CN108199946B - Data forwarding method and communication system - Google Patents
Data forwarding method and communication system Download PDFInfo
- Publication number
- CN108199946B CN108199946B CN201711471546.5A CN201711471546A CN108199946B CN 108199946 B CN108199946 B CN 108199946B CN 201711471546 A CN201711471546 A CN 201711471546A CN 108199946 B CN108199946 B CN 108199946B
- Authority
- CN
- China
- Prior art keywords
- end tunnel
- tunnel node
- node
- far
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present disclosure provides a data forwarding method and a communication system, wherein the communication system comprises two near-end tunnel nodes, wherein the two near-end tunnel nodes have a common far-end tunnel node; the method comprises the following steps: if one of the two near-end tunnel nodes, serving as a first near-end tunnel node, detects that the BGP neighbor state between the two near-end tunnel nodes and the far-end tunnel node is disconnected, a first notice is sent to the other near-end tunnel node, serving as a second near-end tunnel node; if the second near-end tunnel node detects that the BGP neighbor state is kept between the second near-end tunnel node and the far-end tunnel node, a preset horizontal forwarding rule is applied, so that the second near-end tunnel node can forward the data sent by the first near-end tunnel node to the far-end tunnel node. Therefore, the problem that data forwarding between the first near-end tunnel node and the far-end tunnel node fails due to the disconnection of the BGP neighbor relation is solved.
Description
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a data forwarding method and a communication system.
Background
An Ethernet Virtual Private Network (EVPN) is a two-layer Virtual Private Network (VPN) technology. The EVPN can provide two-layer interconnection for terminal devices physically dispersed at different locations by using a Virtual Extensible LAN (VXLAN) based on an existing service provider or an existing enterprise IP network. It is also possible to provide three tiers of interconnection for different subnetworks through EVPN gateways and to provide three tiers of interconnection with external networks.
For example, in EVPN networking, a VXLAN is formed by interconnecting a plurality of VXLAN Tunnel nodes (VTEPs) through virtual tunnels, where the VTEPs adopt a Border Gateway Protocol (BGP) neighbor relationship in a control plane, and two Tunnel nodes that are BGP neighbors may interact with each other through BGP to obtain MAC information of a user terminal for data forwarding. And forwarding the message on the data plane EVPN by adopting a VXLAN packaging mode. Terminal devices which are physically dispersed at different positions realize two-layer interconnection by respectively accessing the VTEPs, or realize three-layer interconnection by taking the VTEPs as gateways to realize different subnets.
Disclosure of Invention
In a first aspect, the present disclosure provides a data forwarding method, which is applied to a communication system including two near-end tunnel nodes, where the two near-end tunnel nodes have a common far-end tunnel node, and any two of the two near-end tunnel nodes and the far-end tunnel node are BGP neighbors; the method comprises the following steps:
when one of the two near-end tunnel nodes detects that the BGP neighbor state between the two near-end tunnel nodes and the far-end tunnel node is disconnected, the near-end tunnel node serves as a first near-end tunnel node and sends a first notice to the other near-end tunnel node serving as a second near-end tunnel node;
if the second near-end tunnel node receives the first notification, detecting whether a BGP neighbor state is kept between the second near-end tunnel node and the far-end tunnel node;
if the second near-end tunnel node detects that the BGP neighbor state is maintained with the far-end tunnel node, the second near-end tunnel node applies a preset horizontal forwarding rule to enable the second near-end tunnel node to forward the data sent by the first near-end tunnel node to the far-end tunnel node.
In a second aspect, the present disclosure provides a communication system, including two near-end tunnel nodes, where the two near-end tunnel nodes have a common far-end tunnel node, and any two of the two near-end tunnel nodes and the far-end tunnel node are neighbors of each other by BGP;
when one of the two near-end tunnel nodes detects that the BGP neighbor state between the two near-end tunnel nodes and the far-end tunnel node is disconnected, the near-end tunnel node serves as a first near-end tunnel node and sends a first notice to the other near-end tunnel node serving as a second near-end tunnel node;
if the second near-end tunnel node receives the first notification, detecting whether a BGP neighbor state is kept between the second near-end tunnel node and the far-end tunnel node; if the second near-end tunnel node detects that the BGP neighbor state is maintained with the far-end tunnel node, the second near-end tunnel node applies a preset horizontal forwarding rule to enable the second near-end tunnel node to forward the data sent by the first near-end tunnel node to the far-end tunnel node.
In a third aspect, the present disclosure provides a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the data forwarding method provided by the present disclosure.
Compared with the prior art, the method has the following beneficial effects:
according to the data forwarding method and the communication system provided by the disclosure, when the BGP neighbor relationship between the first near-end tunnel node and the far-end tunnel node is disconnected, a preset horizontal forwarding rule is applied to the second near-end tunnel node, so that the second near-end tunnel node can forward the data which needs to be sent to the far-end tunnel node by the first near-end tunnel node. Therefore, the problem that data forwarding between the first near-end tunnel node and the far-end tunnel node fails due to the disconnection of the BGP neighbor relation is solved.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present disclosure and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings may be obtained from the drawings without inventive effort.
Fig. 1 is a schematic diagram of EVPN dual uplink networking in the prior art;
fig. 2 is a schematic flow chart of a data forwarding method according to an embodiment of the present disclosure;
fig. 3 is a second schematic flow chart of a data forwarding method according to an embodiment of the present disclosure;
fig. 4 is a third schematic flowchart of a data forwarding method according to the embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all embodiments of the present disclosure. The components of the embodiments of the present disclosure, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present disclosure, presented in the figures, is not intended to limit the scope of the claimed disclosure, but is merely representative of selected embodiments of the disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present disclosure, it should be noted that the terms "first", "second", "third", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
In the description of the present disclosure, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present disclosure can be understood in specific instances by those of ordinary skill in the art.
In EVPN networking, in order to increase stability and fault-tolerant capability of communication, a dual-uplink networking mode is often adopted. For example, referring to fig. 1, Host1, Host3, and Host4 may have a plurality of different virtual machines VM respectively installed thereon, and these virtual machines may communicate through VXLAN composed of virtual tunnel nodes VTEP1, VTEP2, VTEP3, and VTEP 4. Any two of VTEP1, VTEP2, VTEP3 and VTEP4 are BGP neighbors. Host1 may communicate with VTEP2 via VTEP1 to send data to a remote tunnel node, VTEP3 or VTEP 4. The link between the VM1 and the VTEP1 and the VTEP2 may adopt a static aggregation manner, that is, when sending data, the Host1 may share the IP address or the MAC address of the data source virtual machine to the VTEP1 or the VTEP2 through a preset load balancing algorithm, and after receiving the data, the VTEP1 or the VTEP2 searches for a corresponding forwarding path according to the MAC obtained through the BGP.
The tunnel node may be a functional module for forwarding data on a host where the virtual machine is located, or may be an independently operating device.
In practical application, BGP neighbor states between virtual tunnel nodes may be abnormal, resulting in failure of data transmission. For example, in the networking environment of fig. 1, if the BGP neighbor state between VTEP1 and VTEP3 is abnormal (e.g., the BGP neighbor state between VTEP1 and VTEP3 is down), the virtual tunnel communication between VTEP1 and VTEP3 cannot be continued, and VTEP1 deletes the MAC entry sent by VTEP3 through BGP.
At this time, if the VETP1 is used as the near-end tunnel node of Host1, when target data that a certain virtual machine on Host1 needs to send to Host3 accessing remote VTEP3 is received, the VTEP1 broadcasts and sends the target data because the corresponding MAC entry cannot be found.
In EVPN networking, in order to prevent a data forwarding loop from occurring, a tunneling node is usually provided with a horizontal splitting function, and a broadcast or unicast message received by a VTEP from a virtual tunnel of a VXLAN can be blocked by the horizontal splitting function and then forwarded from other VXLAN tunnels of the VTEP. Therefore, when receiving the target data broadcast by VTEP1, VTEP2 cannot transmit the target data to VTEP 3. Similarly, when receiving the target data broadcast by VTEP1, VTEP4 cannot send the target data to VTEP 3.
Thus, once the BGP neighbor relationship between VTEP1 and VTEP3 is broken, data transfer between VTEP1 and VTEP3 may fail.
Therefore, in this embodiment, the inventor designs that in a dual uplink networking, when a BGP relationship between one of the near-end tunnel nodes and the far-end tunnel node is broken through interaction between the two near-end tunnel nodes, data can be sent to the far-end tunnel node through the other near-end tunnel node. Next, the data forwarding method and the communication system provided in this embodiment are described in detail.
First, in the communication system provided in this embodiment, the communication system includes two near-end tunnel nodes, where the two near-end tunnel nodes have a common far-end tunnel node, and any two of the two near-end tunnel nodes and any two of the far-end tunnel nodes are adjacent to each other by BGP. For example, referring again to fig. 1, the two near-end tunnel nodes may be the VTEP1 and the VTEP2 shown in fig. 1, respectively, and the far-end tunnel node may be the VTEP3 shown in fig. 1.
A near-end terminal device (Host 1 shown in fig. 1) accessing the near-end tunnel node may transmit data to a far-end terminal device (Host 3 shown in fig. 1) accessing the far-end tunnel node through a virtual tunnel between the near-end tunnel node and the far-end tunnel node.
Referring to fig. 2, the present embodiment further provides a data forwarding method applied to the communication system, and the following describes each step of the method in detail.
Step S210, when detecting that the BGP neighbor state between the two near-end tunnel nodes and the far-end tunnel node is disconnected, one of the two near-end tunnel nodes serves as a first near-end tunnel node and sends a first notification to another near-end tunnel node serving as a second near-end tunnel node.
Because the BGP neighbor relationship between the first near-end tunnel node and the far-end tunnel node is broken, and data between the first near-end tunnel node and the far-end tunnel node cannot be communicated with each other continuously, the first near-end tunnel node deletes or shields the first MAC entry obtained from the far-end tunnel node through BGP.
At this time, since the first MAC entry obtained from the far-end tunnel node is deleted or masked, if the first near-end tunnel node receives the target data that needs to be sent to the far-end tunnel node, the corresponding forwarding address cannot be found, and the target data is broadcasted to other tunnel nodes communicating with the first near-end tunnel node, where the target data is broadcasted to the second near-end tunnel node.
In order to enable the second near-end tunnel node to send the target data to the far-end tunnel node, the first near-end tunnel node needs to send the first notification to the second near-end tunnel node while deleting or masking the first MAC entry obtained from the far-end tunnel node. In this embodiment, a first notification in a Type-length-value (TLV) format under a BGP framework may be defined in advance between the first near-end tunnel node and the second near-end tunnel node, and when detecting that a BGP neighbor relationship with the far-end tunnel node is broken, the first near-end tunnel node sends the first notification to the second tunnel node through BGP.
Step S220, if the second near-end tunnel node receives the first notification, it detects whether a BGP neighbor state is maintained with the far-end tunnel node.
In this embodiment, at this time, if the BGP neighbor relationship between the second near-end tunnel node detection and the far-end tunnel node is also broken, processing may be performed according to a processing mechanism for a tunnel node failure in the EVPN networking itself, and other special processing is not performed, which is not described herein again.
If the second near-end tunnel node detects that the second near-end tunnel node maintains the BGP neighbor state with the far-end tunnel node, step S230 is performed.
Step S230, the second near-end tunnel node applies a preset horizontal forwarding rule, so that the second near-end tunnel node can forward the data sent by the first near-end tunnel node to the far-end tunnel node.
In this embodiment, the second near-end tunnel node stores a preset horizontal forwarding rule, and the preset horizontal forwarding rule has a higher priority for traffic forwarding processing than the horizontal splitting function. And when the horizontal forwarding rule is applied, allowing the second near-end tunnel node to forward the broadcast or unicast message received from the virtual tunnel of a VXLAN and then from other VXLAN tunnels of the second near-end tunnel node.
Specifically, after the horizontal forwarding rule is applied, the second near-end tunnel node writes a preset forwarding configuration into its forwarding chip, so that when the second near-end tunnel node receives data, it executes corresponding forwarding processing according to the forwarding configurations.
Thus, when the data sent by the first near-end tunnel node to the far-end tunnel node is sent to the second near-end tunnel node, the second near-end tunnel node may send the received data to the far-end tunnel node through a virtual tunnel according to the preset horizontal forwarding rule.
Further, since the broadcasting of the target data by the first near-end tunnel node may occupy more network communication resources, in this embodiment, referring to fig. 4, the data forwarding method may further include step S240 after step S230.
Step S240, the second near-end tunnel node sends the second MAC entry acquired from the far-end tunnel node to the first near-end tunnel node, so that the first near-end tunnel node sends the data to be sent to the far-end tunnel node to the second near-end tunnel node according to the second MAC entry received from the second near-end tunnel node.
The second near-end tunnel node may send, to the first near-end tunnel node, the second MAC entry obtained from the far-end tunnel node through BGP, and after receiving target data that needs to be sent to the far-end tunnel node, the first near-end tunnel node may forward, to the second near-end tunnel node in a unicast manner according to the second MAC entry received from the second near-end tunnel node. Therefore, the mode of broadcasting the target data is converted into the unicast mode, and the occupation of network communication resources can be reduced.
Further, after step S240, if the first near-end tunnel node detects that the BGP neighbor state between the first near-end tunnel node and the far-end tunnel node is recovered, it needs to recover the direct communication with the far-end tunnel node. In this embodiment, referring to fig. 4 again, after step S240, the data forwarding method may further include step S250 and step S260.
Step S250, if the first near-end tunnel node detects that the BGP neighbor state with the far-end tunnel node is restored, delete the second MAC entry obtained from the second near-end tunnel node, and send a second notification to the second near-end tunnel node.
And if the first near-end tunnel node detects that the BGP neighbor state of the first near-end tunnel node and the far-end tunnel node is recovered, the second near-end tunnel node is not required to forward target data which are required to be sent to the far-end tunnel node. In this embodiment, if the first near-end tunnel node detects that the BGP neighbor state with the far-end tunnel node is restored, the second MAC entry obtained from the second near-end tunnel node is deleted.
After the first near-end tunnel node deletes the second MAC entry, it is further necessary to obtain a new MAC entry from the far-end tunnel node again in subsequent interaction for data forwarding, which is not described herein again.
Step S260, if the second near-end tunnel node receives the second notification, the second near-end tunnel node stops applying the preset horizontal forwarding rule.
After the BGP neighbor state between the first near-end tunnel node and the far-end tunnel node is recovered, the target data does not need to be forwarded by the second near-end tunnel node any more, so in this embodiment, if the second near-end tunnel node receives the second notification, the second near-end tunnel node stops applying the preset horizontal forwarding rule. After stopping the preset horizontal forwarding rule, the data between the first near-end tunnel node and the second near-end tunnel node is limited by the horizontal division function of the EVPN networking again.
In this embodiment, both the two near-end tunnel nodes may serve as the first near-end tunnel node or the second near-end tunnel node to execute the method provided in this embodiment, for example, in the networking scenario shown in fig. 1, if it is detected by VTEP1 that the BGP neighbor relationship with VTEP3 is broken, VTEP1 serves as the first near-end tunnel node, and VTEP2 serves as the second tunnel node to execute the steps of the method; if a break in the BGP neighbor relationship with VTEP3 is detected by VTEP2, then VTEP2 acts as the first near-end tunnel node and VTEP1 acts as the second tunnel node to perform the steps of the method.
In summary, according to the data forwarding method and the communication system provided by the present disclosure, when the BGP neighbor relationship between the first near-end tunnel node and the far-end tunnel node is broken, a preset horizontal forwarding rule is applied to the second near-end tunnel node, so that the second near-end tunnel node can forward the data that the first near-end tunnel node needs to send to the far-end tunnel node. Therefore, the problem that data forwarding between the first near-end tunnel node and the far-end tunnel node fails due to the disconnection of the BGP neighbor relation is solved.
In the embodiments provided in the present disclosure, it should be understood that the disclosed system and method may be implemented in other ways. The above-described system embodiments are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present disclosure may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a machine-readable storage medium. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. For example, in the present embodiment, each tunnel node may include a respective readable storage medium and a processor, with the machine-readable storage medium storing machine-executable instructions. Each tunnel node stores executable instructions that, when invoked and executed by its processor, cause its processor to implement the data forwarding method provided by the present embodiment.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only for the specific embodiments of the present disclosure, but the scope of the present disclosure is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present disclosure, and all the changes or substitutions should be covered within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.
Claims (11)
1. A data forwarding method is characterized in that the method is applied to a communication system comprising two near-end tunnel nodes, wherein the two near-end tunnel nodes have a common far-end tunnel node, and any two of the two near-end tunnel nodes and the far-end tunnel node are mutually adjacent to a Border Gateway Protocol (BGP); the method comprises the following steps:
when one of the two near-end tunnel nodes detects that the BGP neighbor state between the two near-end tunnel nodes and the far-end tunnel node is disconnected, the near-end tunnel node serves as a first near-end tunnel node and sends a first notice to the other near-end tunnel node serving as a second near-end tunnel node;
if the second near-end tunnel node receives the first notification, detecting whether a BGP neighbor state is kept between the second near-end tunnel node and the far-end tunnel node;
if the second near-end tunnel node detects that the BGP neighbor state is maintained with the far-end tunnel node, the second near-end tunnel node applies a preset horizontal forwarding rule to enable the second near-end tunnel node to forward the data sent by the first near-end tunnel node to the far-end tunnel node.
2. The method of claim 1, wherein if the second near-end tunnel node detects that the BGP neighbor state is maintained with the far-end tunnel node, the method further comprises:
and the second near-end tunnel node sends the MAC table entry acquired from the far-end tunnel node to the first near-end tunnel node, so that the first near-end tunnel node sends the data required to be sent to the far-end tunnel node to the second near-end tunnel node according to the MAC table entry received from the second near-end tunnel node.
3. The method of claim 2, further comprising:
if the first near-end tunnel node detects that the BGP neighbor state of the first near-end tunnel node is recovered from the far-end tunnel node, deleting the MAC table entry obtained from the second near-end tunnel node, and sending a second notification to the second near-end tunnel node;
and if the second near-end tunnel node receives the second notification, stopping applying the preset horizontal forwarding rule.
4. The method of claim 1, further comprising:
before the second near-end tunnel node sends the MAC table entry acquired from the far-end tunnel node to the first near-end tunnel node, the first near-end tunnel node sends the data to be sent to the far-end tunnel node to the BGP neighbor tunnel node of the first near-end tunnel node in a broadcast manner.
5. The method of claim 1, wherein the preset horizontal forwarding rule prioritizes traffic forwarding processing higher than a horizontal split function.
6. A communication system is characterized by comprising two near-end tunnel nodes, wherein the two near-end tunnel nodes have a common far-end tunnel node, and any two of the two near-end tunnel nodes and the far-end tunnel node are mutually adjacent to a Border Gateway Protocol (BGP);
when one of the two near-end tunnel nodes detects that the BGP neighbor state between the two near-end tunnel nodes and the far-end tunnel node is disconnected, the near-end tunnel node serves as a first near-end tunnel node and sends a first notice to the other near-end tunnel node serving as a second near-end tunnel node;
if the second near-end tunnel node receives the first notification, detecting whether a BGP neighbor state is kept between the second near-end tunnel node and the far-end tunnel node; if the second near-end tunnel node detects that the BGP neighbor state is maintained with the far-end tunnel node, the second near-end tunnel node applies a preset horizontal forwarding rule to enable the second near-end tunnel node to forward the data sent by the first near-end tunnel node to the far-end tunnel node.
7. The system according to claim 6, wherein if the second near-end tunnel node detects that the BGP neighbor state is maintained with the far-end tunnel node, the second near-end tunnel node sends the MAC entry acquired from the far-end tunnel node to the first near-end tunnel node, so that the first near-end tunnel node sends the data that needs to be sent to the far-end tunnel node to the second near-end tunnel node according to the MAC entry received from the second near-end tunnel node.
8. The system according to claim 7, wherein if the first near-end tunnel node detects that the BGP neighbor state with the far-end tunnel node is restored, the first near-end tunnel node deletes the MAC entry obtained from the second near-end tunnel node, and sends a second notification to the second near-end tunnel node;
and if the second near-end tunnel node receives the second notification, stopping applying the preset horizontal forwarding rule.
9. The system according to claim 7, wherein before the second near-end tunnel node sends the second MAC entry obtained from the far-end tunnel node to the first near-end tunnel node, the first near-end tunnel node sends data to be sent to the far-end tunnel node to the BGP neighbor tunnel node of the first near-end tunnel node in a broadcast manner.
10. The system of claim 6, wherein the predetermined horizontal forwarding rules prioritize traffic forwarding processing over horizontal split functionality.
11. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711471546.5A CN108199946B (en) | 2017-12-29 | 2017-12-29 | Data forwarding method and communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711471546.5A CN108199946B (en) | 2017-12-29 | 2017-12-29 | Data forwarding method and communication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108199946A CN108199946A (en) | 2018-06-22 |
CN108199946B true CN108199946B (en) | 2020-08-14 |
Family
ID=62586316
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711471546.5A Active CN108199946B (en) | 2017-12-29 | 2017-12-29 | Data forwarding method and communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108199946B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103841028A (en) * | 2014-03-24 | 2014-06-04 | 杭州华三通信技术有限公司 | Method and device for forwarding messages |
CN104869042A (en) * | 2014-02-20 | 2015-08-26 | 华为技术有限公司 | Message forwarding method and message forwarding device |
CN105763440A (en) * | 2016-01-29 | 2016-07-13 | 杭州华三通信技术有限公司 | Message forwarding method and device |
CN105791457A (en) * | 2016-02-26 | 2016-07-20 | 杭州华三通信技术有限公司 | Data processing method and apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9137119B2 (en) * | 2013-03-07 | 2015-09-15 | Cisco Technology, Inc. | Efficient handling of multi-destination traffic in an internet protocol fabric data center |
-
2017
- 2017-12-29 CN CN201711471546.5A patent/CN108199946B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104869042A (en) * | 2014-02-20 | 2015-08-26 | 华为技术有限公司 | Message forwarding method and message forwarding device |
CN103841028A (en) * | 2014-03-24 | 2014-06-04 | 杭州华三通信技术有限公司 | Method and device for forwarding messages |
CN105763440A (en) * | 2016-01-29 | 2016-07-13 | 杭州华三通信技术有限公司 | Message forwarding method and device |
CN105791457A (en) * | 2016-02-26 | 2016-07-20 | 杭州华三通信技术有限公司 | Data processing method and apparatus |
Non-Patent Citations (1)
Title |
---|
《基于VXLAN的EVPN技术研究与实现》;钟耿辉等;《计算机技术与发展》;20170313;第27卷(第5期);第46-50页 * |
Also Published As
Publication number | Publication date |
---|---|
CN108199946A (en) | 2018-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3148127A1 (en) | Egress protection for bum traffic with link failures in evpn | |
CN110417569B (en) | Network link fault processing method and tunnel endpoint equipment | |
EP2911341B1 (en) | Method and device for dynamically switching gateway of distributed resilient network interconnect | |
CN110730125B (en) | Message forwarding method and device, dual-active system and communication equipment | |
CN110798403B (en) | Communication method, communication device and communication system | |
CN111935013B (en) | Flow forwarding control method and device, flow forwarding method and chip, and switch | |
US20240121178A1 (en) | Failure protection Method and Apparatus, Storage Medium, and Electronic Device | |
CN105162704A (en) | Multicast replication method and device in Overlay network | |
CN108989200A (en) | data packet forwarding method, device and system | |
CN104184708A (en) | Method of inhabiting MAC address attack in EVI (Ethernet Virtualization Interconnection) network and ED (edge device) | |
US20140050092A1 (en) | Load sharing method and apparatus | |
CN105471725A (en) | Routing method and routing device for traversing autonomous system | |
US9467370B2 (en) | Method and system for network traffic steering based on dynamic routing | |
WO2018107974A1 (en) | Routing switching-back method, and controller and system | |
CN111083049A (en) | User table item recovery method and device, electronic equipment and storage medium | |
EP3566401B1 (en) | Detecting and mitigating loops | |
CN108259325B (en) | Route maintenance method and route equipment | |
CN105763463A (en) | Method and device for transmitting link detection message | |
CN108199946B (en) | Data forwarding method and communication system | |
WO2017000542A1 (en) | Oam configuration method and apparatus for service single board | |
US20200136946A1 (en) | System and method for determining branch gateway device availability in computer networks | |
US11570073B1 (en) | Service status notification | |
US10756813B1 (en) | Broadband subscriber switchover in a ring network | |
US20140293827A1 (en) | Method And Apparatus For Peer Node Synchronization | |
CN115022120B (en) | Message suppression method, device and medium for MLAG in VXLAN network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |