CN114584509A - Communication method and related equipment - Google Patents

Communication method and related equipment Download PDF

Info

Publication number
CN114584509A
CN114584509A CN202011375216.8A CN202011375216A CN114584509A CN 114584509 A CN114584509 A CN 114584509A CN 202011375216 A CN202011375216 A CN 202011375216A CN 114584509 A CN114584509 A CN 114584509A
Authority
CN
China
Prior art keywords
nlri
message
protocol
packet
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011375216.8A
Other languages
Chinese (zh)
Inventor
冯建权
朱彤
任化军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huawei Digital Technologies Co Ltd
Original Assignee
Beijing Huawei Digital Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huawei Digital Technologies Co Ltd filed Critical Beijing Huawei Digital Technologies Co Ltd
Priority to CN202011375216.8A priority Critical patent/CN114584509A/en
Publication of CN114584509A publication Critical patent/CN114584509A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application discloses a communication method, which can be executed by a first carrier edge device, and also can be executed by a component (such as a processor, a chip, or a chip system) of the first carrier edge device. The method is suitable for a multi-home multi-active scene of annular networking or square networking, and comprises the following steps: the method comprises the steps that a first Provider Edge (PE) receives a disruption protocol message sent by a first user edge (CE), wherein the disruption protocol message is used for avoiding network loop of the ring-shaped networking; the first PE encapsulates the broken protocol message based on the network layer accessibility information NLRI to obtain the NLRI message; the first PE sends an NLRI message to the second PE, and the NLRI message is used for the second PE to receive the message of the destructive protocol. Namely, a disruption protocol is transmitted between PEs through an EVPN, namely, two-layer connection between the PEs is opened, and normal disruption is carried out on a CE ring, so that the EVPN can realize transparent transmission, and a blocking point is formed on the ring so as to provide link and node protection for services on the ring.

Description

Communication method and related equipment
Technical Field
The embodiment of the present application relates to the field of communications, and in particular, to a communication method and a related device.
Background
Ethernet Virtual Private Network (EVPN) is a Virtual Private Network (VPN) technology used for two-layer network interconnection. The EVPN includes a customer edge router (CE) and a provider edge router (PE), where the CE is a customer network side device directly connected to a service provider network, and the PE is an operator network side device connected to the CE. In practical application, a CE may access an EVPN networking in a dual-homing manner, that is, in the EVPN, for one CE, two PEs connected to the CE may access the networking, and the CE and the two PEs connected to the CE may form a dual-homing unit.
Currently, the industry has introduced EVPN multiple homing solutions.
However, since EVPN cannot pass through the destructive protocol, EVPN cannot be applied to a multi-homing and multi-survival scenario.
Disclosure of Invention
The embodiment of the application provides a communication method and related equipment. The problem that the EVPN is not supported in the annular/square-shaped multi-home multi-active scene can be effectively solved, and the effect similar to two-layer direct connection is achieved by an EVPN transmission loop-breaking protocol between PEs.
A first aspect of the embodiments of the present application provides a communication method, which may be performed by a first carrier edge device, or may be performed by a component (e.g., a processor, a chip, or a system-on-chip) of the first carrier edge device. The method is suitable for a multi-home multi-active scene of annular networking or square-shaped networking, and comprises the following steps: a first Provider Edge (PE) receives a destruction protocol message sent by a first CE, wherein the destruction protocol message is used for avoiding network loop of ring networking; the first PE encapsulates the broken protocol message based on the network layer accessibility information NLRI to obtain the NLRI message; the first PE sends an NLRI message to the second PE, and the NLRI message is used for the second PE to receive the message of the destructive protocol.
In this embodiment of the present application, after receiving a disruption protocol packet, a first PE may encapsulate the disruption protocol packet based on NLRI, and send the NLRI packet to a second PE, that is, the disruption protocol is transmitted between PEs through EVPN, which is equivalent to that two-layer connection between PEs is already opened, and CE ring is normally disrupted, so that EVPN may implement transparent transmission in a ring networking or port-shaped networking scenario, so as to form a blocking point on the ring, thereby providing link and node protection for services on the ring.
Optionally, in a possible implementation manner of the first aspect, the fragmentation protocol packet in the above step includes a bridge protocol data unit BPDU packet.
In this possible implementation manner, the problem that the EVPN is not supported in the ring/square-shaped multi-homed multi-living scenario and the problem that the EVPN cannot break the two-layer loop in this scenario are solved, and a similar effect of direct connection of physical links is achieved by using an EVPN extended routing transparent transmission/synchronous Spanning Tree Protocol (STP) message (i.e., BPDU message) between PEs.
Optionally, in a possible implementation manner of the first aspect, the fragmentation protocol packet in the above step includes an ethernet multi-ring protection technology EPRS packet.
In the possible implementation mode, the problem that the EVPN is not supported in an annular/square-shaped multi-home multi-active scene and the problem that the EVPN cannot break a two-layer loop in the scene are solved, and the effect similar to the direct connection of a physical link is achieved by transmitting/synchronizing a G.8032 message (namely an EPRS message) between the PEs through the EVPN extended route.
Optionally, in a possible implementation manner of the first aspect, the NLRI packet in the above step carries an instance identifier, where the instance identifier is used to indicate an instance to which the NLRI packet belongs.
In this possible implementation manner, the NLRI carries the instance identifier, so that the second PE can determine the instance to which the NLRI message belongs after receiving the NLRI, and avoid that the instance corresponding to the NLRI message cannot be distinguished when there are multiple instances.
Optionally, in a possible implementation manner of the first aspect, the NLRI packet in the above step carries a process identifier of the second layer gateway, where the process identifier is used to indicate a process to which the NLRI packet belongs.
In this possible implementation manner, the NLRI carries the process identifier, so that the second PE can determine the process to which the NLRI message belongs after receiving the NLRI, and avoid that the process corresponding to the NLRI message cannot be distinguished when there are multiple processes.
Optionally, in a possible implementation manner of the first aspect, the step further includes: if the network topology where the first PE is located changes, the first PE clears the stored Media Access Control (MAC) table and the Address Resolution Protocol (ARP) table.
In this possible implementation manner, if the network topology changes, the first PE may timely clear the MAC table and the ARP table, thereby avoiding the PE from performing invalid transmission.
Optionally, in a possible implementation manner of the first aspect, the step further includes: the first PE controls the transmission range of the NLRI message.
In this possible implementation manner, the first PE may control the transmission range of the NLRI packet, thereby controlling the transmission range of the two-layer protocol, and avoiding mutual influence between two-layer networks.
Optionally, in a possible implementation manner of the first aspect, the controlling, by the first PE, the transmission range of the NLRI packet in the above step includes: the first PE controls the transmission range of the NLRI by configuring a source Internet protocol address (IP) address and a destination IP address, wherein the source IP address is the address of the first PE, and the destination IP address is the address of the second PE.
A second aspect of the embodiments of the present application provides a communication method, which may be performed by a second carrier edge device, or may be performed by a component (e.g., a processor, a chip, or a system-on-chip) of the second carrier edge device. The method is suitable for a multi-home multi-active scene of annular networking or square-shaped networking, and comprises the following steps: a second Provider Edge (PE) receives a network layer reachability information NLRI message sent by a first PE; the second PE de-encapsulates the NLRI message to obtain a broken protocol message in the NLRI message, wherein the broken protocol message is used for avoiding network loop of the ring-shaped network; and the second PE sends the destroy protocol message to the second CE.
In this embodiment of the present application, after receiving the NLRI packet, the second PE may decapsulate the NLRI packet to obtain a disruption protocol packet, and send the disruption protocol packet to the second CE, that is, the disruption protocol is transmitted between the PEs through the EVPN, which is equivalent to that the two-layer connection between the PEs is opened, and the CE ring is broken normally, so that the EVPN can implement transparent transmission in a ring networking or square networking scenario, so as to form a blocking point on the ring and provide link and node protection for the service on the ring.
Optionally, in a possible implementation manner of the second aspect, the step further includes: if the network topology where the second PE is located changes, the second PE clears the stored Media Access Control (MAC) table and the Address Resolution Protocol (ARP) table.
In this possible implementation manner, if the network topology changes, the second PE may clear the MAC table and the ARP table in time, so as to avoid the PE from performing invalid transmission.
Optionally, in a possible implementation manner of the second aspect, the fragmentation protocol packet in the above step includes a bridge protocol data unit BPDU packet.
In the possible implementation mode, the problem that the EVPN is not supported in the annular/square-shaped multi-home multi-active scene and the problem that the EVPN cannot break a two-layer loop in the scene are solved, and the STP message (namely the BPDU message) is transmitted/synchronized between the PEs through the EVPN extended route, so that the effect similar to the direct connection of the physical link is achieved.
Optionally, in a possible implementation manner of the second aspect, the fragmentation protocol packet in the above step includes an ethernet multi-ring protection technology EPRS packet.
In the possible implementation mode, the problem that the EVPN is not supported in an annular/square-shaped multi-home multi-active scene and the problem that the EVPN cannot break a two-layer loop in the scene are solved, and the PE transmits/synchronizes the G.8032 message (namely the EPRS message) through the EVPN extended route, so that the effect similar to the direct connection of the physical link is achieved.
Optionally, in a possible implementation manner of the second aspect, the NLRI packet in the above step carries an instance identifier, where the instance identifier is used to indicate an instance to which the NLRI packet belongs.
In this possible implementation manner, the NLRI carries the instance identifier, so that the second PE can determine the instance to which the NLRI message belongs after receiving the NLRI, and avoid that the instance corresponding to the NLRI message cannot be distinguished when there are multiple instances.
Optionally, in a possible implementation manner of the second aspect, the NLRI packet in the above step carries a process identifier of the second layer gateway, where the process identifier is used to indicate a process to which the NLRI packet belongs.
In this possible implementation manner, the NLRI carries the process identifier, so that the second PE can determine the process to which the NLRI message belongs after receiving the NLRI, and avoid that the process corresponding to the NLRI message cannot be distinguished when there are multiple processes.
A third aspect of the embodiments of the present application provides a communication apparatus, which may be a first provider edge device or a component (e.g., a processor, a chip, or a chip system) of the first provider edge device, and the communication apparatus includes:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving a disruption protocol message sent by first user edge equipment (CE), and the disruption protocol message is used for avoiding network loop of ring-shaped networking;
the processing unit is used for encapsulating the broken protocol message based on the network layer accessibility information NLRI to obtain the NLRI message;
and the sending unit is used for sending an NLRI message to the second Provider Edge (PE), and the NLRI message is used for receiving the destructive protocol message by the second PE.
Optionally, in a possible implementation manner of the third aspect, the above-mentioned fragmentation protocol message includes a bridge protocol data unit BPDU message.
Optionally, in a possible implementation manner of the third aspect, the fragmentation protocol packet includes an ethernet multi-ring protection technology EPRS packet.
Optionally, in a possible implementation manner of the third aspect, the NLRI packet carries an instance identifier, where the instance identifier is used to indicate an instance to which the NLRI packet belongs.
Optionally, in a possible implementation manner of the third aspect, the NLRI packet carries a process identifier of the second layer gateway, where the process identifier is used to indicate a process to which the NLRI packet belongs.
Optionally, in a possible implementation manner of the third aspect, the processing unit of the communication device is further configured to clear the stored MAC table and the ARP table if a network topology where the communication device is located changes.
Optionally, in a possible implementation manner of the third aspect, the processing unit of the communication apparatus is further configured to control a transmission range of the NLRI packet.
Optionally, in a possible implementation manner of the third aspect, the processing unit of the communication device is specifically configured to control the transmission range of the NLRI by configuring a source internet protocol address IP address and a destination IP address, where the source IP address is an address of the first PE and the destination IP address is an address of the second PE.
A fourth aspect of the embodiments of the present application provides a communication apparatus, which may be a second provider edge device or a component (e.g., a processor, a chip, or a chip system) of the second provider edge device, and the communication apparatus includes:
a receiving unit, configured to receive a network layer reachability information NLRI message sent by a first provider edge device PE;
the processing unit is used for de-encapsulating the NLRI message to obtain a broken protocol message in the NLRI message, wherein the broken protocol message is used for avoiding network loop of the ring-shaped networking;
and the sending unit is used for sending the damage protocol message to the second CE.
Optionally, in a possible implementation manner of the fourth aspect, the processing unit of the communication device is further configured to clear the stored MAC table and the ARP table if a network topology where the communication device is located changes.
Optionally, in a possible implementation manner of the fourth aspect, the above-mentioned fragmentation protocol message includes a bridge protocol data unit BPDU message.
Optionally, in a possible implementation manner of the fourth aspect, the fragmentation protocol packet includes an ethernet multi-ring protection technology EPRS packet.
Optionally, in a possible implementation manner of the fourth aspect, the NLRI packet carries an instance identifier, where the instance identifier is used to indicate an instance to which the NLRI packet belongs.
Optionally, in a possible implementation manner of the fourth aspect, the NLRI packet carries a process identifier of the second layer gateway, where the process identifier is used to indicate a process to which the NLRI packet belongs.
A fifth aspect of embodiments of the present application provides a communication apparatus, which may be a first carrier edge device or a component (e.g., a processor, a chip, or a chip system) of the first carrier edge device, and the communication apparatus executes the method in the foregoing first aspect or any possible implementation manner of the first aspect.
A sixth aspect of the present embodiment provides a communication apparatus, which may be a second provider edge device or a component (e.g., a processor, a chip, or a chip system) of the second provider edge device, and the communication apparatus executes the method in the second aspect or any possible implementation manner of the second aspect.
A seventh aspect of embodiments of the present application provides a computer-readable storage medium, which stores instructions that, when executed on a computer, cause the computer to perform the method of the foregoing first aspect or any possible implementation manner of the first aspect, the second aspect or any possible implementation manner of the second aspect.
An eighth aspect of embodiments of the present application provides a computer program product, which, when executed on a computer, causes the computer to execute the method in the foregoing first aspect or any possible implementation manner of the first aspect, or any possible implementation manner of the second aspect.
A ninth aspect of an embodiment of the present application provides a communication apparatus, including: a processor coupled to a memory for storing a program or instructions which, when executed by the processor, cause the apparatus to carry out the method of the first aspect or any possible implementation of the first aspect.
A tenth aspect of an embodiment of the present application provides a communication apparatus, including: a processor coupled to a memory for storing a program or instructions which, when executed by the processor, cause the apparatus to carry out the method of the second aspect described above or any possible implementation of the second aspect.
An eleventh aspect of embodiments of the present application provides a communication system including the communication apparatus provided in the third, fifth, or ninth aspect, and the communication apparatus of the fourth, sixth, or tenth aspect.
For technical effects brought by any one of the third, fifth, seventh, eighth, and ninth aspects or any one of possible implementation manners, reference may be made to technical effects brought by the first aspect or different possible implementation manners of the first aspect, and details are not described here again.
For example, the technical effect brought by any one of the fourth, sixth, seventh, eighth, and tenth aspects or any one of the possible implementation manners of the fourth aspect may refer to the technical effect brought by the different possible implementation manners of the second aspect or the second aspect, and is not described herein again.
According to the technical scheme, the embodiment of the application has the following advantages: after receiving the disruption protocol message, the first PE may encapsulate the disruption protocol message based on NLRI, and send the NLRI message to the second PE, that is, the disruption protocol is transmitted between the PEs through EVPN, which is equivalent to that the two-layer connection between the PEs is opened, and the CE ring is normally disrupted, so that the EVPN can implement transparent transmission in a ring networking or square networking scenario, so as to form a blocking point on the ring and provide link and node protection for the service on the ring.
Drawings
Fig. 1 is a schematic diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic diagram of another communication system in an embodiment of the present application;
fig. 3 is a schematic diagram of another communication system in an embodiment of the present application;
FIG. 4 is a flow chart illustrating a communication method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an NLRI packet in the embodiment of the present application;
fig. 6 is another schematic structural diagram of an NLRI packet in the embodiment of the present application;
fig. 7 is a schematic diagram of another communication system in an embodiment of the present application;
fig. 8 is a schematic structural diagram of a communication device in the embodiment of the present application;
fig. 9 is another schematic structural diagram of a communication device in the embodiment of the present application;
fig. 10 is another schematic structural diagram of a communication device in the embodiment of the present application;
fig. 11 is another schematic structural diagram of a communication device in the embodiment of the present application.
Detailed Description
The embodiment of the application provides a communication method and related equipment. The problem that the EVPN is not supported in the annular/square-shaped multi-home multi-living scene can be effectively solved, and the effect similar to two-layer direct connection is achieved by an EVPN transmission destructive protocol between the PEs.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments.
Fig. 1 shows a schematic diagram of a communication system. The communication system may include CE devices 101 to 104 (including CE1, CE2, CE3, CE4) and PE devices 105 to 108 (including PE1, PE2, PE3, PE 4).
The network comprises a CE1, a CE2, a CE3 and a CE4 two-layer ring network, and is dually classified into PE1 and PE 2. EVPN is established among PE1, PE2, PE3, and PE 4.
In the embodiment of the present application, only four CE devices 101 to 104 and four PE devices 105 to 108 are taken as examples for schematic illustration. In practical applications, the communication system in the embodiment of the present application may have more CE devices and PE devices. The number of CE devices and PE devices is not limited in the embodiments of the present application.
The CE device in this embodiment of the present application may be an access device such as a router, a switch (switch), an Optical Line Terminal (OLT), or a host, and is not limited herein.
The PE device in this embodiment may be a router, a switch (switch), and other devices, and is not limited herein.
In a ring networking scenario or a square networking scenario, EVPN cannot transparently transmit a broken protocol packet, thereby restricting popularization and implementation of an EVPN solution, as shown in fig. 2, since PE1 and PE2 cannot transparently transmit a broken protocol packet, CE1, CE2, CE3, and CE4 cannot form a loop. Although STP/g.8032over EVPN is a good idea for solving the scenario, EVPN is required to be able to transparently transmit/synchronize STP/g.8032 messages.
In view of the above problems, an embodiment of the present application provides a communication method, which may implement transparent transmission in a ring networking scenario or a delta-type networking scenario (or a scenario in which a first CE connects to an ethernet virtual private network EVPN through a first PE and a second PE in a multi-homing manner) through an EVPN transmission fragmentation protocol, so that the scenario shown in fig. 2 becomes a closed loop (as shown in fig. 3), so as to form a blocking point (as a black point in CE3 in fig. 3) on the loop, thereby providing link and node protection for services on the loop. The following describes a communication method in the embodiment of the present application.
In the embodiment of the present application, the first CE may be CE1 shown in fig. 1, the first PE may be PE1 shown in fig. 1, the second PE may be PE2 shown in fig. 1, and the second CE may be CE4 shown in fig. 1.
The communication method provided by the embodiment of the application can be applied to multi-home multi-active scenes of ring networking or port-shaped networking, wherein the multi-home multi-active scenes comprise double-home double-active scenes, triple-home triple-active scenes and the like, and the specific details are not limited herein.
Referring to fig. 4, an embodiment of a communication method in the embodiment of the present application includes:
401. and the first CE sends a damage protocol message to the first PE. Correspondingly, the first PE receives the damage protocol message sent by the first CE.
In this embodiment of the application, the loop-breaking protocol packet sent by the first CE to the first PE may be a Bridge Protocol Data Unit (BPDU) in a Spanning Tree Protocol (STP), or may be an ethernet multiple ring protection switching (ERPS) in g.8032, and the specific details are not limited herein.
402. The first PE encapsulates the loop-breaking protocol packet based on network layer accessibility information (NLRI) to obtain an NLRI packet.
Optionally, if the network topology changes, the first PE may clear the MAC table and the ARP table by receiving a topology change-bridge protocol data unit (TCN-BPDU), so as to avoid that the first PE performs packet transmission (that is, avoids performing invalid transmission) according to the MAC table and the ARP table corresponding to the original network topology.
After the first PE receives the disruption protocol message sent by the first CE, the first PE encapsulates the disruption protocol message based on the NLRI to obtain the NLRI message. In other words, if the damaged protocol message is transmitted only in the second layer, the first PE encapsulates the damaged protocol message into the NLRI message in the third layer, and the purpose of transmitting the damaged protocol message in the third layer is achieved.
The NLRI message in the embodiment of the present application includes a fragmentation protocol message, an EVPN instance (instance), and a process of the second layer gateway.
Illustratively, as shown in fig. 5, a structural form of the NLRI message is shown. Where octet is 8 bits. The NLRI message includes three fields, which are respectively an extended Length (Length of extended), an EVPN instance identity number (ID), a Gateway (GW) Process (Process) ID (Process ID) of L2, and an instance ID. Wherein, the Length of extended field is used to carry the fragmentation protocol message, for example: a BPDU message of STP or an ERPS message of g.8032, and the like, the EVPN instance ID field is used to indicate that the NLRI message is a message of a certain instance in a plurality of EVPN instance messages, and the L2 GW Process ID field is used to indicate that the NLRI message is a message of a certain instance in a plurality of instance messages in a layer 2 protocol Process.
Optionally, if one CE connects to multiple PEs, the NLRI packet may further include an Ethernet Segment Identifier (ESI) for distinguishing a certain link in the multiple connections, and it may also be understood that the ESI is a unique identifier defined by a connection between a PE and a certain CE.
Optionally, if there are multiple EVPN instances, the NLRI packet may further include an Ethernet Tag Identifier (ETI) for distinguishing different broadcast domains (or becoming a user network) in the same EVPN instance.
Optionally, the NLRI packet may further include a multi-protocol label switching (MPLS) label (label), where the MPLS label is used by a receiving end to determine a PE device at the receiving end, and the number of MPLS labels is set according to an actual need, and is not limited herein.
Optionally, if there are two MPLS labels (MPLS label1 and MPLS label2, which may also be referred to as an inner label and an outer label) in the NLRI message, one MPLS label is used to determine the PE device, and the other MPLS label is used to determine a certain instance on the PE device.
Illustratively, the NLRI message includes MPLS label1 and MPLS label2, where MPLS label1 is used by the second PE to determine to send the fragmentation protocol message in the NLRI message to the second CE. The MPLS label2 is configured to determine, by the second CE, to send the fragmentation protocol packet to the next-hop device.
Illustratively, as shown in fig. 6, another structure form of the NLRI message is shown.
In this embodiment of the present application, the first PE may further control the transmission range of the two-layer protocol-destruction by controlling the transmission range of the NLRI packet, so as to avoid mutual influence between two-layer networks. The specific control manner may include, but is not limited to, specifying the EVPN STP/g.8032peer to send, manually specifying a specific invalid-route next hop (next-hop), or configuring a source internet protocol address (IP) and a destination IP (for example, the source IP address is an IP address of the first PE, and the destination IP address is an IP address of the second PE) when the service is issued.
Optionally, if the communication method provided in the embodiment of the present application is applied to multiple CE Ring networks, for example, as shown in fig. 7, fig. 7 includes two Ring networks Ring1 and Ring2, which can be broken through Ring1 and Ring2 (i.e., broken at different times), a break protocol packet on Ring1 is passed between PE1 and PE2, and a break protocol packet on Ring2 is synchronized between PE3 and PE 4.
403. The first PE sends an NLRI message to the second PE. Correspondingly, the second PE receives the NLRI message sent by the first PE.
After the first PE obtains the NLRI message, the first PE sends the NLRI message to the second PE.
404. And the second PE de-encapsulates the NRLI message to obtain a broken protocol message.
And after the second PE receives the NLRI, the second PE de-encapsulates the NLRI to obtain a broken protocol message.
405. And the second PE sends the destroy protocol message to the second CE.
The second PE may determine the next hop device through a field in the NLRI message.
Optionally, the second PE determines, according to the MPLS Label1 in the NLRI message, to send the disruption protocol message to the second CE message.
Optionally, if the network topology changes, the second PE clears a Media Access Control (MAC) table and an Address Resolution Protocol (ARP) table. The second PE is prevented from performing packet transmission (i.e., from performing invalid transmission) according to the MAC table and the ARP table corresponding to the original network topology. Illustratively, if the second PE receives that the NLRI sent by the first PE includes the TC-BPDU, the second PE clears the MAC table and the ARP table.
In the embodiment of the application, a disruption protocol can be transmitted between PEs through an EVPN, which is equivalent to that a two-layer connection between PEs is opened, and a CE ring is broken normally, so that the EVPN can realize transparent transmission in a ring networking or port-shaped networking scene, so that a blocking point is formed on the ring, and link and node protection is provided for services on the ring.
Corresponding to the method provided by the above method embodiment, the embodiment of the present application further provides a corresponding apparatus, which includes a module for executing the above embodiment. The module may be software, hardware, or a combination of software and hardware.
Referring to fig. 8, in an embodiment of the communication apparatus 800 according to the present invention, the communication apparatus 800 may be a first PE. Or may be a component of the first PE (e.g., a processor, a chip, or a system of chips), the communications apparatus 800 may be adapted to a multi-homed scenario of ring networking or square networking, the communications apparatus 800 includes:
a receiving unit 801, configured to receive a disruption protocol packet sent by a first customer edge device CE, where the disruption protocol packet is used to avoid network loopback of an annular networking;
a processing unit 802, configured to encapsulate a disruption protocol message based on network layer reachability information NLRI, to obtain an NLRI message;
a sending unit 803, configured to send an NLRI message to the second provider edge device PE, where the NLRI message is used for the second PE to receive a breach protocol message.
Optionally, the processing unit 802 is further configured to clear the stored MAC table and ARP table if the network topology where the communication device is located changes.
Optionally, the processing unit 802 is further configured to control a transmission range of the NLRI packet.
In this embodiment, operations performed by each unit in the communication apparatus are similar to those performed by the first PE in the embodiments shown in fig. 3, fig. 4, or fig. 7, and are not described again here.
In this embodiment, after the receiving unit 801 receives the disruption protocol message, the processing unit 802 may encapsulate the disruption protocol message based on NLRI, and send the NLRI message to the second PE through the sending unit 803, that is, the disruption protocol is transmitted between the PEs through EVPN, which is equivalent to that two-layer connection between the PEs is already opened, and CE performs normal disruption on the ring, so that in a ring networking or a port-type networking scenario, EVPN can implement transparent transmission, so that a blocking point is formed on the ring to provide link and node protection for the service on the ring.
Referring to fig. 9, another communication device 900 is provided in the present embodiment, where the communication device 900 may be a second PE. Or a component of the second PE (e.g., a processor, a chip, or a system of chips), the communication apparatus 900 may be adapted for a multi-homed scenario of ring networking or square networking, the communication apparatus 900 includes:
a receiving unit 901, configured to receive a network layer reachability information NLRI message sent by a first provider edge device PE;
a processing unit 902, configured to decapsulate the NLRI packet, to obtain a broken protocol packet in the NLRI packet, where the broken protocol packet is used to avoid network loopback of the ring network;
a sending unit 903, configured to send the breach protocol packet to the second CE.
Optionally, the processing unit 902 is further configured to clear the stored MAC table and ARP table if a network topology where the communication device is located changes.
In this embodiment, operations performed by each unit in the communication apparatus are similar to the operations performed by the second PE in the embodiments shown in fig. 3, fig. 4, or fig. 7, and are not repeated herein.
In this embodiment, after the receiving unit 901 receives the NLRI message, the processing unit 902 may decapsulate the NLRI message to obtain a disruption protocol message, and send the disruption protocol message to the second CE through the sending unit 903, that is, the disruption protocol is transmitted between the PEs through the EVPN, which is equivalent to that two-layer connection between the PEs is opened, and the CE ring is normally disrupted, so that in an environment of ring networking or square networking, the EVPN may implement transparent transmission, so that a blocking point is formed on the ring to provide link and node protection for a service on the ring.
Referring to fig. 10, another communication apparatus 1000 is provided in the present embodiment, where the communication apparatus 1000 may be a first PE. Or a component (e.g., a processor, a chip, or a system-on-a-chip) of the first PE, the communication device 1000 may be suitable for a multi-homing and multi-homing scenario of ring networking or square networking, the communication device 1000 may include, but is not limited to, a processor 1001, a communication port 1002, a memory 1003, and a bus 1004, and in an embodiment of the present application, the processor 1001 is configured to control an operation of the communication device 1000.
Further, the processor 1001 may be a central processing unit, a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, transistor logic, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a digital signal processor and a microprocessor, or the like. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
It should be noted that the communication apparatus shown in fig. 10 may be specifically configured to implement the functions of the steps executed by the first PE in the method embodiments corresponding to fig. 3, fig. 4, or fig. 7, and implement the technical effect corresponding to the first PE, and the specific implementation manner of the communication apparatus shown in fig. 10 may refer to the descriptions in each method embodiment corresponding to fig. 3, fig. 4, or fig. 7, and is not described in detail here.
Referring to fig. 11, another communication device 1100 is provided in the embodiments of the present application, where the communication device 1100 may be a second PE. Or a component (e.g., a processor, a chip, or a system of chips) of the second PE, the communication device 1100 may be suitable for a multi-homing and multi-homing scenario of ring networking or square type networking, the communication device 1100 may include, but is not limited to, a processor 1101, a communication port 1102, a memory 1103, and a bus 1104, and in an embodiment of the present application, the processor 1101 is configured to control an operation of the communication device 1100.
Further, the processor 1101 may be a central processing unit, a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, transistor logic, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a digital signal processor and a microprocessor, or the like. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
It should be noted that the communication apparatus shown in fig. 11 may be specifically configured to implement the functions of the steps executed by the second PE in the method embodiments corresponding to fig. 3, fig. 4, or fig. 7, and implement the technical effect corresponding to the second PE, and the specific implementation manner of the communication apparatus shown in fig. 11 may refer to the descriptions in each method embodiment corresponding to fig. 3, fig. 4, or fig. 7, and is not described in detail here.
The present application further provides a computer-readable storage medium storing one or more computer-executable instructions, which, when executed by a processor, perform a method as described in a possible implementation manner of the communication apparatus in the foregoing embodiments, where the communication apparatus may specifically be the communication apparatus in the foregoing method embodiment corresponding to fig. 3, fig. 4, or fig. 7.
The present application further provides a computer program product storing one or more computers, and when the computer program product is executed by the processor, the processor executes the method that may be implemented by the communication apparatus, where the communication apparatus may specifically be the first PE and/or the second PE in the method embodiments corresponding to fig. 3, fig. 4, or fig. 7.
An embodiment of the present application further provides a chip system, where the chip system includes a processor, and is configured to support a communication device to implement functions related to possible implementation manners of the communication device. In one possible design, the system-on-chip may further include a memory, which stores program instructions and data necessary for the communication device. The chip system may be formed by a chip, or may include a chip and other discrete devices, where the communication device may specifically be the first PE and/or the second PE in the foregoing method embodiments corresponding to fig. 3, fig. 4, or fig. 7.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.

Claims (33)

1. A communication method is suitable for a multi-homing and multi-living scene of ring networking or square networking, and comprises the following steps:
a first Provider Edge (PE) receives a disruption protocol message sent by a first user edge (CE), wherein the disruption protocol message is used for avoiding network loopback of the ring-shaped networking;
the first PE encapsulates the damage protocol message based on network layer reachability information NLRI to obtain an NLRI message;
and the first PE sends the NLRI message to a second PE, and the NLRI message is used for the second PE to receive the destructive protocol message.
2. The method of claim 1, wherein the breach protocol message comprises a Bridge Protocol Data Unit (BPDU) message.
3. The method of claim 1, wherein the breach protocol message comprises an Ethernet Multi-Ring protection technology (EPRS) message.
4. The method according to any one of claims 1 to 3, wherein the NLRI packet carries an instance identifier, and the instance identifier is used to indicate an instance to which the NLRI packet belongs.
5. The method according to any one of claims 1 to 4, wherein the NLRI packet carries a process identifier of a second layer gateway, and the process identifier is used for indicating a process to which the NLRI packet belongs.
6. The method according to any one of claims 1 to 5, further comprising:
and if the network topology where the first PE is located changes, the first PE clears the stored Media Access Control (MAC) table and the Address Resolution Protocol (ARP) table.
7. The method according to any one of claims 1 to 6, further comprising:
and the first PE controls the transmission range of the NLRI message.
8. The method of claim 7, wherein the controlling the transmission range of the NLRI packet by the first PE includes:
the first PE controls the transmission range of the NLRI by configuring a source Internet protocol address (IP) address and a destination IP address, wherein the source IP address is the address of the first PE, and the destination IP address is the address of the second PE.
9. A communication method is suitable for a multi-homing and multi-living scene of ring networking or square networking, and comprises the following steps:
a second Provider Edge (PE) receives a Network Layer Reachability Information (NLRI) message sent by a first PE;
the second PE decapsulates the NLRI message to obtain a broken protocol message in the NLRI message, wherein the broken protocol message is used for avoiding network loop of the ring-shaped network;
and the second PE sends the damage protocol message to a second CE.
10. The method of claim 9, further comprising:
and if the network topology where the second PE is located changes, the second PE clears the stored Media Access Control (MAC) table and the Address Resolution Protocol (ARP) table.
11. The method according to claim 9 or 10, wherein the destruction protocol message comprises a bridge protocol data unit, BPDU, message.
12. The method according to claim 9 or 10, wherein the fragmentation protocol packet comprises an ethernet multi-ring protection technology EPRS packet.
13. The method according to any one of claims 9 to 12, wherein the NLRI packet carries an instance identifier, and the instance identifier is used to indicate an instance to which the NLRI packet belongs.
14. The method according to any one of claims 9 to 13, wherein the NLRI packet carries a process identifier of a second layer gateway, and the process identifier is used to indicate a process to which the NLRI packet belongs.
15. A communication device, adapted to a multi-homing and multi-living scenario of ring networking or square networking, the communication device comprising:
a receiving unit, configured to receive a disruption protocol packet sent by a first user edge device CE, where the disruption protocol packet is used to avoid network loopback of the ring network;
the processing unit is used for packaging the disruption protocol message based on the network layer reachability information NLRI to obtain the NLRI message;
and the sending unit is used for sending the NLRI message to second provider edge equipment PE, and the NLRI message is used for receiving the destructive protocol message by the second PE.
16. The communications apparatus of claim 15, wherein the breach protocol message comprises a Bridge Protocol Data Unit (BPDU) message.
17. The communications apparatus of claim 15, wherein the breach protocol message comprises an ethernet multi-ring protection technology EPRS message.
18. The apparatus according to any one of claims 15 to 17, wherein the NLRI packet carries an instance identifier, and the instance identifier is used to indicate an instance to which the NLRI packet belongs.
19. The communications apparatus according to any one of claims 15 to 18, wherein the NLRI packet carries a process identifier of a second layer gateway, and the process identifier is used to indicate a process to which the NLRI packet belongs.
20. The communication device according to any one of claims 15 to 19, wherein the processing unit is further configured to clear the stored MAC table and ARP table if a network topology where the communication device is located changes.
21. The communication device according to any one of claims 15 to 20,
the processing unit is further configured to control a transmission range of the NLRI packet.
22. The communication device of claim 21,
the processing unit is specifically configured to control a transmission range of the NLRI by configuring a source internet protocol address IP address and a destination IP address, where the source IP address is an address of the first PE and the destination IP address is an address of the second PE.
23. A communication device, adapted to a multi-homing and multi-living scenario of ring networking or square networking, the communication device comprising:
a receiving unit, configured to receive a network layer reachability information NLRI message sent by a first provider edge device PE;
the processing unit is used for decapsulating the NLRI message to obtain a broken protocol message in the NLRI message, wherein the broken protocol message is used for avoiding network loop of the ring-shaped networking;
and the sending unit is used for sending the damage protocol message to the second CE.
24. The communication device according to claim 23, wherein the processing unit is further configured to clear the stored MAC table and ARP table if a topology of a network where the communication device is located changes.
25. The communication device according to claim 23 or 24, wherein the breach protocol message comprises a bridge protocol data unit, BPDU, message.
26. The communication apparatus according to claim 23 or 24, wherein the fragmentation protocol packet comprises an ethernet multi-ring protection technology EPRS packet.
27. The apparatus according to any one of claims 23 to 26, wherein the NLRI packet carries an instance identifier, and the instance identifier is used to indicate an instance to which the NLRI packet belongs.
28. The communications apparatus according to any one of claims 23 to 27, wherein the NLRI packet carries a process identifier of a second layer gateway, and the process identifier is used to indicate a process to which the NLRI packet belongs.
29. A communications apparatus comprising a processor coupled to a memory, the memory for storing a computer program or instructions, the processor for executing the computer program or instructions in the memory such that the method of any of claims 1 to 8 is performed.
30. A communications apparatus comprising a processor coupled to a memory, the memory for storing a computer program or instructions, the processor for executing the computer program or instructions in the memory such that the method of any of claims 9 to 14 is performed.
31. A communication system, comprising: communication device according to claim 29, and/or communication device according to claim 30.
32. A chip comprising a processor and a communication interface, the communication interface being coupled to the processor, the processor being configured to execute a computer program or instructions such that the method of any of claims 1 to 8 is performed or such that the method of any of claims 9 to 14 is performed.
33. A computer storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 8 or cause the computer to perform the method of any one of claims 9 to 14.
CN202011375216.8A 2020-11-30 2020-11-30 Communication method and related equipment Pending CN114584509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011375216.8A CN114584509A (en) 2020-11-30 2020-11-30 Communication method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011375216.8A CN114584509A (en) 2020-11-30 2020-11-30 Communication method and related equipment

Publications (1)

Publication Number Publication Date
CN114584509A true CN114584509A (en) 2022-06-03

Family

ID=81767063

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011375216.8A Pending CN114584509A (en) 2020-11-30 2020-11-30 Communication method and related equipment

Country Status (1)

Country Link
CN (1) CN114584509A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115118629A (en) * 2022-07-05 2022-09-27 杭州云合智网技术有限公司 VPWS multi-activity multi-homing business connectivity identification method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115118629A (en) * 2022-07-05 2022-09-27 杭州云合智网技术有限公司 VPWS multi-activity multi-homing business connectivity identification method
CN115118629B (en) * 2022-07-05 2023-08-25 杭州云合智网技术有限公司 Method for identifying service connectivity of VPWS multi-activity multi-homing

Similar Documents

Publication Publication Date Title
CN109873760B (en) Method and device for processing route, and method and device for data transmission
US9444642B2 (en) LAN multiplexing apparatus
CN109995654B (en) Method and device for transmitting data based on tunnel
EP3782336B1 (en) Multi-vrf universal device internet protocol address for fabric edge devices
EP2014035B1 (en) Ethernet vll spoke termination at an ip interface
EP3188422B1 (en) Traffic black holing avoidance and fast convergence for active-active pbb-evpn redundancy
CN107026796B (en) VPN route notification method, data flow forwarding method and related equipment
EP1475942A2 (en) Address Resolution in IP Internetworking Layer 2 point-to-point connections
CN107547340B (en) Message forwarding method and device
WO2008085375A2 (en) Method and apparatus for multicast routing
CN112422398B (en) Message transmission method and communication device
US20190007368A1 (en) DHCP in Layer-3 Overlay with Anycast Address Support and Network Address Transparency
CN112822097B (en) Message forwarding method, first network device and first device group
US7835388B2 (en) Communication method for interworking of local heterogeneous link layer protocols and apparatus thereof
JP2024500548A (en) Packet transfer method and device, and network system
CN113328937B (en) Method and device for realizing distributed aggregation
CN109728926B (en) Communication method and network device
CN101286918A (en) Virtual private network system and data processing method thereof
CN114584509A (en) Communication method and related equipment
WO2016197933A2 (en) Packet forwarding
WO2019056239A1 (en) Packet synchronization method and device
CN113923162A (en) Message forwarding method, device, equipment and storage medium
CN113300998A (en) Method and device for realizing data encryption transmission and communication system
CN115733643A (en) MAC learning method, device, electronic equipment and storage medium
CN117792825A (en) Message processing method, device, system, network equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination