CN112688887B - Tunnel configuration method and node equipment - Google Patents

Tunnel configuration method and node equipment Download PDF

Info

Publication number
CN112688887B
CN112688887B CN202011532653.6A CN202011532653A CN112688887B CN 112688887 B CN112688887 B CN 112688887B CN 202011532653 A CN202011532653 A CN 202011532653A CN 112688887 B CN112688887 B CN 112688887B
Authority
CN
China
Prior art keywords
node
sent
address information
routing information
tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011532653.6A
Other languages
Chinese (zh)
Other versions
CN112688887A (en
Inventor
程剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Information Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN202011532653.6A priority Critical patent/CN112688887B/en
Publication of CN112688887A publication Critical patent/CN112688887A/en
Application granted granted Critical
Publication of CN112688887B publication Critical patent/CN112688887B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present specification provides a tunnel configuration method and a node device, where the method includes: receiving first routing information sent by an opposite end node, wherein the first routing information carries real address information of the opposite end node, judging whether the opposite end node sends virtual address information, if so, establishing a target tunnel according to the first routing information, and configuring the target tunnel not to forward broadcast messages. By the method, the broadcast message can be prevented from being diffused in the distributed aggregation system.

Description

Tunnel configuration method and node equipment
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a tunnel configuration method and a node device.
Background
EVPN (Ethernet Virtual Private Network) is a VPN technology for two-layer Network interconnection. The EVPN technology adopts a mechanism similar to BGP/MPLS IP VPN, and by expanding a BGP protocol, the expanded reachability information is used to transfer the MAC address learning and publishing process between two-layer networks of different sites from a data plane to a control plane.
VM (Virtual Machine): multiple virtual machines can be created on one server, and different virtual machines can belong to different VXLANs. Virtual machines belonging to the same VXLAN are in the same logic two-layer network and are communicated with each other in two layers; two levels of isolation between virtual machines belonging to different VXLANs.
VTEP (VXLAN Tunnel End Point ): edge device of VXLAN. The VXLAN processing is performed on the VTEP, for example, to identify the VXLAN to which the ethernet data frame belongs, to perform two-layer forwarding on the data frame based on the VXLAN, and to encapsulate/decapsulate the packet. The VTEP may be an independent physical device or a server where the virtual machine is located.
VXLAN tunnel: a point-to-point logical tunnel between two VTEPs. After encapsulating a VXLAN header, a UDP header and an IP header for a data frame, the VTEP forwards the encapsulated message to a far-end VTEP through a VXLAN tunnel, and the far-end VTEP decapsulates the encapsulated message.
Disclosure of Invention
Embodiments of the present specification provide a tunnel configuration method and a node device, by which a broadcast packet may be prevented from being diffused in a distributed aggregation system.
An embodiment of the present specification provides a method for configuring a tunnel, where the method includes:
receiving first routing information sent by an opposite end node, wherein the first routing information carries real address information of the opposite end node;
judging whether the opposite end node sends virtual address information;
if yes, a target tunnel is established according to the first routing information, and the target tunnel is configured not to forward the broadcast message.
Optionally, the method for determining whether the opposite node has sent the virtual address information includes:
judging whether the first routing information carries an identification bit for indicating that the opposite end node has sent the virtual address information;
if the virtual address information is carried, the virtual address information is sent by the opposite end node.
Optionally, the method for configuring the target tunnel not to forward the broadcast packet includes:
and configuring a forwarding strategy for the target tunnel, wherein the forwarding strategy comprises not forwarding the broadcast message.
It can be seen from the above embodiments that, after receiving the first routing information for establishing the tunnel, the network node device may determine whether a tunnel based on the virtual address information has been established with the network node device that sent the first routing information, and if so, establish a target tunnel according to the first routing information, and configure the target tunnel as not to forward the broadcast packet, thereby avoiding a waste of resources for copying the broadcast packet by the home terminal and for processing and discarding the broadcast packet by the peer terminal.
An embodiment of the present specification further provides a tunnel configuration method, where the method includes:
acquiring real address information of a local node;
judging whether the local end node sends second routing information containing virtual address information to the opposite end node;
and if so, generating first routing information containing an identification bit according to the real address information, wherein the identification bit is used for indicating that the tunnel is configured not to send the broadcast message.
Optionally, the method for determining whether the local node has sent the second routing information including the virtual address information to the peer node includes:
acquiring a first routing table, wherein the first routing table is used for recording sent routing information;
and judging whether the local end node sends information containing virtual addresses to the opposite end node or not according to the routing information recorded in the first routing table.
An embodiment of the present specification further provides a method for processing a packet, where the method includes:
receiving a message to be sent;
when the message to be sent is determined to be a broadcast message, the broadcast message is not sent through a target tunnel;
the target tunnel is established according to received first routing information carrying real address information, and when the target tunnel is established according to the first routing information, the target tunnel is configured not to send broadcast messages.
An embodiment of the present specification further provides a node device, where the node device includes:
a receiving unit, configured to receive first routing information sent by an opposite end node, where the first routing information carries real address information of the opposite end node;
a first processing unit, configured to determine whether the opposite node has sent the virtual address information
And the second processing unit is used for establishing a target tunnel according to the processing result of the first processing unit and configuring the target tunnel not to forward the broadcast message.
Optionally, the first processing unit is configured to determine whether the first routing information carries an identifier bit used to indicate that the opposite end node has sent the virtual address information;
if the virtual address information is carried, the virtual address information is sent by the opposite end node.
Optionally, the second processing unit is configured to configure a forwarding policy for the target tunnel, where the forwarding policy includes not forwarding a broadcast packet.
An embodiment of the present specification further provides a node device, where the node device includes:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring real address information of a local node;
the first processing unit is used for judging whether the local end node sends second routing information containing virtual address information to the opposite end node;
and the second processing unit is used for generating first routing information containing an identification bit according to the processing result of the first processing unit, wherein the identification bit is used for indicating that the tunnel is configured not to send the broadcast message.
Optionally, the first processing unit is configured to obtain a first routing table, where the first routing table is used to record the sent routing information, and determine, according to the routing information recorded in the first routing table, whether the home node has sent the virtual address information to the opposite node.
An embodiment of the present specification further provides a node device, where the node device includes:
a receiving unit, configured to receive a message to be sent;
a third processing unit, configured to send the broadcast packet without passing through a target tunnel when it is determined that the packet to be sent is a broadcast packet;
the target tunnel is established according to received first routing information carrying real address information, and when the target tunnel is established according to the first routing information, the target tunnel is configured not to send broadcast messages.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present specification and together with the description, serve to explain the principles of the specification.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a tunnel configuration method according to an embodiment of the present disclosure;
fig. 3 is a flowchart illustrating a tunnel configuration method according to an embodiment of the present disclosure;
fig. 4 is a flowchart illustrating a tunnel configuration method according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the specification, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Based on the EVPN technology, distributed aggregation is widely applied to the internet, for example, after both VTEPs open the distributed aggregation mode of the EVPN and configure the same virtual address for the EVPN, the two VTEPs will become a VTEP device virtually, and the device automatically establishes a VXLAN tunnel with the remote VTEP by using the virtual address as the source address, thereby avoiding the network from being affected by VTEP single-point failure.
As shown in fig. 1, the server1 is connected to two leaf of DRS (Distributed-Relay System) System through aggregation ports (open the Distributed aggregation mode of EVPN, where the leaf can be regarded as VTEP device), and the leaf1 configures its own real address IP1 and virtual address IPv; the leaf2 is configured with its own real address IP2 and virtual address IPv (the same virtual VTEP address is configured in the DRS system). Leaf1 and Leaf2 respectively send two three types of routes, the routes are announced to Leaf3 at a far end through a reflector spine, Leaf3 receives 4 routes, two of the routes are found to be repeated (IPv), all three effective routes are provided, and the IPs are respectively IP1, IP2 and IPv. Leaf3 establishes three tunnels Tunnel1(IP1 IP3), Tunnel2(IP2 IP3) and Tunnel3(IPv IP3) using its own configured IP3 and the three routes published from each other. Also, the route sent by Leaf3 to remote Leaf1 and Leaf2 creates a tunnel for the response after receipt.
When a server2 connected with a Leaf3 sends a broadcast message (including unknown unicast and unknown multicast) to the Leaf3, the message is broadcasted in a corresponding forwarding instance vsi, and a copy of the message is respectively copied from three bound tunnels 1, 2, 3 and forwarded out; and forwarding to a DRS system through spine. The same message receives multiple messages in one system, which results in multiple packets of the message. The excess messages need to be discarded and only one of the broadcast messages is forwarded to server 1. The existing implementation mode is to forward the broadcast message of which the destination IP is the virtual VTEP address normally; and the broadcast message forwarded by the real IP (IP1 IP2) is discarded.
Therefore, the broadcast messages are divided into three parts, the bandwidth of the public network is wasted, and the broadcast copied hardware resources are wasted by copying the three parts of traffic on the Leaf 3.
In order to solve the above technical problem, an embodiment of the present specification provides a method for configuring a tunnel, as shown in fig. 2, the method includes:
s202, receiving first routing information sent by an opposite end node, wherein the first routing information carries real address information of the opposite end node;
s204, judging whether the opposite end node sends virtual address information;
and if so, establishing a target tunnel according to the first routing information, and configuring the target tunnel as a broadcast message not to be forwarded.
By the method, the node equipment can judge whether the opposite end has sent the virtual address information when the tunnel is established, if the virtual address information has been sent, the node equipment can think that the tunnel based on the virtual address is established with the opposite end (the tunnel is established with the equipment in the aggregation system), so that the target tunnel can be configured not to forward the broadcast message when the target tunnel is established according to the real address in the first routing information, and resources for copying the broadcast message and forwarding the broadcast message are saved.
In step S204, the method for determining whether the opposite node has sent the virtual address information includes: and judging whether the first routing information carries an identification bit for indicating that the opposite end node has sent the virtual address information, if so, indicating that the opposite end node has sent the virtual address information. If not, it indicates that the opposite node has not sent the virtual address information.
In this step, the first routing information may be an IMET route, the corresponding node sends the IMET route, and when the corresponding node determines that the virtual address information of the corresponding node has been sent outside before sending the IMET route, an identification bit may be added to a reserved bit of a community extension attribute of the IMET route, where the identification bit may be represented by high-order 1 or low-order 0.
After receiving the IMET route, the home node equipment configures whether to forward the broadcast message for the established tunnel according to the identification bit in the IMET route.
It should be noted that, this embodiment only uses the IMET route as an exemplary description, and the route may also include the release route of the MAC/IP, and the process is similar to the IMET route, and is not described here.
In step S206, the administrator may issue an intelligent control policy in the node device in advance, for example, when an identifier is carried in an IMET route used for establishing a tunnel, configure a Flooding _ Disable _ All for the tunnel, so that the tunnel does not forward a broadcast packet.
In an embodiment of combining to process a packet, as shown in fig. 3, the method may include:
s302, receiving a message to be sent;
s304, when determining that the message to be sent is a broadcast message, sending the broadcast message without a target tunnel;
the target tunnel is established according to received first routing information carrying real address information, and when the target tunnel is established according to the first routing information, the target tunnel is configured not to send broadcast messages.
In step S302, after receiving the service packet, the node device identifies whether the service packet belongs to a broadcast packet (including a multicast packet and an unknown multicast packet), and if so, executes step S304.
In step S304, through the Flooding _ Disable _ All policy configured in the target tunnel, it may be executed that the service packet is not sent in the target tunnel, so as to save packet copying and forwarding resources for sending the service packet.
When a home node sends routing information to an opposite node, in order to configure a Flooding _ Disable _ All policy for a tunnel when the opposite node establishes the tunnel according to the routing information sent by the home node, this specification further provides a method for configuring the tunnel, and as shown in fig. 4, the method includes:
s402, acquiring real address information of a home node;
s404, judging whether the local node sends second routing information containing virtual address information to the opposite node;
and S406, if yes, generating first routing information containing an identification bit according to the real address information, wherein the identification bit is used for indicating that the tunnel is configured not to send the broadcast message.
In step S402, the real address information is real address information of the local node, and may be an IP address or a MAC address.
Meanwhile, the home node may further determine whether second routing information including virtual address information has been sent to the correspondent node, where the virtual address may be understood as an aggregated address.
Specifically, the method for determining whether the second routing information including the virtual address information has been sent to the correspondent node may include:
and calling a first routing table of the router, wherein the first routing table records routing information sent by the local node, and whether second routing information containing virtual address information is sent or not can be obtained by traversing the first routing table.
Including the case where the first routing table is traversed to determine that the dummy address information has been sent to the correspondent node, step S406 is performed.
In another case, it is found that the virtual address information has not been sent to the opposite end node, at this time, the home end node may send third routing information that does not include the identification bit to the opposite end node, and after the opposite end node receives the third routing information, a tunnel is established according to a real address in the third routing information, and the Flooding _ Disable _ All is not configured. If the end node sends the route information containing the virtual address to the opposite end node after sending the third route, the end node will send the second route information containing the identification bit again, and after the opposite end node receives the second route information, the end node configures the routing _ Disable _ All for the tunnel corresponding to the second route information according to the identification bit.
It can be seen from the above embodiments that, by the above method, a policy of whether to send a broadcast packet is configured for a tunnel when the tunnel is established, and a situation that a broadcast packet is still sent in a real address tunnel and a resource is wasted when a real address tunnel and a virtual address tunnel are established between two nodes is avoided.
Based on the above, an embodiment of the present specification further provides a node device, where the node device includes:
a receiving unit, configured to receive first routing information sent by an opposite end node, where the first routing information carries real address information of the opposite end node;
a first processing unit, configured to determine whether the opposite node has sent the virtual address information
And the second processing unit is used for establishing a target tunnel according to the processing result of the first processing unit and configuring the target tunnel not to forward the broadcast message.
Optionally, the first processing unit is configured to determine whether the first routing information carries an identifier bit used to indicate that the opposite end node has sent the virtual address information;
if the virtual address information is carried, the virtual address information is sent by the opposite end node.
Optionally, the second processing unit is configured to configure a forwarding policy for the target tunnel, where the forwarding policy includes not forwarding the broadcast packet.
An embodiment of the present specification further provides a node device, where the node device includes:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring real address information of a local node;
the first processing unit is used for judging whether the local end node sends second routing information containing virtual address information to the opposite end node;
and the second processing unit is used for generating first routing information containing an identification bit according to the processing result of the first processing unit, wherein the identification bit is used for indicating that the tunnel is configured not to send the broadcast message.
Optionally, the first processing unit is configured to obtain a first routing table, where the first routing table is used to record the sent routing information, and determine, according to the routing information recorded in the first routing table, whether the home node has sent the virtual address information to the opposite node.
An embodiment of the present specification further provides a node device, where the node device includes:
a receiving unit, configured to receive a message to be sent;
a third processing unit, configured to send the broadcast packet without passing through a target tunnel when it is determined that the packet to be sent is a broadcast packet;
the target tunnel is established according to received first routing information carrying real address information, and when the target tunnel is established according to the first routing information, the target tunnel is configured not to send broadcast messages.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Other embodiments of the present description will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This specification is intended to cover any variations, uses, or adaptations of the specification following, in general, the principles of the specification and including such departures from the present disclosure as come within known or customary practice within the art to which the specification pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
It will be understood that the present description is not limited to the precise arrangements described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present description is limited only by the appended claims.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (12)

1. A method for configuring a tunnel, the method comprising:
receiving first routing information sent by an opposite end node, wherein the first routing information carries real address information of the opposite end node;
judging whether the opposite end node sends virtual address information;
if yes, a target tunnel is established according to the first routing information, and the target tunnel is configured not to forward the broadcast message.
2. The method of claim 1, wherein the determining whether the correspondent node has sent the virtual address information comprises:
judging whether the first routing information carries an identification bit for indicating that the opposite end node has sent the virtual address information;
if the virtual address information is carried, the virtual address information is sent by the opposite end node.
3. The method of claim 1, wherein the configuring the target tunnel to not forward broadcast packets comprises:
and configuring a forwarding strategy for the target tunnel, wherein the forwarding strategy comprises not forwarding the broadcast message.
4. A method for configuring a tunnel, the method comprising:
acquiring real address information of a local node;
judging whether the local end node sends second routing information containing virtual address information to the opposite end node;
and if so, generating first routing information containing an identification bit according to the real address information, wherein the identification bit is used for indicating that the tunnel is configured not to send the broadcast message.
5. The method of claim 4, wherein the determining whether the home node has sent the second routing information including the virtual address information to the correspondent node comprises:
acquiring a first routing table, wherein the first routing table is used for recording sent routing information;
and judging whether the local end node sends information containing virtual addresses to the opposite end node or not according to the routing information recorded in the first routing table.
6. A method for processing a packet, the method comprising:
receiving a message to be sent;
when the message to be sent is determined to be a broadcast message, the broadcast message is not sent through a target tunnel;
the target tunnel is established according to received first routing information carrying real address information, and when the target tunnel is established according to the first routing information, the target tunnel is configured not to send broadcast messages.
7. A node apparatus, characterized in that the node apparatus comprises:
a receiving unit, configured to receive first routing information sent by an opposite end node, where the first routing information carries real address information of the opposite end node;
a first processing unit, configured to determine whether the opposite node has sent virtual address information
And the second processing unit is used for establishing a target tunnel according to the processing result of the first processing unit and configuring the target tunnel not to forward the broadcast message.
8. The node apparatus of claim 7,
the first processing unit is configured to determine whether the first routing information carries an identifier bit used to indicate that the correspondent node has sent the virtual address information;
and if the virtual address information is carried, the virtual address information is sent by the opposite end node.
9. The apparatus of claim 7,
the second processing unit is configured to configure a forwarding policy for the target tunnel, where the forwarding policy includes not forwarding the broadcast packet.
10. A node apparatus, characterized in that the node apparatus comprises:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring real address information of a local node;
the first processing unit is used for judging whether the local end node sends second routing information containing virtual address information to the opposite end node;
and the second processing unit is used for generating first routing information containing an identification bit according to the processing result of the first processing unit, wherein the identification bit is used for indicating that the tunnel is configured not to send the broadcast message.
11. The node apparatus of claim 10,
a first processing unit, configured to obtain a first routing table, where the first routing table is used to record sent routing information, and determine, according to the routing information recorded in the first routing table, whether a home node has sent information including a virtual address to an opposite node.
12. A node apparatus, characterized in that the node apparatus comprises:
a receiving unit, configured to receive a message to be sent;
a third processing unit, configured to send the broadcast packet without passing through a target tunnel when it is determined that the packet to be sent is a broadcast packet;
the target tunnel is established according to received first routing information carrying real address information, and when the target tunnel is established according to the first routing information, the target tunnel is configured not to send broadcast messages.
CN202011532653.6A 2020-12-23 2020-12-23 Tunnel configuration method and node equipment Active CN112688887B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011532653.6A CN112688887B (en) 2020-12-23 2020-12-23 Tunnel configuration method and node equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011532653.6A CN112688887B (en) 2020-12-23 2020-12-23 Tunnel configuration method and node equipment

Publications (2)

Publication Number Publication Date
CN112688887A CN112688887A (en) 2021-04-20
CN112688887B true CN112688887B (en) 2022-07-12

Family

ID=75450832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011532653.6A Active CN112688887B (en) 2020-12-23 2020-12-23 Tunnel configuration method and node equipment

Country Status (1)

Country Link
CN (1) CN112688887B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9451500B2 (en) * 2011-11-16 2016-09-20 Telefonaktiebolaget Lm Ericsson (Publ) Conditional routing technique
CN107342925B (en) * 2016-04-29 2020-03-06 新华三技术有限公司 Message transmission method and device
CN106453025B (en) * 2016-11-04 2020-06-09 新华三技术有限公司 Tunnel creation method and device
CN106878181A (en) * 2016-12-29 2017-06-20 新华三技术有限公司 A kind of message transmitting method and device
CN107547342B (en) * 2017-06-27 2020-09-08 新华三技术有限公司 Message broadcasting method and device based on VXLAN tunnel
CN108259301B (en) * 2017-08-16 2020-09-25 新华三技术有限公司 Tunnel online method and device
CN108600073B (en) * 2018-04-19 2020-12-29 新华三技术有限公司 Dynamic tunnel establishment method and device
CN109194560B (en) * 2018-08-29 2021-06-22 迈普通信技术股份有限公司 Multicast method and VTEP

Also Published As

Publication number Publication date
CN112688887A (en) 2021-04-20

Similar Documents

Publication Publication Date Title
JP7208386B2 (en) Packet transfer method, packet transmitter, and packet receiver
US11374862B2 (en) Packet sending and processing method and apparatus, PE node, and node
CN109218178B (en) Message processing method and network equipment
US20220078114A1 (en) Method and Apparatus for Providing Service for Traffic Flow
US10652047B2 (en) Connectivity to internet via shared services in enterprise fabric based network with LISP control plane
US10594513B2 (en) Packet communications providing packet forwarding efficiencies in a network including using a segment routing and tunnel exchange
CN108964940B (en) Message sending method and device and storage medium
US20150146727A1 (en) Forwarding Packets and PE Devices in VPLS
US7953097B2 (en) Neighbour discovery protocol mediation
CN107040441B (en) Cross-data-center data transmission method, device and system
EP4191966A1 (en) Method and device for processing data message, storage medium, and electronic device
US9438475B1 (en) Supporting relay functionality with a distributed layer 3 gateway
CN116368860A (en) Network layer support for 5G edge computing sticky traffic
US20230081052A1 (en) Method and apparatus for sending multicast packet
CN112688887B (en) Tunnel configuration method and node equipment
CN113542441B (en) Communication processing method and device
CN115118545B (en) Group management protocol host mobility in ethernet virtual private network multicast networks
JP2005057693A (en) Network virtualizing system
WO2021077991A1 (en) Message detection method, connectivity negotiation relationship establishment method, and related device
CN106452992A (en) Remote multi-homing networking method and apparatus
US20230308389A1 (en) Inter-compatible forwarding modes in network fabric overlays
CN113347101B (en) Routing information sending control method, VTEP and computer readable storage medium
CN108512762B (en) Multicast implementation method and device
WO2019123630A1 (en) Communication device and communication method
CN115665043A (en) Data message forwarding method, VTEP, device, medium and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230619

Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: H3C INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 310052 Changhe Road, Binjiang District, Hangzhou, Zhejiang Province, No. 466

Patentee before: NEW H3C TECHNOLOGIES Co.,Ltd.

TR01 Transfer of patent right