second user configuration information is directly encapsulated with IOAM.
需要说明的是,当以第二用户配置信息作为目标IOAM封装对象时,虽然完成了IOAM封装,但并不能与目标数据流进行关联,从而使的上报的IOAM信息并不能正确反馈某个转发节点对应的网络状态,例如:当首位物理交换机对应的丢包为M,而当采用第二用户配置信息进行IOAM封装,分析器分析完成后,会得到首位物理交换机对应的丢包为N,如此,会造成对虚拟化隧道网络的错误监测及分析。It should be noted that when the second user configuration information is used as the target IOAM encapsulation object, although the IOAM encapsulation is completed, it cannot be associated with the target data flow, so that the reported IOAM information cannot correctly feedback the network status corresponding to a forwarding node. For example: when the packet loss corresponding to the first physical switch is M, and when the second user configuration information is used for IOAM encapsulation, after the analyzer completes the analysis, the packet loss corresponding to the first physical switch will be N. This will cause incorrect monitoring and analysis of the virtualized tunnel network.
通过上述步骤中的确定标志信息的参数值,并判断参数值是否为预设有效值;在判断到参数值为预设有效值的情况下,确定数据流编码为目标IOAM封装对象;在判断到参数值不为预设有效值的情况下,以第二用户配置信息作为目标IOAM封装对象,实现了内外层报文映射是否匹配的判断,提高IOAM封装的准确率,进而实现进一步提升IOAM用于网络故障定位和处理能力。By determining the parameter value of the flag information in the above steps, and judging whether the parameter value is a preset valid value; when judging that the parameter value is a preset valid value, determining that the data stream is encoded as a target IOAM encapsulation object; when judging that the parameter value is not a preset valid value, using the second user configuration information as the target IOAM encapsulation object, it is possible to judge whether the inner and outer layer message mappings match, thereby improving the accuracy of IOAM encapsulation, and further improving the IOAM's ability to locate and handle network faults.
图2为本公开实施例提供的另一种虚拟化隧道网络的IOAM封装的实现方法的流程示意 图。如图2所示,本公开实施例提供了一种虚拟化隧道网络的IOAM封装的实现方法,应用于中间物理交换机,该方法包括如下步骤:FIG. 2 is a flow chart of another method for implementing IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure. As shown in FIG. 2 , an embodiment of the present disclosure provides a method for implementing IOAM encapsulation of a virtualized tunnel network, which is applied to an intermediate physical switch. The method includes the following steps:
步骤S201、接收前一级的物理交换机所转发的第二IOAM报文,其中,第二IOAM报文对应的外层报文中存储有第一IOAM封装信息。Step S201: Receive a second IOAM message forwarded by a physical switch at a previous stage, wherein the outer message corresponding to the second IOAM message stores first IOAM encapsulation information.
步骤S202、获取本节点所采集的IOAM信息,并将IOAM信息添加至第一IOAM封装信息中,生成对应的第三IOAM报文,并将第三IOAM报文转发至后一级转发节点所对应的物理交换机。Step S202: Acquire the IOAM information collected by the node, add the IOAM information to the first IOAM encapsulation information, generate a corresponding third IOAM message, and forward the third IOAM message to the physical switch corresponding to the next-level forwarding node.
在本实施例中,前一级的物理交换机可以是首位物理交换机,也可以是中间级物理交换机;当为首位物理交换机时,则接收到的第二IOAM报文为首位物理交换机进行IOAM封装并添加IOAM信息所生成的IOAM报文,当为中间级物理交换机时,则接收到的第二IOAM报文为在首位物理交换机IOAM封装及添加IOAM信息生成的IOAM报文的基础上,添加该前一级的物理交换机的IOAM信息后的IOAM报文。In this embodiment, the previous-level physical switch can be a first-level physical switch or an intermediate-level physical switch; when it is the first-level physical switch, the second IOAM message received is an IOAM message generated by IOAM encapsulation and adding IOAM information to the first-level physical switch; when it is an intermediate-level physical switch, the second IOAM message received is an IOAM message generated by IOAM encapsulation and adding IOAM information to the first-level physical switch, with the IOAM information of the previous-level physical switch added to it.
在本实施例中,中间物理交换机在接收到对应的IOAM报文后,将采集的IOAM信息进行添加,进而生成对应的IOAM报文。In this embodiment, after receiving the corresponding IOAM message, the intermediate physical switch adds the collected IOAM information to generate the corresponding IOAM message.
在本实施例中,中间物理交换机在接收到前一级的物理交换机所转发的对应的报文后,会判断对应的报文中是否有对应的IOAM封装,也就是确定是否具有对应的IOAM信息,如果有,则添加自身节点对应的IOAM信息,否则,则确定虚拟化隧道网络为执行IOAM功能。In this embodiment, after receiving the corresponding message forwarded by the physical switch at the previous level, the intermediate physical switch will determine whether there is a corresponding IOAM encapsulation in the corresponding message, that is, determine whether there is corresponding IOAM information. If so, the IOAM information corresponding to its own node is added. Otherwise, the virtualized tunnel network is determined to perform the IOAM function.
通过上述步骤S201至步骤S202,采用接收前一级的物理交换机所转发的第二IOAM报文,其中,第二IOAM报文对应的外层报文中存储有第一IOAM封装信息;获取本节点所采集的IOAM信息,并将IOAM信息添加至第一IOAM封装信息中,生成对应的第三IOAM报文,并将第三IOAM报文转发至后一级转发节点所对应的物理交换机,解决相关技术中虚拟化隧道网络无法实现IOAM功能的问题,实现提升IOAM用于网络故障定位和处理能力的有益效果。Through the above steps S201 to S202, the second IOAM message forwarded by the physical switch of the previous level is received, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information; the IOAM information collected by the current node is obtained, and the IOAM information is added to the first IOAM encapsulation information, a corresponding third IOAM message is generated, and the third IOAM message is forwarded to the physical switch corresponding to the forwarding node of the next level, so as to solve the problem that the virtualized tunnel network in the related technology cannot realize the IOAM function, and achieve the beneficial effect of improving the IOAM for network fault location and processing capabilities.
图3为本公开实施例提供的再一种虚拟化隧道网络的IOAM封装的实现方法的流程示意图。如图3所示,本公开实施例提供了虚拟化隧道网络的IOAM封装的实现方法,应用于末位物理交换机,该方法包括如下步骤:FIG3 is a flow chart of another implementation method of IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure. As shown in FIG3, an implementation method of IOAM encapsulation of a virtualized tunnel network provided by an embodiment of the present disclosure is applied to the last physical switch, and the method includes the following steps:
步骤S301、在接收到预设分析器所下发的IOAM解封装指令之后,获取由前一级转发节点对应的物理交换机所转发的第四IOAM报文,其中,第四IOAM报文对应的外层报文中存储有对应的第二IOAM封装信息。Step S301: after receiving the IOAM decapsulation instruction sent by the preset analyzer, obtain the fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information.
步骤S302、将第二IOAM封装信息从第四IOAM报文对应的外层报文中去除,并将得到的隧道报文信息转发至位于后一级节点的虚拟交换机。 Step S302: remove the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forward the obtained tunnel message information to the virtual switch located at the next-level node.
在本实施例中,前一级转发节点对应的物理交换机可以是首位物理交换机,也可以是中间物理交换机;在本实施例中,末位物理交换机执行IOAM解封装之前,分析器会向其下发IOAM解封装指令,例如:通过netconf配置方式,下发该IOAM解封装指令;在本实施例中,末位物理交换接收第四IOAM报文以后进行IOAM解封装,去除首位物理交换机或中间物理交换机添加的IOAM信息,并向后一级节点的虚拟交换机发送IOAM解封装后生成的隧道报文信息。In this embodiment, the physical switch corresponding to the previous-level forwarding node can be the first physical switch or the middle physical switch; in this embodiment, before the last physical switch performs IOAM decapsulation, the analyzer will send an IOAM decapsulation instruction to it, for example: through the netconf configuration method, send the IOAM decapsulation instruction; in this embodiment, the last physical switch performs IOAM decapsulation after receiving the fourth IOAM message, removes the IOAM information added by the first physical switch or the middle physical switch, and sends the tunnel message information generated after IOAM decapsulation to the virtual switch of the next-level node.
通过上述步骤S301至步骤S302,采用在接收到预设分析器所下发的IOAM解封装指令之后,获取由前一级转发节点对应的物理交换机所转发的第四IOAM报文,其中,第四IOAM报文对应的外层报文中存储有对应的第二IOAM封装信息;将第二IOAM封装信息从第四IOAM报文对应的外层报文中去除,并将得到的隧道报文信息转发至位于后一级节点的虚拟交换机,实现了虚拟化隧道网络的IOAM解封装,解决相关技术中虚拟化隧道网络无法实现IOAM功能的问题,实现提升IOAM用于网络故障定位和处理能力的有益效果。Through the above steps S301 to S302, after receiving the IOAM decapsulation instruction issued by the preset analyzer, the fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node is obtained, wherein the outer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information; the second IOAM encapsulation information is removed from the outer message corresponding to the fourth IOAM message, and the obtained tunnel message information is forwarded to the virtual switch located at the next-level node, thereby realizing IOAM decapsulation of the virtualized tunnel network, solving the problem that the virtualized tunnel network cannot realize the IOAM function in the related technology, and achieving the beneficial effect of improving the IOAM for network fault location and processing capabilities.
图4是本公开优选实施例的虚拟化隧道网络工作示意图;图5是本公开优选实施例的虚拟化隧道网络工作时序图,参考图4至图5,以下对本公开优选实施例的虚拟化隧道网络实现IOAM封装中各网元所执行的操作说明如下:FIG4 is a schematic diagram of the operation of the virtualized tunnel network in the preferred embodiment of the present disclosure; FIG5 is a timing diagram of the operation of the virtualized tunnel network in the preferred embodiment of the present disclosure. With reference to FIG4 to FIG5, the operations performed by each network element in the IOAM encapsulation of the virtualized tunnel network in the preferred embodiment of the present disclosure are described as follows:
在本公开优选实施例的虚拟化隧道网络中,虚拟交换机和物理交换机共存,同时还包括分析器analyzer,其中,analyzer接收用户配置信息,根据用户配置信息中五元组信息(参考图4中的原始信息对应的MAC、IP、tcp/udp、payload)按照一定规则生成flowid,该flowid需要和dscp值匹配;analyzer下发flowid和dscp匹配的标志信息到虚拟交换机和首位物理交换及;虚拟交换机获取flowid和dscp匹配的标志信息,将对应flowid作为dscp值添加到隧道报文信息的外层报文信息中,完成隧道报文封装后发送到首位物理交换机;首位物理交换机根据外层报文信息中dscp值(参考图4中的隧道报文封装对应的IP)进行IOAM封装;中间物理交换及负责添加本节点的IOAM信息并转发,末位物理交换机进行IOAM解封装,;首位物理交换机、中间物理交换机及末位物理交换机还定时推送IOAM采集信息到analyzer。In the virtualized tunnel network of the preferred embodiment of the present disclosure, the virtual switch and the physical switch coexist, and also include an analyzer, wherein the analyzer receives user configuration information, generates a flowid according to a certain rule based on the five-tuple information in the user configuration information (refer to the MAC, IP, TCP/UDP, and payload corresponding to the original information in FIG4 ), and the flowid needs to match the dscp value; the analyzer sends the flowid and dscp matching flag information to the virtual switch and the first physical switch; the virtual switch obtains the flowid and dscp matching flag information, adds the corresponding flowid as the dscp value to the outer message information of the tunnel message information, completes the tunnel message encapsulation and sends it to the first physical switch; the first physical switch performs IOAM encapsulation according to the dscp value in the outer message information (refer to the IP corresponding to the tunnel message encapsulation in FIG4 ); the intermediate physical switch is responsible for adding the IOAM information of the node and forwarding it, and the last physical switch performs IOAM decapsulation; the first physical switch, the intermediate physical switch, and the last physical switch also regularly push IOAM collection information to the analyzer.
参考图4至图5,以下对本公开优选实施例的虚拟化隧道网络实现IOAM封装的实现过程说明如下:With reference to FIG. 4 and FIG. 5 , the implementation process of implementing IOAM encapsulation in a virtualized tunnel network according to a preferred embodiment of the present disclosure is described as follows:
步骤1、analyzer接收用户输入的配置信息,根据五元组信息mac地址、ip地址、协议号,通过hash算法生成满足dscp范围的flowid值,保证同时存在的flowid唯一。Step 1. Analyzer receives the configuration information entered by the user, and generates a flowid value that meets the dscp range through a hash algorithm based on the five-tuple information mac address, ip address, and protocol number, ensuring that the flowids that exist at the same time are unique.
步骤2、analyzer定义标志信息FlowidMatchDscp,analyzer下发标志信息FlowidMatchDscp到虚机交换机,analyzer给首位物理交换机下发IOAM封装和标志信息 FlowidMatchDscp,analyzer给末位物理交换机下发IOAM解封装。Step 2: Analyzer defines the flag information FlowidMatchDscp, and the analyzer sends the flag information FlowidMatchDscp to the virtual machine switch. The analyzer sends the IOAM encapsulation and flag information to the first physical switch. FlowidMatchDscp, analyzer sends IOAM decapsulation to the last physical switch.
在本实施例中,analyzer通过netconf进行下发IOAM封装指令以及下发标志信息FlowidMatchDscpanalyze;在本实施例中,如果下发标志信息FlowidMatchDscp的值为true,则代表目标数据流对应的flowid和dscp值匹配。In this embodiment, the analyzer sends the IOAM encapsulation instruction and the flag information FlowidMatchDscpanalyze through netconf; in this embodiment, if the value of the sent flag information FlowidMatchDscp is true, it means that the flowid and dscp values corresponding to the target data flow match.
步骤3、当虚拟交换机接收到报文,需要进行隧道报文封装。Step 3: When the virtual switch receives the message, it needs to perform tunnel message encapsulation.
在本实施例中,虚拟交换机首先读取存储的标志信息FlowidMatchDscp,判断该标志信息FlowidMatchDscp的值,如果为true,在封装的时候将之前隧道报文中的flowid值作为dscp值添加隧道报文外层的ip层,如果为false,则不需要此操作。In this embodiment, the virtual switch first reads the stored flag information FlowidMatchDscp and determines the value of the flag information FlowidMatchDscp. If it is true, the flowid value in the previous tunnel message is added as the dscp value to the outer IP layer of the tunnel message during encapsulation. If it is false, this operation is not required.
步骤4、首位物理交换接收到隧道封装后的隧道报文信息,首先,读取存储的标志信息FlowidMatchDscp,判断该标志信息FlowidMatchDscp的值,如果为true,直接解析隧道报文信息的外层报文信息,根据ip层的dscp值进行IOAM封装,添加IOAM信息;如果为false,则直接对隧道报文信息的外层报文信息的五元组信息进行IOAM封装。Step 4. The first physical switch receives the tunnel message information after tunnel encapsulation. First, it reads the stored flag information FlowidMatchDscp and determines the value of the flag information FlowidMatchDscp. If it is true, it directly parses the outer message information of the tunnel message information, performs IOAM encapsulation according to the dscp value of the IP layer, and adds IOAM information; if it is false, it directly performs IOAM encapsulation on the five-tuple information of the outer message information of the tunnel message information.
步骤5、中间物理交换机负责对来自封装节点的IOAM报文,添加本节点的IOAM信息并转发。Step 5: The intermediate physical switch is responsible for adding the IOAM information of the local node to the IOAM message from the encapsulation node and forwarding it.
步骤6、末位物理交换接收对应的IOAM报文以后,进行IOAM解封装,去除首交换添加的IOAM信息,并向后面的虚拟交换机发送解封得到的隧道报文信息。Step 6: After receiving the corresponding IOAM message, the last physical switch performs IOAM decapsulation, removes the IOAM information added by the first switch, and sends the decapsulated tunnel message information to the subsequent virtual switch.
步骤7、虚拟交换机进行隧道报文解封装,去除隧道报文信息;Step 7: The virtual switch decapsulates the tunnel message and removes the tunnel message information;
步骤8、首位物理交换机、中间物理交换机及末位物理交换机按照周期上报IOAM采集信息。Step 8: The first physical switch, the middle physical switch, and the last physical switch report IOAM collection information periodically.
在本实施例中,IOAM采集信息包括数据流的出入端口、转发时延、时间戳、队列深度信息、采集序列号入设备时间戳。In this embodiment, the IOAM collection information includes the ingress and egress ports of the data flow, forwarding delay, timestamp, queue depth information, and the collection sequence number entry device timestamp.
步骤9、analyzer接收到上报的IOAM信息,解析处理。Step 9: The analyzer receives the reported IOAM information and performs analysis and processing.
本公开实施例中还提供了虚拟化隧道网络的IOAM封装的实现装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。以下所使用的术语“模块”、“单元”、“子单元”等可以实现预定功能的软件和/或硬件的组合。尽管在以下实施例中所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。The embodiments of the present disclosure also provide an implementation device for IOAM encapsulation of a virtualized tunnel network, which is used to implement the above embodiments and preferred implementation modes, and will not be repeated hereafter. The terms "module", "unit", "sub-unit", etc. used below may implement a combination of software and/or hardware for a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and conceivable.
图6为本公开实施例提供的一种虚拟化隧道网络的IOAM封装的实现装置的结构示意图,如图6所示,本实施例提供的虚拟化隧道网络的IOAM封装的实现装置,应用于首位物理交换机,该装置包括: FIG6 is a schematic diagram of the structure of a device for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure. As shown in FIG6 , the device for implementing IOAM encapsulation of a virtualized tunnel network provided in this embodiment is applied to a first physical switch, and the device includes:
接收模块61,设置为接收由虚拟交换机所转发的目标数据流对应的隧道报文信息,其中,隧道报文信息包括内层报文信息和外层报文信息,内层报文信息存储存与目标数据流所对应的第一用户配置信息,外层报文信息存储有与第一用户配置信息对应的数据流编码和虚拟交换机对应的第二用户配置信息;The receiving module 61 is configured to receive tunnel message information corresponding to the target data flow forwarded by the virtual switch, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores the first user configuration information corresponding to the target data flow, and the outer message information stores the data flow code corresponding to the first user configuration information and the second user configuration information corresponding to the virtual switch;
确定模块62,与接收模块61耦合连接,设置为获取预设的标志信息,基于对标志信息的校验结果,从数据流编码和第二用户配置信息中选取目标IOAM封装对象,其中,标志信息用于表征数据流编码的有效性;The determination module 62 is coupled to the receiving module 61 and configured to obtain preset flag information, and select a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding;
封装模块63,与确定模块62耦合连接,设置为将获取的IOAM信息封装至目标IOAM封装对象,生成第一IOAM报文,并将第一IOAM报文转发至后一级转发节点所对应的物理交换机。The encapsulation module 63 is coupled to the determination module 62 and is configured to encapsulate the acquired IOAM information into a target IOAM encapsulation object, generate a first IOAM message, and forward the first IOAM message to a physical switch corresponding to a next-level forwarding node.
通过本公开实施例中的虚拟化隧道网络的IOAM封装的实现装置,采用接收由虚拟交换机所转发的目标数据流对应的隧道报文信息,其中,隧道报文信息包括内层报文信息和外层报文信息,内层报文信息存储有与目标数据流所对应的第一用户配置信息,外层报文信息存储有与第一用户配置信息对应的数据流编码和虚拟交换机对应的第二用户配置信息;获取预设的标志信息,基于对标志信息的校验结果,从数据流编码和第二用户配置信息中选取目标IOAM封装对象,其中,标志信息用于表征数据流编码的有效性;将获取的IOAM信息封装至目标IOAM封装对象,生成第一IOAM报文,并将第一IOAM报文转发至后一级转发节点所对应的物理交换机,解决相关技术中虚拟化隧道网络无法实现IOAM功能的问题,通过使用内外层报文映射方式在虚拟化隧道网络中实现IOAM封装,实现提升IOAM用于网络故障定位和处理能力的有益效果。Through the implementation device of IOAM encapsulation of the virtualized tunnel network in the embodiment of the present disclosure, tunnel message information corresponding to the target data flow forwarded by the virtual switch is received, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores the first user configuration information corresponding to the target data flow, and the outer message information stores the data flow code corresponding to the first user configuration information and the second user configuration information corresponding to the virtual switch; the preset flag information is obtained, and based on the verification result of the flag information, the target IOAM encapsulation object is selected from the data flow code and the second user configuration information, wherein the flag information is used to characterize the validity of the data flow code; the obtained IOAM information is encapsulated into the target IOAM encapsulation object, a first IOAM message is generated, and the first IOAM message is forwarded to the physical switch corresponding to the next-level forwarding node, so as to solve the problem that the virtualized tunnel network in the related technology cannot realize the IOAM function, and IOAM encapsulation is realized in the virtualized tunnel network by using the inner and outer layer message mapping method, so as to achieve the beneficial effect of improving the IOAM for network fault location and processing capabilities.
在其中一些实施例中,在接收由虚拟交换机所转发的目标数据流对应的隧道报文信息之前,该虚拟化隧道网络的IOAM封装的实现装置接收由预设分析器按预设的网络配置协议下发的IOAM封装指令和标志信息。In some of the embodiments, before receiving the tunnel message information corresponding to the target data flow forwarded by the virtual switch, the IOAM encapsulation implementation device of the virtualized tunnel network receives the IOAM encapsulation instruction and flag information issued by the preset analyzer according to the preset network configuration protocol.
在其中一些实施例中,网络配置协议包括Netconf协议。In some of these embodiments, the network configuration protocol includes the Netconf protocol.
在其中一些实施例中,该确定模块62还用于确定标志信息的参数值,并判断参数值是否为预设有效值,其中,预设有效值用于表征数据流编码的值与外层报文信息中的差分服务代码点DSCP值相匹配,数据流编码是预设分析器对第一用户配置信息对应的多元目标信息按预设运算算法进行运算所生成的;在判断到参数值为预设有效值的情况下,确定数据流编码为目标IOAM封装对象;在判断到参数值不为预设有效值的情况下,以第二用户配置信息作为目标IOAM封装对象。 In some of the embodiments, the determination module 62 is further used to determine a parameter value of the flag information and to determine whether the parameter value is a preset valid value, wherein the preset valid value is used to characterize that the value of the data stream encoding matches the differential services code point DSCP value in the outer message information, and the data stream encoding is generated by a preset analyzer performing operations on the multi-target information corresponding to the first user configuration information according to a preset operation algorithm; when it is determined that the parameter value is a preset valid value, the data stream encoding is determined as the target IOAM encapsulation object; when it is determined that the parameter value is not a preset valid value, the second user configuration information is used as the target IOAM encapsulation object.
图7是本公开实施例提供的另一种虚拟化隧道网络的IOAM封装的实现装置的结构示意图,如图7所示,本实施例提供的虚拟化隧道网络的IOAM封装的实现装置,应用于中间物理交换机,该装置包括:FIG. 7 is a schematic diagram of the structure of another device for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure. As shown in FIG. 7 , the device for implementing IOAM encapsulation of a virtualized tunnel network provided in this embodiment is applied to an intermediate physical switch, and the device includes:
接收模块71,设置为接收前一级的物理交换机所转发的第二IOAM报文,其中,第二IOAM报文对应的外层报文中存储有第一IOAM封装信息;The receiving module 71 is configured to receive a second IOAM message forwarded by a physical switch at a previous stage, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information;
添加模块72,与接收模块71耦合连接,设置为获取本节点所采集的IOAM信息,并将IOAM信息添加至第一IOAM封装信息中,生成对应的第三IOAM报文,并将第三IOAM报文转发至后一级转发节点所对应的物理交换机。The adding module 72 is coupled to the receiving module 71, and is configured to obtain the IOAM information collected by the node, add the IOAM information to the first IOAM encapsulation information, generate a corresponding third IOAM message, and forward the third IOAM message to the physical switch corresponding to the next-level forwarding node.
通过本公开实施例中的虚拟化隧道网络的IOAM封装的实现装置,采用接收前一级的物理交换机所转发的第二IOAM报文,其中,第二IOAM报文对应的外层报文中存储有第一IOAM封装信息;获取本节点所采集的IOAM信息,并将IOAM信息添加至第一IOAM封装信息中,生成对应的第三IOAM报文,并将第三IOAM报文转发至后一级转发节点所对应的物理交换机,解决相关技术中虚拟化隧道网络无法实现IOAM功能的问题,实现提升IOAM用于网络故障定位和处理能力的有益效果。Through the implementation device of IOAM encapsulation of the virtualized tunnel network in the embodiment of the present disclosure, a second IOAM message forwarded by a physical switch at the previous level is received, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information; the IOAM information collected by this node is obtained, and the IOAM information is added to the first IOAM encapsulation information to generate a corresponding third IOAM message, and the third IOAM message is forwarded to the physical switch corresponding to the next-level forwarding node, thereby solving the problem that the virtualized tunnel network in the related technology cannot realize the IOAM function, and achieving the beneficial effect of improving the IOAM for network fault location and processing capabilities.
图8是本公开实施例提供的再一种虚拟化隧道网络的IOAM封装的实现装置的结构示意图,如图8所示,本实施例提供的虚拟化隧道网络的IOAM封装的实现装置,应用于末位物理交换机,该装置包括:FIG8 is a schematic diagram of the structure of another device for implementing IOAM encapsulation of a virtualized tunnel network provided in an embodiment of the present disclosure. As shown in FIG8 , the device for implementing IOAM encapsulation of a virtualized tunnel network provided in this embodiment is applied to a last physical switch, and the device includes:
获取模块81,设置为在接收到预设分析器所下发的IOAM解封装指令之后,获取由前一级转发节点对应的物理交换机所转发的第四IOAM报文,其中,第四IOAM报文对应的外层报文中存储有对应的第二IOAM封装信息;The acquisition module 81 is configured to acquire, after receiving the IOAM decapsulation instruction sent by the preset analyzer, the fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information;
解封装模块82,与获取模块81耦合连接,设置为将第二IOAM封装信息从第四IOAM报文对应的外层报文中去除,并将得到的隧道报文信息转发至位于后一级节点的虚拟交换机。The decapsulation module 82 is coupled to the acquisition module 81 and is configured to remove the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forward the obtained tunnel message information to the virtual switch located at the next-level node.
通过本公开实施例中的虚拟化隧道网络的IOAM封装的实现装置,采用在接收到预设分析器所下发的IOAM解封装指令之后,获取由前一级转发节点对应的物理交换机所转发的第四IOAM报文,其中,第四IOAM报文对应的外层报文中存储有对应的第二IOAM封装信息;将第二IOAM封装信息从第四IOAM报文对应的外层报文中去除,并将得到的隧道报文信息转发至位于后一级节点的虚拟交换机,实现了虚拟化隧道网络的IOAM解封装,解决相关技术中虚拟化隧道网络无法实现IOAM功能的问题,实现提升IOAM用于网络故障定位和处理能力的有益效果。Through the implementation device of IOAM encapsulation of the virtualized tunnel network in the embodiment of the present invention, after receiving the IOAM decapsulation instruction issued by the preset analyzer, the fourth IOAM message forwarded by the physical switch corresponding to the previous level forwarding node is obtained, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information; the second IOAM encapsulation information is removed from the outer layer message corresponding to the fourth IOAM message, and the obtained tunnel message information is forwarded to the virtual switch located at the next level node, thereby realizing IOAM decapsulation of the virtualized tunnel network, solving the problem that the virtualized tunnel network cannot realize the IOAM function in the related technology, and achieving the beneficial effect of improving the IOAM for network fault location and processing capabilities.
图9是本公开实施例提供的一种物理交换机的结构示意图,如图9所示,本公开实施例提 供了一种物理交换机,包括处理器91、通信接口92、存储器93和通信总线94,其中,处理器91,通信接口92,存储器93通过通信总线94完成相互间的通信,FIG. 9 is a schematic diagram of the structure of a physical switch provided in an embodiment of the present disclosure. As shown in FIG. 9 , the present disclosure embodiment provides A physical switch is provided, including a processor 91, a communication interface 92, a memory 93 and a communication bus 94, wherein the processor 91, the communication interface 92 and the memory 93 communicate with each other through the communication bus 94.
存储器93,设置为存放计算机程序;A memory 93, configured to store computer programs;
处理器91,设置为执行存储器93上所存放的程序时,实现图1、图2及图3中的方法步骤。The processor 91 is configured to implement the method steps in FIG. 1 , FIG. 2 and FIG. 3 when executing the program stored in the memory 93 .
该物理交换机中的处理器91实现图1、图2及图3中的方法步骤,所带来的技术效果与上述实施例执行图1、图2及图3中的虚拟化隧道网络的IOAM封装的实现方法的技术效果一致,在此不再赘述。The processor 91 in the physical switch implements the method steps in Figures 1, 2 and 3, and the technical effects brought about are consistent with the technical effects of the implementation method of IOAM encapsulation of the virtualized tunnel network in Figures 1, 2 and 3 executed in the above-mentioned embodiment, and will not be repeated here.
上述基站提到的通信总线可以是外设部件互连标准(Peripheral Component Interconnect,简称PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,简称EISA)总线等。该通信总线可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The communication bus mentioned in the above base station can be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The communication bus can be divided into an address bus, a data bus, a control bus, etc. For ease of representation, only one thick line is used in FIG9, but it does not mean that there is only one bus or one type of bus.
通信接口用于上述终端与其他设备之间的通信。The communication interface is used for communication between the above terminal and other devices.
存储器可以包括随机存取存储器(Random Access Memory,简称RAM),也可以包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。可选的,存储器还可以是至少一个位于远离前述处理器的存储装置。The memory may include a random access memory (RAM) or a non-volatile memory, such as at least one disk storage. Optionally, the memory may also be at least one storage device located away from the aforementioned processor.
上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,简称CPU)、网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(Digital Signal Processing,简称DSP)、专用集成电路(Application Specific Integrated Circuit,简称ASIC)、现场可编程门阵列(Field-Programmable Gate Array,简称FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。The above-mentioned processors can be general-purpose processors, including central processing units (CPU), network processors (NP), etc.; they can also be digital signal processors (DSP), application specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
本公开实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如前述任意一个方法实施例提供的虚拟化隧道网络的IOAM封装的实现方法的步骤。The embodiments of the present disclosure also provide a computer-readable storage medium having a computer program stored thereon. When the computer program is executed by a processor, the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as provided in any of the aforementioned method embodiments are implemented.
在本公开提供的又一实施例中,还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述实施例中任一所述的虚拟化隧道网络的IOAM封装的实现方法的步骤。In another embodiment provided by the present disclosure, a computer program product including instructions is also provided, which, when executed on a computer, enables the computer to execute the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in any of the above embodiments.
需要说明的是,在本文中,诸如“第一”和“第二”等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任 何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个......”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。It should be noted that, in this article, relational terms such as "first" and "second" are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply that there is any relationship between these entities or operations. In addition, the terms "comprises", "comprising" or any other variation thereof are intended to cover non-exclusive inclusion, so that a process, method, article or apparatus comprising a series of elements includes not only those elements, but also other elements not explicitly listed, or elements inherent to such process, method, article or apparatus. In the absence of further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising the element.
以上所述仅是本公开的具体实施方式,使本领域技术人员能够理解或实现本公开实施例。对这些实施例的多种修改对本领域的技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本公开实施例的精神或范围的情况下,在其它实施例中实现。因此,本公开将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。 The above description is only a specific implementation of the present disclosure, so that those skilled in the art can understand or implement the embodiments of the present disclosure. Various modifications to these embodiments will be apparent to those skilled in the art, and the general principles defined herein can be implemented in other embodiments without departing from the spirit or scope of the embodiments of the present disclosure. Therefore, the present disclosure will not be limited to the embodiments shown herein, but will conform to the widest scope consistent with the principles and novel features disclosed herein.

Claims (12)

  1. 一种虚拟化隧道网络的带内操作管理维护IOAM封装的实现方法,应用于首位物理交换机,包括:A method for implementing in-band operation management and maintenance (IOAM) encapsulation of a virtualized tunnel network, applied to a first-tier physical switch, comprising:
    接收由虚拟交换机所转发的目标数据流对应的隧道报文信息,其中,所述隧道报文信息包括内层报文信息和外层报文信息,所述内层报文信息存储有与所述目标数据流所对应的第一用户配置信息,所述外层报文信息存储有与所述第一用户配置信息对应的数据流编码和所述虚拟交换机对应的第二用户配置信息;Receive tunnel message information corresponding to a target data flow forwarded by a virtual switch, wherein the tunnel message information includes inner message information and outer message information, the inner message information stores first user configuration information corresponding to the target data flow, and the outer message information stores a data flow code corresponding to the first user configuration information and second user configuration information corresponding to the virtual switch;
    获取预设的标志信息,基于对所述标志信息的校验结果,从所述数据流编码和所述第二用户配置信息中选取目标IOAM封装对象,其中,所述标志信息用于表征所述数据流编码的有效性;Acquire preset flag information, and select a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding;
    将获取的IOAM信息封装至所述目标IOAM封装对象,生成第一IOAM报文,并将所述第一IOAM报文转发至后一级转发节点所对应的物理交换机。The obtained IOAM information is encapsulated into the target IOAM encapsulation object, a first IOAM message is generated, and the first IOAM message is forwarded to a physical switch corresponding to a next-level forwarding node.
  2. 根据权利要求1所述的实现方法,其中,在接收由虚拟交换机所转发的目标数据流对应的隧道报文信息之前,所述实现方法还包括:接收由预设分析器按预设的网络配置协议下发的IOAM封装指令和所述标志信息。According to the implementation method of claim 1, before receiving the tunnel message information corresponding to the target data flow forwarded by the virtual switch, the implementation method also includes: receiving the IOAM encapsulation instruction and the flag information issued by the preset analyzer according to the preset network configuration protocol.
  3. 根据权利要求2所述的实现方法,其中,所述网络配置协议包括Netconf协议。The implementation method according to claim 2, wherein the network configuration protocol comprises the Netconf protocol.
  4. 根据权利要求2所述的实现方法,其中,基于对所述标志信息的校验结果,从所述数据流编码和所述第二用户配置信息中选取目标IOAM封装对象,包括:The implementation method according to claim 2, wherein, based on the verification result of the flag information, selecting the target IOAM encapsulation object from the data stream encoding and the second user configuration information comprises:
    确定所述标志信息的参数值,并判断所述参数值是否为预设有效值,其中,所述预设有效值用于表征所述数据流编码的值与所述外层报文信息中的差分服务代码点DSCP值相匹配,所述数据流编码是所述预设分析器对所述第一用户配置信息对应的多元目标信息按预设运算算法进行运算所生成的;determining a parameter value of the flag information, and judging whether the parameter value is a preset valid value, wherein the preset valid value is used to indicate that the value of the data stream code matches the differential service code point DSCP value in the outer message information, and the data stream code is generated by the preset analyzer calculating the multi-target information corresponding to the first user configuration information according to a preset calculation algorithm;
    在判断到所述参数值为预设有效值的情况下,确定所述数据流编码为所述目标IOAM封装对象。When it is determined that the parameter value is a preset valid value, the data stream is determined to be encoded as the target IOAM encapsulation object.
  5. 根据权利要求4所述的实现方法,其中,在判断到所述参数值不为预设有效值的情况下,以所述第二用户配置信息作为所述目标IOAM封装对象。According to the implementation method of claim 4, wherein, when it is determined that the parameter value is not a preset valid value, the second user configuration information is used as the target IOAM encapsulation object.
  6. 一种虚拟化隧道网络的IOAM封装的实现装置,应用于首位物理交换机,包括:A device for implementing IOAM encapsulation of a virtualized tunnel network, applied to a first physical switch, comprising:
    接收模块,设置为接收由虚拟交换机所转发的目标数据流对应的隧道报文信息,其中,所述隧道报文信息包括内层报文信息和外层报文信息,所述内层报文信息存储 有与所述目标数据流所对应的第一用户配置信息,所述外层报文信息存储有与所述第一用户配置信息对应的数据流编码和所述虚拟交换机对应的第二用户配置信息;A receiving module is configured to receive tunnel message information corresponding to a target data flow forwarded by a virtual switch, wherein the tunnel message information includes inner message information and outer message information, and the inner message information is stored in There is first user configuration information corresponding to the target data flow, and the outer message information stores the data flow code corresponding to the first user configuration information and second user configuration information corresponding to the virtual switch;
    确定模块,设置为获取预设的标志信息,基于对所述标志信息的校验结果,从所述数据流编码和所述第二用户配置信息中选取目标IOAM封装对象,其中,所述标志信息用于表征所述数据流编码的有效性;a determination module, configured to obtain preset flag information, and select a target IOAM encapsulation object from the data stream encoding and the second user configuration information based on a verification result of the flag information, wherein the flag information is used to characterize the validity of the data stream encoding;
    封装模块,设置为将获取的IOAM信息封装至所述目标IOAM封装对象,生成第一IOAM报文,并将所述第一IOAM报文转发至后一级转发节点所对应的物理交换机。The encapsulation module is configured to encapsulate the acquired IOAM information into the target IOAM encapsulation object, generate a first IOAM message, and forward the first IOAM message to a physical switch corresponding to a next-level forwarding node.
  7. 一种虚拟化隧道网络的IOAM封装的实现方法,应用于中间物理交换机,包括:A method for implementing IOAM encapsulation of a virtualized tunnel network, applied to an intermediate physical switch, comprising:
    接收前一级的物理交换机所转发的第二IOAM报文,其中,所述第二IOAM报文对应的外层报文中存储有第一IOAM封装信息;receiving a second IOAM message forwarded by a physical switch at a previous level, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information;
    获取本节点所采集的IOAM信息,并将所述IOAM信息添加至所述第一IOAM封装信息中,生成对应的第三IOAM报文,并将所述第三IOAM报文转发至后一级转发节点所对应的物理交换机。The IOAM information collected by the node is obtained, and the IOAM information is added to the first IOAM encapsulation information, a corresponding third IOAM message is generated, and the third IOAM message is forwarded to a physical switch corresponding to a next-level forwarding node.
  8. 一种虚拟化隧道网络的IOAM封装的实现装置,应用于中间物理交换机,包括:A device for implementing IOAM encapsulation of a virtualized tunnel network, applied to an intermediate physical switch, comprising:
    接收模块,设置为接收前一级的物理交换机所转发的第二IOAM报文,其中,所述第二IOAM报文对应的外层报文中存储有第一IOAM封装信息;A receiving module, configured to receive a second IOAM message forwarded by a physical switch at a previous level, wherein the outer message corresponding to the second IOAM message stores the first IOAM encapsulation information;
    添加模块,设置为获取本节点所采集的IOAM信息,并将所述IOAM信息添加至所述第一IOAM封装信息中,生成对应的第三IOAM报文,并将所述第三IOAM报文转发至后一级转发节点所对应的物理交换机。The adding module is configured to obtain the IOAM information collected by the node, add the IOAM information to the first IOAM encapsulation information, generate a corresponding third IOAM message, and forward the third IOAM message to the physical switch corresponding to the next-level forwarding node.
  9. 一种虚拟化隧道网络的IOAM封装的实现方法,应用于末位物理交换机,包括:A method for implementing IOAM encapsulation of a virtualized tunnel network, applied to a last-position physical switch, comprising:
    在接收到预设分析器所下发的IOAM解封装指令之后,获取由前一级转发节点对应的物理交换机所转发的第四IOAM报文,其中,所述第四IOAM报文对应的外层报文中存储有对应的第二IOAM封装信息;After receiving the IOAM decapsulation instruction sent by the preset analyzer, a fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node is obtained, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information;
    将所述第二IOAM封装信息从所述第四IOAM报文对应的外层报文中去除,并将得到的隧道报文信息转发至位于后一级节点的虚拟交换机。The second IOAM encapsulation information is removed from the outer message corresponding to the fourth IOAM message, and the obtained tunnel message information is forwarded to the virtual switch located at the next-level node.
  10. 一种虚拟化隧道网络的IOAM封装的实现装置,应用于末位物理交换机,包括:A device for implementing IOAM encapsulation of a virtualized tunnel network, applied to a last-position physical switch, comprising:
    获取模块,设置为在接收到预设分析器所下发的IOAM解封装指令之后,获取由前一级转发节点对应的物理交换机所转发的第四IOAM报文,其中,所述第四IOAM报文对应的外层报文中存储有对应的第二IOAM封装信息; an acquisition module, configured to acquire, after receiving the IOAM decapsulation instruction issued by the preset analyzer, a fourth IOAM message forwarded by the physical switch corresponding to the previous-level forwarding node, wherein the outer layer message corresponding to the fourth IOAM message stores the corresponding second IOAM encapsulation information;
    解封装模块,设置为将所述第二IOAM封装信息从所述第四IOAM报文对应的外层报文中去除,并将得到的隧道报文信息转发至位于后一级节点的虚拟交换机。The decapsulation module is configured to remove the second IOAM encapsulation information from the outer message corresponding to the fourth IOAM message, and forward the obtained tunnel message information to a virtual switch located at a subsequent node.
  11. 一种物理交换机,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;A physical switch includes a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory communicate with each other through the communication bus;
    存储器,设置为存放计算机程序;a memory arranged to store a computer program;
    处理器,设置为执行存储器上所存放的程序时,实现权利要求1-5任一项所述的虚拟化隧道网络的IOAM封装的实现方法的步骤、实现权利要求7所述的虚拟化隧道网络的IOAM封装的实现方法的步骤以及实现权利要求9所述的虚拟化隧道网络的IOAM封装的实现方法的步骤。The processor is configured to, when executing a program stored in a memory, implement the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in any one of claims 1 to 5, implement the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in claim 7, and implement the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in claim 9.
  12. 一种计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现权利要求1-5任一项所述的虚拟化隧道网络的IOAM封装的实现方法的步骤、实现权利要求7所述的虚拟化隧道网络的IOAM封装的实现方法的步骤以及实现权利要求9所述的虚拟化隧道网络的IOAM封装的实现方法的步骤。 A computer-readable storage medium having a computer program stored thereon, wherein when the computer program is executed by a processor, the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in any one of claims 1 to 5, the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in claim 7, and the steps of the method for implementing IOAM encapsulation of a virtualized tunnel network as described in claim 9 are implemented.
PCT/CN2023/117054 2022-09-29 2023-09-05 Implementation method and apparatus for ioam encapsulation of virtualized tunnel network WO2024066964A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211203224.3A CN117834342A (en) 2022-09-29 2022-09-29 Method and device for realizing IOAM encapsulation of virtualized tunnel network
CN202211203224.3 2022-09-29

Publications (1)

Publication Number Publication Date
WO2024066964A1 true WO2024066964A1 (en) 2024-04-04

Family

ID=90475999

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/117054 WO2024066964A1 (en) 2022-09-29 2023-09-05 Implementation method and apparatus for ioam encapsulation of virtualized tunnel network

Country Status (2)

Country Link
CN (1) CN117834342A (en)
WO (1) WO2024066964A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964943A (en) * 2017-05-18 2018-12-07 中兴通讯股份有限公司 A kind of method and device for realizing IOAM encapsulation
US20200278892A1 (en) * 2019-02-28 2020-09-03 Cisco Technology, Inc. Remote smart nic-based service acceleration
CN112448926A (en) * 2019-08-30 2021-03-05 烽火通信科技股份有限公司 Processing method and system for in-band operation, management and maintenance IOAM
CN112910773A (en) * 2019-11-19 2021-06-04 华为技术有限公司 Method for issuing OAM configuration information and control node
US20210328860A1 (en) * 2018-12-29 2021-10-21 Huawei Technologies Co., Ltd. Operation, Administration, and Maintenance IOAM Packet Transmission Method and Related Apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964943A (en) * 2017-05-18 2018-12-07 中兴通讯股份有限公司 A kind of method and device for realizing IOAM encapsulation
US20210328860A1 (en) * 2018-12-29 2021-10-21 Huawei Technologies Co., Ltd. Operation, Administration, and Maintenance IOAM Packet Transmission Method and Related Apparatus
US20200278892A1 (en) * 2019-02-28 2020-09-03 Cisco Technology, Inc. Remote smart nic-based service acceleration
CN112448926A (en) * 2019-08-30 2021-03-05 烽火通信科技股份有限公司 Processing method and system for in-band operation, management and maintenance IOAM
CN112910773A (en) * 2019-11-19 2021-06-04 华为技术有限公司 Method for issuing OAM configuration information and control node

Also Published As

Publication number Publication date
CN117834342A (en) 2024-04-05

Similar Documents

Publication Publication Date Title
EP3139560B1 (en) Packet processing method, device and computer storage medium
CN111953604A (en) Method and device for providing service for service flow
US20060274791A1 (en) Method measuring a delay time metric and measurement system
EP3905618A2 (en) Data packet sending method and apparatus in ipv6 network
JP5681067B2 (en) Traffic generator using dynamic MPLS label allocation
EP3720075B1 (en) Data transmission method and virtual switch
US10313182B2 (en) Apparatus and method to detect a fault in a communication path by using a detection packet
CN108566336A (en) A kind of network path acquisition methods and equipment
WO2017000802A1 (en) Service fault location method and device
CN111614580B (en) Data forwarding method, device and equipment
CN111064668B (en) Method and device for generating routing table entry and related equipment
EP4057576A1 (en) Packet encapsulating method and apparatus, and packet decapsulating method and apparatus
CN114598626A (en) Message processing method and gateway equipment
WO2024066964A1 (en) Implementation method and apparatus for ioam encapsulation of virtualized tunnel network
DK2482494T3 (en) User equipment bandwidth measurement
CN112565053A (en) Method, device, service system and storage medium for identifying private network user
CN115277450B (en) Virtual-real combined heterogeneous communication network fusion system based on OPNET and application
CN115412512B (en) IPv 6-based multi-cloud cross-network intercommunication method and device
CN107612848B (en) Debugging method and device and computer readable storage medium
CN110224916B (en) Message processing method and device and message packaging method, device and system
CN114978600B (en) Abnormal flow processing method, system, equipment and storage medium
CN112350844A (en) Method and device for data transmission
CN102611631A (en) Method, device and system for protecting protocol under pseudo-wire scene
WO2014201906A1 (en) Traffic statistics collection method and apparatus
CN108833282A (en) Data forwarding method, system, device and SDN switch

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23870203

Country of ref document: EP

Kind code of ref document: A1