CN109831378B - Message timeout response method and device - Google Patents

Message timeout response method and device Download PDF

Info

Publication number
CN109831378B
CN109831378B CN201910099661.7A CN201910099661A CN109831378B CN 109831378 B CN109831378 B CN 109831378B CN 201910099661 A CN201910099661 A CN 201910099661A CN 109831378 B CN109831378 B CN 109831378B
Authority
CN
China
Prior art keywords
message
identifier
packet
overtime
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910099661.7A
Other languages
Chinese (zh)
Other versions
CN109831378A (en
Inventor
郭威
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Information Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201910099661.7A priority Critical patent/CN109831378B/en
Publication of CN109831378A publication Critical patent/CN109831378A/en
Application granted granted Critical
Publication of CN109831378B publication Critical patent/CN109831378B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the application provides a message timeout response method and device. The method comprises the following steps: storing a message identifier and a source address of a first message to be sent to the second PE device and a VPN identifier of a VPN instance to which the first message belongs; modifying the source address of the first message into the address of the first PE device to obtain a second message; sending the second message to the P equipment; when receiving an overtime message sent by the P equipment, matching a message identifier carried by the overtime message with a stored message identifier so as to find a message identifier which is the same as the message identifier carried by the overtime message in the stored message identifier and serve as a target message identifier; and forwarding the overtime message to the source end of the first message corresponding to the target message identifier according to the source address and the VPN identifier corresponding to the target message identifier. The probability that the source end of the first message cannot normally receive the overtime message can be reduced.

Description

Message timeout response method and device
Technical Field
The present application relates to the field of MPLS networking technologies, and in particular, to a message timeout response method and apparatus.
Background
Two user sites may not be able to directly establish communication connection due to being in different geographical locations, and may forward a message between the user sites on a service provider backbone network through an MPLS (Multiprotocol Label Switching) technology, thereby implementing communication connection between the two user sites. Fig. 1 is a schematic diagram of a networking architecture of MPLS networking, which includes a first CE (Customer Edge) device 111, a first PE (Provider Edge) device 121, multiple P (Provider Edge) devices 130, a second CE device 112, and a second PE device 122.
In some application scenarios, for an actual requirement (e.g., To prevent a packet from being forwarded in a loop or To perform a trace route), a packet (e.g., a trace route packet) may carry TTL (Time To Live), where the TTL is reduced by 1 every Time the packet passes through a network device in a forwarding process, and when a network device at a non-destination end receives the packet with TTL of 1, the packet is determined To be overtime, and an ICMP (Internet Control Message Protocol) overtime packet carrying an overtime error Message is sent To a source end of the packet, so as To respond that the source end is overtime after the packet reaches the network device. In MPLS networking, the P device 130 forwards the packet based on the public network label encapsulated by the PE device for the packet, so the routing table of the user network is stored in the PE device, and the P device 130 does not locally store the routing table of the user network. Therefore, after the P device 130 receives the TTL packet with 1 and the source address of the packet is the address of the network device of the user network (e.g., the address of the user site and the address of the CE device), the P device 130 cannot find a route for sending the ICMP timeout packet to the source end according to the source address of the packet, so that the P device 130 cannot respond to the source end.
In the related art, taking an overtime message as an example of a message sent by the first CE device 111 to the second CE device 112, the P device 130 may send an ICMP overtime message to the second PE device 122 according to a public network tag encapsulated by the first PE device 121, where the ICMP overtime message carries a source address of the message and a private network tag indicating a user network to which the message belongs, and the second PE device 122 searches a local routing table according to the source address and the private network tag of the message, determines a route for sending the ICMP overtime message to the first CE device 111, and sends the ICMP overtime message to the P device 130 after re-encapsulating a corresponding public network tag for the ICMP overtime message. The P device 130 forwards the ICMP timeout packet to the first PE device 121 according to the public network label repackaged by the ICMP timeout packet, and forwards the ICMP timeout packet to the first CE device 111 through the first PE device 121.
However, if the communication connection between P device 130 and second PE device 122 fails, the source end may not normally receive the ICMP timeout message.
Disclosure of Invention
An object of the embodiments of the present application is to provide a message timeout response method, so as to reduce a probability that a network device of a user network cannot normally receive a timeout message when a message sent by the network device of the user network is timeout in a public network. The specific technical scheme is as follows:
in a first aspect of the embodiments of the present application, a message timeout response method is provided, where the method is applied to a first PE device in an MPLS networking, where the MPLS networking further includes a second PE device and a P device, and the P device is connected between the first PE and the second PE, where the method includes:
storing a message identifier and a source address of a first message to be sent to the second PE device and a VPN identifier of a VPN instance to which the first message belongs;
modifying the source address of the first message into the address of the first PE device to obtain a second message;
sending the second message to the P equipment;
when receiving an overtime message sent by the P equipment, matching a message identifier carried by the overtime message with a stored message identifier so as to find a message identifier which is the same as the message identifier carried by the overtime message in the stored message identifier and serve as a target message identifier;
and forwarding the overtime message to the source end of the first message corresponding to the target message identifier according to the source address and the VPN identifier corresponding to the target message identifier.
With reference to the first aspect, in a first possible implementation manner, before the storing a packet identifier and a source address of a first packet that needs to be sent to the second PE device, and a VPN identifier of a VPN instance to which the first packet belongs, the method further includes:
obtaining a public network route used for sending a message to the second PE equipment;
determining whether the first message is overtime before being sent to the second PE device based on the public network route and the survival time carried by the first message;
if the first message is overtime before being sent to the second PE equipment, the step of storing the message identifier, the source IP address and the VPN identifier of the VPN example to which the first message belongs of the first message, which is required to be sent to the second PE equipment, is executed;
and if the first message is overtime before being sent to the second PE equipment, sending the first message to the P equipment.
With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner, the determining, based on the public network route and the lifetime carried by the first packet, whether the first packet is to be overtime before being sent to the second PE device includes:
determining the number of network devices passing from the first PE device to the second PE device in the public network route;
and if the survival time carried by the first message is less than the number of the network devices, determining that the first message is overtime before being sent to the second PE device.
With reference to the first or second possible implementation manner of the first aspect, in a third possible implementation manner, the obtaining a public network route used for sending a packet to the second PE device includes:
and calculating to obtain a public network route with the minimum hop count from the first PE equipment to the second PE equipment by using a minimum spanning tree algorithm, wherein the public network route is used for sending a message to the second PE equipment.
With reference to the first aspect, in a fourth possible implementation manner, the storing a packet identifier and a source address of a first packet that needs to be sent to the second PE device, and a VPN identifier of a VPN instance to which the first packet belongs includes:
storing a message identifier and a source address of a first message to be sent to the second PE device and a VPN identifier of a VPN instance to which the first message belongs in a local triple of the first PE device;
after matching the message identifier carried by the timeout message with the stored message identifier to find the message identifier identical to the message identifier carried by the timeout message from the stored message identifier, and using the found message identifier as the target message identifier, the method further includes:
and taking the source address in the triple to which the target message identifier belongs as a target source address, and taking the VPN identifier as a target VPN identifier.
In a second aspect of the present embodiment, a message timeout response method is provided, where the method is applied to a P device in an MPLS networking, where the MPLS networking further includes a first PE device and a second PE device, and the P device is connected between the first PE device and the second PE device, where the method includes:
after determining that a received second message sent from the first PE device to the second PE device is overtime, acquiring a message identifier and a source address carried by the second message, wherein the source address of the second message is modified into the address of the first PE device by the first PE device;
and sending an overtime message to the first PE equipment based on the source address, wherein the overtime message carries the message identifier.
With reference to the second aspect, in a first possible implementation manner, the sending a timeout packet to the first PE device based on the source address includes:
inquiring a locally stored route table item learned in the process of establishing a Border Gateway Protocol (BGP) neighbor relation between the first PE device and the second PE device, and determining a public network route corresponding to the source address;
and sending an overtime message to the first PE equipment based on the public network route.
In a third aspect of the embodiments of the present application, a message timeout response apparatus is provided, where the apparatus is applied to a first PE device in an MPLS networking, where the MPLS networking further includes a second PE device and a P device, and the P device is connected between the first PE and the second PE, and the apparatus includes:
an identifier storage module, configured to store a packet identifier of a first packet that needs to be sent to the second PE device, a source address, and a VPN identifier of a VPN instance to which the first packet belongs;
an address modification module, configured to modify a source address of the first packet into an address of the first PE device, so as to obtain a second packet;
a message sending module, configured to send the second message to the P device;
the identification matching module is used for matching the message identification carried by the overtime message with the stored message identification when the overtime message sent by the P equipment is received, so that the message identification which is the same as the message identification carried by the overtime message is found in the stored message identification and is used as a target message identification;
the packet sending module is further configured to forward the timeout packet to the source end of the first packet corresponding to the target packet identifier according to the source address and the VPN identifier corresponding to the target packet identifier.
With reference to the third aspect, in a first possible implementation manner, the identifier storing module is further configured to, before the storing of the packet identifier and the source address of the first packet that needs to be sent to the second PE device and the VPN identifier of the VPN instance to which the first packet belongs,
obtaining a public network route used for sending a message to the second PE equipment;
determining whether the first message is overtime before being sent to the second PE device based on the public network route and the survival time carried by the first message;
if the first message is overtime before being sent to the second PE equipment, the step of storing the message identifier, the source IP address and the VPN identifier of the VPN example to which the first message belongs of the first message, which is required to be sent to the second PE equipment, is executed;
and if the first message is overtime before being sent to the second PE equipment, sending the first message to the P equipment.
With reference to the first possible implementation manner of the third aspect, in a second possible implementation manner, the identifier saving module is specifically configured to determine the number of network devices that pass through from the first PE device to the second PE device in the public network route;
if the survival time carried by the first message is less than the number of the network devices, determining that the first message is overtime before being sent to the second PE device;
and if the survival time carried by the first message is not less than the number of the network equipment, determining that the first message is not overtime before being sent to the second PE equipment.
With reference to the first or second possible implementation manner of the third aspect, in a third possible implementation manner, the identifier storage module is specifically configured to calculate, by using a minimum spanning tree algorithm, a public network route with a minimum hop count from the first PE device to the second PE device, and use the public network route as a public network route used for sending a packet to the second PE device.
With reference to the third aspect, in a fourth possible implementation manner, the identifier storing module is specifically configured to store a packet identifier and a source address of a first packet that needs to be sent to the second PE device, and a VPN identifier of a VPN instance to which the first packet belongs, in a local triple of the first PE device;
the message sending module is further configured to match the message identifier carried in the timeout message with a stored message identifier, to find a message identifier that is the same as the message identifier carried in the timeout message from the stored message identifier, and after the message identifier is used as a target message identifier, use a source address in a triplet to which the target message identifier belongs as a target source address, and use a VPN identifier as a target VPN identifier.
In a fourth aspect of the embodiments of the present application, a message timeout response apparatus is provided, where the apparatus is applied to a P device in an MPLS networking, where the MPLS networking further includes a first PE device and a second PE device, and the P device is connected between the first PE device and the second PE device, and the apparatus includes:
an identifier obtaining module, configured to obtain a message identifier and a source address carried in a second message after determining that the received second message sent from the first PE device to the second PE device is overtime, where the source address of the second message is modified to the address of the first PE device by the first PE device;
and the overtime response module is used for sending an overtime message to the first PE equipment based on the source address, wherein the overtime message carries the message identifier.
With reference to the fourth aspect, in a first possible implementation manner, the timeout response module is specifically configured to query a locally stored routing table entry learned in a process of establishing a BGP neighbor relation between the first PE device and the second PE device, and determine a public network route corresponding to the source address;
and sending an overtime message to the first PE equipment based on the public network route.
In a fifth aspect of the embodiments of the present application, a first PE device is provided, where the first PE device is applied to MPLS networking, where the MPLS networking further includes a second PE device, and the first PE includes:
a first memory for storing a computer program;
a first processor, configured to implement the message timeout response method according to any one of the first aspect above when executing a program stored in a memory.
In a sixth aspect of the embodiments of the present application, a P device is provided, where the P device is applied to MPLS networking, where the MPLS networking further includes a first PE device and a second PE device, and the P device includes:
a second memory for storing a computer program;
and a second processor, configured to implement the message timeout response method according to any one of the second aspects when executing the program stored in the memory.
In a seventh aspect of embodiments of the present application, a computer-readable storage medium is provided, where a computer program is stored in the computer-readable storage medium, and when executed by a processor, the computer program implements the message timeout response method according to any one of the above first aspects.
In an eighth aspect of the embodiments of the present application, a computer-readable storage medium is provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the message timeout response method according to any one of the second aspects.
According to the message timeout response method and device provided by the embodiment of the application, the source address of the first message can be modified into the address of the first PE device, so that if the modified second message is overtime after reaching the P device, the P device can directly send the timeout message to the first PE device without passing through the second PE device based on the source address of the second message, and even if the communication connection between the P device and the second PE device fails, the source end can normally receive the timeout message, so that the probability that the source end of the first message cannot normally receive the timeout message is reduced. Of course, not all advantages described above need to be achieved at the same time in the practice of any one product or method of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of MPLS networking according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a message timeout response method according to an embodiment of the present application;
fig. 3 is another schematic flow chart of a message timeout response method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an MPLS networking according to an embodiment of the present application;
fig. 5 is a schematic diagram illustrating a principle of a message timeout response according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a message timeout response device according to an embodiment of the present application;
fig. 7 is another schematic structural diagram of a message timeout response device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a first PE device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a P device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In some application scenarios, a network device may implement a traceroute (Tracert) function through a packet carrying a lifetime, so as to determine a network device through which the packet passes in a process of sending the packet to another network device by the network device.
For example, taking the networking structure shown in fig. 1 as an example, assume that, through a traceroute function, the first CE device 111 determines, in a process of sending a message to the second CE device 112 by the first CE device 111, a network device through which the message passes, and further may determine whether a communication connection of the passed network device has a fault.
The first CE device 111 may send a traceroute packet with a lifetime of 1 to the second CE device 112, and no application program in the second CE device 112 uses a port number that is the same as a UDP (User Datagram Protocol) port number of the traceroute packet. The traceroute packet is sent to the first PE device 121, because the lifetime is 1, the first PE device 121 responds to the first CE device 111 with an timeout packet, where the timeout packet carries an IP address of the first PE device 121, and the first CE device 111 may obtain the IP address of the first PE device 121 from the timeout packet, that is, the first CE device 111 obtains an address of a first hop in a packet sending process to the second CE device 112.
The first CE device 111 sends the traceroute packet with a lifetime of 2 to the second CE device 112, and no application in the second CE device 112 uses the same port number as the UDP port number of the traceroute packet. The traceroute packet is forwarded to the P device 130 via the first PE device 121, and since the lifetime is 2, the P device 130 responds to the first CE device 111 with an timeout packet, where the timeout packet carries an IP address of the P device 130, and the first CE device 111 may obtain the IP address of the P device 130 from the timeout packet, that is, the first CE device 111 obtains an address of a second hop in the process of sending the packet to the second CE device 112.
And so on, until the first CE device 111 sends the traceroute packet with the lifetime n to the second CE device 112, and no application program in the second CE device 112 uses the same port number as the UDP port number of the traceroute packet. n is the number of network devices through which the trace routing packet passes in the process of sending the trace routing packet to the second CE device 112 by the first CE device 111. Since the lifetime is n, the traceroute packet may be sent to the second CE device 112, and since there is no application program in the second CE device 112 using the same port number as the UDP port number of the traceroute packet, the second CE device 112 may respond to the first CE device 111 with a service packet indicating that the port is unreachable, where the service packet carries an IP address of the second CE device 112. The first CE device 111 may obtain the IP address of the second CE device 112 from the timeout message, that is, the first CE device 111 obtains the address of the destination end in the process of sending the message to the second CE device 112.
However, in the related art, in the process of responding to the timeout packet from the first CE device 111, the route of the timeout packet is P device 130 → second PE device 122 → P device 130 → first PE device 121 → first CE device 111. Therefore, if a communication failure occurs between the P device 130 and the second PE device 122, the first CE device 111 cannot normally receive the timeout packet responding to the traceroute packet with the lifetime of 3, which may result in an erroneous determination that a communication failure exists between the first CE device 111 and the P device 130.
In view of this, an embodiment of the present application provides a message timeout response method, which may be referred to fig. 2, where fig. 2 is a schematic flow chart of the message timeout response method provided in the embodiment of the present application, and the method may include:
s201, storing a message identifier, a source address, and a VPN identifier of a VPN instance to which the first message belongs, of the first message to be sent to the second PE device.
The first packet may be a packet sent by one network device to another network device in the user network, and may be, for example, a packet sent by the first CE device to the second CE device. Different message identifiers of different first messages are different, and different information of the first messages can be used as the message identifiers of the first messages according to different application scenes. For example, in some application scenarios, the UDP port number of the first packet may be used as the packet identifier.
The stored message identifier and source address of the first message and the VPN identifier of the VPN instance may be selected in different ways to establish a corresponding relationship according to actual requirements. For example, in an alternative embodiment, the packet identifier, the source IP address, and the VPN identifier of the VPN instance of the first packet may be stored in a triplet local to the first PE device.
S202, the source address of the first message is modified into the address of the first PE device, and a second message is obtained.
The address of the first PE device may be an IP address used when the first PE device establishes a BGP (Border Gateway Protocol) neighbor relationship with the second PE device. The P device locally stores a routing table entry corresponding to the address.
S203, sending the second message to the P device.
The second message sent by the first PE device to the second PE device is packaged in advance by the first PE device, and a public network label used for representing a public network route of the second message and a private network label used for representing a user network to which the first message belongs are packaged. For forwarding the second packet in the MPLS network, reference may be made to the related description in the background art, which is not described herein again.
S204, when receiving the overtime message sent by the P equipment, matching the message identifier carried by the overtime message with the stored message identifier, so as to find the message identifier which is the same as the message identifier carried by the overtime message in the stored message identifier, and using the message identifier as the target message identifier.
The message identifier carried by the overtime message is the same as the message identifier of the second message corresponding to the overtime message, and the message identifier of the second message is the same as the message identifier of the corresponding first message because the second message is obtained by modifying the address based on the first message. For example, it is assumed that a packet identifier of a second packet sent by a first PE device to a second PE device is a packet identifier a, the second packet is determined to be overtime after reaching a P device, and the P device responds to a source end of the second packet with an overtime packet, so that the packet identifier carried by the overtime packet is the packet identifier a.
The hash value of the stored message identifier may be calculated in advance as an index, and when the timeout message is received, the hash value of the message identifier carried by the timeout message is calculated, so as to find the message identifier identical to the message identifier carried by the timeout message from the stored message identifiers.
S205, according to the source address and the VPN identification corresponding to the target message identification, the overtime message is forwarded to the source end of the first message corresponding to the target message identification.
For example, the first PE device locally stores the message identifier, the source address, and the VPN identifier in a triple form, where the VPN identifier in the triple to which the target message identifier belongs may be used as the VPN identifier corresponding to the target message identifier, and the source address is used as the source address corresponding to the target message identifier.
The source end of the timeout message is sent to the source end of the network, and the source end of the timeout message is sent to the source end of the network.
Because the message identifier carried by the timeout message is the same as the message identifier of the second message corresponding to the timeout message, the target source address is the source address of the first message corresponding to the second message corresponding to the timeout message, the target VPN identifier is the VPN identifier of the VPN instance to which the second message corresponding to the timeout message belongs, and the VPN identifiers of the first message and the second message are the same. The first PE device may forward the timeout packet to the source end of the first packet based on the target source address and the target VPN identification.
With the embodiment, the source address of the first packet can be modified into the address of the first PE device, so that if the modified second packet is overtime after reaching the P device, the P device can directly send the overtime packet to the first PE device without passing through the second PE device based on the source address of the second packet, and even if the communication connection between the P device and the second PE device fails, the source end can normally receive the overtime packet, thereby reducing the probability that the source end of the first packet cannot normally receive the overtime packet.
Referring to fig. 1, a network device through which a message passes in a process in which the first CE device 111 determines that the first CE device 111 sends the message to the second CE device 112 through a traceroute function is taken as an example. If the message timeout response method provided in the embodiment of the present application is used, because the first PE device 121 modifies the source address of the trace route message sent by the first CE device 111 to the second CE device 112 to the address of the first PE device 121, if the modified trace route message is determined to be timeout after reaching the P device 130, the P device 130 may send the timeout message to the first PE device 121 according to the locally stored routing table entry on the premise of not passing through the second PE device 122, and forward the timeout message to the first CE device 111 through the first PE device 121. That is, in the process that the P device 130 responds to the first CE device 111 with the timeout packet, the route of the timeout packet is the P device 130 → the first PE device 121 → the first CE device 111. Therefore, even if a communication failure occurs between the P device 130 and the second PE device 122, the first CE device 111 can still normally receive the timeout packet responded by the P device 130, thereby reducing the probability of determining that a communication failure occurs between the first CE device and the P device 130 by an error.
Because the second PE device stores the routing table entry of the user network, even if the first PE device does not modify the source address of the first packet, the second PE device can respond to the source end with the timeout packet according to the source address of the timeout packet. That is, if the first PE device needs to send the first packet to the second PE device, the first packet is not determined to be overtime after reaching the P device, and the first PE device may not modify the source address of the first packet, but occupies system resources. In view of this, referring to fig. 3, fig. 3 is a schematic flow chart of a message timeout response method provided in the embodiment of the present application, and the method may include:
s301, obtaining a public network route used for sending the message to the second PE device.
The public network route with the minimum hop count from the first PE device to the second PE device may be calculated by using a minimum spanning tree algorithm, and is used as the public network route for sending the packet to the second PE device. In other optional embodiments, a public network route used for sending a packet to the second PE device may also be stored in the first PE device in advance.
S302, based on the public network route and the survival time carried by the first message, determining whether the first message is overtime before being sent to the second PE device.
Taking the networking structure shown in fig. 1 as an example, assume that a public network route used for sending a message to the second PE device is: first PE device → P device 1 → P device 2 → P device 4 → second PE device. If the first packet will not time out before being sent to the second PE device, the lifetime of the first packet should be at least 1 when it reaches the second PE device. Therefore, if the lifetime of the first packet to be sent to the second PE device is less than 5, the first packet will time out before being sent to the second PE device.
In an optional embodiment, the number of network devices passing through from the first PE device to the second PE device in the public network route may be determined, and if the lifetime carried by the first packet is less than the number of network devices, it is determined that the first packet will time out before being sent to the second PE device. It can be understood that, since the lifetime of the first packet decreases as the number of times the first packet is forwarded increases, the lifetime of the same first packet received by different network devices is different. The lifetime in this embodiment is the lifetime of the first packet after reaching the first PE device. The network devices through which the first PE device passes to the second PE device include the first PE device and the second PE device.
In other alternative embodiments, the network device through which the first PE device passes to the second PE device may not include the first PE device and/or the second PE device, but the determination condition needs to be changed accordingly. For example, if the network device passed by the first PE device to the second PE device does not include the first PE device, it may be determined that the first message will time out before being sent to the second PE device when the lifetime carried by the first message is less than or equal to the number of network devices, and determined that the first message will not time out before being sent to the second PE device when the lifetime carried by the first message is greater than the number of network devices.
Since the first packet may be considered to pass through a network device after reaching the first PE device, theoretically, the lifetime of the first packet should be reduced by 1, but the first PE device reduces the lifetime of the packet by 1 when sending the packet. Therefore, in an alternative embodiment, the lifetime carried by the first packet may also be reduced by 1, and the lifetime after the reduction by 1 is compared with the number of network devices to determine whether the first packet will timeout before being sent to the second PE device. The determination conditions may be different according to different network devices included in the network devices through which the first PE device passes to the second PE device. For example, in a possible application scenario, the network device that the first PE device passes through to the second PE device does not include the first PE device and the second PE device, and it may be determined that the first packet will time out before being sent to the second PE device when the lifetime after reducing 1 is less than or equal to the number of network devices, and it is determined that the first packet will not time out before being sent to the second PE device when the lifetime after reducing 1 is not less than the number of network devices.
S303, if the first message is overtime before being sent to the second PE device, storing the message identifier, the source address and the VPN identifier of the VPN instance to which the first message belongs of the first message, wherein the message identifier and the source address of the first message need to be sent to the second PE device.
The step is the same as S201, and reference may be made to the foregoing description related to S201, which is not described herein again. If the second packet is not timed out before being sent to the second PE device, the first PE device may directly send the first packet to the second PE device.
S304, the source address of the first message is modified into the address of the first PE device, and a second message is obtained.
The step is the same as S202, and reference may be made to the foregoing description related to S202, which is not repeated herein.
S305, sending a second message to the P equipment.
The step is the same as S203, and reference may be made to the foregoing description about S203, which is not repeated herein.
S306, when receiving the overtime message sent by the P device, matching the message identifier carried by the overtime message with the stored message identifier, so as to find the message identifier which is the same as the message identifier carried by the overtime message in the stored message identifier, and using the message identifier as the target message identifier.
The step is the same as S204, and reference may be made to the foregoing description related to S204, which is not repeated herein. The timeout message received by the first PE device may be a timeout message responded by the P device, or may be a timeout message responded by another network device other than the P device.
If the first PE device receives the timeout message responded by the network device other than the P device, in this embodiment, the first PE device may not locally store the message identifier, the source address, and the VPN identifier of the VPN instance corresponding to the message responded by the timeout message. Therefore, the source address and the VPN identifier corresponding to the packet identifier carried in the timeout packet may not be found locally, and for this situation, because the packet responded by the timeout packet is not modified by the first PE device, the address and the VPN identifier of the responded source end are carried in the timeout packet, and the first PE device may send the timeout packet to the source end based on the address and the VPN identifier of the responded source end carried by the timeout packet.
In an alternative embodiment, the first PE device may determine whether a destination address of the received timeout message is an address of the first PE device. If the destination address of the received overtime message is the IP address of the first PE device, the message responded by the overtime message is a second message obtained by modifying the source address of the first PE device, and if the destination address of the received overtime message is not the address of the first PE device, the message responded by the overtime message is not the second message obtained by modifying the source address of the first PE device.
S307, according to the source address and the VPN identification corresponding to the target message identification, the overtime message is forwarded to the source end of the first message corresponding to the target message identification.
The step is the same as S205, and reference may be made to the foregoing description about S205, which is not repeated herein.
By adopting the embodiment, meaningless source address modification aiming at the first message is effectively reduced, and system resources occupied by overtime response of the message are reduced.
The message timeout response method provided in the embodiment of the present application will be described below with reference to each network device in the MPLS networking. For convenience of discussion, referring to fig. 4, fig. 4 is a schematic diagram illustrating another MPLS networking structure provided in the embodiment of the present application, where the MPLS networking structure includes a first CE device 111, a first PE device 121, a P device 130, a second PE device 122, and a second CE device 112.
Assuming that the first CE device 111 sends a first message with a lifetime of 2 to the second CE device, referring to fig. 5, fig. 5 is a schematic flow chart of the timeout response of the first message, including:
s501, the first PE device receives the first packet.
And S502, the first PE device calculates to obtain the public network route with the minimum hop count from the first PE device to the second PE device by using the minimum spanning tree algorithm.
I.e., the public network route is first PE device → P device → second PE device.
S503, the first PE device determines the number of network devices passing through from the first PE device to the second PE device in the public network route.
In this application scenario, 3 network devices need to be passed through (because the lifetime of the first packet sent from the first PE device needs to be reduced by 1, although the private network has already reached the first PE device, the first PE device needs to be considered when calculating the number of network devices that need to be passed through).
S504, the first PE device determines that the survival time is less than the number of the network devices.
S505, the first PE device saves the UDP port number, the source address, and the VPN identifier of the VPN instance of the first packet in a local triple.
Wherein, the UDP port number of the first packet is stored as the packet identifier of the first packet. The index of this triplet is the hash value of the UDP port number.
S506, the first PE device modifies the source address of the first packet from the address of the first CE device to the address of the first PE device, so as to obtain a second packet.
And S507, the first PE device packages a public network label and a private network label for the second message and sends the second message packaged with the public network label and the private network label to the P device.
S508, the P device receives the second message and determines overtime.
Since the lifetime of the first packet is 2, and the lifetime of the second packet is 1 when the P device receives the second packet, the time-out is determined after the P device arrives.
S509, the P device sends the timeout packet to the first PE device based on the source IP address of the second packet.
The UDP port number of the timeout packet is identical to the port number of the second packet (since the UDP port number of the second packet is identical to that of the first packet, the UDP port number of the timeout packet is also identical to that of the first packet). In an optional embodiment, the P device may query a locally stored routing table entry learned in the process of establishing the BGP neighbor relationship between the first PE device and the second PE device to determine a public network route corresponding to the source IP address, and send the timeout packet to the first PE device based on the determined public network route.
Since the source IP address of the modified first packet is the IP address of the first PE device, the P device may send the timeout packet to the first PE device based on the source IP address.
S510, the first PE device receives an overtime message with the destination address being the IP address of the first PE device, and determines the triple corresponding to the UDP port number by performing hash calculation on the UDP port number of the overtime message.
S511, the first PE device forwards the timeout packet to the first CE device based on the source IP address and the VPN instance included in the triple corresponding to the UDP port number.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a message timeout response device according to an embodiment of the present application, where the schematic structural diagram may include:
an identifier storage module 601, configured to store a message identifier of a first message to be sent to a second PE device, a source address, and a VPN identifier of a VPN instance to which the first message belongs;
an address modification module 602, configured to modify a source address of the first packet into an address of the first PE device, to obtain a second packet;
a message sending module 603, configured to send a second message to the P device;
an identifier matching module 604, configured to match, when an timeout message sent by the P device is received, a message identifier carried in the timeout message with a stored message identifier, so as to find, from the stored message identifier, a message identifier that is the same as the message identifier carried in the timeout message, and use the message identifier as a target message identifier;
the packet sending module 603 is further configured to forward the timeout packet to the source end of the first packet corresponding to the target packet identifier according to the source address and the VPN identifier corresponding to the target packet identifier.
In an optional embodiment, the identifier storing module 601 is further configured to, before storing the packet identifier of the first packet to be sent to the second PE device, the source address, and the VPN identifier of the VPN instance to which the first packet belongs,
obtaining a public network route used for sending a message to second PE equipment;
determining whether the first message is overtime before being sent to the second PE equipment based on the public network route and the survival time carried by the first message;
if the first message is overtime before being sent to the second PE equipment, executing the step of storing the message identifier, the source IP address and the VPN identifier of the VPN example to which the first message belongs, of the first message needing to be sent to the second PE equipment;
and if the first message is not overtime before being sent to the second PE equipment, the first message is sent to the P equipment.
In an optional embodiment, the identifier saving module 601 is specifically configured to determine the number of network devices passing through from a first PE device to a second PE device in a public network route;
if the survival time carried by the first message is less than the number of the network devices, determining that the first message is overtime before being sent to the second PE device;
and if the survival time carried by the first message is not less than the number of the network devices, determining that the first message is not overtime before being sent to the second PE device.
In an optional embodiment, the identifier saving module 601 is specifically configured to calculate, by using a minimum spanning tree algorithm, a public network route with a minimum hop count from the first PE device to the second PE device, and use the public network route as a public network route used for sending a packet to the second PE device.
In an optional embodiment, the identifier storing module 601 is specifically configured to store a packet identifier and a source address of a first packet that needs to be sent to a second PE device, and a VPN identifier of a VPN instance to which the first packet belongs, in a local triple of the first PE device;
the identifier matching module 604 is further configured to match the message identifier carried in the timeout message with the stored message identifier, so as to find the message identifier that is the same as the message identifier carried in the timeout message from the stored message identifier, and use the source address in the triple to which the target message identifier belongs as the target source address, and use the VPN identifier as the target VPN identifier.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a message timeout response device according to an embodiment of the present application, where the schematic structural diagram may include:
an identifier obtaining module 701, configured to obtain a message identifier and a source address carried in a second message after determining that a received second message sent from a first PE device to a second PE device is overtime, where the source address of the second message is modified to an address of the first PE device by the first PE device;
the timeout response module 702 is configured to send a timeout packet to the first PE device based on the source address, where the timeout packet carries a packet identifier.
In an optional embodiment, the timeout response module 702 is specifically configured to query a locally stored routing table entry learned in a process of establishing a BGP neighbor relation between a first PE device and a second PE device, and determine a public network route corresponding to a source address;
and sending an overtime message to the first PE equipment based on the public network route.
An embodiment of the present application further provides a first PE device, as shown in fig. 8, including:
a first memory 801 for storing a computer program;
the first processor 802 is configured to implement the following steps when executing the program stored in the first memory 801:
storing a message identifier, a source address and a VPN identifier of a VPN instance to which a first message belongs, of the first message to be sent to second PE equipment;
modifying the source address of the first message into the address of the first PE device to obtain a second message;
sending a second message to the P equipment;
when an overtime message sent by P equipment is received, matching a message identifier carried by the overtime message with a stored message identifier so as to search the message identifier which is the same as the message identifier carried by the overtime message in the stored message identifier and use the message identifier as a target message identifier;
and forwarding the overtime message to the source end of the first message corresponding to the target message identifier according to the source address and the VPN identifier corresponding to the target message identifier.
In an optional embodiment, before saving the packet identifier, the source address, and the VPN identifier of the VPN instance to which the first packet belongs, of the first packet that needs to be sent to the second PE device, the method further includes:
obtaining a public network route used for sending a message to second PE equipment;
determining whether the first message is overtime before being sent to the second PE equipment based on the public network route and the survival time carried by the first message;
if the first message is overtime before being sent to the second PE equipment, executing the step of storing the message identifier, the source IP address and the VPN identifier of the VPN example to which the first message belongs, of the first message needing to be sent to the second PE equipment;
and if the first message is not overtime before being sent to the second PE equipment, the first message is sent to the P equipment.
In an optional embodiment, determining whether the first packet will timeout before being sent to the second PE device based on the public network route and the lifetime carried by the first packet includes:
determining the number of network devices passing from a first PE device to a second PE device in a public network route;
if the survival time carried by the first message is less than the number of the network devices, determining that the first message is overtime before being sent to the second PE device;
and if the survival time carried by the first message is not less than the number of the network devices, determining that the first message is not overtime before being sent to the second PE device.
In an optional embodiment, obtaining a public network route used for sending a packet to a second PE device includes:
and calculating to obtain the public network route with the minimum hop count from the first PE equipment to the second PE equipment by using the minimum spanning tree algorithm, wherein the public network route is used for sending the message to the second PE equipment.
In an optional embodiment, the storing a packet identifier and a source address of a first packet that needs to be sent to a second PE device, and a VPN identifier of a VPN instance to which the first packet belongs includes:
storing a message identifier and a source address of a first message to be sent to second PE equipment and a VPN identifier of a VPN instance to which the first message belongs in a local triple of the first PE equipment;
after matching the message identifier carried by the overtime message with the stored message identifier to find the message identifier which is the same as the message identifier carried by the overtime message in the stored message identifier as the target message identifier, the method further comprises:
and taking the source address in the triple to which the target message identifier belongs as a target source address, and taking the VPN identifier as a target VPN identifier.
An embodiment of the present application further provides a first P device, as shown in fig. 9, including:
a second memory 901 for storing a computer program;
the second processor 902 is configured to implement the following steps when executing the program stored in the second memory 901:
after determining that a received second message sent from the first PE device to the second PE device is overtime, acquiring a message identifier and a source address carried by the second message, wherein the source address of the second message is modified into the address of the first PE device by the first PE device;
and sending an overtime message to the first PE equipment based on the source address, wherein the overtime message carries a message identifier.
In an optional embodiment, the sending the timeout message to the first PE device based on the source address includes:
inquiring a locally stored route table item learned in the process of establishing a Border Gateway Protocol (BGP) neighbor relation between first PE equipment and second PE equipment, and determining a public network route corresponding to a source address;
and sending an overtime message to the first PE equipment based on the public network route.
The aforementioned electronic device may include a Random Access Memory (RAM) and a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In another embodiment provided by the present application, a computer-readable storage medium is further provided, which has instructions stored therein, and when the instructions are executed on a computer, the instructions cause the computer to execute any one of the message timeout response methods in the above embodiments.
In yet another embodiment provided by the present application, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the message timeout response methods of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the embodiments of the apparatus, the first PE device, the first P device, the computer-readable storage medium, and the computer program product, since they are substantially similar to the method embodiments, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiments.
The above description is only for the preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application are included in the protection scope of the present application.

Claims (14)

1. A message timeout response method is applied to a first PE device in an MPLS network, wherein the MPLS network further comprises a second PE device and a P device, and the P device is connected between the first PE and the second PE, and the method comprises the following steps:
storing a message identifier and a source address of a first message to be sent to the second PE device and a VPN identifier of a VPN instance to which the first message belongs;
modifying the source address of the first message into the address of the first PE device to obtain a second message;
sending the second message to the P equipment;
when receiving an overtime message sent by the P equipment, matching a message identifier carried by the overtime message with a stored message identifier so as to find a message identifier which is the same as the message identifier carried by the overtime message in the stored message identifier and serve as a target message identifier;
and forwarding the overtime message to the source end of the first message corresponding to the target message identifier according to the source address and the VPN identifier corresponding to the target message identifier.
2. The method according to claim 1, wherein before storing the packet identifier, the source address, and the VPN identifier of the VPN instance to which the first packet belongs, the method further comprises:
obtaining a public network route used for sending a message to the second PE equipment;
determining whether the first message is overtime before being sent to the second PE device based on the public network route and the survival time carried by the first message;
if the first message is overtime before being sent to the second PE equipment, the step of storing the message identifier, the source IP address and the VPN identifier of the VPN example to which the first message belongs of the first message, which is required to be sent to the second PE equipment, is executed;
and if the first message is overtime before being sent to the second PE equipment, sending the first message to the P equipment.
3. The method of claim 2, wherein the determining whether the first packet will time out before being sent to the second PE device based on the public network route and a time-to-live carried by the first packet comprises:
determining the number of network devices passing from the first PE device to the second PE device in the public network route;
if the survival time carried by the first message is less than the number of the network devices, determining that the first message is overtime before being sent to the second PE device;
and if the survival time carried by the first message is not less than the number of the network equipment, determining that the first message is not overtime before being sent to the second PE equipment.
4. The method according to claim 2 or 3, wherein the obtaining of the public network route used for sending the packet to the second PE device comprises:
and calculating to obtain a public network route with the minimum hop count from the first PE equipment to the second PE equipment by using a minimum spanning tree algorithm, wherein the public network route is used for sending a message to the second PE equipment.
5. The method according to claim 1, wherein the storing the packet identifier and the source address of the first packet that needs to be sent to the second PE device, and the VPN identifier of the VPN instance to which the first packet belongs comprises:
storing a message identifier and a source address of a first message to be sent to the second PE device and a VPN identifier of a VPN instance to which the first message belongs in a local triple of the first PE device;
after matching the message identifier carried by the timeout message with the stored message identifier to find the message identifier identical to the message identifier carried by the timeout message from the stored message identifier, and using the found message identifier as the target message identifier, the method further includes:
and taking the source address in the triple to which the target message identifier belongs as a target source address, and taking the VPN identifier as a target VPN identifier.
6. A message timeout response method is applied to a P device in an MPLS network, wherein the MPLS network further comprises a first PE device and a second PE device, and the P device is connected between the first PE device and the second PE device, and the method comprises the following steps:
after determining that a received second message sent from the first PE device to the second PE device is overtime, acquiring a message identifier and a source address carried by the second message, wherein the second message is obtained by modifying the source address of a first message into the address of the first PE device by the first PE device, and the first message is a message which needs to be sent to the second PE device by the first PE device;
based on the source address, sending an overtime packet to the first PE device, where the overtime packet carries the packet identifier, so that the first PE device forwards the overtime packet to a source end of the first packet corresponding to the packet identifier.
7. The method according to claim 6, wherein the sending a timeout message to the first PE device based on the source address comprises:
inquiring a locally stored route table item learned in the process of establishing a Border Gateway Protocol (BGP) neighbor relation between the first PE device and the second PE device, and determining a public network route corresponding to the source address;
and sending an overtime message to the first PE equipment based on the public network route.
8. A message timeout response apparatus, applied to a first PE device in an MPLS network, where the MPLS network further includes a second PE device and a P device, and the P device is connected between the first PE and the second PE, and the apparatus includes:
an identifier storage module, configured to store a packet identifier of a first packet that needs to be sent to the second PE device, a source address, and a VPN identifier of a VPN instance to which the first packet belongs;
an address modification module, configured to modify a source address of the first packet into an address of the first PE device, so as to obtain a second packet;
a message sending module, configured to send the second message to the P device;
the identification matching module is used for matching the message identification carried by the overtime message with the stored message identification when the overtime message sent by the P equipment is received, so that the message identification which is the same as the message identification carried by the overtime message is found in the stored message identification and is used as a target message identification;
the packet sending module is further configured to forward the timeout packet to the source end of the first packet corresponding to the target packet identifier according to the source address and the VPN identifier corresponding to the target packet identifier.
9. The apparatus according to claim 8, wherein the identifier saving module is further configured to, before saving the packet identifier, the source address, and the VPN identifier of the VPN instance to which the first packet belongs,
obtaining a public network route used for sending a message to the second PE equipment;
determining whether the first message is overtime before being sent to the second PE device based on the public network route and the survival time carried by the first message;
if the first message is overtime before being sent to the second PE equipment, the step of storing the message identifier, the source IP address and the VPN identifier of the VPN example to which the first message belongs of the first message, which is required to be sent to the second PE equipment, is executed;
and if the first message is overtime before being sent to the second PE equipment, sending the first message to the P equipment.
10. The apparatus according to claim 9, wherein the identifier saving module is specifically configured to determine a number of network devices that pass through from the first PE device to the second PE device in the public network route;
if the survival time carried by the first message is less than the number of the network devices, determining that the first message is overtime before being sent to the second PE device;
and if the survival time carried by the first message is not less than the number of the network equipment, determining that the first message is not overtime before being sent to the second PE equipment.
11. A message timeout response apparatus, which is applied to a P device in an MPLS network, where the MPLS network further includes a first PE device and a second PE device, and the P device is connected between the first PE device and the second PE device, and the apparatus includes:
an identifier obtaining module, configured to obtain a message identifier and a source address carried by a second message after determining that a received second message sent from the first PE device to the second PE device is overtime, where the second message is obtained by modifying, by the first PE device, the source address of a first message into the address of the first PE device, and the first message is a message that the first PE device needs to send to the second PE device;
and the timeout response module is configured to send a timeout packet to the first PE device based on the source address, where the timeout packet carries the packet identifier, so that the first PE device forwards the timeout packet to a source end of the first packet corresponding to the packet identifier.
12. The apparatus according to claim 11, wherein the timeout response module is specifically configured to query a locally stored routing table entry learned in a process of establishing a BGP neighbor relation between the first PE device and the second PE device, and determine a public network route corresponding to the source address;
and sending an overtime message to the first PE equipment based on the public network route.
13. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 1-5.
14. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 6-7.
CN201910099661.7A 2019-01-31 2019-01-31 Message timeout response method and device Active CN109831378B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910099661.7A CN109831378B (en) 2019-01-31 2019-01-31 Message timeout response method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910099661.7A CN109831378B (en) 2019-01-31 2019-01-31 Message timeout response method and device

Publications (2)

Publication Number Publication Date
CN109831378A CN109831378A (en) 2019-05-31
CN109831378B true CN109831378B (en) 2021-03-19

Family

ID=66862061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910099661.7A Active CN109831378B (en) 2019-01-31 2019-01-31 Message timeout response method and device

Country Status (1)

Country Link
CN (1) CN109831378B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995040B (en) * 2021-04-29 2021-08-03 中国人民解放军国防科技大学 Message path tracing method and device based on equipment identification calculation
CN116781497A (en) * 2022-03-10 2023-09-19 中国电信股份有限公司 Abnormal feedback and fault positioning method, network node and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100374844B1 (en) * 2001-05-18 2003-03-04 엘지전자 주식회사 Timer circuit in aal2 protocol service logic
CN102457386B (en) * 2010-10-25 2014-07-16 杭州华三通信技术有限公司 Multicast message transmission method in bidirectional PIM (Personal Information Management) of communication equipment and communication equipment
CN102088417B (en) * 2011-03-18 2013-04-17 华为技术有限公司 Method and apparatus for achieving IP (Internet Protocol) message loopback
HUE052889T2 (en) * 2014-06-17 2021-05-28 Sercel Rech Const Elect Communication method in a communication segment of a network
CN107580079B (en) * 2017-08-31 2020-12-29 新华三技术有限公司 Message transmission method and device

Also Published As

Publication number Publication date
CN109831378A (en) 2019-05-31

Similar Documents

Publication Publication Date Title
US20200280514A1 (en) Packet forwarding method, apparatus, and system
US11757932B2 (en) Event driven route control
US9246799B2 (en) Data plane learning of bi-directional service chains
US20180359176A1 (en) Centralized segment routing dataplane based backup path validation
EP3054635B1 (en) System and method for on-demand content exchange with adaptive naming in information-centric networks
CN109714274B (en) Method for acquiring corresponding relation and routing equipment
US20210119906A1 (en) Loop Avoidance Communications Method, Device, and System
US10791051B2 (en) System and method to bypass the forwarding information base (FIB) for interest packet forwarding in an information-centric networking (ICN) environment
CN110798403B (en) Communication method, communication device and communication system
US9973578B2 (en) Real time caching efficient check in a content centric networking (CCN)
US10404598B1 (en) Managing next hop groups in routers
CN109951371B (en) Data forwarding method and device
CN114978978A (en) Computing resource scheduling method and device, electronic equipment and medium
CN109831378B (en) Message timeout response method and device
US10536368B2 (en) Network-aware routing in information centric networking
CN106911549B (en) Data message processing method and device
US20210281507A1 (en) Parameter notification and obtaining methods and devices, and storage medium
CN109067657B (en) Message processing method and device
WO2021232906A1 (en) Method for determining packet forwarding and backup path and related device
US20190334814A1 (en) Path establishment method and device, and network node
CN109218182B (en) Method and device for synchronizing routing information
US9665441B2 (en) Method and system for packet redundancy removal
CN108768845B (en) Multi-homing host routing synchronization method and device
US20160337232A1 (en) Flow-indexing for datapath packet processing
CN109218199B (en) Message processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230607

Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: H3C INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 310052 Changhe Road, Binjiang District, Hangzhou, Zhejiang Province, No. 466

Patentee before: NEW H3C TECHNOLOGIES Co.,Ltd.