CN112636997B - Path detection method and device - Google Patents
Path detection method and device Download PDFInfo
- Publication number
- CN112636997B CN112636997B CN202011282907.3A CN202011282907A CN112636997B CN 112636997 B CN112636997 B CN 112636997B CN 202011282907 A CN202011282907 A CN 202011282907A CN 112636997 B CN112636997 B CN 112636997B
- Authority
- CN
- China
- Prior art keywords
- vxlan
- tunnel
- path
- loopback
- flow
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
Abstract
The application provides a path detection method and device. The path detection method comprises the following steps: receiving a VXLAN packaging loopback request message with a flow identifier; determining a VXLAN tunnel based on tunnel encapsulation information of the VXLAN encapsulation loopback request message; obtaining a hash parameter of an equivalent path for selectively receiving a VXLAN packaging return request message in the reverse direction; generating a loop-back path flow table entry; the tunnel information of the VXLAN tunnel in the reverse direction and the flow identification corresponding to the hash parameter are recorded; receiving a VXLAN packaging loopback response message with a flow identifier; based on the tunnel source address, the tunnel destination address and the flow identification of the VXLAN packaging return response message, searching a return path flow list item; and sending a VXLAN packaging loopback response message through the equivalent path of the VXLAN tunnel corresponding to the hash parameter.
Description
Technical Field
The present application relates to communication technologies, and in particular, to a method and an apparatus for path detection.
Background
VXLAN (Virtual eXtensible Virtual local area network) is a two-layer VPN technology based on IP networks, using the "MAC in UDP" encapsulation form. In the VXLAN network, the two-layer message is transmitted among different sites across a three-layer network through a three-layer forwarding path provided by a three-layer physical network.
A logical VXLAN Tunnel is established between a VTEP (VXLAN Tunnel End Point ) and a remote VTEP. In order to ensure that the VXLAN tunnel route can be reached, the VTEP equipment initiates PING detection, sends a loopback request message packaged by VXLAN and sets an OAM bit of a VXLAN head packaged by VXLAN for identifying the PING message. And the opposite-end VTEP equipment receives the echo request message packaged by the VXLAN, identifies PING detection based on the OAM bit of the VXLAN head, removes the VXLAN packaging, generates an echo response message, and packages the echo response message into the echo response message packaged by the VXLAN. And the VTEP receives a response message back packaged by VXLAN of the opposite-end VTEP and stops Ping detection.
If an equivalent path exists on the intermediate path of the VXLAN tunnel between the VTEP and the far-end VETP, the VTEP needs to traverse and detect all the intermediate paths. However, the hash routing result of the device on the intermediate path is not controllable, so that the echo request message encapsulated by VXLAN and the echo response message encapsulated by VXLAN, which need to be transmitted and received on different equivalent paths of the intermediate path, are transmitted and received by different equivalent paths, and thus each equivalent path of the intermediate path cannot be accurately detected. For example, when a path on the intermediate path is a single-pass path, after the VXLAN encapsulated loopback request message sent by the VTEP reaches the VTEP at the opposite end, the VXLAN encapsulated loopback response message sent by the VTEP at the opposite end is returned by the routing device on the intermediate path through another equivalent path, which may cause a failure in detecting the single-pass path.
Disclosure of Invention
The application aims to provide a path detection method and equipment, which can accurately detect each equivalent path of a VXLAN tunnel.
In order to achieve the above object, the present application provides a path detection method, including: receiving a VXLAN packaging loopback request message with a flow identifier; determining a VXLAN tunnel based on tunnel encapsulation information of the VXLAN encapsulation loopback request message; obtaining hash parameters of an equivalent path for selectively receiving a VXLAN packaging return request message in the reverse direction; generating a loop-back path flow table entry; the tunnel information of the VXLAN tunnel in the reverse direction and the flow identification corresponding to the hash parameter are recorded; receiving a VXLAN packaging loopback response message with a flow identifier; finding a loopback path flow table item based on a tunnel source address, a tunnel destination address and a flow identification of a VXLAN packaging loopback response message; and sending a VXLAN packaging loopback response message through the equivalent path of the VXLAN tunnel corresponding to the hash parameter.
To achieve the above object, the present application also provides a path detecting apparatus, including: the receiving module is used for receiving a VXLAN packaging loopback request message with the flow identification and receiving a VXLAN packaging loopback response message with the flow identification; the table entry module is used for acquiring a hash parameter of an equivalent path for selectively receiving the VXLAN packaging return request message in the reverse direction; generating a loop path flow table entry; the tunnel information of the VXLAN tunnel in the reverse direction and the flow identification corresponding to the hash parameter are recorded; the sending module is used for finding the loopback path flow list item based on the tunnel source address, the tunnel destination address and the flow identification of the VXLAN packaging loopback response message; and sending a VXLAN packaging loopback response message through an equivalent path on the opposite direction corresponding to the hash parameter.
The method has the advantages that the device on the middle path traverses the echo response message packaged by the VXLAN of the echo request message packaged by the VXLAN of each equivalent path of the VXLAN tunnel and is sent by the same path in the reverse direction, so that the accurate detection of each equivalent path of the VXLAN tunnel is ensured.
Drawings
Fig. 1 is a flowchart illustrating an embodiment of a path detection method provided in the present application;
fig. 2 is a schematic diagram illustrating an equivalent path for accurately detecting a VXLAN tunnel according to the present application;
fig. 3 is a schematic diagram illustrating an embodiment of a path detection apparatus provided in the present application.
Detailed Description
A detailed description will be given of a number of examples shown in a number of figures. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present application. Well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the examples.
The term "including" as that term is used is meant to include, but is not limited to; the term "comprising" means including but not limited to; the terms "above," "within," and "below" include the instant numbers; the terms "greater than" and "less than" mean that the number is not included. The term "based on" means based on at least a portion thereof.
Fig. 1 is a flowchart illustrating an embodiment of a path detection method provided in the present application, where the method includes:
103, acquiring a hash parameter of an equivalent path for selectively receiving the VXLAN packaging return request message in the reverse direction;
and step 107, sending a VXLAN packaging loopback response message through the equivalent path corresponding to the hash parameter found out from the loopback path flow entry.
The method has the advantages that the loopback request message packaged by the VXLAN for detecting each equivalent path and the loopback response message packaged by the VXLAN are ensured to be sent through the same path in the back-and-forth direction, and the accurate detection of each equivalent path of the VXLAN tunnel is realized.
Fig. 2 is a schematic diagram illustrating an equivalent path for accurately detecting a VXLAN tunnel according to the present application.
VTEP11 and VTEP16 establish VXLAN tunnels. On VTEP11, the source and destination IP addresses of the VXLAN tunnel are 1.1.1.1 and 2.2.2.2, respectively; on VTEP16, the source IP address and destination IP address of the VXLAN tunnel are 2.2.2.2 and 1.1.1.1, respectively. There are two equal-cost paths on the VXLAN tunnels of VTEP11 and VTEP 16.
VTEP11 sends a loopback request message encapsulated by the first VXLAN for traversing each equivalent path of the VXLAN tunnel connecting VTEP16, where the Flow ID carried by the OAM bit of the VXLAN encapsulation is 1.
The VTEP11 selects the next-hop intermediate device R12 reaching the VXLAN tunnel destination IP address 2.2.2.2 according to the route forwarding table entry of the route forwarding table, and sends the first echo request message encapsulated by VXLAN to the intermediate device R12.
The intermediate device R12 obtains the next hop on two equivalent paths reaching the destination IP address of the VXLAN tunnel according to the route forwarding table entry of the route forwarding table, calculates the hash parameter according to the ECMP routing algorithm, selects the next hop intermediate device R13 corresponding to the calculated hash parameter, modifies the outer Ethernet header of the loopback request message encapsulated by the first VXLAN according to the next hop intermediate device R13, and then sends the outer Ethernet header to the intermediate device R13.
The intermediate device R13 selects the next-hop intermediate device R15 reaching the destination IP address 2.2.2.2 of the VXLAN tunnel according to the route forwarding table entry of the route forwarding table, modifies the outer ethernet header of the echo request message encapsulated by the first VXLAN according to the next-hop intermediate device R15, and then sends the modified echo request message to the intermediate device R15.
Based on the embodiment of the application, the intermediate device R15 encapsulates the loopback request message according to the first VXLAN, and recognizes that the packet detection type message is according to the OAM bit encapsulated by the VXLAN. Intermediate device R15 recognizes that physical port a1 is the ingress interface for the first VXLAN encapsulation echo request message and the equivalent path that physical port a1 is the egress interface in the reverse direction is R15-R13-R12-VTEP 11.
The intermediate device R15 obtains the Hash parameter Hash a for selecting the identified equivalent path, and generates the loopback path flow entry, as shown in table 1, the priority of the Hash parameter of the loopback path flow entry in table 1 is set to be higher than the priority of the Hash parameter of the routing forwarding entry in the routing forwarding table.
Flow table key (DIP, SIP, Flow ID) | Hash parameter | Aging time |
1.1.1.1,2.2.2.2,Flow1 | Hash A | 5s |
TABLE 1
The intermediate device R15 finds the next-hop VTEP16 according to the route forwarding table entry of the route forwarding table, modifies the outer ethernet header of the echo request message encapsulated by the first VXLAN according to the next-hop VTEP16, and then sends the modified outer ethernet header to the VTEP 16.
VTEP11 sends a second VXLAN encapsulated loopback request message to traverse the other equivalent path of the VXLAN tunnel connecting VTEP16, with the Flow ID carried by the OAM bit of the VXLAN encapsulation equal to 2. Since each equivalent path of the VXLAN tunnel needs to be traversed, the VTEP11 sets different values for the source UDP encapsulated by the VXLAN, so that the intermediate device will hash the loopback request packet encapsulated by each VXLAN to each equivalent path when selecting the equivalent path according to the source UDP port and the computed hash parameters are different.
VTEP11 sends a second VXLAN encapsulated echo request message to the next hop intermediate R12 that arrives at the tunnel destination IP address.
The intermediate device R12 obtains next hops on two equivalent paths reaching the destination IP address of the VXLAN tunnel according to the route forwarding table entry of the route forwarding table, calculates the hash parameter according to an ECMP routing algorithm, changes the next hop into the intermediate device R14 according to the calculated hash parameter, modifies the outer Ethernet header of the loopback request message encapsulated by the second VXLAN according to the next hop intermediate device R4, and then sends the loopback request message to the intermediate device R14.
The intermediate device R14 finds the next-hop intermediate device R15 according to the route forwarding table entry of the route forwarding table according to the tunnel destination IP address of the loopback request message encapsulated by the second VXLAN, modifies the outer ethernet header of the loopback request message encapsulated by the second VXLAN according to the next-hop intermediate device R15, and then sends the modified loopback request message to the intermediate device R15.
The intermediate device R15 encapsulates the loopback request message according to the second VXLAN and recognizes that the packet detection type message is a PING detection type message according to the OAM bit encapsulated by the VXLAN. Intermediate device R15 recognizes that physical port B1 is the ingress interface for the second VXLAN encapsulation echo request message and the equivalent path that physical port B1 is the egress interface in the reverse direction is R15-R14-R12-VTEP 11.
The intermediate device R15 obtains the hash parameter hash B of the selected identified equal-cost path, and generates the loopback path flow entry shown in table 2; the priority of the hash parameter of the loopback path flow table entry in the table 2 is set to be higher than the priority of the hash parameter of the route forwarding table entry in the route forwarding table.
TABLE 2
The intermediate device R15 finds the next-hop VTEP16 according to the tunnel destination IP address of the echo request message encapsulated by the second VXLAN, modifies the outer ethernet header of the echo request message encapsulated by the first VXLAN according to the next-hop VTEP16, and then sends the modified echo request message to the VTEP 16.
The VETP16 receives the echo request message encapsulated by the first VXLAN, strips off the VXLAN encapsulation, processes and generates an echo response message according to a PING detection mechanism of an ICMP protocol, selects the next hop device R15 of the destination IP address 1.1.1.1 of the VXLAN tunnel according to the echo response message encapsulated by the first VXLAN with the same Flow ID1 of the VXLAN tunnel and the route forwarding table item of the route forwarding table, and sends the echo response message encapsulated by the first VXLAN to the next hop intermediate device R15 reaching the destination IP address of the tunnel.
Similarly, the VETP16 receives the echo request message of the second VXLAN encapsulation, strips off the VXLAN encapsulation, processes the echo response message according to the PING detection mechanism of the ICMP protocol, selects the next hop device R15 of the VXLAN tunnel destination IP address 1.1.1.1 according to the echo response message of the second VXLAN encapsulation with Flow ID2 according to the VXLAN tunnel encapsulation, and sends the echo response message of the second VXLAN encapsulation to the next hop intermediate device R15 reaching the tunnel destination IP address.
The intermediate device R15 encapsulates the loopback request message according to the first VXLAN, and recognizes that the loopback request message is a PING detection type message according to the OAM bit encapsulated by the VXLAN. The intermediate device R15 finds the loopback path Flow entry according to the source IP address 2.2.2.2, the destination IP address 1.1.1.1 and the Flow ID1 of the VXLAN tunnel, and obtains Hash a that selects an equivalent path in the reverse direction.
The intermediate device R15 obtains the next hops on the two equivalent paths reaching the destination IP address 1.1.1.1 of the VXLAN tunnel according to the route forwarding table entry of the route forwarding table, and calculates the routing Hash parameter Hash B according to the first VXLAN encapsulation return request message. The intermediate device R15 selects an equivalent path R15-R13-R12-VTEP11 according to the high priority Hash a, modifies the outer ethernet header of the echo reply message of the first VXLAN encapsulation according to the next hop intermediate device R13, and then sends it to the intermediate device R13.
The intermediate device R13 searches for the next hop intermediate device R12 of the tunnel destination IP address 1.1.1.1 of the first VXLAN encapsulated echo reply message according to the route forwarding table entry of the route forwarding table, modifies the outer ethernet header of the first VXLAN encapsulated echo reply message according to the next hop intermediate device R12, and then sends the modified outer ethernet header to the intermediate device R12.
The intermediate device R12 searches the tunnel destination IP address 1.1.1.1 of the echo reply message encapsulated by the first VXLAN according to the route forwarding table entry of the route forwarding table, searches the next-hop VTEP11, modifies the outer ethernet header of the echo reply message encapsulated by the first VXLAN according to the next-hop VTEP11, and then sends the modified outer ethernet header to the next-hop VTEP 1.
The VTEP11 receives the echo response message of the first VXLAN package, strips the VXLAN package, and determines that the equivalent path detected by the Flow ID1 can be reached according to the PING detection mechanism of the ICMP protocol, thereby realizing the detection of the equivalent path.
The intermediate device R15 encapsulates the loopback request message according to the second VXLAN and recognizes that the packet detection type message is a PING detection type message according to the OAM bit encapsulated by the VXLAN. The intermediate device R15 finds the loopback path Flow entry according to the source IP address 2.2.2.2, the destination IP address 1.1.1.1, and the Flow ID2 of the VXLAN tunnel, and obtains the Hash B that selects the equivalent path in the reverse direction.
The intermediate device R15 obtains the next hop on the two equivalent paths to reach the destination IP address 1.1.1.1 of the VXLAN tunnel according to the route forwarding table entry of the route forwarding table, and calculates the route selection Hash B according to the second VXLAN encapsulation loopback request message. The intermediate device R15 still selects the equivalent path R15-R14-R12-VTEP11 according to the high priority Hash B, and modifies the outer ethernet header of the echo response message encapsulated by the first VXLAN according to the next hop intermediate device R14.
However, the path between the intermediate device R14 and the intermediate device R15 is one-way, the path connecting the intermediate device R15 to the intermediate device 14 cannot be forwarded, and the intermediate device R15 discards the echo reply message encapsulated by the second VXLAN.
The VTEP12 does not receive the echo response message of the second VXLAN encapsulation with the Flow ID2 in the detection period, and determines that the detected equivalent path identified by the Flow ID2 is not reachable according to the PING detection mechanism of the ICMP protocol.
If there is message matching the flow table entry continuously, the flow table in table 2 will not be aged. When VTEP11 does not perform path detection for a while, and the flow entries in table 2 are not matched and the respective aging times arrive, intermediate device R15 deletes these entries, thereby avoiding waste of entry resources.
When the VTEP16 initiates PING detection, the processing is the same as VETP11, and the processing that the intermediate device R12 receives the echo request message encapsulated by VXLAN through the equivalent path is the same as the processing that the intermediate device R15 receives the echo request message encapsulated by VXLAN; the process of receiving the echo reply message encapsulated by VXLAN is also the same as that of the intermediate device R15, and the details are not described in this embodiment.
Fig. 3 is a schematic diagram illustrating a path detection apparatus 300 provided in the present application, where the apparatus 300 includes: a receiving module 301, an entry module 302, and a sending module 303.
The receiving module 301 is configured to receive a VXLAN encapsulation loopback request message with a flow identifier and a VXLAN encapsulation loopback response message with a flow identifier.
The table entry module 302 is configured to obtain a hash parameter for selecting an equivalent path for receiving a VXLAN encapsulation loopback request message in a reverse direction; generating a loop path flow table entry; wherein the tunnel information of the VXLAN tunnel in the reverse direction and the flow identification are recorded to correspond to the hash parameter. The tunnel information in the opposite direction of the VXLAN tunnel is the tunnel destination address and the tunnel source address of the tunnel encapsulation information respectively.
The sending module 303 is configured to search the loopback path flow entry based on the tunnel source address, the tunnel destination address, and the flow identifier of the VXLAN encapsulation loopback response message; and sending a VXLAN packaging loopback response message through an equivalent path on the opposite direction corresponding to the hash parameter.
The table entry module 302 is configured to identify an ingress interface of an equivalent path receiving a VXLAN encapsulation loopback request message; identifying an equivalence path with a physical port of an ingress interface as an egress interface in a reverse direction; hash parameters for selecting the identified equal cost path are obtained.
The entry module 302 is further configured to set an aging time for the loopback path flow entry; and deleting the loop-back path flow table entry reaching the aging time.
The entry module 302 is further configured to set a priority for the loopback path flow entry; the priority of the hash parameter of the loopback path flow table entry is higher than that of the hash parameter of the forwarding table entry matched with the tunnel source address and the tunnel destination address of the VXLAN packaging loopback response message.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (10)
1. A method for path detection, the method comprising:
receiving a VXLAN packaging loopback request message with a flow identifier;
determining a VXLAN tunnel based on the tunnel encapsulation information of the VXLAN encapsulation loopback request message;
obtaining a hash parameter of an equivalent path for selectively receiving the VXLAN packaging return request message in the reverse direction;
generating a loop path flow table entry; wherein the tunnel information of the VXLAN tunnel in the reverse direction and the flow identification are recorded to correspond to the hash parameter;
receiving a VXLAN encapsulation loopback response message with the flow identification;
based on the tunnel source address, the tunnel destination address and the flow identification of the VXLAN packaging loopback response message, the loopback path flow list item is found;
and sending the VXLAN packaging loopback response message through the equivalent path of the VXLAN tunnel corresponding to the hash parameter.
2. The method of claim 1, wherein a tunnel source address and a tunnel destination address of tunnel information in the opposite direction of the VXLAN tunnel are a tunnel destination address and a tunnel source address of the tunnel encapsulation information, respectively.
3. The method of claim 1, wherein obtaining hash parameters for selecting an equivalent path for receiving the VXLAN encapsulated echo request message in a reverse direction comprises:
identifying an input interface of an equivalent path receiving the VXLAN packaging loopback request message;
identifying an equivalence path with a physical port of the ingress interface in a reverse direction as an egress interface;
obtaining the hash parameter selecting the identified equal cost path.
4. The method of claim 1, further comprising:
setting aging time for the loopback path flow table entry;
and when the aging time is up, deleting the loopback path flow table entry.
5. The method of claim 4, wherein the loopback path flow entry has a higher priority than the hash parameter of the forwarding entry having a matching tunnel source address and tunnel destination address of the VXLAN encapsulated loopback response message.
6. A path detection apparatus, characterized in that the apparatus comprises:
the receiving module is used for receiving a VXLAN packaging loopback request message with the flow identification and receiving a VXLAN packaging loopback response message with the flow identification;
the table entry module is used for acquiring a hash parameter of an equivalent path for selectively receiving the VXLAN packaging return request message in the reverse direction; generating a loop path flow table entry; wherein the tunnel information of the VXLAN tunnel in the reverse direction and the flow identification are recorded to correspond to the hash parameter;
a sending module, configured to find the loopback route flow entry based on the tunnel source address, the tunnel destination address, and the flow identifier of the VXLAN encapsulation loopback response message; and sending the VXLAN packaging loopback response message through the equivalent path on the opposite direction corresponding to the hash parameter.
7. The apparatus of claim 6, wherein the tunnel information in the opposite direction of the VXLAN tunnel is a tunnel destination address and a tunnel source address of tunnel encapsulation information, respectively.
8. The apparatus of claim 6,
the table entry module is used for identifying an input interface of an equivalent path for receiving the VXLAN packaging return request message; identifying an equivalence path with a physical port of the ingress interface in a reverse direction as an egress interface; obtaining the hash parameter for selecting the identified equal cost path.
9. The apparatus of claim 6, wherein the entry module is further configured to set an aging time for the loopback path flow entry; and deleting the loopback path flow table entry reaching the aging time.
10. The apparatus of claim 9, wherein the entry module is further configured to set a priority for the loopback path flow entry; the priority of the hash parameter of the loopback path flow table entry is higher than the priority of the hash parameter of the forwarding table entry matched with the tunnel source address and the tunnel destination address of the VXLAN packaging loopback response message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011282907.3A CN112636997B (en) | 2020-11-17 | 2020-11-17 | Path detection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011282907.3A CN112636997B (en) | 2020-11-17 | 2020-11-17 | Path detection method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112636997A CN112636997A (en) | 2021-04-09 |
CN112636997B true CN112636997B (en) | 2022-08-30 |
Family
ID=75303428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011282907.3A Active CN112636997B (en) | 2020-11-17 | 2020-11-17 | Path detection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112636997B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425973A (en) * | 2008-11-25 | 2009-05-06 | 中兴通讯股份有限公司 | Method for route selection by IP multicast on equivalent multiple paths |
CN102833122A (en) * | 2011-06-17 | 2012-12-19 | 中兴通讯股份有限公司 | Loopback detection method and system |
CN104270298A (en) * | 2014-09-30 | 2015-01-07 | 杭州华三通信技术有限公司 | Method and device for forwarding message in VXLAN |
CN104579981A (en) * | 2013-10-18 | 2015-04-29 | 杭州华三通信技术有限公司 | Multicast data message forwarding method and equipment |
WO2017008712A1 (en) * | 2015-07-10 | 2017-01-19 | 杭州华三通信技术有限公司 | Reachability detection for path between vxlan tunnel end points (vtep) |
CN106878181A (en) * | 2016-12-29 | 2017-06-20 | 新华三技术有限公司 | A kind of message transmitting method and device |
CN110545230A (en) * | 2019-09-06 | 2019-12-06 | 北京百度网讯科技有限公司 | method and device for forwarding VXLAN message |
US10749741B1 (en) * | 2019-04-25 | 2020-08-18 | Dell Products L.P. | Methods and systems for auto-discovery of VXLAN VTEPs using PIM BSR |
-
2020
- 2020-11-17 CN CN202011282907.3A patent/CN112636997B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425973A (en) * | 2008-11-25 | 2009-05-06 | 中兴通讯股份有限公司 | Method for route selection by IP multicast on equivalent multiple paths |
CN102833122A (en) * | 2011-06-17 | 2012-12-19 | 中兴通讯股份有限公司 | Loopback detection method and system |
CN104579981A (en) * | 2013-10-18 | 2015-04-29 | 杭州华三通信技术有限公司 | Multicast data message forwarding method and equipment |
CN104270298A (en) * | 2014-09-30 | 2015-01-07 | 杭州华三通信技术有限公司 | Method and device for forwarding message in VXLAN |
WO2017008712A1 (en) * | 2015-07-10 | 2017-01-19 | 杭州华三通信技术有限公司 | Reachability detection for path between vxlan tunnel end points (vtep) |
CN106878181A (en) * | 2016-12-29 | 2017-06-20 | 新华三技术有限公司 | A kind of message transmitting method and device |
US10749741B1 (en) * | 2019-04-25 | 2020-08-18 | Dell Products L.P. | Methods and systems for auto-discovery of VXLAN VTEPs using PIM BSR |
CN110545230A (en) * | 2019-09-06 | 2019-12-06 | 北京百度网讯科技有限公司 | method and device for forwarding VXLAN message |
Non-Patent Citations (1)
Title |
---|
无线Ad Hoc网络的安全;周亚建等;《中兴通讯技术》;20071010(第05期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112636997A (en) | 2021-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10050877B2 (en) | Packet forwarding method and apparatus | |
WO2021170092A1 (en) | Message processing method and apparatus, and network device and storage medium | |
US9497107B1 (en) | Seamless path monitoring and rapid fault isolation using bidirectional forwarding detection in a network environment | |
EP4089981B1 (en) | Bit-forwarding ingress router and operation, administration and maintenance detection method | |
CN109873760A (en) | Handle the method and apparatus of routing and the method and apparatus of data transmission | |
WO2016082588A1 (en) | Link connectivity checking method and apparatus | |
CN102404197B (en) | Data path processing information included in the pseudowire layer of packets | |
CN109995654B (en) | Method and device for transmitting data based on tunnel | |
US8964745B2 (en) | SPB based multicast forwarding method and SPBM bridge | |
US20050053006A1 (en) | Obtaining path information related to a bridged network | |
CN105429841B (en) | NNI PING implementation method and device | |
US8165038B2 (en) | Network physical connection inference for IP tunnels | |
US20160149725A1 (en) | Packet forwarding | |
EP1856862A2 (en) | System and methods for network reachability detection | |
EP2595344A2 (en) | Method, apparatus, and system for detecting connectivity in a multi-protocol label switching ring network | |
US20140146710A1 (en) | Trill Network Communications Across an IP Network | |
US10785095B2 (en) | Service fault locating method and apparatus | |
US20180123828A1 (en) | Packet forwarding | |
WO2022042503A1 (en) | Message transmission method, apparatus, and system | |
CN108400911B (en) | Device and method for realizing Micro-BFD protocol | |
CN108667709B (en) | Message forwarding method and device | |
CN103297340A (en) | Routing convergence method and device in multi-protocol label switching (MPLS) and border gateway protocol (BGP) networking | |
CN110430131B (en) | Message forwarding method and device | |
US10313274B2 (en) | Packet forwarding | |
CN112636997B (en) | Path detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |