CN113810278A - Tunnel path switching method, path configuration method, device, system and medium - Google Patents

Tunnel path switching method, path configuration method, device, system and medium Download PDF

Info

Publication number
CN113810278A
CN113810278A CN202010531065.4A CN202010531065A CN113810278A CN 113810278 A CN113810278 A CN 113810278A CN 202010531065 A CN202010531065 A CN 202010531065A CN 113810278 A CN113810278 A CN 113810278A
Authority
CN
China
Prior art keywords
tunnel
service
escape
path
escape path
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010531065.4A
Other languages
Chinese (zh)
Inventor
丁春云
向奇敏
任伟
龚汉杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202010531065.4A priority Critical patent/CN113810278A/en
Publication of CN113810278A publication Critical patent/CN113810278A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/825Involving tunnels, e.g. MPLS

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a tunnel path switching method, a path configuration method, equipment, a system and a medium, wherein the tunnel path switching method comprises the following steps: according to the received tunnel failure information of the preset service, acquiring an escape path of a bearing tunnel of the preset service from preset tunnel configuration information of the preset service, wherein the escape path is used for service escape; and switching the predetermined service to the obtained escape path so as to forward the predetermined service by using the escape path.

Description

Tunnel path switching method, path configuration method, device, system and medium
Technical Field
The present application relates to the field, and in particular, to a tunnel path switching method, a path configuration method, a device, a system, and a medium.
Background
A Segment Routing Transport Profile (SR-TP) tunnel may be used to carry a fifth Generation mobile communication technology (5th Generation Wireless Systems, 5G) service, and has a strict requirement on the robustness of the service.
When the existing technology is used for protecting an SR-TP tunnel, if the tunnel protection is completely failed, the problems of service discontinuity and overlong service damage time occur, and particularly, most of traffic on a network is borne by the SR-TP tunnel, but the service damage influence range is very large, and the problem is difficult to solve in a short time.
Disclosure of Invention
The application provides a tunnel path switching method, a path configuration method, equipment, a system and a medium.
The embodiment of the application provides a tunnel path switching method, which comprises the following steps: according to the received tunnel failure information of the preset service, acquiring an escape path of a bearing tunnel of the preset service from preset tunnel configuration information of the preset service, wherein the escape path is used for service escape; and switching the predetermined service to the obtained escape path so as to forward the predetermined service by using the escape path.
The embodiment of the application provides a tunnel configuration method, which comprises the following steps: configuring a bearing tunnel of a preset service, and calculating an escape path of the bearing tunnel of the preset service, wherein the escape path is used for service escape; generating tunnel configuration information, wherein the tunnel configuration information at least comprises an escape path of the bearing tunnel; and sending the tunnel configuration information to the appointed network node equipment.
An embodiment of the present application provides a tunnel path switching apparatus, including: the system comprises an escape path acquisition module, a service management module and a service management module, wherein the escape path acquisition module is used for acquiring an escape path of a bearing tunnel of a preset service from preset tunnel configuration information of the preset service according to received tunnel failure information of the preset service, and the escape path is used for service escape; and the escape path switching module is used for switching the preset service to the acquired escape path so as to forward the preset service by using the escape path.
An embodiment of the present application provides a tunnel configuration device, including: the escape path calculation module is used for configuring a bearing tunnel of a preset service and calculating an escape path of the bearing tunnel of the preset service, wherein the escape path is used for service escape; the configuration information generating module is used for generating tunnel configuration information, wherein the tunnel configuration information at least comprises an escape path of the bearing tunnel; and the configuration information sending module is used for sending the tunnel configuration information to the appointed network node equipment.
An embodiment of the present application provides a network node device, including: one or more processors; a memory, on which one or more programs are stored, and when the one or more programs are executed by the one or more processors, the one or more processors implement any of the tunnel path switching methods in the embodiments of the present application.
An embodiment of the present application provides a network management controller, including: one or more processors; a memory, on which one or more programs are stored, which when executed by the one or more processors, cause the one or more processors to implement any one of the tunnel configuration methods in the embodiments of the present application.
An embodiment of the present application provides a network management system, including: a network management controller, configured to implement any one of the tunnel configuration methods in the embodiments of the present application; the network node device is configured to execute any one of the tunnel path switching methods in the embodiments of the present application.
The embodiment of the present application provides a storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for switching a tunnel path in the embodiment of the present application is implemented.
According to the tunnel path switching method, the tunnel path switching device and the network node equipment, aiming at the problem of discontinuous service caused by failure of protection of the preset service, the escape path of the preset service bearing tunnel is configured in advance, and under the condition of failure of protection, an escape tunnel does not need to be sent again each time service escape is carried out, so that the number of tunnel configuration is greatly reduced, the capability of quickly switching to a new path under the condition of failure of protection is realized, the robustness of a network is improved, the network damage caused by the failure is reduced, and the short-time service switching is realized.
According to the tunnel configuration method, the tunnel configuration device and the network management controller in the embodiment of the application, the network management controller can calculate the escape path of the bearer tunnel of the predetermined service when the bearer tunnel of the predetermined service is configured, and send the tunnel configuration information containing the escape path to the designated network node equipment, so that the escape path can be configured to the forwarding node equipment when the tunnel is initially established and configured, and the tunnel configuration information does not need to be recalculated and retransmitted every time the service is required to escape, thereby greatly reducing the time of the links of detection, calculation, configuration and the like, and achieving the purpose of reducing the service damage.
According to the network management system of the embodiment of the application, when the bearing tunnel of the preset service is configured through the network management controller, the escape path of the bearing tunnel of the preset service is calculated, and the tunnel configuration information containing the escape path is issued to the specified network node equipment; and the network node equipment receives the tunnel configuration information, and acquires the preset escape path of the bearer tunnel of the preset service from the tunnel configuration information under the condition that the service protection is invalid. In the network management system, an escape tunnel does not need to be sent again each time a service is escaped, the number of tunnel configuration is greatly reduced, the capability of quickly switching to a new path under the condition of protection failure is realized, the robustness of the network is improved, the network damage caused by the failure is reduced, and the service is switched in a short time.
With regard to the above embodiments and other aspects of the present application and implementations thereof, further description is provided in the accompanying drawings description, detailed description and claims.
Drawings
Fig. 1 shows a network architecture diagram of an engineering application scenario according to an embodiment of the present application.
Fig. 2 shows a flowchart of a tunnel path switching method according to an embodiment of the present application.
Fig. 3 is a flowchart illustrating a tunnel configuration method according to an embodiment of the present application.
Fig. 4 shows a schematic diagram of a networking architecture according to an embodiment of the present application.
Fig. 5 shows a schematic diagram of a networking architecture of another embodiment of the present application.
Fig. 6 is a schematic structural diagram of a tunnel path switching apparatus according to an embodiment of the present application.
Fig. 7 is a schematic structural diagram of a tunnel path switching apparatus according to an embodiment of the present application.
Fig. 8 is a schematic structural diagram of a network management system according to an embodiment of the present application.
FIG. 9 is a block diagram illustrating an exemplary hardware architecture of a computing device capable of implementing methods and apparatus in accordance with embodiments of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the present application more apparent, embodiments of the present application will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
Fig. 1 shows a network architecture diagram of an engineering application scenario according to an embodiment of the present application. As shown in fig. 1, the architecture includes a Network management controller 10(UME), a core Network 20, a Network-facing provider Edge equipment (NPE) 30, a plurality of core Scheduling servers such as the core Scheduling server 41 and the core Scheduling server 4, a plurality of Scheduling Processor devices (SPEs) such as the Scheduling Processor device SPE51 and the Scheduling Processor device SPE52, and a User provider Edge router (UPE) such as the UPE61 and the UPE 62.
The Core Network 20 may be a fifth Generation mobile communication technology Core Network (5 GC), or a Core Network of a communication Network exceeding 5G, for example.
In the tunnel configuration method, the network management controller 10 may create a bearer path of a predetermined service, calculate an escape path of the bearer path of the predetermined service, generate tunnel configuration information including the escape path, and send the tunnel configuration information to network node devices such as NPE.
It should be understood that the number of devices in fig. 1 is merely illustrative. According to the actual application needs, can carry out nimble adjustment.
In the tunnel path switching method, when tunnel implementation information of a predetermined service is received, the network node device determines an escape path of a bearer tunnel of the predetermined service according to pre-acquired tunnel configuration information, so that the predetermined service is switched to the escape path of the bearer tunnel for forwarding.
For better understanding of the present application, a tunnel path switching method and a tunnel configuration method according to an embodiment of the present application are described in detail below with reference to the accompanying drawings.
Fig. 2 shows a flowchart of a tunnel path switching method according to an embodiment of the present application. As shown in fig. 2, the tunnel path switching method in the embodiment of the present application may include the following steps.
S110, according to the received tunnel failure information of the preset service, acquiring an escape path of a bearing tunnel of the preset service from preset tunnel configuration information of the preset service, wherein the escape path is used for service escape.
And S120, switching the predetermined service to an escape path of the bearer tunnel to forward the predetermined service by using the escape path.
According to the tunnel path switching method, aiming at the problem of discontinuous service caused by failure of protection of the preset service, the escape path of the preset service bearing tunnel is configured in advance, and under the condition of failure of protection, one escape tunnel does not need to be sent down again each time service escape is carried out, so that the number of configured tunnels is greatly reduced, the capability of quickly switching to a new path under the condition of failure of protection is realized, the robustness of a network is improved, network damage caused by the failure is reduced, and short-time service switching is realized.
In one embodiment, the predetermined service may be a customer service carried in a 5G and above wireless communication network; the bearer tunnel for the predetermined traffic may be an SR-TP tunnel for carrying the client traffic in the 5G and above wireless communication networks. In this embodiment, according to the basic requirements of the service, the path of the SR-TP tunnel needs to be strictly constrained in a normal situation, that is, in order to satisfy the constraint condition that the SR-TP tunnel passes through the designated network node device or exclude the designated network node device and the link, a bidirectional tunnel path is ensured, and it is beneficial to fully utilize the bandwidth and the scheduling requirement in network deployment, and some specific requirements, such as that the service must pass through a certain network node device, etc., the tunnel carrying the client service needs to be strictly constrained.
In an embodiment, the tunnel configuration information is configuration information sent by a network management controller in a network to which the device belongs, which is received in advance.
In this embodiment, the tunnel configuration information may be tunnel configuration information issued by the network management controller UME, or may be configuration information pre-written or stored locally in another manner.
In one embodiment, if the predetermined service does not set tunnel protection, the tunnel failure information is detected failure warning information of a current bearer tunnel of the predetermined service; if the preset service is provided with tunnel protection, the tunnel failure information is protection failure information that all the set tunnel protections at all levels fail.
In the embodiment of the present application, the tunnel protection includes, but is not limited to, a tunnel protection group (tunnelling) protection and Fast Reroute (FRR) protection, and various currently applied protections may be applicable.
For example, an Equal-Cost Multipath (ECMP) based tunnel ECMP, the member being a single tunnel or a tunnel protection group; the FRR is superposed with the ECMP, and the member is a tunnel protection group or a single tunnel; routing ECMP, the member is a tunnel protection group or a single tunnel, etc. Therefore, when the tunnel protection is set for the predetermined service, the tunnel failure information is the detected information that all levels of protection are failed.
In this embodiment, when the predetermined service has no tunnel protection, and when detecting the failure warning information of the current tunnel of the predetermined service, it may determine that the protection of the predetermined service is failed, and the tunnel failure information is the failure warning information of the bearer tunnel; when the predetermined service has tunnel protection, the protection failure of the predetermined service may be determined when corresponding protection, for example, a tunnel protection group fails or FRR protection fails.
In one embodiment, the escape path is an escape path of a bearer tunnel for a predetermined service, which requires service escape. In this embodiment, in step S110, the step of obtaining the escape path of the bearer tunnel of the predetermined service from the preset tunnel configuration information of the predetermined service may specifically include: s111, taking the escape route of the first tunnel or the second tunnel of the preset service as the acquired escape route; the first tunnel is any one of the bearing tunnels of the preset service which need to be subjected to service escape; the second tunnel is a main link tunnel in the bearing tunnel which is acquired from the tunnel configuration information and needs to be subjected to service escape.
In this embodiment, since the paths of the SR-TP tunnels are strictly constrained according to the basic requirements of the service in general, in some specific scenarios, the bearer tunnels of the service need to be strictly paths, and do not need to escape to other paths, therefore, the escape path of the bearer tunnel of the predetermined service in the tunnel configuration information may be an escape path of the bearer tunnel of the predetermined service, which allows the service to escape.
In an embodiment, the tunnel configuration information further includes an escape tunnel identifier and a main link identifier, where the escape tunnel identifier is used to identify a bearer tunnel that needs to be escaped from the service, and the main link identifier is used to identify a main link tunnel in the bearer tunnel that needs to be escaped from the service.
In this embodiment, the escape tunnel identifier is used as tunnel attribute information, and may be used to identify that the corresponding bearer tunnel may use escape. Because the bearing tunnel needs a strict path in some special scenes, the bearing tunnel does not need to escape to other paths; the escape tunnel mark can distinguish the tunnel needing service escape from the tunnel not needing service escape; the main link identifier is also used as tunnel attribute information, and can be used to identify a main link tunnel that allows service escape in a bearer tunnel for carrying a predetermined service.
In one embodiment, the bearer tunnel of the predetermined traffic is a tunnel for traffic bearer based on segment routing; step S120 may specifically include: and S121, switching the label stack of the segmented route of the current bearing tunnel bearing the preset service into the label stack of the acquired escape path of the bearing tunnel so as to switch the preset service to the escape path for service forwarding.
In this embodiment, the outgoing label stack, i.e., the fragment List, of the SR-TP tunnel may be directly switched to the label stack, i.e., the escape path (escape path), of the escape path, so as to switch the predetermined service to the escape path for service forwarding. In addition, the outgoing label stack of the SR-TP tunnel is directly switched to the label stack of the escape path without adding a new tunnel, so that the tunnel resource can be greatly saved, the switching to the new path can be performed quickly, and the service damage time can be reduced.
In one embodiment, the escape path has a high priority; when the predetermined service is forwarded using the escape path, the method further includes: and if the path flow congestion of the network to which the node equipment belongs is detected, the escape path is preferentially used for forwarding the predetermined service.
In this embodiment, the escape path may be a path of a tunnel calculated by a shortest path establishment algorithm corresponding to an Intermediate System-Intermediate System (ISIS) protocol at a network management controller end, and the algorithm may ensure that path planning is balanced better, that is, the path of the tunnel obtained by the shortest path establishment algorithm under the ISIS protocol may have a high priority, so that when the path traffic is congested, it may be ensured that the packet passes preferentially, and the requirements of various service scenarios are met.
In this embodiment, unlike the above-described embodiments in which a bearer tunnel for carrying a predetermined service, such as an SR-TP tunnel, needs to be strictly constrained, the escape path in the embodiment of the present application may be a path calculated in the network management controller according to an unconstrained or loosely constrained manner. That is to say, the calculated escape path can satisfy the requirement that the network node equipment which is determined according to the service requirement and must pass through the specified number, but the passing network node equipment is not strictly restricted, so as to ensure that the flow is not affected to the maximum extent and the basic service requirement of the customer is ensured.
As an example, when an escape path is planned, loose constraints on the escape path may be used to: for a specific requirement, for example, a certain network node device must be passed through, loose constraints can be adopted when planning the escape path so that the escape path can pass through the specified network node device and reach the destination network node device. Because the escape path is only used as a temporary path after the bearing tunnel fault, the service is switched back to the original path after the fault is recovered, and the long-time influence on the original bearing path can not be caused.
In one embodiment, after step S120, the method further comprises: s130, according to the received fault elimination information of the bearing tunnel of the preset service, the preset service is switched to the original bearing tunnel, wherein the original bearing tunnel is the bearing tunnel of the preset service before the escape path of the bearing tunnel is switched to, or the bearing tunnel determined by the attribute information of the tunnel protection group of the preset service.
In this embodiment, if the number of tunnel protection groups for the predetermined service is zero, the original bearer tunnel is the bearer tunnel for the predetermined service before switching to the escape path of the bearer tunnel.
If the number of the tunnel protection groups is 1, the attribute information of the tunnel protection group may include a tunnel type: a main tunnel, also called working tunnel, i.e. protected tunnel, and a protection tunnel, i.e. a tunnel used to protect the main tunnel. According to the attribute information of the tunnel protection group, the main tunnel can be used as the original bearing tunnel when the tunnel fault is eliminated.
If the number of the tunnel protection groups is greater than 1, FRR protection is formed between the tunnel protection groups, and the attribute information of the tunnel protection groups may include a protection group type and a tunnel type in the protection group; the protection group types may include a main tunnel protection group and a non-main tunnel protection group, and the tunnel types in the protection group include a main tunnel and a protection tunnel in each tunnel protection group. According to the attribute information of the tunnel protection group, the total main tunnel of the main tunnel protection group can be used as the original bearing tunnel when the tunnel fault is eliminated.
As an example, after a failure in the bearer tunnel of the traffic is recovered, the traffic may be restored onto the segment list path of the tunnel.
According to the tunnel path switching method, compared with the situation that the gateway controller is re-received to send an escape tunnel every time a service escapes, the number of received tunnel configuration information can be greatly reduced, and therefore the number of tunnel configurations is reduced.
According to the tunnel path switching method, the short-time service switching can be achieved, 50MS escape can be achieved under the condition that Topology-Independent Loop-Free alternation (TILFA) exists, 100MS escape can be achieved under the condition that the TILFA does not exist, and the industry leading level is achieved. The TILFA can provide link and node protection for a bearing tunnel of service in Segment Routing of the Segment router. When a link or a node at a certain position fails, the flow can be quickly switched to a backup path and continuously forwarded, so that the loss of the flow is avoided to the maximum extent.
Fig. 3 is a flowchart illustrating a tunnel configuration method according to an embodiment of the present application. As shown in fig. 3, in one embodiment, the tunnel configuration method may include the following steps.
S210, configuring a bearing tunnel of the preset service, and calculating an escape path of the bearing tunnel of the preset service, wherein the escape path is used for service escape.
S220, tunnel configuration information is generated, wherein the tunnel configuration information at least comprises an escape path of the bearing tunnel.
S230, sending the tunnel configuration information to the specified network node device.
According to the tunnel configuration method provided by the embodiment of the application, the network management controller can calculate the escape path of the bearer tunnel of the predetermined service when the bearer tunnel of the predetermined service is configured, and send the tunnel configuration information containing the escape path to the specified network node equipment, so that the escape path can be configured to the forwarding node equipment when the tunnel is initially established and configured, and the tunnel configuration information does not need to be recalculated and resent every time service escape is required, thereby greatly reducing the time of links such as detection, calculation, configuration and the like, and achieving the purpose of reducing service damage.
In one embodiment, the designated network node device is a forwarding node device and may contain a forwarding chip.
In one embodiment, the escape path is an escape path of a bearer tunnel requiring service escape for a predetermined service, and the tunnel configuration information further includes an escape tunnel identifier and a main link identifier, where the escape tunnel identifier is used to identify the bearer tunnel requiring service escape, and the main link identifier is used to identify a main link tunnel in the bearer tunnel requiring service escape.
In this embodiment, because in some special scenarios, the bearer tunnel needs a strict path and does not need to escape to another path, when configuring the SR-TP tunnel, the network management controller device may carry an escape tunnel identifier in the delivered tunnel attribute information to identify the bearer tunnel that can use the escape, so that the tunnel that needs to be service-escaped may be distinguished from the tunnel that does not need to be service-escaped.
In this embodiment, if there are more than 1 bearer tunnel that needs to be escaped in the bearer path of the predetermined service, the main link identifier may be used to identify the main link tunnel of the bearer tunnel that needs to be escaped, so that the main link tunnel may be preferentially selected to carry the traffic according to actual needs.
In an embodiment, in step S210, the step of calculating an escape path of a bearer tunnel of the predetermined service may specifically include: s221, calculating an escape path meeting the path constraint condition according to the path constraint condition corresponding to the service requirement; the path constraint condition comprises a lower limit value of the flow which needs to be distributed to the escape path and/or network node equipment which needs to be passed through.
In this embodiment, the service escape usually uses unconstrained or non-strictly constrained (i.e. loosely constrained), and the escape path calculated under the condition of using unconstrained or loosely constrained can satisfy the requirement that a specified number of network node devices must pass through, which is determined according to the service requirement, but does not strictly constrain the passing network node devices, so as to maximally ensure that the traffic is not affected and the basic service requirement of the customer is ensured.
In one embodiment, in step S221, the step of calculating the escape path satisfying the path constraint condition may specifically include: s2211, according to the shortest path algorithm corresponding to the ISIS protocol from the intermediate system to the intermediate system, calculating the escape path meeting the path constraint condition, wherein the calculated escape path has high priority.
In this embodiment, when the tunnel escape path is calculated by the shortest path algorithm corresponding to the ISIS protocol, each network node device in the shortest path region can acquire the corresponding network topology by notifying the link condition of the designated node device to the neighboring network node device, so that the shortest path node for packet forwarding is calculated by the shortest path establishment algorithm, and the path planning is guaranteed to be balanced better. That is to say, compared with other shortest path algorithms, the path of the tunnel obtained by the shortest path establishment algorithm under the ISIS protocol can have high priority, so that when the path traffic is congested, the message can be guaranteed to pass preferentially, and the requirements of various service scenes are met.
The following describes specific flows of the tunnel path switching methods under two networking structures with reference to fig. 4 and 5. Fig. 4 shows a schematic networking structure diagram of an embodiment of the present application, and fig. 5 shows a schematic networking structure diagram of another embodiment of the present application.
In fig. 4, NE1, NE2, NE3, and NE4 among a plurality of Network Equipment (NEs) are exemplarily shown. Tunnel a provides a transmission path for forwarding traffic from NE1 to NE4, and tunnel B provides a transmission path for forwarding traffic from NE1 to NE4 via NE2 and NE 3.
As shown in fig. 4, in one embodiment, the tunnel path switching method may include the following steps.
S301, according to the tunnel configuration information acquired in advance, determining that a tunnel A and a tunnel B form a protection group, wherein A is a working tunnel, and B is a protection tunnel.
S302, detecting the failure of the tunnel A, and switching the service to the tunnel B.
In this step, through the switching of the protection group, the tunnel a does not escape, and the traffic is carried to the tunnel B.
And S303, detecting that the tunnel B also has a fault, and escaping the service from the tunnel A or the tunnel B to a specified escape path.
In the step, if both the tunnel a and the tunnel B have faults, it is determined that the protection group fails, and the escape attribute of the tunnel a and the tunnel B is triggered, and both the tunnel a and the tunnel B use the default path in the tunnel configuration information as the Segment List of the SR-TP tunnel, and the service escapes from the tunnel a or the tunnel B. The default path may be the primary link tunnel for traffic in the tunnel configuration information.
When the tunnel A and the tunnel B can both carry out service escape, and the tunnel A is a main link tunnel, the escape path of the tunnel A is used as the escape path for service escape under the condition that the escape path of the tunnel A is in a normal state, otherwise, the escape path of the tunnel B is used as the escape path for service escape.
S304, recovering the fault, eliminating the fault of the tunnel A or the tunnel B, invalidating the escape attribute, returning the service to the normal path, and particularly walking the tunnel A or the tunnel B to mainly protect the group attribute.
Through the steps S301-S304, when the failure of the protection group is detected, the original path of the SR-TP tunnel is switched to the escape path, and the tunnel escape is realized.
In fig. 5, a networking structure of NE1, NE2, NE3, and NE4 among the plurality of NEs is exemplarily shown. Wherein tunnel a provides a transport path for traffic forwarded from NE1 to NE 4; tunnel B provides a transport path for traffic from NE1, via NE2 and NE3, to be forwarded to NE 4; tunnel C provides a transport path for traffic forwarded from NE1, via NE4, to NE 3; tunnel D provides a transport path for traffic forwarded from NE1, via NE2, to NE 3.
As shown in fig. 5, in another embodiment, the tunnel path switching method may include the following steps.
S401, according to the pre-acquired tunnel configuration information, determining that a tunnel A and a tunnel B form a protection group, wherein A is a working tunnel, and B is a protection tunnel; a tunnel C and a tunnel D form a protection group, wherein the tunnel C is a working tunnel, and the tunnel D is a protection tunnel; tunnel a and tunnel B, and tunnel C and tunnel D form FRR protection.
S402, tunnel A is in failure, and the service is switched to tunnel B.
In this step, by switching the protection groups, all tunnels do not escape at this time, and the traffic is carried to tunnel B.
S403, tunnel B also fails, and at this time, both tunnel a and tunnel B fail, the protection group fails, and the protection switching of FRR is triggered, and the service traffic is carried in tunnel C.
In this step, the traffic is carried through tunnel C, and all tunnels still do not escape.
S404, the tunnel C also fails, which triggers the switching of the tunnel protection group, and the traffic is carried in the tunnel D.
In this step, the traffic is carried through tunnel D, at which time the FRR protection group is still valid and all tunnels do not trigger escape.
And S405, the tunnel D also breaks down, all the tunnel protection groups fail at the moment, the FRR protection also fails, and the tunnel escape is triggered.
In this step, the traffic is carried in tunnel D, all tunnels use the default path as Segment List of SR-TP tunnel, the service escapes from tunnel a, tunnel B, tunnel C, or tunnel D, and the primary link tunnel is preferably used to carry the traffic. The default path may be any one of tunnel a, tunnel B, tunnel C, and tunnel D or a primary link tunnel among tunnel a, tunnel B, tunnel C, and tunnel D, which is previously configured in the tunnel configuration information.
S406, the service is recovered, and the service is switched to the original path.
In this step, if any one or more tunnels are recovered, the triggered escape attribute is invalid, and the specific path on which the service returns to the normal path is determined by the attribute information of the protection group, which may be used to indicate the path in the bearer tunnel used when the service is switched to the original path.
Through the steps S401 to S406, when all protection failures are detected, the original path of the SR-TP tunnel is switched to the escape path, and the tunnel escape is realized.
Fig. 6 is a schematic structural diagram of a tunnel path switching apparatus according to an embodiment of the present application. As shown in fig. 6, the tunnel path switching apparatus may include the following modules.
An escape path obtaining module 510, configured to obtain, according to the received tunnel failure information of the predetermined service, an escape path of a bearer tunnel of the predetermined service from preset tunnel configuration information of the predetermined service, where the escape path is used for service escape; an escape path switching module 520, configured to switch the predetermined service to the obtained escape path, so as to forward the predetermined service using the escape path.
In one embodiment, if the number of bearer tunnels of the predetermined service is 1, the tunnel failure information is detected failure alarm information of the bearer tunnels; if the bearer tunnel of the predetermined service comprises a working tunnel and a protection tunnel, and the number of tunnel protection groups formed by the working tunnel and the protection tunnel is 1, the tunnel failure information is the failure information of the detected tunnel protection group; and if the number of the tunnel protection groups is more than 1 and fast reroute FRR protection is formed between the tunnel protection groups, the tunnel failure information is the detected FRR protection failure information.
In one embodiment, the escape path is an escape path of a bearer tunnel of a predetermined service, which needs to be escaped from the service; the escape route acquiring module 510 may be specifically configured to: taking the escape path of the first tunnel or the escape path of the second tunnel of the preset service as the acquired escape path; the first tunnel is any one of the bearing tunnels needing service escape; the second tunnel is a main link tunnel in the bearing tunnel needing service escape.
In an embodiment, the tunnel configuration information further includes an escape tunnel identifier and a main link identifier, where the escape tunnel identifier is used to identify a bearer tunnel that needs to be escaped from the service, and the main link identifier is used to identify a main link tunnel in the bearer tunnel that needs to be escaped from the service.
In one embodiment, the bearer tunnel of the predetermined traffic is a tunnel for traffic bearer based on segment routing; the escape path switching module 520 may be specifically configured to: and switching the label stack out of the segmented route of the bearing tunnel bearing the preset service to the label stack of the obtained escape path of the bearing tunnel so as to switch the preset service to the escape path for service forwarding.
In one embodiment, the escape path has a high priority; the escape path switching module 520 may be further configured to preferentially use the escape path to forward the predetermined service when detecting that the path traffic congestion occurs in the network to which the node device belongs when the predetermined service is forwarded by using the escape path.
In one embodiment, the escape path switching module 520 may be further configured to: after the predetermined service is switched to the escape path of the bearer tunnel, the predetermined service is switched to the original bearer tunnel according to the received fault elimination information of the bearer tunnel of the predetermined service, and the original bearer tunnel is the bearer tunnel of the predetermined service before the predetermined service is switched to the escape path of the bearer tunnel.
According to the tunnel path switching device provided by the embodiment of the application, aiming at the problem of discontinuous service caused by failure of protection of the preset service, the escape path of the bearing tunnel is obtained from the preset tunnel configuration information, and under the condition of failure of service protection, the escape tunnel is not required to be sent down again every time service escape is carried out, so that the number of tunnel configuration is greatly reduced, the capability of rapidly switching to a new path under the condition of failure of protection is realized, the robustness of a network is improved, the network damage caused by the failure is reduced, and the short-time service switching is realized.
Fig. 7 is a schematic structural diagram of a tunnel path switching apparatus according to an embodiment of the present application. As shown in fig. 7, the tunnel configuration apparatus may include the following modules.
An escape path calculation module 610, configured to configure a bearer tunnel of a predetermined service, and calculate an escape path of the bearer tunnel of the predetermined service, where the escape path is used for service escape; a configuration information generating module 620, configured to generate tunnel configuration information, where the tunnel configuration information at least includes an escape path of a bearer tunnel; a configuration information sending module 630, configured to send the tunnel configuration information to the specified network node device.
In one embodiment, the configuration information generating module 620 is specifically configured to: acquiring a corresponding path constraint condition according to the service requirement of a predetermined service, and calculating an escape path meeting the path constraint condition; the path constraint condition comprises a lower limit value of the flow which needs to be distributed to the escape path and/or network node equipment which needs to be passed through.
In one embodiment, the configuration information generating module 620 is specifically configured to calculate the escape route meeting the route constraint condition according to a shortest path algorithm from the intermediate system to the intermediate system under the ISIS protocol when specifically configured to calculate the escape route meeting the route constraint condition, where the calculated escape route has a high priority.
In one embodiment, the escape path is an escape path of a bearer tunnel requiring service escape for a predetermined service, and the tunnel configuration information further includes an escape tunnel identifier and a main link identifier, where the escape tunnel identifier is used to identify the bearer tunnel requiring service escape, and the main link identifier is used to identify a main link tunnel in the bearer tunnel requiring service escape.
According to the tunnel configuration method provided by the embodiment of the application, when the bearer tunnel of the preset service can be configured, the escape path of the bearer tunnel of the preset service is calculated, and the tunnel configuration information containing the escape path is issued to the specified network node equipment, so that when the tunnel is initially established and configured, the escape path can be configured to the forwarding node equipment, and the tunnel configuration information does not need to be recalculated and re-issued every time the service is required to escape, and therefore, the time of links such as detection, calculation and configuration can be greatly reduced, and the purpose of reducing service damage is achieved.
Fig. 8 is a schematic structural diagram of a network management system according to an embodiment of the present application. As shown in fig. 8, the network management system may include the following modules.
A network management controller 710 for performing the tunnel configuration method described in the above embodiments; a plurality of network node devices 720, each of which may be configured to perform the tunnel path switching method described in the above embodiments.
According to the network management system of the embodiment of the application, when the network management controller configures the bearing tunnel of the preset service, the escape path of the bearing tunnel of the preset service is calculated, and the tunnel configuration information containing the escape path is issued to the appointed network node equipment; and the network node equipment receives the tunnel configuration information, and acquires the preset escape path of the bearer tunnel of the preset service from the tunnel configuration information under the condition that the service protection is invalid. In the network management system, an escape tunnel does not need to be sent again each time a service is escaped, the number of tunnel configuration is greatly reduced, the capability of quickly switching to a new path under the condition of protection failure is realized, the robustness of the network is improved, the network damage caused by the failure is reduced, and the service is switched in a short time.
It is to be understood that the invention is not limited to the particular arrangements and instrumentality described in the above embodiments and shown in the drawings. For convenience and brevity of description, detailed description of a known method is omitted here, and for the specific working processes of the system, the module and the unit described above, reference may be made to corresponding processes in the foregoing method embodiments, which are not described herein again.
FIG. 9 is a block diagram illustrating an exemplary hardware architecture of a computing device capable of implementing methods and apparatus in accordance with embodiments of the present invention. As shown in fig. 9, computing device 800 includes an input device 801, an input interface 802, a central processor 803, a memory 804, an output interface 805, and an output device 806. The input interface 802, the central processing unit 803, the memory 804, and the output interface 805 are connected to each other via a bus 810, and the input device 801 and the output device 806 are connected to the bus 810 via the input interface 802 and the output interface 805, respectively, and further connected to other components of the computing device 800.
Specifically, the input device 801 receives input information from the outside, and transmits the input information to the central processor 803 through the input interface 802; the central processor 803 processes input information based on computer-executable instructions stored in the memory 804 to generate output information, temporarily or permanently stores the output information in the memory 804, and then transmits the output information to the output device 806 via the output interface 805; output device 806 outputs output information external to computing device 800 for use by a user.
In one embodiment, the computing device shown in fig. 9 may be implemented as a network node device that may include: a memory configured to store a program; a processor configured to execute a program stored in the memory to perform the tunnel path switching method described in the above embodiments.
In one embodiment, the computing device shown in fig. 9 may be implemented as a network management controller that may include: a memory configured to store a program; a processor configured to execute the program stored in the memory to perform the tunnel configuration method described in the above embodiments.
The above description is only exemplary embodiments of the present application, and is not intended to limit the scope of the present application. In general, the various embodiments of the application may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the application is not limited thereto.
Embodiments of the application may be implemented by a data processor of a mobile device executing computer program instructions, for example in a processor entity, or by hardware, or by a combination of software and hardware. The computer program instructions may be assembly instructions, Instruction Set Architecture (ISA) instructions, machine related instructions, microcode, firmware instructions, state setting data, or source code or object code written in any combination of one or more programming languages.
Any logic flow block diagrams in the figures of this application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions. The computer program may be stored on a memory. The memory may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), optical storage devices and systems (digital versatile disks, DVDs, or CD discs), etc. The computer readable medium may include a non-transitory storage medium. The data processor may be of any type suitable to the local technical environment, such as but not limited to general purpose computers, special purpose computers, microprocessors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), programmable logic devices (FGPAs), and processors based on a multi-core processor architecture.
The foregoing has provided by way of exemplary and non-limiting examples a detailed description of exemplary embodiments of the present application. Various modifications and adaptations to the foregoing embodiments may become apparent to those skilled in the relevant arts in view of the following drawings and the appended claims without departing from the scope of the invention. Therefore, the proper scope of the invention is to be determined according to the claims.

Claims (17)

1. A method for switching tunnel paths, the method comprising:
according to the received tunnel failure information of the preset service, acquiring an escape path of a bearing tunnel of the preset service from preset tunnel configuration information of the preset service, wherein the escape path is used for service escape;
and switching the predetermined service to the obtained escape path so as to forward the predetermined service by using the escape path.
2. The method of claim 1,
if the preset service is not provided with tunnel protection, the tunnel failure information is the detected fault warning information of the current bearing tunnel of the preset service;
if the preset service is provided with tunnel protection, the tunnel failure information is protection failure information of all levels of tunnel protection failure.
3. The method according to claim 1, wherein the escape path is an escape path of a bearer tunnel of the predetermined service requiring service escape; the acquiring the escape path of the bearer tunnel of the predetermined service from the preset tunnel configuration information of the predetermined service includes:
taking the escape path of the first tunnel or the escape path of the second tunnel of the preset service as the acquired escape path;
the first tunnel is any one of the bearing tunnels needing service escape;
the second tunnel is a main link tunnel in the bearing tunnel needing service escape.
4. The method of claim 3,
the tunnel configuration information also comprises an escape tunnel identifier and a main link identifier, wherein,
the escape tunnel identifier is used for identifying the bearer tunnel needing service escape, and the main link identifier is used for identifying a main link tunnel in the bearer tunnel needing service escape.
5. The method according to any of claims 1 to 3, wherein the bearer tunnel for the predetermined traffic is a tunnel for traffic bearer based on segmented routing; the switching the predetermined service to the obtained escape path to forward the predetermined service using the escape path includes:
and switching the label stack out of the segmented route of the bearing tunnel bearing the preset service to the label stack of the obtained escape path of the bearing tunnel so as to switch the preset service to the escape path for service forwarding.
6. The method according to any one of claims 1 to 3, wherein the escape path has a high priority; when the predetermined service is forwarded using the escape path, the method further includes:
and if the path flow congestion of the network to which the node equipment belongs is detected, the escape path is preferentially used for forwarding the predetermined service.
7. The method according to any one of claims 1 to 3, wherein after switching the predetermined traffic to the escape path of the bearer tunnel, the method further comprises:
and switching the predetermined service to an original bearer tunnel according to the received fault elimination information of the bearer tunnel of the predetermined service, wherein the original bearer tunnel is the bearer tunnel of the predetermined service before the escape path of the bearer tunnel is switched to, or the bearer tunnel determined by the attribute information of the tunnel protection group of the predetermined service.
8. A tunnel configuration method, the method comprising:
configuring a bearing tunnel of a preset service, and calculating an escape path of the bearing tunnel of the preset service, wherein the escape path is used for service escape;
generating tunnel configuration information, wherein the tunnel configuration information at least comprises an escape path of the bearing tunnel;
and sending the tunnel configuration information to the appointed network node equipment.
9. The method according to claim 8, wherein the calculating of the escape path of the bearer tunnel for the predetermined service comprises:
acquiring a corresponding path constraint condition according to the service requirement of the predetermined service, and calculating an escape path meeting the path constraint condition;
the path constraint condition comprises a lower limit value of the flow which needs to be distributed to the escape path and/or network node equipment which needs to be passed through.
10. The method of claim 9, wherein the calculating of the escape path satisfying the path constraint condition comprises:
and calculating the escape path meeting the path constraint condition according to a shortest path algorithm from the intermediate system to the intermediate system under the ISIS protocol, wherein the calculated escape path has high priority.
11. The method according to any one of claims 8 to 10,
the escape path is an escape path of a bearer tunnel of the predetermined service, which needs to be escaped from the service, and the tunnel configuration information further includes an escape tunnel identifier and a main link identifier, wherein,
the escape tunnel identifier is used for identifying the bearer tunnel needing service escape, and the main link identifier is used for identifying a main link tunnel in the bearer tunnel needing service escape.
12. A tunnel path switching apparatus, characterized in that the apparatus comprises:
the system comprises an escape path acquisition module, a service management module and a service management module, wherein the escape path acquisition module is used for acquiring an escape path of a bearing tunnel of a preset service from preset tunnel configuration information of the preset service according to received tunnel failure information of the preset service, and the escape path is used for service escape;
and the escape path switching module is used for switching the preset service to the acquired escape path so as to forward the preset service by using the escape path.
13. A tunnel configuration apparatus, characterized in that the apparatus comprises:
the escape path calculation module is used for configuring a bearing tunnel of a preset service and calculating an escape path of the bearing tunnel of the preset service, wherein the escape path is used for service escape;
the configuration information generating module is used for generating tunnel configuration information, wherein the tunnel configuration information at least comprises an escape path of the bearing tunnel;
and the configuration information sending module is used for sending the tunnel configuration information to the appointed network node equipment.
14. A network node device, comprising:
one or more processors;
a memory having one or more programs stored thereon that, when executed by the one or more processors, cause the one or more processors to implement the tunnel path switching method of any of claims 1-7.
15. A network management controller comprising:
one or more processors;
memory having one or more programs stored thereon that, when executed by the one or more processors, cause the one or more processors to implement the tunnel configuration method of any of claims 8-11.
16. A network management system, comprising:
a network management controller for performing the tunnel configuration method of any one of claims 8-11;
a plurality of network node devices, each for performing the tunnel path switching method of any of claims 1-7.
17. A storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1-7 or any one of claims 8-11.
CN202010531065.4A 2020-06-11 2020-06-11 Tunnel path switching method, path configuration method, device, system and medium Pending CN113810278A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010531065.4A CN113810278A (en) 2020-06-11 2020-06-11 Tunnel path switching method, path configuration method, device, system and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010531065.4A CN113810278A (en) 2020-06-11 2020-06-11 Tunnel path switching method, path configuration method, device, system and medium

Publications (1)

Publication Number Publication Date
CN113810278A true CN113810278A (en) 2021-12-17

Family

ID=78891997

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010531065.4A Pending CN113810278A (en) 2020-06-11 2020-06-11 Tunnel path switching method, path configuration method, device, system and medium

Country Status (1)

Country Link
CN (1) CN113810278A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023119576A1 (en) * 2021-12-23 2023-06-29 楽天モバイル株式会社 Communication path control system and communication path control method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023119576A1 (en) * 2021-12-23 2023-06-29 楽天モバイル株式会社 Communication path control system and communication path control method

Similar Documents

Publication Publication Date Title
CN108337157B (en) Method and node for transmitting message in network
Shand et al. IP fast reroute framework
EP1111860B1 (en) Automatic protection switching using link-level redundancy supporting multi-protocol label switching
EP2260620B1 (en) Constructing repair paths around multiple non-available links in a data communications network
EP2224644B1 (en) A protection method, system and device in the packet transport network
US8456982B2 (en) System and method for fast network restoration
US9853854B1 (en) Node-protection and path attribute collection with remote loop free alternates
US8780696B2 (en) System and method of implementing lightweight not-via IP fast reroutes in a telecommunications network
US7961602B2 (en) Method and device using a backup communication path to transmit excess traffic
US10439880B2 (en) Loop-free convergence in communication networks
EP3029883B1 (en) Network protection method and apparatus, next-ring node, and system
US8934335B2 (en) System and method for enhancing loop free alternative coverage
EP2658177B1 (en) Method for detecting tunnel faults and traffic engineering node
US7808890B2 (en) Forwarding data in a data communications network
US8223629B2 (en) Core router capable of securing the output router of an autonomous system
CN107979848B (en) Detection method and device for standby path
CN113810278A (en) Tunnel path switching method, path configuration method, device, system and medium
WO2016165061A1 (en) Service protecting method and device
US11451478B1 (en) Distributed tactical traffic engineering (TE) using loop free alternative (LFA), remote-LFA (R-LFA) and/or topology independent-LFA (TI-LFA) secondary paths
CN109873762B (en) Path scheduling method, path scheduling device and computer-readable storage medium
CN109787797B (en) Link fault detection method, device and system
CN112637054B (en) Networking optimization method and device for IP bearing network, computing equipment and storage medium
CN110138636B (en) Dynamic linear protection method and device
US10432505B2 (en) Systems, apparatuses, and methods for rerouting network traffic
CN103795625A (en) Multi-protocol label switching network quick rerouting implementation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination