CN111835736A - Message transmission method and system - Google Patents

Message transmission method and system Download PDF

Info

Publication number
CN111835736A
CN111835736A CN202010605506.0A CN202010605506A CN111835736A CN 111835736 A CN111835736 A CN 111835736A CN 202010605506 A CN202010605506 A CN 202010605506A CN 111835736 A CN111835736 A CN 111835736A
Authority
CN
China
Prior art keywords
tunnel
message
udh
forwarding network
private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010605506.0A
Other languages
Chinese (zh)
Other versions
CN111835736B (en
Inventor
钟济
常培峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU XEL TECHNOLOGY Inc
Original Assignee
SUZHOU XEL TECHNOLOGY Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU XEL TECHNOLOGY Inc filed Critical SUZHOU XEL TECHNOLOGY Inc
Priority to CN202010605506.0A priority Critical patent/CN111835736B/en
Publication of CN111835736A publication Critical patent/CN111835736A/en
Application granted granted Critical
Publication of CN111835736B publication Critical patent/CN111835736B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2212/00Encapsulation of packets

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application provides a message transmission method and a system, wherein the method comprises the following steps: acquiring a source message from a first terminal; encapsulating the source message by using a UDH tunnel to obtain a tunnel encapsulation message; transmitting the tunnel encapsulation message to a second private forwarding network edge device by utilizing a private forwarding network; wherein the private forwarding network comprises a plurality of private forwarding devices. The first terminal sends the source message to a first private forwarding network edge device, the first private forwarding network edge device conducts UDH tunnel encapsulation on the source message, and then the message after the UDH tunnel encapsulation is sent to a second private forwarding network edge device through a private forwarding network. The tunnel used in the embodiment of the application is a tunnel constructed by using the UDH technology, and the private forwarding network edge device and the private network are used in the whole transmission process, so that the message can be prevented from being intercepted and analyzed, the message is prevented from being disguised or attacked, and the safety of the message transmission process is ensured.

Description

Message transmission method and system
Technical Field
The present disclosure relates to the field of data communication technologies, and in particular, to a method and a system for transmitting a packet.
Background
Tunneling is a way of passing messages between networks through the infrastructure using the internet. The messages or payloads communicated using the tunnel may be message frames or packets of different protocols. Tunneling protocols re-encapsulate message frames or packets of other protocols and then send them through tunnels. However, tunnels are currently typically constructed using common protocols. The use of public protocols to construct tunnels to deliver messages creates problems: in the process of transmitting the message, the message is easy to intercept and analyze, and finally the message is disguised or attacked. For some messages with higher security level, the security is difficult to be ensured.
Disclosure of Invention
In order to overcome the problems that in the related art, a common protocol is adopted to construct a tunnel to transmit messages, the messages are easy to intercept and analyze, the messages are disguised or attacked, and the security of some messages with higher security level is difficult to guarantee, the application provides a message transmission method and a transmission device, which can prevent the messages from being intercepted and analyzed in the process of transmitting the messages, avoid the messages from being disguised or attacked, and guarantee the security of the message transmission process.
In a first aspect of the present application, a packet transmission method is provided, which is applied to a first private forwarding network edge device, and includes:
acquiring a source message from a first terminal;
encapsulating the source message by using a UDH tunnel to obtain a tunnel encapsulation message;
transmitting the tunnel encapsulation message to a second private forwarding network edge device by utilizing a private forwarding network; wherein the private forwarding network comprises a plurality of private forwarding devices.
With reference to the first aspect, in a first possible implementation manner, encapsulating the source packet by using a UDH tunnel to obtain a tunnel encapsulation packet specifically includes:
acquiring tunnel attribute configuration; the tunnel attribute configuration is obtained after the UDH tunnel number is obtained according to the configuration of the first private forwarding network edge device system, or is specified by a Route/Bridge module in the first private forwarding network edge device;
configuring the port to which the source message belongs and the tunnel attribute when the source message is sent by the first terminal, and filling the port and the tunnel attribute into each user-defined domain of the UDH to obtain a data structure of the UDH tunnel;
packaging the source message by using the data structure of the UDH tunnel to obtain a tunnel packaging message; the tunnel encapsulation message comprises tunnel forwarding information.
With reference to the first possible implementation manner, in a second possible implementation manner, the method further includes:
in the process of encapsulating the source packet by using the data structure of the UDH tunnel, the method further includes: and performing TTL processing on the source message entering the UDH tunnel and DSCP processing added with UDH encapsulation.
With reference to the first possible implementation manner, in a third possible implementation manner, in a process of encapsulating the source packet by using a data structure of the UDH tunnel, the method further includes: and (5) performing Checksum processing on the source message.
With reference to the first possible implementation manner, in a fourth possible implementation manner, the sending the tunnel encapsulation packet to the second private forwarding network edge device by using the private forwarding network specifically includes:
acquiring a UDB matching template index;
performing Policy matching processing on the tunnel encapsulation message by using the UDB matching template index through a forwarding port of the first private forwarding network edge device so as to identify the tunnel encapsulation message;
and sending the identified tunnel encapsulation message to the second private forwarding network edge device according to the tunnel forwarding information.
With reference to the fourth possible implementation manner, in a fifth possible implementation manner, in the process of sending the identified tunnel encapsulation packet to the second private forwarding network edge device, the method further includes:
and performing UDH tunnel intermediate forwarding identification (TTL) processing, UDH tunnel intermediate forwarding identification (DSCP) processing and UDH tunnel intermediate forwarding Remark (TTL) processing on the identified tunnel encapsulation message.
In a second aspect of the present application, a packet transmission method is provided, which is applied to a second private forwarding network edge device, and includes:
acquiring a tunnel encapsulation message from a first private forwarding network edge device by utilizing a private forwarding network; the tunnel encapsulation message is obtained by encapsulating a source message by using a UDH tunnel;
performing UDH tunnel processing on the tunnel encapsulation message to obtain the source message;
and sending the source message to a second terminal.
With reference to the second aspect, in a sixth possible implementation manner, performing an out-UDH tunnel processing on the tunnel encapsulation packet specifically includes:
acquiring a UDB matching template;
performing Policy matching processing on the tunnel encapsulation message by using a UDB matching template through a message output port of the second private forwarding network edge device so as to acquire a UDH tunnel number;
and performing tunnel editing processing and QoS processing on the tunnel encapsulation message according to the UDH tunnel number to obtain the source message.
With reference to the sixth possible implementation manner, in a seventh possible implementation manner, in the process of performing the UDH tunneling processing on the tunnel encapsulation packet, the method further includes:
and performing TTL processing of the tunnel outgoing tunnel and DSCP processing of deleting UDH encapsulation on the tunnel encapsulation message subjected to tunnel editing processing and QoS processing.
In a third aspect of the present application, a message transmission system is provided, where the system includes: the system comprises a first terminal, a first private forwarding network edge device, a private forwarding network, a second private forwarding network edge device and a second terminal; wherein the private forwarding network comprises a plurality of forwarding devices;
the first terminal and the first private forwarding network edge device, the first private forwarding network edge device and the private forwarding network, the private forwarding network and the second private forwarding network edge device are in communication connection, the second private forwarding network edge device and the second terminal, and a plurality of forwarding devices in the private forwarding network are in communication connection with each other.
The embodiment of the application provides a message transmission method and a transmission system, wherein the method comprises the following steps: acquiring a source message from a first terminal; encapsulating the source message by using a UDH tunnel to obtain a tunnel encapsulation message; transmitting the tunnel encapsulation message to a second private forwarding network edge device by utilizing a private forwarding network; wherein the private forwarding network comprises a plurality of private forwarding devices. The first terminal sends the source message to a first private forwarding network edge device, the first private forwarding network edge device conducts UDH tunnel encapsulation on the source message, and then the message after the UDH tunnel encapsulation is sent to a second private forwarding network edge device through a private forwarding network. The tunnel used in the embodiment of the application is a tunnel constructed by using the UDH technology, and the private forwarding network edge device and the private network are used in the whole transmission process, so that the message can be prevented from being intercepted and analyzed, the message is prevented from being disguised or attacked, and the safety of the message transmission process is ensured.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic structural diagram of a message transmission system according to an exemplary embodiment of the present application;
fig. 2 is a schematic diagram of a workflow of a packet transmission method at an edge device of a first private forwarding network according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a packet transmission method at an edge device of a first private forwarding network according to an embodiment of the present application;
fig. 4 is a schematic diagram of a specific implementation process of packet encapsulation provided in the embodiment of the present application;
fig. 5 is a schematic diagram of a packet forwarding flow of a first private forwarding network edge device end according to an embodiment of the present application;
fig. 6 is a schematic diagram of a specific implementation process of forwarding a tunnel encapsulation packet according to an embodiment of the present application;
FIG. 7 is a diagram illustrating an example of a table entry association relationship for user-defined content Policy matching according to an embodiment of the present application;
fig. 8 is a schematic flowchart of a packet transmission method at an edge device of a second private forwarding network according to an embodiment of the present application;
fig. 9 is a schematic diagram of a specific implementation process of tunneling packet egress tunneling processing according to the embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present application, but it will be appreciated by those skilled in the art that the present application may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the embodiments.
Fig. 1 is a schematic structural diagram of a message transmission system according to an exemplary embodiment of the present application. The system comprises a first terminal ES1(End Station), a first Private forwarding network Edge PE1(Private forwarding network Edge), a Private forwarding network PFN (Private forwarding network), a second Private forwarding network Edge PE2 and a second terminal ES2, wherein the Private forwarding network PFN comprises a plurality of forwarding devices PF1, PF2 … PFn (Private forwarding device). The first terminal ES1 is in communication connection with the first private forwarding network edge PE1, the first private forwarding network edge PE1 is in communication connection with the private forwarding network PFN, the private forwarding network PFN is in communication connection with the second private forwarding network edge PE2, and the second private forwarding network edge PE2 is in communication connection with the second terminal ES 2. A plurality of forwarding devices PF1, PF2 … PFN in a private forwarding network PFN are communicatively connected to each other.
The UDH (User Defined Header) can allow a User to configure fields to be used and identify the contents of the fields. UDB (User Defined Byte), a component of UDH, is used to define the content of each Byte in UDH. The user can extract the fields from the data by the chip internal logic by configuring the positions of the fields to be used by the software. Referring to fig. 2, a schematic workflow diagram of a method for transmitting a packet at an edge device of a first private forwarding network includes the following steps:
step 101, obtaining a source message from a first terminal; for example, the first terminal ES1 shown in fig. 1 sends the source packet to the first private forwarding network edge PE 1.
102, encapsulating the source message by using a UDH tunnel to obtain a tunnel encapsulation message;
after the first private forwarding network edge device PE1 obtains the source packet, it performs UDH tunnel encapsulation on the source packet.
Encapsulating the source packet by using the UDH tunnel to obtain a tunnel encapsulation packet, as shown in fig. 3, specifically including:
step 201, acquiring tunnel attribute configuration; the tunnel attribute configuration is obtained after the UDH tunnel number is obtained according to the configuration of the first private forwarding network edge device system, or is specified by a Route/Bridge module in the first private forwarding network edge device;
step 202, configuring the port to which the source message belongs when being sent by the first terminal and the tunnel attribute, and filling in each user-defined domain of the UDH to obtain a data structure of the UDH tunnel;
step 203, encapsulating the source message by using the data structure of the UDH tunnel to obtain a tunnel encapsulation message; wherein, the tunnel encapsulation message comprises tunnel forwarding information.
PE1 receives a message sent by a terminal ES1, and PE1 adds the message to a UDH tunnel, namely, encapsulates the message by using the UDH tunnel; the processing flow is shown in fig. 4. And according to the UDH tunnel number acquired by the first private forwarding network edge device system configuration, acquiring tunnel attribute configuration according to the UDH tunnel number, or specifying tunnel attribute configuration by a Route/Bridge module in the first private forwarding network edge device.
And filling the obtained tunnel attribute configuration and the port to which the source message belongs when being sent by the first terminal into each user-defined domain of the UDH to obtain the data structure of the UDH tunnel. And then, packaging the message according to the data structure of the UDH tunnel, and finally outputting the message from a forwarding port. The generated tunnel encapsulation message also comprises tunnel forwarding information used for forwarding the tunnel encapsulation message in the private forwarding network.
According to the embodiment of the application, the user-defined domain can be edited through the UDH, the message content which does not exceed 40 bytes in the range of the first 128 bytes of the message is the UDH, and the message is inserted into the UDH by defining the processing command of the UDH. The PE1 edits the UDH through the UDH _ object arrays configured in table 1, where each UDH _ object corresponds to one byte of the UDH, and table 1 defines a data structure of the UDH tunnel encapsulation, specifically including the following editing modes:
Figure BDA0002560956420000051
table 1 data structure for UDH tunnel encapsulation
When an IP message is carried over UDH, the UDH and IP header should be completely within the first 64 bytes of the message, and the IP message should be encapsulated immediately adjacent to UDH without inserting other encapsulation protocols. If other data structures are included between the UDH and the IP packet, the corresponding data structure should be defined as part of the UDH.
In addition, when an IP packet is encapsulated by UDH, TTL (Time To Live) of the UDH and the IP packet needs To be processed at the same Time. TTL, i.e. the "lifetime" of the data packet, is a parameter in the IP protocol packet, and each time the data packet passes through one forwarding device, the TTL parameter value is reduced by one, until the value is 0, and the data packet is judged to be "lifetime" full by the forwarding device, and is discarded. When a routing loop occurs, IP data packets are transmitted between devices on the loop repeatedly, the resources and the link bandwidth of the devices are consumed, and the devices discard the data packets until the TTL parameter values are exhausted.
When the IPv4 message is carried through the UDH, it is required to ensure that the message is encapsulated into a normal IPv4 data structure, that is, the encapsulation of the message is: 1) DMAC + SMAC + EtherType (0x0800) + IPv4, or, 2) DMAC + SMAC + VLAN + EtherType (0x0800) + IPv 4.
When the UDH encapsulation is carried out on the IP message, the TTL of the payload IP message needs to be subjected to decrement processing. When policy routing, routing table routing or three-layer multicast forwarding is configured, the forwarding device performs decremental processing on the TTL. And writing the decreased TTL back to the IP message package.
The UDH encapsulated TTL is realized by a user configuration table entry through a UDH editing object. The type of UDH _ object corresponding to the TTL byte of UDH is configured to be 0x0, and a desired TTL is configured in the UDH _ object (the user sets a value or performs a TTL-1 operation). The DSCP (Differentiated Services Code Point) of the payload IP packet may also be remapped. Configuring QoS remapping table based on port or QoS remapping table based on flow on the transmission output interface, starting DSCP remapping, namely writing back the DSCP of the net load IP message. The UDH encapsulated DSCP is implemented by a UDH editing object. The type of UDH _ object corresponding to the DSCP byte of UDH is configured to be 0x1, while the desired DSCP is configured in UDH _ object (user sets a certain value).
When the IP message is encapsulated through the UDH, the forwarding device can also recalculate the Checksum (Checksum, the sum of a group of data items used for verification in the data processing and data communication fields, wherein the data items can be numbers or other character strings which are regarded as numbers in the process of calculating and checking the sum, so that the integrity and the accuracy of the data are ensured), and the Checksum is used for judging whether the IP message is legal or not according to the Checksum when the UDH is stripped from the IP message encapsulated in the tunnel, so that the IP message can be normally forwarded.
103, transmitting the tunnel encapsulation message to a second private forwarding network edge device by using a private forwarding network; wherein the private forwarding network comprises a plurality of private forwarding devices.
As shown in fig. 5, step 103 specifically includes:
step 301, acquiring a UDB matching template index;
step 302, performing Policy matching processing on the tunnel encapsulation packet by using the UDB matching template index through the forwarding port of the first private forwarding network edge device, so as to identify the tunnel encapsulation packet;
step 303, according to the tunnel forwarding information, sending the identified tunnel encapsulation packet to the second private forwarding network edge device.
The first private forwarding network edge device forwards the packet according to the tunnel forwarding information by using forwarding devices PF1/PF2/…/PFN in the forwarding network PFN, and may include unicast and multicast replication (unicast is a point-to-point connection between a client and a server, "point-to-point" means that each client receives a remote stream from the server, only when the client sends a request, the server sends a unicast stream.
In the forwarding process, the tunnel encapsulation message is identified according to Policy matching through the port/VLAN to which the message belongs, then tunnel editing commands, QoS processing and tunnel attribute configuration are sequentially carried out, then tunnel forwarding information is edited, TTL processing and QoS processing are carried out, and finally the tunnel encapsulation message is output from the forwarding port.
The forwarding device PE/PF supports multi-level Policy matching (Policy is similar to the ACL of the Bordetella, and can perform message operation through matching of certain fields; and multi-level Policy matching can realize more message operations according to different requirements) to realize a multi-level flow table. And multiple Policy is completely equivalent, the locally input message and the message coming out of the tunnel can be matched, and the user-defined message content identification and the like can be realized through a Policy command template table. Fig. 7 is an exemplary schematic diagram of table entry association relationship of user-defined content Policy matching, which is a 4-level flow table, and user-defined message content identification is realized through 4 times of Policy matching. Table 2 is an illustration corresponding to each entry in fig. 5.
FIG. 7 specifically describes the steps of obtaining UDB matching template index through an input port table/input VLAN (virtual Local area network) table/QinQ-TFB (QinQ-Tunnel Forwarding Base, Tunnel Forwarding Base based on QinQ technology) table/MPLS-TFB (Multi-protocol Label Switching-Tunnel Forwarding Base, Tunnel Forwarding Base based on multiprotocol Label Switching technology) table/Local-VLAN-TFB (Local-VLAN-Tunnel Forwarding Base, Tunnel Forwarding Base based on Local virtual Local area network technology) table, obtaining Policy matching command according to Policy-d-template table, then sequentially performing Policy matching, obtaining the position of user defined byte in the message according to the UDB template table for each matching, performing Policy matching correctly, and searching for Policy-action table according to the Policy-index after Policy matching, obtaining QoS trust relation, binding Policy to be matched to a Behaviour (characteristic) table, initiating forced association matching and starting statistics, and realizing VLAN conversion of N: 1. Finally, the user-defined message content identification is realized, and the identified message content is continuously forwarded.
Figure BDA0002560956420000071
Figure BDA0002560956420000081
Table 2 description of the entries in fig. 5
Referring to fig. 8, a schematic workflow diagram of a method for transmitting a packet at an edge device of a second private forwarding network includes the following steps:
step 401, acquiring a tunnel encapsulation message from a first private forwarding network edge device by using a private forwarding network; the tunnel encapsulation message is obtained by encapsulating a source message by using a UDH tunnel; the tunnel encapsulation message is a tunnel encapsulation message sent by a first private forwarding network edge device through a private forwarding network;
step 402, performing an out-UDH tunnel process on the tunnel encapsulation message to obtain the source message;
step 403, sending the source message to a second terminal.
Performing an out-UDH tunnel process on the tunnel encapsulation packet, as shown in fig. 9, specifically including:
acquiring a UDB matching template;
performing Policy matching processing on the tunnel encapsulation message by using a UDB matching template through a message output port of the second private forwarding network edge device so as to acquire a UDH tunnel number;
and performing tunnel editing processing and QoS processing on the tunnel encapsulation message according to the UDH tunnel number to obtain the source message.
And when the user goes out of the tunnel, the UDH tunnel needs to be deleted, and forwarding is carried out according to the user message header. The schematic diagram of the processing flow is shown in fig. 9. The port of the message sent by ES1 forwarded by PF1/PF2/…/PFn is subjected to Policy matching by PE2 to obtain UDH tunnel ID, tunnel editing command and QoS processing are sequentially performed, the message is subjected to out-tunnel processing, the message can be selected to go out from an out-interface according to user configuration, or payload message can be selected to be analyzed and routed or bridged for normal forwarding processing, and finally the message is output to a destination from a forwarding port. And when the UDH encapsulation is stripped, acquiring TTL bytes of an IP message of a UDH payload, and rewriting TTL-1 into the IP message encapsulation. And when the UDH encapsulation is stripped, using the UDB to match and obtain the DSCP of the IP payload encapsulated by the UDH, and writing back the DSCP of the IP message of the payload.
In a specific implementation, the present application further provides a computer storage medium, where the computer storage medium may store a program, and when the program is executed, the program may include some or all of the steps in the embodiments of the message transmission method provided in the present application. The storage medium may be a magnetic disk, an optical disk, a ROM (read-only memory), a RAM (random access memory), or the like.
Those skilled in the art will clearly understand that the techniques in the embodiments of the present application may be implemented by way of software plus a required general hardware platform. Based on such understanding, the technical solutions in the embodiments of the present application may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments or some parts of the embodiments of the present application.
The same and similar parts in the various embodiments in this specification may be referred to each other. In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the description in the method embodiment.
The present application has been described in detail with reference to specific embodiments and illustrative examples, but the description is not intended to limit the application. Those skilled in the art will appreciate that various equivalent substitutions, modifications or improvements may be made to the presently disclosed embodiments and implementations thereof without departing from the spirit and scope of the present disclosure, and these fall within the scope of the present disclosure. The protection scope of this application is subject to the appended claims.

Claims (10)

1. A message transmission method is applied to a first private forwarding network edge device, and comprises the following steps:
acquiring a source message from a first terminal;
encapsulating the source message by using a UDH tunnel to obtain a tunnel encapsulation message;
transmitting the tunnel encapsulation message to a second private forwarding network edge device by utilizing a private forwarding network; wherein the private forwarding network comprises a plurality of private forwarding devices.
2. The method of claim 1, wherein encapsulating the source packet with the UDH tunnel to obtain a tunnel encapsulation packet specifically comprises:
acquiring tunnel attribute configuration; the tunnel attribute configuration is obtained after the UDH tunnel number is obtained according to the configuration of the first private forwarding network edge device system, or is specified by a Route/Bridge module in the first private forwarding network edge device;
configuring the port to which the source message belongs and the tunnel attribute when the source message is sent by the first terminal, and filling the port and the tunnel attribute into each user-defined domain of the UDH to obtain a data structure of the UDH tunnel;
packaging the source message by using the data structure of the UDH tunnel to obtain a tunnel packaging message; the tunnel encapsulation message comprises tunnel forwarding information.
3. The method of claim 2, wherein in encapsulating the source packet with the data structure of the UDH tunnel, further comprising: and performing TTL processing on the source message entering the UDH tunnel and DSCP processing added with UDH encapsulation.
4. The method of claim 2, wherein in encapsulating the source packet with the data structure of the UDH tunnel, further comprising: and (5) performing Checksum processing on the source message.
5. The method according to claim 2, wherein sending the tunnel encapsulation packet to a second private forwarding network edge device using a private forwarding network specifically comprises:
acquiring a UDB matching template index;
performing Policy matching processing on the tunnel encapsulation message by using the UDB matching template index through a forwarding port of the first private forwarding network edge device so as to identify the tunnel encapsulation message;
and sending the identified tunnel encapsulation message to the second private forwarding network edge device according to the tunnel forwarding information.
6. The method of claim 5, wherein in sending the identified tunnel encapsulation packet to the second private forwarding network edge device, further comprising:
and performing UDH tunnel intermediate forwarding identification (TTL) processing, UDH tunnel intermediate forwarding identification (DSCP) processing and UDH tunnel intermediate forwarding Remark (TTL) processing on the identified tunnel encapsulation message.
7. A message transmission method is applied to a second private forwarding network edge device, and comprises the following steps:
acquiring a tunnel encapsulation message from a first private forwarding network edge device by utilizing a private forwarding network; the tunnel encapsulation message is obtained by encapsulating a source message by using a UDH tunnel;
performing UDH tunnel processing on the tunnel encapsulation message to obtain the source message;
and sending the source message to a second terminal.
8. The method of claim 7, wherein performing an out-UDH tunneling process on the tunnel encapsulation packet specifically includes:
acquiring a UDB matching template;
performing Policy matching processing on the tunnel encapsulation message by using a UDB matching template through a message output port of the second private forwarding network edge device so as to acquire a UDH tunnel number;
and performing tunnel editing processing and QoS processing on the tunnel encapsulation message according to the UDH tunnel number to obtain the source message.
9. The method of claim 8, wherein during the out-UDH tunneling of the tunnel encapsulation packet, further comprising:
and performing TTL processing of the tunnel outgoing tunnel and DSCP processing of deleting UDH encapsulation on the tunnel encapsulation message subjected to tunnel editing processing and QoS processing.
10. A message transmission system, the system comprising: the system comprises a first terminal, a first private forwarding network edge device, a private forwarding network, a second private forwarding network edge device and a second terminal; wherein the private forwarding network comprises a plurality of forwarding devices;
the first terminal and the first private forwarding network edge device, the first private forwarding network edge device and the private forwarding network, the private forwarding network and the second private forwarding network edge device are in communication connection, the second private forwarding network edge device and the second terminal, and a plurality of forwarding devices in the private forwarding network are in communication connection with each other.
CN202010605506.0A 2020-06-29 2020-06-29 Message transmission method and system Active CN111835736B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010605506.0A CN111835736B (en) 2020-06-29 2020-06-29 Message transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010605506.0A CN111835736B (en) 2020-06-29 2020-06-29 Message transmission method and system

Publications (2)

Publication Number Publication Date
CN111835736A true CN111835736A (en) 2020-10-27
CN111835736B CN111835736B (en) 2023-04-25

Family

ID=72899469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010605506.0A Active CN111835736B (en) 2020-06-29 2020-06-29 Message transmission method and system

Country Status (1)

Country Link
CN (1) CN111835736B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459592A (en) * 2007-12-12 2009-06-17 华为技术有限公司 Method, system and equipment for transmitting packets between supplier edge devices
CN102480496A (en) * 2010-11-22 2012-05-30 中国移动通信集团北京有限公司 Method and system for displaying WAP (Wireless Application Protocol) business content as well as business server and terminal
CN105391771A (en) * 2015-10-16 2016-03-09 张陵 Multi-tenant-oriented cloud network architecture
CN107426346A (en) * 2017-07-06 2017-12-01 浙江宇视科技有限公司 A kind of two layer message passes through safely the method and system of three-layer network
CN107508811A (en) * 2017-08-28 2017-12-22 浙江宇视科技有限公司 A kind of secure registration querying method and system based on UNP

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459592A (en) * 2007-12-12 2009-06-17 华为技术有限公司 Method, system and equipment for transmitting packets between supplier edge devices
CN102480496A (en) * 2010-11-22 2012-05-30 中国移动通信集团北京有限公司 Method and system for displaying WAP (Wireless Application Protocol) business content as well as business server and terminal
CN105391771A (en) * 2015-10-16 2016-03-09 张陵 Multi-tenant-oriented cloud network architecture
CN107426346A (en) * 2017-07-06 2017-12-01 浙江宇视科技有限公司 A kind of two layer message passes through safely the method and system of three-layer network
CN107508811A (en) * 2017-08-28 2017-12-22 浙江宇视科技有限公司 A kind of secure registration querying method and system based on UNP

Also Published As

Publication number Publication date
CN111835736B (en) 2023-04-25

Similar Documents

Publication Publication Date Title
US9130774B2 (en) Data mirroring in a service
US9294302B2 (en) Non-fragmented IP packet tunneling in a network
KR100910818B1 (en) Method and system for tunneling macsec packets through non-macsec nodes
US10404605B2 (en) Packet processing method, device and computer storage medium
US20220078114A1 (en) Method and Apparatus for Providing Service for Traffic Flow
US9571283B2 (en) Enabling packet handling information in the clear for MACSEC protected frames
US7899048B1 (en) Method and apparatus for remotely monitoring network traffic through a generic network
US8320374B2 (en) Method and apparatus for improved multicast routing
WO2019205806A1 (en) Data packet processing method and apparatus, storage medium, and electronic device
CN108933756B (en) Data packet processing method, access network equipment and computer readable storage medium
JP2007135035A (en) Communication device and packet processing method
WO2017193732A1 (en) Method for encapsulating and decapsulating pseudo-wire data message, and relevant apparatus
JP2022537296A (en) EVPN message transfer method, system, storage medium and terminal
CN112437009A (en) SRv6 method, router, routing system and storage medium for end-to-end flow policy
WO2022237291A1 (en) Message transmission method and apparatus, related device, and storage medium
US8149731B2 (en) Technique for transferring data over a packet switched network
CN104579973B (en) Message forwarding method and device in a kind of Virtual Cluster
WO2022142390A1 (en) Packet encapsulation and de-encapsulation method and device, storage medium, and electronic device
WO2020142880A1 (en) Data transmission method and device
WO2008003218A1 (en) Method, apparatus and system for information transmitting between devices in ethernet
CN111835736B (en) Message transmission method and system
WO2021254454A1 (en) Bier oam detection method, and device and system
CN111865805B (en) Multicast GRE message processing method and system
EP3609127B1 (en) Method for control signalling overhead in an access network
WO2017024571A1 (en) Packet processing method, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant