CN106789705B - Method and device for transmitting control message - Google Patents

Method and device for transmitting control message Download PDF

Info

Publication number
CN106789705B
CN106789705B CN201510828724.XA CN201510828724A CN106789705B CN 106789705 B CN106789705 B CN 106789705B CN 201510828724 A CN201510828724 A CN 201510828724A CN 106789705 B CN106789705 B CN 106789705B
Authority
CN
China
Prior art keywords
hash
field
forwarding
information
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510828724.XA
Other languages
Chinese (zh)
Other versions
CN106789705A (en
Inventor
吴楠
庄顺万
李振斌
陈双龙
车佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201510828724.XA priority Critical patent/CN106789705B/en
Priority to PCT/CN2016/106652 priority patent/WO2017088718A1/en
Publication of CN106789705A publication Critical patent/CN106789705A/en
Application granted granted Critical
Publication of CN106789705B publication Critical patent/CN106789705B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a method and a device for transmitting a control message, wherein the method comprises the steps that a forwarding device obtains the control message, the control message carries information of a hash tuple corresponding to the forwarding device, the information of the hash tuple comprises hash algorithm information, forwarding encapsulation type information and hash parameter information, the hash algorithm information represents a hash algorithm used by the forwarding device for forwarding a first data message, the forwarding encapsulation type information represents an encapsulation type used by the forwarding device for forwarding the first data message, and the hash parameter information represents a hash parameter used by the forwarding device for forwarding the first data message; the forwarding device sends the control message to the network device for monitoring the forwarding device, so that the network device for monitoring the forwarding device in the network can obtain the information of the hash tuple corresponding to the forwarding device through the control message.

Description

Method and device for transmitting control message
Technical Field
The present invention relates to the field of communications, and more particularly, to a method and apparatus for transmitting control packets.
Background
The process of load sharing when the conventional forwarding device forwards the data packet is specifically to classify the data packet according to its characteristics, the dependent characteristics are different according to the differences of the specifically forwarded data packet, compress the selected data packet characteristics to a certain value domain space, and map a certain specific value in the certain space to a specific route and an exit.
For example, in a backbone Network of a Virtual Private Network (VPN) scenario of a Border Gateway Protocol (BGP) or a Multi-Protocol Label Switching (MPLS), a data packet is typically forwarded through a Label Switched Path (LSP) of a Label Distribution Protocol (LDP) or a Resource ReSerVation Protocol (RSVP-TE) tunnel based on Traffic Engineering extension. When the data message is subjected to load sharing, the data message needs to be hashed. When forwarding data packets, the current forwarding device usually uses the label stack content of the data packets as hash parameters, and the hash parameters corresponding to the data packets of the BGP/MPLS VPN backbone are almost the same. If the same hashing algorithm is used again, the data message still may be concentrated on a specific path, and the hashing effect is not achieved.
Disclosure of Invention
Embodiments of the present invention provide a method and an apparatus for transmitting a control packet, which are helpful for a network device monitoring a forwarding device in a network to obtain information of a hash tuple corresponding to the forwarding device, so as to improve a hash effect.
In a first aspect, a method for transmitting a control packet is provided, where the method includes: the forwarding device obtains a control message, the control message carries information of a hash tuple corresponding to the forwarding device, the information of the hash tuple comprises hash algorithm information, forwarding encapsulation type information and hash parameter information, the hash algorithm information represents a hash algorithm used by the forwarding device for forwarding a first data message, the forwarding encapsulation type information represents an encapsulation type used by the forwarding device for forwarding the first data message, and the hash parameter information represents a hash parameter used by the forwarding device for forwarding the first data message; the forwarding device sends the control message to a network device for monitoring the forwarding device.
In the method for transmitting the control packet according to the embodiment of the present invention, the forwarding device obtains and sends the control packet carrying the hash tuple information of the forwarding device, so that the network device monitoring the forwarding device in the network can obtain the hash tuple information corresponding to the forwarding device through the control packet, thereby improving the hash effect.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the obtaining, by the forwarding device, a control packet includes: the forwarding device obtains information of the hash tuple, wherein the hash tuple corresponds to a forwarding engine of the forwarding device; the forwarding device obtains the control message according to the information of the hash tuple, wherein a forwarding engine information FEI-type length value TLV field of the control message carries the information of the hash tuple, a type T field included in the FEI-TLV field is used for identifying the information of the hash tuple carried by the FEI-TLV field, and a numerical value V field included in the FEI-TLV field carries the information of the hash tuple.
With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner of the first aspect, if the hash parameter is an N-layer label in a multi-label protocol MPLS label stack, where the N-layer label is a label from a top of the stack to a bottom of the stack or a label from a bottom of the stack to the top of the stack, the FEI-TLV field further includes a label stack depth LSD sub-type length value LSD sub-TLV field, where a T field included in the LSD sub-TLV field is used to identify a depth of the MPLS label stack carried by the LSD sub-TLV field, and a V field included in the LSD sub-TLV field carries a label stack depth.
With reference to the second possible implementation manner of the first aspect, in a third possible implementation manner of the first aspect, if the forwarding engine corresponds to multiple hash tuples, the V field included in the LSD sub-TLV field further carries an identifier of the hash tuple to which the hash parameter belongs.
With reference to the first possible implementation manner of the first aspect, in a fourth possible implementation manner of the first aspect, if the hash parameter does not belong to the preset hash parameter template, the FEI-TLV field further includes a hash parameter selection DKOsub-TLV field, a T field included in the DKO sub-TLV field is used to identify that the DKO sub-TLV field carries the hash parameter used by the hash tuple, and each bit in a V field included in the DKO sub-TLV field indicates a parameter to be selected.
With reference to the fourth possible implementation manner of the first aspect, in a fifth possible implementation manner of the first aspect, if the forwarding engine corresponds to multiple hash tuples, the V field included in the DKO sub-TLV field further carries an identifier of the hash tuple to which the hash parameter belongs.
With reference to any one of the first to fifth possible implementation manners of the first aspect, in a sixth possible implementation manner of the first aspect, if the forwarding engine corresponds to multiple hash tuples, the V field included in the FEI-TLV field further carries the number of the multiple hash tuples and an identifier of each hash tuple in the multiple hash tuples.
With reference to any one of the first to sixth possible implementation manners of the first aspect, in a seventh possible implementation manner of the first aspect, the FEI-TLV field further includes a maximum throughput MT sub-TLV field, a T field included in the MT sub-TLV field is used to identify that the MT sub-TLV field carries the maximum throughput of the forwarding device, and a V field included in the MT sub-TLV field carries the maximum throughput of the forwarding device.
With reference to any one of the first to seventh possible implementation manners of the first aspect, in an eighth possible implementation manner of the first aspect, the FEI-TLV field further includes a maximum forwarding delay MTD field, a T field included in the MTDsub-TLV field is used to identify that the MTDsub-TLV field carries the maximum forwarding delay of the forwarding device, and a V field of the MTDsub-TLV field includes an integer delay field and a fractional delay field and is used to carry the maximum forwarding delay of the forwarding device.
With reference to the first aspect or any possible implementation manner of the first to eighth possible implementation manners of the first aspect, in a ninth possible implementation manner of the first aspect, before the forwarding device obtains the control packet, the method further includes: the forwarding device receives a request sent by the network device for monitoring the forwarding device, wherein the request is used for requesting to acquire information of a hash tuple of the forwarding device; the forwarding device performs the step of obtaining the control packet.
With reference to the first aspect or any one possible implementation manner of the first to ninth possible implementation manners of the first aspect, in a tenth possible implementation manner of the first aspect, the control packet IS carried in an LSU packet in an open shortest path first OSPF protocol or an LSP packet in an intermediate system to intermediate system IS-IS protocol.
In the method for transmitting the control message according to the embodiment of the present invention, the forwarding device sends the control message carrying the hash tuple information of the forwarding device, so that the network device monitoring the forwarding device in the network can cooperate with the applications such as traffic engineering, path planning, and the like after collecting the hash tuple information corresponding to all the forwarding devices in the network, thereby improving the hash effect of the data message and optimizing the use condition of the network.
In a second aspect, an apparatus for transmitting a control packet is provided, where the apparatus is configured to perform the method in the first aspect or any possible implementation manner of the first aspect. In particular, the apparatus comprises means for performing the method of the first aspect described above or any possible implementation manner of the first aspect.
In a third aspect, an apparatus for transmitting a control packet is provided, where the apparatus includes: receiver, transmitter, memory, processor and bus system. Wherein the receiver, the transmitter, the memory and the processor are connected by the bus system, the memory is configured to store instructions, the processor is configured to execute the instructions stored by the memory and control the transmitter to transmit signals, and when the processor executes the instructions stored by the memory, the execution causes the processor to execute the method of the first aspect or any possible implementation manner of the first aspect.
In a fourth aspect, there is provided a computer readable medium for storing a computer program comprising instructions for carrying out the method of the first aspect or any possible implementation manner of the first aspect.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method of transmitting a control packet according to an embodiment of the present invention.
Fig. 2 is a diagram of a Forwarding Engine Information (FEI) -Type Length Value (TLV) field according to an embodiment of the present invention.
Fig. 3 is a diagram of a sub-Type Length Value (sub-TLV) field of a Label Stack Depth (LSD) subtype according to an embodiment of the present invention.
FIG. 4 is a diagram of a hash parameter selection (DKO) sub-TLV field according to an embodiment of the present invention
Fig. 5 is a diagram of a Maximum Throughput (MT) sub-TLV field according to an embodiment of the present invention.
Fig. 6 is a schematic diagram of a Maximum forwarding Delay (MTD) sub-TLV field according to an embodiment of the present invention.
Fig. 7 is a diagram of a v (value) field in a DKO sub-TLV field according to an embodiment of the present invention.
Fig. 8 is a diagram of FEI-TLV fields according to another embodiment of the present invention.
Fig. 9 is a schematic diagram of an LSD sub-TLV field according to another embodiment of the present invention.
Fig. 10 is a schematic diagram of a DKO sub-TLV field according to another embodiment of the present invention
Fig. 11 is a diagram of an MT sub-TLV field according to another embodiment of the present invention.
Fig. 12 is a diagram of an MTD sub-TLV field according to another embodiment of the present invention.
Fig. 13 is a schematic block diagram of an apparatus for transmitting a control packet according to an embodiment of the present invention.
Fig. 14 is a schematic block diagram of an apparatus for transmitting a control packet according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows a schematic flowchart of a method for transmitting a control packet according to an embodiment of the present invention, where the method 100 may be implemented by a forwarding device, and the forwarding device may be, for example, a router, but the embodiment of the present invention is not limited thereto.
S110, a forwarding device obtains a control message, the control message carries information of a hash tuple corresponding to the forwarding device, the information of the hash tuple includes hash algorithm information, forwarding encapsulation type information and hash parameter information, the hash algorithm information represents a hash algorithm used by the forwarding device to forward a first data message, the forwarding encapsulation type information represents an encapsulation type used by the forwarding device to forward the first data message, and the hash parameter information represents a hash parameter used by the forwarding device to forward the first data message.
Specifically, forwarding equipment first acquires information of a hash tuple, the hash tuple corresponds to a forwarding engine of the forwarding equipment, then the forwarding equipment acquires a control message according to the acquired information of the hash tuple, an FEI-TLV field of the control message carries the information of the hash tuple, a type T field included in the FEI-TLV field is used for identifying that the FEI-TLV field carries the information of the hash tuple, and a numerical value V field included in the FEI-TLV field carries the information of the hash tuple.
S120, the forwarding device sends the control packet to the network device for monitoring the forwarding device.
In the method for transmitting a control packet according to the embodiment of the present invention, a forwarding device obtains and sends information of a hash tuple carrying the forwarding device, so that a network device monitoring the forwarding device in a network obtains information of the hash tuple corresponding to the forwarding device through the control packet, and further determines a forwarding path of a data packet according to the information of the hash tuple.
The Interior Gateway Protocol (IGP) is a routing Protocol used within an autonomous system. The two IGPs most commonly used today are: an Intermediate System to Intermediate System (IS-IS) routing protocol and an Open Shortest Path First (OSPF) routing protocol. In the embodiment of the present invention, only the two common IGP protocols are taken as examples for description, in the embodiment of the present invention, the IGP protocol may also be other routing protocols, and the embodiment of the present invention does not limit this. The information of the hash tuple of the router may be carried on a FEI-TLV field in a Link State Update (LSU) message in an OSPF message, may also be carried on a FEI sub-TLV field of an LSP message in an IS-IS message, and may also be carried in other IGP protocol messages, and for convenience of description, all of the fields are referred to as FEI-TLV fields in the following embodiments of the present invention, and these examples are merely for assisting those skilled in the art to understand and implement the embodiments of the present invention, and do not limit the scope of the embodiments of the present invention. Equivalent alterations and modifications may be made by those skilled in the art in light of the examples set forth herein, and such alterations and modifications are intended to be within the scope of the embodiments of the invention.
It should also be understood that the LSU message of the OSPF routing protocol is used to send a Link-State Advertisement (LSA) to an opposite end router or controller, where the LSU message may carry information fields of multiple LSAs, the OSPF routing protocol carries different routing information by using different types of LSAs, and the LSAs are encapsulated into LSUs and advertised to other routers in the network, and the FEI-TLV format may be, for example, a top-level TLV format in a non-transparent (Opaque) LSA in the LSU message, and the Opaque LSA is a type of LSA composed of a standard LSA header followed by special information. This information field may be used directly by the OSPF protocol or by other applications distributing information throughout the OSPF inter-domain, the Opaque LSA being used to add variable expansion features to OSPF, and embodiments of the present invention may expand forwarding engine information of the forwarding device in the Opaque LSA.
Optionally, the IS-IS routing protocol runs directly on the link layer and IS propagated by using the MAC multicast address, and the IS-IS routing protocol carries all routing information through an LSP packet, where the LSP packet IS used to describe all link state information in the current forwarding device, and IS similar to the LSA in the OSPF protocol in function. The forwarding devices transmit link information through Protocol Data Units (PDUs) for transmitting Protocol Data packets, the FEI sub-TLVs may be sub-TLVs of Capability TLVs in the LSP PDUs, and the embodiment of the invention can extend hash tuple information used when the forwarding devices forward Data messages in the LSP PDUs.
It should be understood that after the function of the forwarding device to obtain the hash tuple information can be enabled or disabled by some "switching" means, the OSPF/IS-IS protocol checks whether the function IS enabled in its flow of sending update messages (LSU/LSP). If not, skipping the following processing to continue the sending processing of the original flow; if the function IS enabled, the OSPF/IS-IS obtains the information of the forwarding engine from the device management or system management module of the control plane through an interface realized by internal software, fills the information of the forwarding engine in the LSU/LSP through the protocol extension described in the present invention, and sends out along with the original mechanism, wherein the specific enabling method in the embodiment of the present invention may be command line configuration, may also be default enabling, may also be through network management configuration, and the like, which IS not limited in the embodiment of the present invention.
Specifically, the FEI-TLV field is composed of a T (type) field, an L (length) field, and a V (value) field, where the T field is used to identify the FEI-TLV field, the V field is used to carry information that the FEI-TLV field needs to represent, such as hash algorithm information, forwarding encapsulation type information, and hash parameter information of the hash tuple, and the L field is used to represent the length of the V field, that is, the length of fields in the FEI-TLV field except the T field and the L field, and the unit is byte.
As an embodiment, if the hash parameter is an nth layer label in a multi-label protocol MPLS label stack, that is, a label of the MPLS label stack from the top to the bottom or an nth layer label from the bottom to the top, the FEI-TLV field may further include an LSD sub-TLV field, where a T field included in the LSD sub-TLV field is used to identify a depth of the MPLS label stack carried by the LSD sub-TLV field, and a V field included in the LSD sub-TLV field carries a label stack depth.
As another embodiment, if the hash parameter does not belong to the preset hash parameter template, the FEI-TLV field may further include a hash parameter selection DKO sub-TLV field, a T field included in the DKO sub-TLV field is used to identify the hash parameter used by the hash tuple carried by the DKO sub-TLV field, and each bit in a V field included in the DKO sub-TLV field represents a parameter to be selected.
Optionally, the commonly used hash parameter template may be a fourth version single wave quintuple of an Internet Protocol (IP), an MPLS entire label stack, an MPLS N-layer label from bottom to top, an MPLS N-layer label from top to bottom, an MPLS bottom-of-stack label, an MPLS top-of-stack label, or another hash parameter template formulated according to actual service needs, which is not limited in the embodiment of the present invention.
As an embodiment, the FEI-TLV field may further include an MT sub-TLV field, where a T field included in the MT sub-TLV field is used to identify that the MT sub-TLV field carries the maximum throughput of the forwarding device, and a V field included in the MT sub-TLV field carries the maximum throughput of the forwarding device.
As another embodiment, the FEI-TLV field may further include an MTD sub-TLV field, where a T field included in the MTD sub-TLV field is used to identify that the MTD sub-TLV field carries the maximum forwarding delay of the forwarding device, and a V field of the MTD sub-TLV field includes an integer delay field and a fractional delay field, and is used to carry the maximum forwarding delay of the forwarding device.
Optionally, if the forwarding engine corresponds to multiple hash tuples, the V field included in the FEI-TLV field further carries the number of the multiple hash tuples and an identifier of each hash tuple in the multiple hash tuples, which is not limited in the embodiment of the present invention.
Optionally, the forwarding device may carry the identifier of the hash tuple to which the hash parameter belongs through a V field included in the LSD sub-TLV field, and may also carry the identifier of the hash tuple to which the hash parameter belongs, which is freely selected, through a V field included in the DKO sub-TLV field.
It should also be understood that each forwarding device may support one or more forwarding engines, different forwarding engines may be allocated according to services or interfaces, and a default configuration or a controller may control which forwarding engine a specific type of packet may be forwarded through according to packets of different service types processed by the forwarding device.
Optionally, if the forwarding device corresponds to multiple forwarding engines, the forwarding device may carry information of a hash tuple supported by each forwarding engine through multiple FEI-TLV fields, and identify each forwarding engine through a forwarding engine identification field in a V field of each FEI-TLV field, which is not limited in the embodiment of the present invention.
Specifically, in S120, the forwarding device may send out a control packet carrying information of the hash tuple of the forwarding device in a unicast or multicast manner, and other forwarding devices or controllers in the network for monitoring the forwarding device may collect information of the hash tuple of the forwarding device.
In the method for transmitting protocol messages, the forwarding device sends the control message carrying the hash tuple information of the forwarding device, so that the network device monitoring the forwarding device in the network collects the hash tuple information corresponding to all the forwarding devices in the network, and is matched with the applications of traffic engineering, path planning and the like, thereby improving the hash effect of the data message and optimizing the use condition of the network.
Fig. 2 shows a schematic diagram of the FEI-TLV field of an embodiment of the present invention, which may be a TLV field extended in the LSU of the OSPF routing protocol.
Specifically, the FEI-TLV field may include a 2-byte T field and a 2-byte L field, where the T field identifies that the FEI-TLV field carries information of a hash tuple, and a value of the T field may theoretically be 1 to 65535, and since a type of the T field included in the sub-TLV field of the Opaque LSA of the LSU packet takes a value of 1 to 9, the value of the T field may take a value of 10, for example, and the L field indicates a length of the V field included in the FEI-TLV field.
It should be understood that the OSPF protocol specifies that each TLV field is 4-byte aligned, and therefore, each bit in the 4 bytes of each row in the FEI-TLV should be used.
As an optional embodiment, the V field of the FEI-TLV field may further include an identification field of a 2-byte forwarding engine, a number field of 2-byte hash tuples, an identification field of 1-byte hash tuples, and an information field of 3-byte hash tuples, wherein the information of each hash tuple is respectively carried in the 1-byte hash algorithm field, the 1-byte forwarding encapsulation type field, and the 1-byte hash parameter field. The number of hash tuples field indicates the number of at least one hash tuple supported by the forwarding engine identified by the forwarding engine. The information of each hash tuple of the information of the at least one hash tuple may be uniquely identified by an identification field of the hash tuple.
Optionally, the hash algorithm field may indicate a hash algorithm used when the forwarding device forwards the data packet, for example, the hash algorithm may be a greedy algorithm, a direct hash algorithm, or the like; the field of the forwarding encapsulation type may indicate a method for forwarding the data packet by the forwarding device to perform encapsulation, for example, IP encapsulation, TCP encapsulation, or the like; the hash parameter field may indicate a hash parameter used when the forwarding device forwards the data packet, where the hash parameter may be a hash parameter in a preset hash parameter template, for example, the hash parameter may be a single-wave quintuple of IPv4, an entire label stack of MPLS, an N-layer label of MPLS from the bottom to the top, and the hash parameter may also be a hash parameter that is selected according to a specific service requirement, which is not limited in the embodiment of the present invention.
Optionally, if the hash parameter is an N-layer label in an MPLS label stack of a multi-label protocol, where the N-layer label is a label from the top of the stack to the bottom of the stack or a label from the bottom of the stack to the top of the stack, the FEI-TLV field further includes a label stack depth LSD sub-type length value LSD sub-TLV field, and the LSD sub-TLV field includes a depth for carrying the MPLS label stack.
As an optional embodiment, fig. 3 illustrates a schematic diagram of an LSD sub-TLV field according to an embodiment of the present invention, where the LSD sub-TLV field may include a 2-byte T field and a 2-byte L field, the T field may be used to identify a depth of the MPLS label stack carried by the LSD sub-TLV, a value of the T field may be 1 to 65535, the T field in the embodiment of the present invention may be, for example, 4, the L field is used to indicate a length of a V field of the LSD sub-TLV, the V field may include a 1-byte hash tuple identification field and a 1-byte label stack depth field, the hash tuple identification field is used to identify a first hash tuple to which the LSD sub-TLV belongs, and the label stack depth field carries the depth of the label stack. Since the OSPF routing protocol specifies TLV protocol 4-byte alignment, the LSD sub-TLV field may further include reserved bits of 2 bytes, and therefore, the length represented by the L field of the LSDsub-TLV may be 4 bytes.
Optionally, when the hash parameter does not belong to the hash parameter in the preset hash parameter template, the FEI-TLV field may further include a DKO sub-TLV field, and the FEI sub-TLV field is used to carry the hash parameter currently used by the forwarding engine.
As an optional embodiment, fig. 4 shows a schematic diagram of a DKO sub-TLV field according to an embodiment of the present invention, where the DKO sub-TLV field may include a 2-byte T field and a 2-byte L field, the T field may be used to identify that the DKO sub-TLV field carries a freely selected hash parameter, a value of the T field may range from 1 to 65535, the T field in the embodiment of the present invention may have a value of 3, the L field is used to indicate a length of a V field included in the DKO sub-TLV field, the V field may include a 4-byte hash parameter selection field and a 1-byte hash tuple identification field, the hash tuple identification field is used to identify a first hash tuple to which the DKO sub-TLV field belongs, and each bit in the hash parameter selection field indicates an optional hash parameter. The OSPF routing protocol specifies that TLV protocol is aligned in 4 bytes, and the V field of the DKO sub-TLV field can also comprise reserved bits in 3 bytes, so the length represented by the L field of the DKO sub-TLV can be 5 bytes.
Optionally, the FEI-TLV field of the embodiment of the present invention may further include an MT sub-TLV field and an MTD sub-TLV field, where the MT sub-TLV field carries the maximum throughput of the forwarding device, and the MTD sub-TLV field carries the maximum forwarding delay of the forwarding device, but the embodiment of the present invention is not limited thereto.
As an optional embodiment, fig. 5 shows a schematic diagram of an MT sub-TLV field according to an embodiment of the present invention, where the MT sub-TLV field may include a T field of 2 bytes and an L field of 2 bytes, the T field is used to identify a maximum throughput of a forwarding device carried by the MT sub-TLV, a value of the T field may range from 1 to 65535, the T field in the embodiment of the present invention may have a value of 1, the L field is used to indicate a length of a V field included in the MT sub-TLV field, and the V field may include a maximum throughput field of 4 bytes, so that the length indicated by the L field may be 4 bytes.
As an optional embodiment, fig. 6 shows a schematic diagram of an MTD sub-TLV field according to an embodiment of the present invention, where the MTD sub-TLV field may include a 2-byte T field and a 2-byte L field, the T field is used to identify a maximum forwarding delay of a forwarding device carried by the MTD sub-TLV, a value of the T field may range from 1 to 65535, the T field in an embodiment of the present invention may have a value of, for example, 2, the L field is used to indicate a length of a V field included in the MTD sub-TLV field, the V field may include a 4-byte maximum forwarding delay field, the maximum forwarding delay field indicates a maximum forwarding delay of a data packet from an input port to an output port of the forwarding device and inside the forwarding device, and therefore, the length indicated by the L field may be 4 bytes, and the embodiment of the present invention may further define or extend specific contents of the MTD sub-TLV field according to actual service needs, however, the present invention is not limited thereto.
As another alternative embodiment, fig. 7 shows a schematic diagram of a V field in an MTD sub-TLV field according to an embodiment of the present invention, where the V field of the MTD sub-TLV field may include a 1-byte integer delay field and a 3-byte fractional delay field, the integer delay field represents an integer part of delay, the integer part of delay may be 255 seconds at most, the fractional delay field represents a fractional part of delay, and the fractional part of delay may be 60 nanoseconds at most, and the content of the maximum forwarding delay field may be distributed according to actual needs, but the embodiment of the present invention is not limited thereto.
It should be understood that the value of the L field in the FEI-TLV field is [8, 4+4 × Num (number of hash tuples) +8 × Num (MT sub-TLV) +8 × Num (MTD sub-TLV) +12 × Num (DKO sub-TLV) +8 × LSD sub-TLV) ], and the FEI-TLV field may also be extended according to specific service requirements, but the embodiment of the present invention is not limited thereto.
In the method for transmitting the control message according to the embodiment of the present invention, the forwarding device obtains and sends the information of the hash tuple carrying the forwarding device, so that the network device monitoring the forwarding device in the network determines and collects the information of the hash tuple corresponding to the forwarding device through the control message, and after the network device collects the information of the hash tuple corresponding to all the forwarding devices in the network, the network device cooperates with the applications such as traffic engineering, path planning, and the like, thereby improving the hash effect of the data message and optimizing the use condition of the network.
The extended FEI-TLV field in the OSPF protocol according to the embodiment of the present invention IS described above with reference to fig. 2 to 7, and the extended sub-TLV field in the LSP of the IS-IS protocol according to the embodiment of the present invention IS described in detail below with reference to fig. 8 to 11.
Fig. 8 illustrates a schematic diagram of a FEI-TLV field, which may be a sub-TLV field extended in an LSP of the IS-IS routing protocol, according to an embodiment of the present invention.
Specifically, the FEI-TLV field may include a 1-byte T field and a 1-byte L field, where a value of the T field may theoretically be 1 to 255, and a value of the T field may be 10 in the embodiment of the present invention, and the V field may include an identification field of a 2-byte forwarding engine, a 2-byte hash tuple number field, an identification field of a 1-byte hash tuple, and an information field of a 3-byte hash tuple, where information of each hash tuple is respectively carried in a 1-byte hash algorithm field, a 1-byte forwarding encapsulation type field, and a 1-byte hash parameter field. The number of hash tuples field indicates the number of at least one hash tuple supported by the forwarding engine identified by the forwarding engine. The information of each hash tuple of the information of the at least one hash tuple may be uniquely identified by an identification field of the hash tuple.
Optionally, the hash algorithm field may indicate a hash algorithm used when the forwarding device forwards the data packet, for example, the hash algorithm may be a greedy algorithm, a direct hash algorithm, or the like; the field of the forwarding encapsulation type may indicate a method for forwarding the data packet by the forwarding device to perform encapsulation, for example, IP encapsulation, TCP encapsulation, or the like; the hash parameter field may indicate a hash parameter used when the forwarding device forwards the data packet, where the hash parameter may be a hash parameter in a preset hash parameter template, for example, the hash parameter may be a single-wave quintuple of IPv4, an entire label stack of MPLS, an N-layer label of MPLS from the bottom to the top, and the hash parameter may also be a hash parameter that is selected according to a specific service requirement, which is not limited in the embodiment of the present invention.
Optionally, if the hash parameter is an N-layer label in an MPLS label stack of a multi-label protocol, where the N-layer label is a label from the top of the stack to the bottom of the stack or a label from the bottom of the stack to the top of the stack, the FEI-TLV field further includes a label stack depth LSD sub-type length value LSD sub-TLV field, and the LSD sub-TLV field includes a depth for carrying the MPLS label stack.
As an alternative embodiment, fig. 9 illustrates a schematic diagram of an LSD sub-TLV field, which may include an LSD sub-TLV header and an LSD sub-TLV information field, according to an embodiment of the present invention. The LSD sub-TLV header includes a T field of 1 byte and an L field of 1 byte, a value range of the Type field may be 1 to 255, a value of the Type field may be 4, for example, the L field is used to indicate a length of a V field of the LSD sub-TLV field, the V field may include a hash tuple identification field of 1 byte and a tag stack depth field of 1 byte, the hash tuple identification field is used to identify a first hash tuple to which the LSD sub-TLV belongs, and the tag stack depth field carries a depth of the tag stack. Therefore, the length of the L field of the LSDsub-TLV may be 2 bytes, and the specific content of the LSDsub-TLV field may also be defined or extended according to the actual service requirement, but the embodiment of the present invention does not limit this.
Optionally, when the hash parameter does not belong to the hash parameter in the preset hash parameter template, the FEI-TLV field may further include a DKO sub-TLV field, and the FEI sub-TLV field is used to carry the hash parameter currently used by the forwarding engine.
As an optional embodiment, fig. 10 shows a schematic diagram of a DKO sub-TLV field according to an embodiment of the present invention, where the FEI sub-TLV field may include a T field of 1 byte and an L field of 1 byte, a value of the T field may range from 1 to 255, a value of the T field in the embodiment of the present invention may be, for example, 3, the L field is used to indicate a length of a V field included in the DKO sub-TLV field, the V field may include a 4-byte hash parameter selection field and a 1-byte hash tuple identification field, the hash tuple identification field is used to identify a first hash tuple to which the DKO sub-TLV belongs, and each bit in the hash parameter selection field indicates an optional hash parameter. Therefore, the length of the L field of the DKO sub-TLV may be 5 bytes, and the embodiment of the present invention may also define or extend the specific content of the DKO sub-TLV field according to the actual service requirement, but the embodiment of the present invention does not limit this.
Optionally, the FEI-TLV field of the embodiment of the present invention may further include an MT sub-TLV field and an MTD sub-TLV field, where the MT sub-TLV field carries the maximum throughput of the forwarding device, and the MTD sub-TLV field carries the maximum forwarding delay of the forwarding device, but the embodiment of the present invention is not limited thereto.
As an optional embodiment, fig. 11 shows a schematic diagram of an MT sub-TLV field according to an embodiment of the present invention, where the MT sub-TLV field may include a 1-byte T field and a 1-byte L field, a value of the T field may range from 1 to 65535, a value of the T field in the embodiment of the present invention may be 1, the L field is used to indicate a length of a V field included in the MT sub-TLV field, and the V field may include a 4-byte maximum throughput field, and therefore, the length indicated by the L field may be 4 bytes.
As an optional embodiment, fig. 12 shows a schematic diagram of an MTD sub-TLV field according to an embodiment of the present invention, where the MTD sub-TLV field may include a 1-byte T field and a 1-byte L field, the T field is used to identify a maximum forwarding delay of a forwarding device carried by the MTD sub-TLV, a value of the T field may range from 1 to 65535, the T field in an embodiment of the present invention may have a value of 2, the L field is used to indicate a length of a V field included in the MTD sub-TLV field, the V field may include a 4-byte maximum forwarding delay field, the maximum forwarding delay field indicates a maximum forwarding delay of a data packet from an input port to an output port of the forwarding device and inside the forwarding device, and therefore, the length indicated by the L field may be 4 bytes, and the embodiment of the present invention may further define or extend specific contents of the MTD sub-TLV field according to actual service needs, however, the present invention is not limited thereto.
It should be understood that the value of the L field in the FEI-TLV field is [8, 4+4 × Num (number of hash tuples) +6 × Num (MT sub-TLV) +6 × Num (MTD sub-TLV) +7 × Num (DKO sub-TLV) +4 × LSD sub-TLV) ], and the FEI-TLV may be further extended according to specific service requirements, but the embodiment of the present invention is not limited thereto.
In the method for transmitting the control message according to the embodiment of the present invention, the forwarding device obtains and sends the information of the hash tuple carrying the forwarding device, so that the network device monitoring the forwarding device in the network obtains the information of the hash tuple corresponding to the forwarding device through the control message, and the network device collects the information of the hash tuple corresponding to all the forwarding devices in the network and then cooperates with applications such as traffic engineering, path planning, and the like, thereby improving the hash effect of the data message and optimizing the use condition of the network.
The method for transmitting a control packet according to the embodiment of the present invention is described in detail above with reference to fig. 1 to 12, and the apparatus for transmitting a control packet according to the embodiment of the present invention is described in detail below with reference to fig. 13 to 14.
Fig. 13 shows an apparatus 1300 for transmitting a control packet according to an embodiment of the present invention. The apparatus 1300 includes:
an obtaining unit 1310, configured to obtain, by a forwarding device, a control packet, where the control packet carries information of a hash tuple corresponding to the forwarding device, where the information of the hash tuple includes hash algorithm information, forwarding encapsulation type information, and hash parameter information, where the hash algorithm information indicates a hash algorithm used by the forwarding device to forward a first data packet, the forwarding encapsulation type information indicates an encapsulation type used by the forwarding device to forward the first data packet, and the hash parameter information indicates a hash parameter used by the forwarding device to forward the first data packet;
a sending unit 1320, configured to send the control packet obtained by the obtaining unit to a network device for monitoring the forwarding device by the forwarding device.
Optionally, the obtaining unit 1310 is specifically configured to obtain, by the forwarding device, information of the hash tuple, where the hash tuple corresponds to a forwarding engine of the forwarding device; the forwarding device obtains the control message according to the information of the hash tuple, wherein a forwarding engine information FEI-type length value TLV field of the control message carries the information of the hash tuple, a type T field included in the FEI-TLV field is used for identifying the information of the hash tuple carried by the FEI-TLV field, and a numerical value V field included in the FEI-TLV field carries the information of the hash tuple.
Optionally, if the hash parameter is an N-layer label in an MPLS label stack of a multi-label protocol, where the N-layer label is a label from the top of the stack to the bottom of the stack to the top of the stack or an N-layer label from the bottom of the stack to the top of the stack, the FEI-TLV field further includes a label stack depth LSD sub-type length value LSD sub-TLV field, where a T field included in the LSD sub-TLV field is used to identify a depth at which the LSD sub-TLV field carries the MPLS label stack, and a V field included in the LSD sub-TLV field carries the label stack depth.
Optionally, if the forwarding device corresponds to multiple hash tuples, the V field included in the FEI-TLV field further carries the number of the multiple hash tuples and an identifier of each hash tuple in the multiple hash tuples.
Optionally, the apparatus further includes a receiving unit, where the receiving unit is configured to receive, before the forwarding device obtains the control packet, a request sent by the network device for monitoring the forwarding device, where the request is used to request to obtain information of the hash tuple of the forwarding device.
It should be appreciated that the apparatus 1300 herein is embodied in the form of a functional unit. The term "unit" herein may refer to an Application Specific Integrated Circuit (ASIC), an electronic Circuit, a processor (e.g., a shared, dedicated, or group processor) and memory that execute one or more software or firmware programs, a combinational logic Circuit, and/or other suitable components that support the described functionality. In an optional example, it may be understood by those skilled in the art that the apparatus 1300 may be specifically a network device in the foregoing embodiment, and the apparatus 1300 may be configured to perform each procedure and/or step corresponding to the network device in the foregoing method embodiment, and in order to avoid repetition, details are not described here again.
Fig. 14 shows an apparatus 1400 for transmitting a protocol packet according to an embodiment of the present invention. The apparatus 1400 includes a processor 1410, a transmitter 1420, a receiver 1430, a memory 1440, and a bus system 1450. Wherein the processor 1410, transmitter 1420, receiver 1430, and memory 1440 are coupled via a bus system 1450, the memory 1440 being configured to store instructions, the processor 1410 being configured to execute the instructions stored by the memory 1440 to control the transmitter 1420 to transmit signals. The transmitter 1420 and the receiver 1430 may be communication interfaces, and particularly, the transmitter 1420 may be an interface for receiving data and/or instructions, and the receiver 1430 may be an interface for transmitting data and/or instructions, and specific forms of the transmitter 1420 and the receiver 1430 will not be illustrated herein.
It should be understood that the apparatus 1400 may be embodied as the terminal device in the foregoing embodiment, and may be configured to perform each step and/or flow corresponding to the terminal device in the foregoing method embodiment. Optionally, the memory 1440 may include both read-only memory and random-access memory, and provides instructions and data to the processor. The portion of memory may also include non-volatile random access memory. For example, the memory may also store device type information. The processor 1410 may be configured to execute the instructions stored in the memory, and when the processor executes the instructions, the processor may perform the steps corresponding to the terminal device in the above method embodiments.
It should be understood that in the embodiments of the present invention, the processor may be a Central Processing Unit (CPU), and the processor may also be other general purpose processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor executes instructions in the memory, in combination with hardware thereof, to perform the steps of the above-described method. To avoid repetition, it is not described in detail here.
Those of ordinary skill in the art will appreciate that the various method steps and elements described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of both, and that the steps and elements of the various embodiments have been described above generally in terms of their functionality in order to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for transmitting control packets, comprising:
the method comprises the steps that a forwarding device obtains information of a hash tuple, wherein the hash tuple corresponds to a forwarding engine of the forwarding device, the information of the hash tuple comprises hash algorithm information, forwarding encapsulation type information and hash parameter information, the hash algorithm information represents a hash algorithm used by the forwarding device for forwarding a first data message, the forwarding encapsulation type information represents an encapsulation type used by the forwarding device for forwarding the first data message, and the hash parameter information represents a hash parameter used by the forwarding device for forwarding the first data message;
the forwarding device carries the information of the hash tuple in a forwarding engine information FEI-type length value TLV field of a control message, wherein a type T field included in the FEI-TLV field is used for identifying that the FEI-TLV field carries the information of the hash tuple, and a value V field included in the FEI-TLV field carries the information of the hash tuple;
and the forwarding equipment sends the control message to network equipment for monitoring the forwarding equipment.
2. The method of claim 1, wherein if the hash parameter is an N-layer label in a multi-label protocol MPLS label stack, the N-layer label is a label from top to bottom or from bottom to top, the FEI-TLV field further comprises a label stack depth LSD sub-type length value LSD sub-TLV field, the LSD sub-TLV field comprises a T field for identifying a depth at which the LSD sub-TLV field carries the MPLS label stack, and the LSD sub-TLV field comprises a V field carrying a label stack depth.
3. The method of claim 1, wherein if the forwarding engine corresponds to multiple hash tuples, a V field included in the LSD sub-TLV field further carries an identifier of the hash tuple to which the hash parameter belongs.
4. The method of claim 1, wherein if the forwarding engine corresponds to multiple hash tuples, the FEI-TLV field further comprises a V field that carries the number of the multiple hash tuples and an identification of each of the multiple hash tuples.
5. The method according to any of claims 1 to 4, wherein before the forwarding device obtains the control packet, the method further comprises:
the forwarding device receives a request sent by the network device for monitoring the forwarding device, wherein the request is used for requesting to acquire information of a hash tuple of the forwarding device;
and the forwarding equipment executes the step of obtaining the control message.
6. An apparatus for transmitting control messages, comprising:
an obtaining unit, configured to obtain, by a forwarding device, information of a hash tuple, where the hash tuple corresponds to a forwarding engine of the forwarding device, and the information of the hash tuple includes hash algorithm information, forwarding encapsulation type information, and hash parameter information, where the hash algorithm information indicates a hash algorithm used by the forwarding device to forward a first data packet, the forwarding encapsulation type information indicates an encapsulation type used by the forwarding device to forward the first data packet, and the hash parameter information indicates a hash parameter used by the forwarding device to forward the first data packet; carrying the information of the hash tuple in a forwarding engine information FEI-type length value TLV field of a control message, wherein a type T field included by the FEI-TLV field is used for identifying that the FEI-TLV field carries the information of the hash tuple, and a value V field included by the FEI-TLV field carries the information of the hash tuple;
a sending unit, configured to send, by the forwarding device, the control packet obtained by the obtaining unit to a network device that monitors the forwarding device.
7. The apparatus of claim 6, wherein if the hash parameter is an N-layer label in a multi-label protocol (MPLS) label stack, the N-layer label is a label from top to bottom or from bottom to top, the FEI-TLV field further comprises a Label Stack Depth (LSD) sub-type length value (LSD sub-TLV) field, a T field included in the LSD sub-TLV field is used for identifying a depth at which the LSD sub-TLV field carries the MPLS label stack, and a V field included in the LSD sub-TLV field carries the label stack depth.
8. The apparatus of claim 6, wherein if the forwarding engine corresponds to multiple hash tuples, a V field included in the LSD sub-TLV field further carries an identifier of the hash tuple to which the hash parameter belongs.
9. The apparatus of claim 6, wherein the FEI-TLV field comprises a V field that further carries a number of the plurality of hash tuples and an identification of each of the plurality of hash tuples if the forwarding engine corresponds to the plurality of hash tuples.
10. The apparatus of any one of claims 6 to 9, further comprising: a receiving unit for receiving the received data,
the receiving unit is configured to receive, by the forwarding device, a request sent by the network device for monitoring the forwarding device before the forwarding device obtains the control packet, where the request is used to request to obtain information of a hash tuple of the forwarding device.
CN201510828724.XA 2015-11-25 2015-11-25 Method and device for transmitting control message Active CN106789705B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510828724.XA CN106789705B (en) 2015-11-25 2015-11-25 Method and device for transmitting control message
PCT/CN2016/106652 WO2017088718A1 (en) 2015-11-25 2016-11-21 Method and apparatus for transmitting control message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510828724.XA CN106789705B (en) 2015-11-25 2015-11-25 Method and device for transmitting control message

Publications (2)

Publication Number Publication Date
CN106789705A CN106789705A (en) 2017-05-31
CN106789705B true CN106789705B (en) 2020-04-28

Family

ID=58763051

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510828724.XA Active CN106789705B (en) 2015-11-25 2015-11-25 Method and device for transmitting control message

Country Status (2)

Country Link
CN (1) CN106789705B (en)
WO (1) WO2017088718A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111464422B (en) * 2020-03-27 2022-01-07 京东科技信息技术有限公司 Interaction method, interaction device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859311A (en) * 2006-04-12 2006-11-08 华为技术有限公司 Router control method and system
CN102004673A (en) * 2010-11-29 2011-04-06 中兴通讯股份有限公司 Processing method and system of multi-core processor load balancing
CN102282810A (en) * 2009-01-19 2011-12-14 惠普开发有限公司 Load balancing
CN103929492A (en) * 2014-04-28 2014-07-16 华为技术有限公司 Method, devices and system for load balancing of service chain

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101060494A (en) * 2007-05-17 2007-10-24 华为技术有限公司 A route selection method, system and router
US8300647B2 (en) * 2007-05-18 2012-10-30 Nvidia Corporation Intelligent load balancing and failover of network traffic
CN102307136B (en) * 2011-07-06 2014-12-24 杭州华三通信技术有限公司 Method for processing message and device thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859311A (en) * 2006-04-12 2006-11-08 华为技术有限公司 Router control method and system
CN102282810A (en) * 2009-01-19 2011-12-14 惠普开发有限公司 Load balancing
CN102004673A (en) * 2010-11-29 2011-04-06 中兴通讯股份有限公司 Processing method and system of multi-core processor load balancing
CN103929492A (en) * 2014-04-28 2014-07-16 华为技术有限公司 Method, devices and system for load balancing of service chain

Also Published As

Publication number Publication date
WO2017088718A1 (en) 2017-06-01
CN106789705A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
EP4102785A1 (en) Message processing method and apparatus, and network device and storage medium
EP3713162A1 (en) Route processing method and apparatus, and data transmission method and apparatus
US9485141B1 (en) Constrained route distribution for multiple virtual private network services
US10063447B2 (en) Path-ping and ECMP-traceroute for IPV6 overlay virtualized networks
EP3200402B1 (en) Segment routing information obtainment method and segment routing network establishment method
WO2018000443A1 (en) Service function chaining (sfc)-based packet forwarding method, device and system
CN107026791B (en) Virtual private network VPN service optimization method and device
US9860169B1 (en) Neighbor resolution for remote EVPN hosts in IPV6 EVPN environment
US20150326473A1 (en) Service Chain Path Route Reservations
EP3043519B1 (en) Method, controller, forwarding device, and network system for forwarding packets
US20160006614A1 (en) Source Routing Using Path Computation Elements
EP3934183B1 (en) Service function chain sfc-based communication methods, and apparatuses
EP3148131B1 (en) Address information publishing method and apparatus
EP2869512A1 (en) Dynamic area filtering for link-state routing protocols
US20210203586A1 (en) Communication Method, Device, and System
US11743166B2 (en) Provisioning non-colored segment routing label switched paths via segment routing policies in border gateway protocol
CN110557317B (en) Method and apparatus for managing virtual private network
US11323371B1 (en) Micro SID packet processing with operations, administration, and management
EP3754914B1 (en) Class-based traffic engineering in an ip network
US11296973B2 (en) Path information transmission device, path information transmission method and path information transmission program
CN106789705B (en) Method and device for transmitting control message
EP3481010B1 (en) Method, related device, and system for establishing label-switched path for virtual private network
WO2020021558A1 (en) Methods, apparatus and machine-readable media relating to path computation in a communication network
EP4246917A1 (en) Message transmission method, method for acquiring correspondence, and apparatus and system
George et al. Gap analysis for operating IPv6-only MPLS networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant