CN113992475B - Tunnel establishment method and device - Google Patents

Tunnel establishment method and device Download PDF

Info

Publication number
CN113992475B
CN113992475B CN202111115000.2A CN202111115000A CN113992475B CN 113992475 B CN113992475 B CN 113992475B CN 202111115000 A CN202111115000 A CN 202111115000A CN 113992475 B CN113992475 B CN 113992475B
Authority
CN
China
Prior art keywords
sid
tunnel
vsrp
response result
protection tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111115000.2A
Other languages
Chinese (zh)
Other versions
CN113992475A (en
Inventor
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Security Technologies Co Ltd
Original Assignee
New H3C Security Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Security Technologies Co Ltd filed Critical New H3C Security Technologies Co Ltd
Priority to CN202111115000.2A priority Critical patent/CN113992475B/en
Publication of CN113992475A publication Critical patent/CN113992475A/en
Application granted granted Critical
Publication of CN113992475B publication Critical patent/CN113992475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a tunnel establishment method and a tunnel establishment device, which are applied to a first UP, wherein when a first protection tunnel needs to be established, the first UP acquires a first section identification SID used for establishing the first protection tunnel; sending a first tunnel establishment request to a second UP, wherein the first tunnel establishment request comprises a first SID applied for; and receiving a first response result sent by a second UP, wherein the first response result comprises a second SID required by the second UP for establishing the first protection tunnel with the first UP. Thereby establishing a protection tunnel between the first UP and the second UP is enabled with the SID.

Description

Tunnel establishment method and device
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for tunnel establishment.
Background
In the switching separation dual-unit network, if a protection tunnel is not provided in the UP backup scene, when a main UP (User Plane, also called forwarding Plane) device fails, the current main-standby switching mode is that the descending UP device 1 cancels the route and the ascending UP device 2 issues the route, but the scheme cannot meet the requirement of fast switching because the scheme firstly cancels the route of the descending UP device 1 and then can issue the route of the ascending UP device 2, and meanwhile, the Core Router (CR) route is refreshed, which also needs to consume time. In addition, a large amount of packet loss can be generated in the process of refreshing the route, and the scenes needing quick switching cannot be met, for example, the scenes that hot standby equipment requires switching time not to exceed 1 second in the process of collecting and picking. When the UP backup scene has the protection tunnel, the UP device 1 and the UP device 2 can issue routes with different priorities at the same time, so that when the UP device 1 fails, the UP device 2 can immediately ascend and issue routes with high priority, and before the routes of the UP device 1 are not withdrawn, the traffic can be drained to the UP device 1, and meanwhile, the traffic can be redirected to the UP device 2 through the protection tunnel and then forwarded to the client.
The protection tunnel provided by the existing scheme is an LSP (Label Switched Path ) tunnel, but the LSP protection tunnel needs to rely on LDP (Label Distribution Protocol ) protocol and related routing protocols to synchronize and distribute information of various nodes on network links, and the LSP protection tunnel does not support ECMP (Equal-cost-Cost Multipath Routing); furthermore, the LSP protection tunnel may need to afford forwarding of all IP traffic, resulting in poor scalability and deployment difficulties.
It is therefore one of considerable technical problems how to establish a protection tunnel between two UP devices to avoid the drawbacks associated with LSP protection tunnels.
Disclosure of Invention
In view of this, the present application provides a tunnel establishment method and apparatus for establishing a protection tunnel between two UP devices, so as to avoid the problem caused by the LSP protection tunnel.
Specifically, the application is realized by the following technical scheme:
according to a first aspect of the present application, there is provided a tunnel establishment method applied in a first forwarding plane UP, the method comprising:
when a first protection tunnel needs to be established, acquiring a first segment identification SID used for establishing the first protection tunnel;
sending a first tunnel establishment request to a second UP, wherein the first tunnel establishment request comprises a first SID applied for;
and receiving a first response result sent by a second UP, wherein the first response result comprises a second SID required by the second UP for establishing the first protection tunnel with the first UP.
According to a second aspect of the present application, there is provided a tunnel establishment apparatus comprising:
the acquisition module is used for acquiring a first segment identification SID used for creating the first protection tunnel when the first protection tunnel needs to be created;
a first sending module, configured to send a first tunnel establishment request to a second UP, where the first tunnel establishment request includes an applied first SID;
the first receiving module is configured to receive a first response result sent by a second UP, where the first response result includes a second SID required by the second UP to establish the first protection tunnel with the first UP.
According to a third aspect of the present application there is provided an electronic device comprising a processor and a machine-readable storage medium storing a computer program executable by the processor, the processor being caused by the computer program to perform the method provided by the first aspect of the embodiments of the present application.
According to a fourth aspect of the present application there is provided a machine-readable storage medium storing a computer program which, when invoked and executed by a processor, causes the processor to perform the method provided by the first aspect of the embodiments of the present application.
The beneficial effects of the embodiment of the application are that:
according to the tunnel establishment method provided by the embodiment of the application, the segment identification SID is utilized to establish the protection tunnel between the first UP and the second UP, the protection tunnel is not an LDP tunnel in the prior art, and based on the advantages of the SID in SRv, not only can ECMP be supported, but also the tunnel established by the SID is not dependent on LDP/RSVP-TE any more, and protocol stack simplification can be supported. In addition, the SID is adopted to establish a protection tunnel between two UPs, and the source route serving as a source node and the stateless state determine the expansibility of the established protection tunnel between the two UPs.
Drawings
Fig. 1 is a schematic flow chart of a tunnel establishment method provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of another tunnel establishment method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a tunnel establishment apparatus according to an embodiment of the present application;
fig. 4 is a schematic hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with aspects as described herein.
The terminology used in the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the present application. As used in this application, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the corresponding listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first message may also be referred to as a second message, and similarly, a second message may also be referred to as a first message, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
The tunnel establishment method provided in the present application is described in detail below.
Referring to fig. 1, fig. 1 is a flowchart of a tunnel establishment method provided in the present application, where the method may be applied to a first UP, and when the first UP implements the tunnel establishment method, the method may include the following steps:
s101, when a first protection tunnel needs to be established, acquiring a first segment identification SID used for establishing the first protection tunnel.
In this step, when a first UP located in the remote control separation dual-unit networking scene needs to establish a protection tunnel with a second UP, in order to change an existing LSP protection tunnel, the present application proposes to create the protection tunnel by using a Segment ID (SID). Based on this, the first UP needs to first acquire the first SID for creating the first protection tunnel. Specifically, an allocation mechanism for automatically allocating the SID may be set in the first UP, so that when the SID needs to be applied, the SID allocation mechanism is called, and the SID used for creating the first protection tunnel this time is allocated, and for convenience of description, the SID allocated this time is recorded as the first SID. The SIDs corresponding to different protection tunnels are different.
S102, a first tunnel establishment request is sent to a second UP, wherein the first tunnel establishment request comprises the applied first SID.
In this step, after the first SID for creating the first protection tunnel is acquired by the first UP, the first UP sends a first tunnel establishment request to the second UP, and the first SID acquired is carried in the first tunnel establishment request.
S103, receiving a first response result sent by a second UP, wherein the first response result comprises a second SID required by the second UP for establishing the first protection tunnel with the first UP.
In this step, after receiving the first tunnel establishment request, the second UP analyzes the first SID of the first UP end for establishing the first protection tunnel with the first UP from the first tunnel establishment request, and if the second UP agrees to establish the first protection tunnel with the first UP, the second UP acquires the second SID of the second UP end for establishing the first protection tunnel, where the method for acquiring the second SID of the second UP end is similar to the method for acquiring the first SID of the first UP end, and will not be described in detail herein. After the second UP end acquires the second SID, the first UP end feeds back a first response result, where the first response result carries the second SID. In this way, after the first UP receives the first response result, the second SID is resolved from the first response result, and then the first SID and the second SID corresponding to the first protection tunnel are recorded locally, so that the first protection tunnel between the first UP and the second UP is successfully established. Further, when the first UP can redirect the flow to the second UP by utilizing the first protection tunnel, thereby avoiding the flow interruption.
It should be noted that, the network where the first UP and the second UP are located may be, but not limited to, an IPv6 network.
In the tunnel establishment method provided in this embodiment, the segment identification SID in SRv6 is used to establish the protection tunnel between the first UP and the second UP, instead of the LDP tunnel in the prior art, based on the advantages of the SID in SRv, not only ECMP can be supported, but also the tunnel established by using the SID does not depend on LDP/RSVP-TE any more, and can support protocol stack simplification. In addition, the SID is adopted to establish a protection tunnel between two UPs, and the source route serving as a source node and the stateless state determine the expansibility of the established protection tunnel between the two UPs.
Optionally, based on the foregoing embodiment, the tunnel establishment method provided in the present application further includes: receiving a second tunnel establishment request sent by the second UP, wherein the second tunnel establishment request comprises a third SID used for establishing a second protection tunnel; if the fourth SID applied for protecting the tunnel establishment is confirmed, a second response result is sent to a second UP, wherein the second response result comprises the fourth SID; if the fourth SID for establishing the protection tunnel is confirmed not to be applied, the fourth SID for establishing the second protection tunnel is applied; and transmits a second response result including the applied fourth SID to the second UP.
In particular, the protection tunnel may also be initiated by the second UP device, and the second UP initiated protection tunnel is denoted as a second protection tunnel in order to distinguish it from the first UP initiated protection tunnel. In practical application, the initiator for establishing the protection tunnel between the first UP and the second UP may be determined according to practical situations. When the second UP needs to establish a second protection tunnel between the second UP and the first UP, a third SID which is locally used for establishing the second protection tunnel is acquired first, and then a second tunnel establishment request comprising the third SID is sent to the first UP, so that when the first UP receives the second tunnel establishment request, the third SID is analyzed from the second tunnel establishment request, when the second protection tunnel can be established with the second UP, whether a fourth SID which is applied in advance is stored locally or not is judged first, and if the fourth SID exists and is not temporarily used for establishing other protection tunnels, the first UP feeds back a second response result comprising the fourth SID to the second UP. If the fourth SID does not exist, the fourth SID is acquired first, namely the fourth SID applied for creating the second protection tunnel. And since the fourth SID is newly acquired, the fourth SID has not been previously used to create the tunnel, the first UP feeds back a second response result including the fourth SID to the second UP. Specifically, the method for creating the second protection tunnel by the second UP may refer to a specific description procedure for creating the first protection tunnel by the first UP, which will not be described in detail herein.
Based on any of the foregoing embodiments, in this embodiment, the first UP includes a traffic service process, a first virtual switching redundancy protocol (Virtual Switch Redundancy Protocol, VSRP) process, and a first segment identifier allocation process, denoted as a first SEGRT process; accordingly, the second UP includes a traffic service process, a second VSRP process, and a second segment identification assignment process, denoted as a second SEGRT process. For convenience of distinction, the business service process in the first UP is denoted as a first business service process, and the business service process in the second UP is denoted as a second business service process.
On this basis, step S101 may be performed according to the following procedure, and is shown with reference to fig. 2, including the following steps, where in fig. 2, the first UP and the second UP are in a peer-to-peer relationship, and in practical application, the first UP may be understood as a local end, and the second UP may be understood as a peer-to-peer end.
S201, when a first protection tunnel needs to be established, a first business service process sends a first SID application request for establishing the first protection tunnel to a first VSRP process.
Specifically, the first business service process and the second business service process may be respectively integrated in respective business applications APPD. After the first business service process receives the peer-to-peer relationship between the first UP of the home terminal and the second UP of the opposite terminal, when the first UP has a need to establish a protection tunnel with the second UP, the first business service process triggers the SID application request, i.e. step S201 is implemented. In particular implementations, the first business service process receives SRv Config (VRF, family, peer) configuration instructions. When the first service process has a need of creating the first protection tunnel, the first service process initiates a first SID application request, which is denoted as vsrp_requestsrv6sid. Specifically, a first SID application request is initiated to the first VSRP process by using the VSRP library file VSRPLib in the first UP, so that the VSRP library file VSRPLib triggers the first SID application request based on the library file, i.e., vsrp_cfg_lib_sidreq, to the first VSRP process.
S202, the first VSRP process sends a first SID application request to the first SEGRT process.
Specifically, after the first VSRP process senses the SID application request of the VSRPLib, the first SID application request is initiated to the first SEGRT process, and is denoted as SRv6_sid_alloc.
S203, the first SEGRT process distributes the first SID according to the first SID application request.
In this step, after the first SEGRT process receives the first SID application request, a first SID is allocated to the first VSRP process.
S204, the first SEGRT process sends the first SID to the first VSRT process.
In this step, the first SEGRT process notifies the first VSRT process of the assigned first SID through a SID assignment notification, which may be denoted as srms_notify_add.
S205, after the first VSRP process receives the first SID, a first tunnel establishment request comprising the first SID is sent to a second VSRP in the second UP.
In this step, after the first VSRP process receives the first SID, it initiates a first tunnel establishment request of the first protection tunnel to the second VSRP in the second UP, which may be denoted as vsrp_bckmsg_bidreq. Meanwhile, after the first VSRP process receives the first SID, the first SID may also be notified to the VSRPLib in the first UP through the vsrp_cfg_lib_SIDRPLY, and then the VSRPLib in the first UP notifies the first SID to the first service process through the EVENT vsrp_global_event_sid.
S206, after receiving the first tunnel establishment request, the second VSRP process confirms whether the second SID exists locally.
S207, the second VSRP process confirms that the second SID exists, and a first response result carrying the second SID is sent to the first VSRP process.
And S208, if the second VSRP process confirms that the second SID does not exist, applying the SID to a second SEGRT process in the second UP.
In steps S206 to S208, the second VSRP process determines whether to apply for the second SID in advance, if the second SID exists and is not used for creating the protection tunnel, the second VSRP process directly sends the first response result carrying the second SID to the first VSRP process, and records the first response result as vsrp_bckmsg_sidland, and informs the second service process that the second SID is unchanged, and uses vsrp_cfg_lib_sidland to inform VSRPLib, VSRPLib in the second UP that no change is found and does not inform the second service process. If the second VSPR process confirms that the second SID applied in advance does not exist locally, the second VSPR process applies the SID to the second SEGRT process and marks the SID as srv6_sid_alloc. Accordingly, after receiving the srv6_sid_alloc, the second SEGRT allocates a second SID, and then notifies the second VSRP process of the second SID, which is denoted as srms_notify_add, so that after receiving the second SID, the second VSRP process carries the second SID in the first response result and sends the second SID to the first VSRP. Meanwhile, after the second VSRP process receives the second SID, the second VSRP process synchronizes the second SID to the second service process, that is, the second VSRP process informs VSRPLib, VSRPLib in the second UP of first informing that the second SID is applied for newly through vsrp_cfg_lib_SIDRPLY, and then VSRPLib informs the second service process of the applied second SID through EVENT vsrp_global_event_sid. Meanwhile, the VSRPLib may also inform the second business service process of the first SID through the EVENT vsrp_global_event_sid.
If the second SID is locally present, the second SID is applied for the second service process in the second UP, which is not illustrated in fig. 2, and the general procedure is similar to that of the first service process for applying the first SID, which will not be described in detail here.
It should be noted that, only one of steps S207 and S208 is executed at the same time, and if step S207 is executed, step S208 is not executed, i.e., step S208 does not occur; if step S208 is performed, step S207 will not occur; for convenience of illustration, step S208 is shown by a dotted line in fig. 2, and steps S209 and S210 depend on step S208, so steps S209 and S210 are both shown by a dotted line in fig. 2.
S209, the second VSRP process receives the second SID distributed by the second SEGRT process.
S210, the second VSRP process sends a first response result carrying the second SID to the first VSRP process.
In this step, after the second VSRP process receives the second SID, the second SID is carried in the first response result by the vsrp_bckmsg_sidreply and sent to the first VSRP process. After the first VSRP process receives the second SID, the first VSRP process notifies the VSRPLib in the first UP through the vsrp_cfg_lib_SIDRPLY, and the VSRPLib in the first UP notifies the first business service process of the second SID through the EVENT vsrp_global_event_sid.
By implementing the flow shown in fig. 2, the first UP and the second UP create a first protection tunnel between the two UPs with the first SID and the second SID, respectively, simplifying the supported protocol stack since LDP/RSVP-TE is not relied on; creating a protection tunnel based on SID can support ECMP.
For the same reason, the step of receiving the second tunnel establishment request transmitted by the second UP may be performed as follows: the first VSRP process receives a second tunnel establishment request sent by a second VSRP process in the second UP, wherein a third SID in the second tunnel establishment request is distributed for a second segment identification distribution process in the second UP.
Specifically, when the second protection tunnel needs to be created, the second service process in the second UP sends a second SID application request to the second VSRP process, so that after receiving the second SID application request, the second VSRP process forwards the second SID application request to the second SEGRT process, and after receiving the second SID application request, the second SEGRT process distributes a third SID and then sends the third SID to the second VSRP process. And after receiving the third SID, the second VSRP process sends a second tunnel establishment request to the first VSRP in the first UP.
Accordingly, the step of transmitting the second response result to the second UP if it is confirmed that the fourth SID for protecting the tunnel establishment has been applied may be performed according to the following procedure: and if the first VSRP process confirms the fourth SID applied for protecting the tunnel establishment, sending a second response result to the second VSRP process, wherein the second response result comprises the fourth SID.
Specifically, after the first VSRP process receives the second tunnel establishment request, the first VSRP process may parse the third SID from the second tunnel establishment request. The first VSRP process may determine whether there is a fourth SID that has been previously applied from the first SEGRT process locally, and if so, directly send a second response result carrying the fourth SID to the second VSRP, thereby establishing a second protection tunnel between the first UP and the second UP.
Accordingly, if it is confirmed that the fourth SID for the establishment of the protection tunnel is not applied, applying the fourth SID for the establishment of the second protection tunnel may be performed according to the following procedure; and transmitting a second response result including the applied fourth SID to the second UP: if the first VSRP process confirms that the SID for protecting tunnel establishment is not applied, a second SID application request is sent to the first segment identification allocation process; the first VSRP process receives the fourth SID allocated by the first segment identification allocation process and transmits a second response result comprising the fourth SID to the second VSRP process.
Specifically, when the first VSRP process confirms that the fourth SID does not exist locally, the first VSRP process applies the fourth SID to the first SEGRT process, and after obtaining the fourth SID, feeds back a second response result carrying the fourth SID to the second VSRP process, so that after the second VSRP receives the second response result, the second VSRP process analyzes the fourth SID from the second response result, and indicates that the second protection tunnel is successfully established, and then maintains the second protection tunnel by recording the third SID and the fourth SID.
Optionally, based on any one of the foregoing embodiments, the tunnel establishment method provided in this embodiment further includes: and generating a fast reroute FRR according to the first SID and the second SID.
Specifically, after the first protection tunnel is established, in order to enable the first protection tunnel, the first VSRP process may send the first SID and the second SID for creating the first protection tunnel to the first service process, so that the first service process generates a fast reroute FRR according to the first SID and the second SID. Therefore, after the first SID and the second SID are received, the first business service process can know the path of the first protection tunnel, and in order to avoid the condition that the business is invalid in the downlink traffic path, FRR route is generated according to the first SID and the second SID, so that the business can forward the business traffic through the first protection tunnel under the condition that the downlink traffic path is invalid.
Similarly, after the second VSRP in the second UP receives the fourth SID, the fourth SID and its own third SID are sent to the second service process, and then the second service process generates an FRR route corresponding to the second protection tunnel by using the third SID and the fourth SID.
Optionally, based on any one of the foregoing embodiments, the tunnel establishment method provided in this embodiment further includes: and deleting the related information of the first protection tunnel from the first UP or deleting the related information of the second protection tunnel from the second UP when the first protection tunnel or the second protection tunnel meets the tunnel destruction condition.
Specifically, the generation of the SID may depend on the configuration of protection tunnels, and in order to achieve isolation between protection tunnels, each protection tunnel may be implemented by setting a VPN (virtual private network). Accordingly, in order to save resources on the UP, some relevant information of the protection tunnel meeting the tunnel destruction condition is deleted from the UP. Therefore, when the first protection tunnel on the first UP meets the tunnel destruction condition, deleting the related information of the first protection tunnel from the first UP so as to release the resources occupied by the first protection tunnel; similarly, when the second protection tunnel meets the tunnel destruction condition, the second UP deletes the related information of the second protection tunnel so as to release the resources occupied by the second protection tunnel.
Alternatively, the above-described tunnel destruction conditions may include, but are not limited to, any of the following: there is no need for a protection tunnel, configuration of the protection tunnel is deleted, VPN of the protection tunnel is deleted, etc.
It should be noted that, based on any of the above embodiments, the first UP may be a main UP or a standby UP, and correspondingly, the second UP may be a main UP or a standby UP, but when the first UP and the second UP cannot be both main UP or both standby UP, that is, when the first UP is main UP, the second UP is standby UP; when the first UP is a standby UP, the second UP is a main UP.
Based on the same inventive concept, the application also provides a tunnel establishment device corresponding to the tunnel establishment method. The implementation of the tunnel establishment apparatus may refer specifically to the above description of the tunnel establishment method, and will not be discussed here.
Referring to fig. 3, fig. 3 is a tunnel establishment apparatus according to an exemplary embodiment of the present application, including:
an obtaining module 301, configured to obtain a first segment identifier SID for creating a first protection tunnel when the first protection tunnel needs to be created;
a first sending module 302, configured to send a first tunnel establishment request to a second UP, where the first tunnel establishment request includes the applied first SID;
a first receiving module 303, configured to receive a first response result sent by a second UP, where the first response result includes a second SID required by the second UP to establish the first protection tunnel with the first UP.
Optionally, the tunnel establishment apparatus provided in this embodiment further includes:
a second receiving module (not shown in the figure) configured to receive a second tunnel establishment request sent by the second UP, where the second tunnel establishment request includes a third SID for establishing a second protection tunnel;
a second sending module (not shown in the figure) configured to send a second response result to a second UP if it is confirmed that a fourth SID for protecting tunnel establishment has been applied, where the second response result includes the fourth SID;
an application module (not shown in the figure) for applying for the fourth SID for establishing the second protection tunnel if it is confirmed that the fourth SID for establishing the protection tunnel is not applied;
the second sending module (not shown in the figure) is further configured to send, after the application module applies for the fourth SID, a second response result including the applied fourth SID to the second UP.
It should be noted that, in the practical application of the first sending module and the second sending module, the first sending module and the second sending module may be implemented by the same hardware circuit, or may be implemented by different hardware circuits, which may be specifically determined according to the actual situation. Similarly, the first receiving module and the second receiving module may be implemented by the same hardware circuit in actual application, or may be implemented by different hardware circuits, which may be specific to the actual situation.
Optionally, the obtaining module 301 is specifically configured to, when a first protection tunnel needs to be established, invoke a service process to send a first SID application request for creating the first protection tunnel to a first VSRP process, so that the first VSRP process sends the first SID application request to the first segment identifier allocation process, and receives a first SID allocated by the first segment identifier allocation process.
Optionally, the first sending module 302 is specifically configured to invoke a first VSRP process to send the first tunnel establishment request to a second VSRP process in the second UP;
accordingly, the first receiving module 303 is specifically configured to invoke a first VSRP process to receive a first response result sent by the second VSRP process.
Optionally, the second receiving module (not shown in the figure) is specifically configured to invoke the first VSRP process to receive a second tunnel establishment request sent by a second VSRP process in the second UP, where a third SID in the second tunnel establishment request is allocated for a second segment identifier allocation process in the second UP;
optionally, the second sending module (not shown in the figure) is specifically configured to, if it is confirmed that a fourth SID for protecting tunnel establishment has been applied, invoke the first VSRP process to send a second response result to the second VSRP process, where the second response result includes the fourth SID;
optionally, the second sending module (not shown in the figure) is further configured to, if it is determined that the SID for protecting the tunnel establishment is not applied, invoke the first VSRP process to send a second SID application request to the first segment identification allocation process, receive a fourth SID allocated by the first segment identification allocation process, and send a second response result including the fourth SID to the second VSRP process.
Optionally, based on any one of the foregoing embodiments, the tunnel establishment apparatus provided in this embodiment further includes:
a generating module (not shown in the figure) is configured to generate a fast reroute FRR based on the first SID and the second SID.
Optionally, based on any one of the foregoing embodiments, the tunnel establishment apparatus provided in this embodiment further includes:
a deleting module (not shown in the figure) configured to delete, when the first protection tunnel or the second protection tunnel satisfies a tunnel destruction condition, related information of the first protection tunnel from a first UP or related information of the second protection tunnel from a second UP.
In the tunnel establishment device provided by the embodiment of the application, the protection tunnel between the first UP and the second UP is established by using the segment identification SID in SRv, and is not an LDP tunnel in the prior art, and based on the advantages of the SID in SRv, not only can ECMP be supported, but also the tunnel established by using the SID is not dependent on LDP/RSVP-TE any more, and can support protocol stack simplification. In addition, the SID is adopted to establish a protection tunnel between two UPs, and the source route serving as a source node and the stateless state determine the expansibility of the established protection tunnel between the two UPs.
Based on the same inventive concept, the embodiment of the application provides an electronic device, which may be the first UP or the second UP or a device inheriting the functions of the first UP or the second UP. As shown in fig. 4, the electronic device includes a processor 401 and a machine-readable storage medium 402, the machine-readable storage medium 402 storing a computer program executable by the processor 401, the processor 401 being caused by the computer program to perform the tunnel establishment method provided by any of the embodiments of the present application. The electronic device further comprises a communication interface 403 and a communication bus 404, wherein the processor 401, the communication interface 403 and the machine readable storage medium 402 communicate with each other via the communication bus 404.
The communication bus mentioned above for the electronic devices may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM), DDR SRAM (Double Data Rate Synchronous Dynamic Random Access Memory, double rate synchronous dynamic random access Memory), or Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In addition, the embodiments of the present application provide a machine-readable storage medium storing a computer program that, when invoked and executed by a processor, causes the processor to perform the tunnel establishment method provided by the embodiments of the present application.
For the electronic device and the machine-readable storage medium embodiments, the description is relatively simple, and reference should be made to the description of the method embodiments for relevant points, since the method content involved is substantially similar to that of the method embodiments described above.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The implementation process of the functions and roles of each unit/module in the above device is specifically shown in the implementation process of the corresponding steps in the above method, and will not be repeated here.
For the device embodiments, reference is made to the description of the method embodiments for the relevant points, since they essentially correspond to the method embodiments. The above described apparatus embodiments are merely illustrative, wherein the units/modules illustrated as separate components may or may not be physically separate, and the components shown as units/modules may or may not be physical units/modules, i.e. may be located in one place, or may be distributed over a plurality of network units/modules. Some or all of the units/modules may be selected according to actual needs to achieve the purposes of the present application. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
The foregoing description of the preferred embodiments of the present invention is not intended to limit the invention to the precise form disclosed, and any modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present invention are intended to be included within the scope of the present invention.

Claims (9)

1. A tunnel establishment method, characterized by being applied in a first forwarding plane UP, comprising:
when a first protection tunnel needs to be established, acquiring a first segment identification SID used for establishing the first protection tunnel;
sending a first tunnel establishment request to a second UP, wherein the first tunnel establishment request comprises a first SID applied for;
receiving a first response result sent by a second UP, wherein the first response result comprises a second SID required by the second UP for establishing the first protection tunnel with the first UP;
the first UP comprises a business service process, a first Virtual Switching Redundancy Protocol (VSRP) process and a first segment identification allocation process; then
Obtaining a first segment identification SID for creating the first protection tunnel, including:
when a first protection tunnel needs to be established, a business service process sends a first SID application request for establishing the first protection tunnel to a first VSRP process;
the first VSRP process sends the first SID application request to the first segment identification allocation process;
the first VSRP process receives the first SID assigned by the first segment identification assignment process.
2. The method as recited in claim 1, further comprising:
receiving a second tunnel establishment request sent by the second UP, wherein the second tunnel establishment request comprises a third SID used for establishing a second protection tunnel;
if the fourth SID applied for protecting the tunnel establishment is confirmed, a second response result is sent to a second UP, wherein the second response result comprises the fourth SID;
if the fourth SID for establishing the protection tunnel is confirmed not to be applied, applying for establishing the fourth SID for establishing the second protection tunnel; and transmits a second response result including the applied fourth SID to the second UP.
3. The method of claim 1 wherein sending the first tunnel establishment request to the second UP comprises:
the first VSRP process sends the first tunnel establishment request to a second VSRP process in a second UP;
receiving a first response result sent by the second UP, wherein the first response result comprises the following steps:
and the first VSRP process receives a first response result sent by the second VSRP process.
4. The method of claim 2 wherein the first UP comprises a traffic service process, a first virtual switching redundancy protocol, VSRP, process, and a first segment identification assignment process; then
Receiving a second tunnel establishment request sent by the second UP, including:
the first VSRP process receives a second tunnel establishment request sent by a second VSRP process in the second UP, wherein a third SID in the second tunnel establishment request is distributed for a second segment identification distribution process in the second UP;
if the fourth SID applied for protecting the tunnel establishment is confirmed, a second response result is sent to the second UP, wherein the second response result comprises the fourth SID and comprises the following steps:
if the first VSRP process confirms that the fourth SID for protecting tunnel establishment is applied, a second response result is sent to a second VSRP process, wherein the second response result comprises the fourth SID;
if the fourth SID for establishing the protection tunnel is confirmed not to be applied, applying for establishing the fourth SID for establishing the second protection tunnel; and transmitting a second response result including the applied fourth SID to the second UP, including:
if the first VSRP process confirms that the SID for protecting tunnel establishment is not applied, a second SID application request is sent to the first segment identification allocation process;
the first VSRP process receives a fourth SID allocated by the first segment identification allocation process and sends a second response result comprising the fourth SID to the second VSRP process.
5. The method as recited in claim 1, further comprising:
and generating a fast reroute (FRR) according to the first SID and the second SID.
6. The method according to claim 1 or 2, further comprising:
and deleting the related information of the first protection tunnel from the first UP or deleting the related information of the second protection tunnel from the second UP when the first protection tunnel or the second protection tunnel meets the tunnel destruction condition.
7. A tunnel establishment apparatus, comprising:
the acquisition module is used for acquiring a first segment identification SID used for creating the first protection tunnel when the first protection tunnel needs to be created;
a first sending module, configured to send a first tunnel establishment request to a second UP, where the first tunnel establishment request includes an applied first SID;
a first receiving module, configured to receive a first response result sent by a second UP, where the first response result includes a second SID required by the second UP to establish the first protection tunnel with the first UP;
the acquiring module is specifically configured to invoke a service process to send a first SID application request for creating a first protection tunnel to a first VSRP process when the first protection tunnel needs to be created, so that the first VSRP process sends the first SID application request to the first segment identifier allocation process, and receives a first SID allocated by the first segment identifier allocation process.
8. The apparatus as recited in claim 7, further comprising:
a second receiving module, configured to receive a second tunnel establishment request sent by the second UP, where the second tunnel establishment request includes a third SID for establishing a second protection tunnel;
the second sending module is used for sending a second response result to the second UP if the fourth SID applied for protecting the establishment of the tunnel is confirmed, wherein the second response result comprises the fourth SID;
the application module is used for applying for the fourth SID used for establishing the second protection tunnel if the fourth SID used for establishing the protection tunnel is not applied;
and the second sending module is further configured to send a second response result including the applied fourth SID to the second UP after the application module applies for the fourth SID.
9. The apparatus according to claim 7 or 8, further comprising:
and the deleting module is used for deleting the related information of the first protection tunnel from the first UP or deleting the related information of the second protection tunnel from the second UP when the first protection tunnel or the second protection tunnel meets the tunnel destruction condition.
CN202111115000.2A 2021-09-23 2021-09-23 Tunnel establishment method and device Active CN113992475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111115000.2A CN113992475B (en) 2021-09-23 2021-09-23 Tunnel establishment method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111115000.2A CN113992475B (en) 2021-09-23 2021-09-23 Tunnel establishment method and device

Publications (2)

Publication Number Publication Date
CN113992475A CN113992475A (en) 2022-01-28
CN113992475B true CN113992475B (en) 2023-12-26

Family

ID=79736380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111115000.2A Active CN113992475B (en) 2021-09-23 2021-09-23 Tunnel establishment method and device

Country Status (1)

Country Link
CN (1) CN113992475B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006337A (en) * 2010-11-23 2011-04-06 华为技术有限公司 CGN (Carrier Grade NAT) entity based data transmission method, CGN entity, gateway and system
CN104702684A (en) * 2015-03-10 2015-06-10 杭州华三通信技术有限公司 Method and device for synchronizing data
CN105450437A (en) * 2014-09-19 2016-03-30 中兴通讯股份有限公司 SID allocation method and SR node
CN110635986A (en) * 2018-06-25 2019-12-31 中国移动通信有限公司研究院 Network access method and equipment
CN110870260A (en) * 2017-07-14 2020-03-06 华为技术有限公司 IPv6 segmented routing tunnel establishment method
CN112448877A (en) * 2019-09-05 2021-03-05 华为技术有限公司 SBFD session establishment method, device and system
CN113207192A (en) * 2021-03-29 2021-08-03 新华三信息安全技术有限公司 Message forwarding method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9350657B2 (en) * 2013-07-08 2016-05-24 Nicira, Inc. Encapsulating data packets using an adaptive tunnelling protocol
CN110061920B (en) * 2018-01-18 2021-10-19 中兴通讯股份有限公司 Method, equipment and storage medium for establishing bidirectional segment routing tunnel

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006337A (en) * 2010-11-23 2011-04-06 华为技术有限公司 CGN (Carrier Grade NAT) entity based data transmission method, CGN entity, gateway and system
CN105450437A (en) * 2014-09-19 2016-03-30 中兴通讯股份有限公司 SID allocation method and SR node
CN104702684A (en) * 2015-03-10 2015-06-10 杭州华三通信技术有限公司 Method and device for synchronizing data
CN110870260A (en) * 2017-07-14 2020-03-06 华为技术有限公司 IPv6 segmented routing tunnel establishment method
CN110635986A (en) * 2018-06-25 2019-12-31 中国移动通信有限公司研究院 Network access method and equipment
CN112448877A (en) * 2019-09-05 2021-03-05 华为技术有限公司 SBFD session establishment method, device and system
CN113207192A (en) * 2021-03-29 2021-08-03 新华三信息安全技术有限公司 Message forwarding method and device

Also Published As

Publication number Publication date
CN113992475A (en) 2022-01-28

Similar Documents

Publication Publication Date Title
EP2312798B1 (en) Route switching method, server apparatus, boundary node apparatus, route switching system, and route switching program
CN113132229B (en) Segment identifier determination method and device
CN115552861B (en) Method for generating forwarding table item, method for sending message, network equipment and system
US11497068B2 (en) Establishing a private network using multi-uplink capable network devices
CN106878072B (en) Message transmission method and device
WO2021109824A1 (en) Session creation method and device, session creation control method and device, session creation system, network element, and storage medium
CN112087390B (en) Network routing method and device
CN101986622A (en) Method and system for automatically identifying state attribute of path computation element (PCE)
CN113973026B (en) Site interconnection method, central controller and route reflector
EP2538602B1 (en) Method and system for realizing hot standby in centralized network nodes
CN104160667A (en) Method, Device, and System for Dual-Uplink Tangent Ring Convergence
CN113489640B (en) Message forwarding method, device and gateway system
KR102187292B1 (en) Method for synchronizing topology information in SFC network, and routing network element
CN108271149B (en) Method, equipment and system for migrating user data anchor points
CN113992475B (en) Tunnel establishment method and device
CN116195352A (en) Access traffic management
CN113518104B (en) Data message processing method, transfer equipment and system
CN111277501B (en) Method, equipment and system for controlling downlink data network selection
WO2012114747A1 (en) Communication network system, node device and path control method
CN109067647B (en) Routing information maintenance method and device
JP5889122B2 (en) Control node and communication control method
CN114374643B (en) Communication method and device
CN106533879B (en) Method and device for DCN irregular domain intercommunication in PTN equipment
WO2018205887A1 (en) Delay collection method and apparatus
CN113497756B (en) Shunt processing method and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant