CN116418727A - Method, equipment and system for establishing path - Google Patents

Method, equipment and system for establishing path Download PDF

Info

Publication number
CN116418727A
CN116418727A CN202111679355.4A CN202111679355A CN116418727A CN 116418727 A CN116418727 A CN 116418727A CN 202111679355 A CN202111679355 A CN 202111679355A CN 116418727 A CN116418727 A CN 116418727A
Authority
CN
China
Prior art keywords
path
control device
information
tunnel
management domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111679355.4A
Other languages
Chinese (zh)
Inventor
陈林坤
杨成
吕一哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202111679355.4A priority Critical patent/CN116418727A/en
Publication of CN116418727A publication Critical patent/CN116418727A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a method, equipment and a system for establishing a path, which can be applied to a network comprising a first management domain to which target source equipment belongs and a second management domain to which target destination equipment belongs. The first control device obtains tunnel information and link information, and obtains first path information. The tunnel information is used for indicating a first tunnel in the first management domain. The link information is used to indicate a first cross-domain link from a boundary device of a first management domain to a boundary device of a second management domain. The first control device can determine a first path based on the target source device, the target destination device, the tunnel information, and the link information, and obtain first path information indicating the first path. The first control device is capable of automatically generating a first path from the target source device to the target destination device across the plurality of management domains. Thus, the automatic construction of the path crossing the plurality of management domains can be realized, and the efficiency of establishing the path crossing the plurality of management domains is improved.

Description

Method, equipment and system for establishing path
Technical Field
The present invention relates to the field of communications, and in particular, to a method, an apparatus, and a system for establishing a path.
Background
The operator network is mainly composed of a plurality of network domains such as a backbone network, a metropolitan area network and the like. The metropolitan area network may be a communication network established in a metropolitan area. The backbone network is a core network and is used for connecting with the metropolitan area network. An operator network may include a plurality of interconnected backbones and a plurality of metropolitan networks coupled to the backbones. In providing transport services to users, it may be necessary to establish a transport path across multiple networks. The transmission path established specially for transmitting the user service may also be called a service dedicated line.
In order to facilitate management of networks, there are generally a plurality of network management departments that respectively manage the corresponding networks. In a process involving the opening of a dedicated line of traffic across multiple network domains, multiple network management departments need to configure resources in the respective managed networks, respectively. And the coordination configuration is needed among a plurality of network management departments to realize the opening of the special business lines passing through a plurality of networks. The method for opening the special line of the service has the advantages of complicated process, long completion period and difficulty in meeting the needs of users. Therefore, how to improve the efficiency of establishing a dedicated line of traffic across multiple networks is a problem to be solved.
Disclosure of Invention
The application provides a method, equipment and a system for establishing a path, which can realize that control equipment automatically establishes the path passing through a plurality of management domains and can improve the efficiency of establishing a business private line.
The technical scheme is as follows:
in a first aspect, the present application provides a method of establishing a path, the method being applicable to a network comprising a first management domain and a second management domain. Wherein the first management domain comprises a target source device and the second management domain comprises a target destination device. The first control device acquires tunnel information and link information. The tunnel information is used for indicating the tunnel in the management domain, and can specifically indicate the first tunnel belonging to the first management domain. The link information is used to indicate a first cross-domain link from a boundary device of a first management domain to a boundary device of a second management domain. The first control device is capable of determining a tunnel within the management domain and a cross-domain link between the management domain based on the tunnel information and the link information. The first control device is capable of determining a first path based on the target source device, the target destination device, the tunnel information, and the link information. The first path is a path from the target source device to the target destination device. Based on the determined first path, the first control device can acquire first path information. The first path information is used for indicating the target source equipment to forward the message based on the first path. Therefore, the first control device can automatically generate the first path from the target source device to the target destination device, so that the path crossing the management domain is automatically established, and the path establishment efficiency is improved.
In one possible implementation, the second control device corresponds to a first management domain, and is capable of managing target source devices belonging to the first management domain. The first control device transmits the first path information to the second control device. And the second control equipment sends the first path information to the target source equipment so that the target source equipment can forward the message based on the first path according to the first path information.
In one possible implementation, the second control device may be a control device belonging to the first management domain.
In one possible implementation, the first control device is capable of acquiring tunnel information of the first tunnel from the second control device corresponding to the first management domain. Wherein the second control device corresponding to the first management domain is a control device capable of managing network devices within the first management domain.
In one possible implementation, the first control device corresponds to a first management domain. That is, the first control device is capable of managing network devices within the first management domain. The first control device is capable of managing the target source device. The first control device sends the first path information to the target source device, so that the target source device can forward the message based on the first path according to the first path information.
In one possible implementation, the first control device may be a control device belonging to a first management domain.
In one possible implementation, the first control device corresponding to the first management domain is capable of generating tunnel information for the first tunnel. Specifically, the first control device may obtain tunnel information of the first tunnel from the network device of the first management domain.
In one possible implementation, the tunnel information is also used to indicate the second tunnel. The second tunnel is a tunnel belonging to a second administrative domain. The second tunnel is spliced by one or more segmented tunnels in the second management domain, or the second tunnel is a segmented tunnel in the second management domain.
In one possible implementation, the first control device corresponds to the second management domain. That is, the first control device is capable of managing network devices within the second management domain. The first control device can generate tunnel information for indicating the second tunnel. Specifically, the first control device can obtain tunnel information of the second tunnel from the network device of the second management domain.
In one possible implementation, the third control device corresponds to a second management domain. That is, the third control device is capable of managing the network devices within the second management domain. The first control device can acquire tunnel information of the second tunnel from the third control device.
In a possible implementation manner, the third control device belongs to the second management domain.
In one possible implementation, the first control device is capable of acquiring link information from one or more of a boundary device of the first management domain and a boundary device of the second management domain.
In one possible implementation, the first control device is capable of acquiring link information from one or more of a control device corresponding to the first management domain and a control device corresponding to the second management domain.
In one possible implementation, the network further comprises a third management domain. The third management domain is adjacent to the first management domain and the second management domain, respectively. The tunnel information is also used to indicate a third tunnel belonging to a third administrative domain. The first cross-domain link includes a second cross-domain link between a boundary device of the first management domain and a boundary device of the third management domain, and a third cross-domain link between the boundary device of the third management domain and the boundary device of the second management domain. The third tunnel is spliced by one or more segmented tunnels in the third management domain, or the third tunnel is segmented tunnel in the third management domain.
In one possible implementation, the first control device corresponds to the third management domain. That is, the first control device is able to manage network devices within the third management domain. The first control device can generate tunnel information of the third tunnel. Specifically, the first control device may acquire tunnel information for indicating the third tunnel from the network device of the third management domain.
As an example, the first control device may be a control device belonging to a third management domain.
In one possible implementation, the fourth control device is a control device corresponding to the third management domain. That is, the fourth control device can manage the network devices in the third management domain. The first control device can acquire tunnel information of the third tunnel from the fourth control device.
In one possible implementation, the fourth control device is a control device belonging to the third management domain.
In one possible implementation, the first control device is capable of acquiring link information of the second cross-domain link from one or more of a border device of the first management domain and a border device of the third management domain.
In one possible implementation, the first control device is capable of acquiring link information of the third cross-domain link from one or more of the border device of the second management domain and the border device of the third management domain.
In one possible implementation manner, the first control device may be capable of acquiring link information of the second cross-domain link from one or more of the control device corresponding to the first management domain and the control device corresponding to the third management domain
In one possible implementation manner, the first control device can acquire link information of the third cross-domain link from one or more of the control device corresponding to the second management domain and the control device corresponding to the third management domain.
In one possible implementation, the first tunnel is spliced from one or more segmented tunnels in the first management domain, or the first tunnel is a segmented tunnel in the first management domain.
In one possible implementation, the first control device determines the target source device according to the first device information and determines the target destination device according to the second device information. Wherein the first device information is used to identify the target source device. The second device information is used to identify the target destination device.
In one possible implementation, the first control device obtains the first device information and the second device information according to the path establishment request. The route request includes first device information and second device information. As an example, the first control device can obtain a request for a route establishment from the second control device corresponding to the first management domain. As another example, the first control device corresponds to a first management domain. The first control device can obtain a path establishment request generated by user trigger from the network device of the first management domain.
In one possible implementation, the first device information and the second device information are stored in a management system. The first control device is capable of acquiring first device information and second device information from the management system.
In one possible implementation, the first device information includes a network address of the target source device and the second device information includes a network address of the target destination device.
In one possible implementation, the first device information includes a device identification of the target source device, and the second device information includes a device identification of the target destination device.
In one possible implementation, the first device information includes location information of the target source device, and the second device information includes location information of the target destination device.
In one possible implementation manner, the first control device may determine the first path according to the target source device, the target destination device, the tunnel information, and the link information, and then acquire the first path information based on the first path.
In one possible implementation, the first control device can construct the network topology based on the tunnel information and the link information. Wherein the network topology is composed of tunnels indicated by the tunnel information and cross-domain links indicated by the link information. The first control device is capable of determining tunnels and cross-domain links included in the network based on the network topology. The first control device determines a first path according to the target source device, the target destination device and the network topology.
In one possible implementation, the user has a transmission requirement for the first path to be established. The first control device can determine the first path based on the first traffic demand, the target source device, the target destination device, the tunnel information, and the link information. Wherein the first traffic demand is used to indicate a transmission requirement of the first path. The first control device can determine a first path according to the first service requirement, wherein the first path meets the transmission requirement of the first path indicated by the first service requirement. The first control device is capable of acquiring first path information based on the determined first path.
In one possible implementation, the first control device can construct a network topology based on the tunnel information and the link information first. Wherein the network topology is composed of tunnels indicated by the tunnel information and cross-domain links indicated by the link information.
The first control device determines a first path based on one or more of the tunnel information and the link information, the first traffic demand, the target source device, the target destination device, and the constructed network topology.
In one possible implementation, the tunnel information includes a device identification of the tunneled device and a device identification of the tunneled device. The tunnel entering device is a tunnel entering device indicated by the tunnel information, and the tunnel exiting device is a tunnel exiting device indicated by the tunnel information. The link information includes a device identification of the first endpoint device and a device identification of the second endpoint device. The first end point device and the second end point device are devices at two ends of a cross-domain link indicated by link information;
The first control device can determine the tunnel indicated by the tunnel information according to the device identifier of the tunnel-in device and the device identifier of the tunnel-out device. The first control device is capable of determining a cross-domain link indicated by the link information based on the device identification of the first endpoint device and the device identification of the second endpoint device. The first control device constructs a network topology according to the determined tunnel and the cross-domain link.
In a possible implementation manner, the tunnel information further includes a first tunnel identifier, where the first tunnel identifier is used to identify a traffic attribute of a tunnel indicated by the tunnel information.
The first control device is capable of determining a first path based on a first tunnel identification, a first traffic demand, a target source device, a target destination device, and a network topology. As one example, the first control device can computationally determine the first path using a path computation algorithm. The first tunnel identifier may be a color identifier.
In one possible implementation, the tunnel information further includes tunnel operation information. The tunnel operation information is used for indicating the operation state of the tunnel indicated by the tunnel information. The link information also includes link operation information. The link operation information is used for indicating the operation state of the cross-domain link indicated by the link information.
The first control device is capable of determining the first path based on one or more of tunnel operation information and the link operation information, a first traffic demand, the target source device, the target destination device, and the network topology. As one example, the first control device can computationally determine the first path using a path computation algorithm.
In one possible implementation, the tunnel operation information includes first service level agreement SLA information. The first SLA information is used for indicating the operation performance of the tunnel indicated by the tunnel information.
In one possible implementation, the link operation information includes second SLA information. The second SLA information is used for indicating the operation performance of the cross-domain link indicated by the link information.
In one possible implementation, the first control device has a path tuning function. The first control device is capable of obtaining the second service requirement. Wherein the second traffic demand is indicative of a transmission requirement of the second path. The second path is a path of the first path in a management domain corresponding to the first control device. The second traffic demand may be, for example, a normal transmission of the second path, an SLA demand for the second path, or a traffic attribute of the second path, etc.
And if the first control equipment determines that the second path does not meet the transmission requirement indicated by the second service requirement, acquiring second path information. The second path information is used for indicating the target source equipment to forward the message based on the third path. The third path is obtained by replacing the second path in the first path with a fourth path. The source device of the fourth path is identical to the source device of the second path and the destination device of the fourth path is identical to the destination device of the second path.
In one possible implementation, the second control device corresponds to the first management domain. The first control device sends the second path information to the second control device.
In one possible implementation, the first control device corresponds to a first management domain. The first control device is capable of managing the target source device. The first control device transmits the second path information to the target source device.
In one possible implementation, the tunnel information includes a second tunnel identification. The second tunnel identifier is used for identifying a tunnel indicated by the tunnel information. The link information includes a link identification. The link identification is used to identify the cross-domain link indicated by the link information.
In one possible implementation, the first path information includes a second tunnel identification and a link identification. Specifically, as an example, the second tunnel identifier may be a binding segment identifier BSID, and the link identifier may be a segment identifier SID.
In one possible implementation, the first control device is further capable of displaying one or more of the first path information and the network topology of the first path in the operation and maintenance interface. The user can determine the first path based on the displayed first path information and the network topology of the first path.
In a second aspect, the present application provides a method of establishing a path, the method being applied to a second control device. The second control device belongs to the network. The network includes a first management domain and a second management domain. The first management domain includes a target source device and the second management domain includes a target destination device. The second control device corresponds to the first management domain. The second control device is capable of managing the target source device. The second control device can acquire the first path information sent by the first control device. Specifically, the second control device can acquire the first path information issued by the first control device through an interface connected with the first control device. The first path information is used for indicating a first path. The first path is a path from the target source device to the target destination device. The second control device sends the first path information to the target source device. The first path information is used for indicating the target source equipment to forward the message based on the first path. The target source device can encapsulate the message based on the acquired first path information, and forward the encapsulated message based on the first path.
In one possible implementation, the second control device is further capable of acquiring tunnel information indicative of the first tunnel. Wherein the first tunnel belongs to a first administrative domain. The second control device sends the tunnel information to the first control device so that the first control device determines the first path based on the tunnel information.
In one possible implementation, the first tunnel is spliced from one or more segmented tunnels in the first management domain, or the first tunnel is a segmented tunnel in the first management domain.
In one possible implementation, the second control device further corresponds to a second management domain. The second control device is further capable of acquiring tunnel information indicating the second tunnel from the second management domain. The second tunnel belongs to a second administrative domain. The second tunnel may be spliced by one or more segmented tunnels in the second management domain, or may be segmented tunnels in the second management domain.
In one possible implementation, the second control device further corresponds to a third management domain. The second control device is further capable of acquiring tunnel information indicating the third tunnel from the third management domain. The third tunnel belongs to a third administrative domain. The third management domain is adjacent to the first management domain and the second management domain, respectively. The third tunnel may be spliced by one or more segmented tunnels in the third management domain, or may be segmented tunnels in the third management domain.
In one possible implementation, the first management domain is adjacent to the second management domain. The second control device is also capable of acquiring the first link information. The first link information is used to indicate a cross-domain link between a boundary device of the first management domain and a boundary device of the second management domain. The second control device sends the first link information to the first control device so that the first control device obtains the first path information.
In one possible implementation, the first management domain is adjacent to the third management domain. The second control device can acquire the second link information. The second link information is used to indicate a cross-domain link between the boundary device of the first management domain and the boundary device of the third management domain. The second control device sends the second link information to the first control device so that the first control device obtains the first path information.
In one possible implementation, the second control device corresponds to a first management domain and a second management domain. The second control device can acquire the third link information. The third link information is used to indicate a cross-domain link between the boundary device of the first management domain and the boundary device of the second management domain. The second control device sends third link information to the first control device so that the first control device obtains the first path information.
In one possible implementation, the second control device corresponds to a first management domain and a third management domain. The third management domain is adjacent to the first management domain and the second management domain, respectively. The second control device is also capable of acquiring fourth link information. The fourth link information is used to indicate one or more of a cross-domain link between the edge device of the first management domain and the edge device of the third management domain, and a cross-domain link between the edge device of the third management domain and the edge device of the second management domain. The second control device sends fourth link information to the first control device so that the first control device obtains the first path information.
In one possible implementation, the second control device is capable of acquiring the first device information and the second device information generated by the user trigger. The first device information is used to identify a target source device and the second device information is used to identify a target destination device. The second control device also sends a first request to the first control device. The first request includes first device information and second device information. The first control device is capable of determining a target source device and a target destination device based on the first request.
In one possible implementation, the second control device has a path tuning function. The second control device can determine whether the fifth path satisfies the first preset condition. The fifth path is a path of the first path in a management domain corresponding to the second control device. After the second control device determines that the fifth path meets the first preset condition, the sixth path can be determined, and third path information is sent to the target source device. The sixth path is an alternate path to the fifth path. The source device of the sixth path is the same as the source device of the fifth path. The destination device of the sixth path is the same as the destination device of the fifth path. The third path information indicates the target source device to forward the message based on the seventh path. The seventh path is obtained by replacing the fifth path in the first path with the sixth path.
In one possible implementation, the first preset condition includes one or more of the fifth path failing and the fifth path failing to meet the transmission requirement indicated by the third traffic demand. Wherein the third traffic demand is used to indicate a transmission requirement of the fifth path. The third business requirement may be generated based on the first business requirement and transmitted by the first control device to the second control device.
In one possible implementation, the second control device has the capability to apply for a determined path to the first control device. The second control device can determine that a second preset condition is satisfied. As an example, the second preset condition may be one or more of the fifth path failing, the fifth path failing to meet the transmission requirement indicated by the third traffic demand, and the second control device re-determining the fifth path failure, and the second control device sending the second request to the first control device after determining that the second preset condition is met. The second request is for instructing the first control device to re-determine the path from the target source device to the target destination device.
In one possible implementation, the second control device displays one or more of the first path information and the network topology of the first path, so that the user determines the first path based on the displayed first path information and the network topology of the first path.
In a third aspect, the present application provides an apparatus for establishing a path, the apparatus being applied to a first control device, the first control device belonging to a network, the network including a first management domain and a second management domain, the first management domain including a target source device, the second management domain including a target destination device, the apparatus comprising:
an obtaining unit, configured to obtain tunnel information and link information, where the tunnel information is used to indicate a first tunnel, the first tunnel belongs to the first management domain, and the link information is used to indicate a first cross-domain link from a border device of the first management domain to a border device of the second management domain;
the processing unit is used for acquiring first path information, the first path information is used for indicating the target source equipment to forward a message based on a first path, the first path is a path from the target source equipment to the target destination equipment, and the first path is determined based on the target source equipment, the target destination equipment, the tunnel information and the link information.
In one possible implementation, the apparatus further includes:
and the sending unit is used for sending the first path information to a second control device, and the second control device corresponds to the first management domain.
In a possible implementation, the second control device belongs to the first management domain.
In a possible implementation manner, the acquiring unit is configured to acquire tunnel information of the first tunnel from the second control device.
In a possible implementation manner, the first control device corresponds to the first management domain, and the sending unit is further configured to send the first path information to the target source device by using the first control device.
In a possible implementation manner, the processing unit is further configured to generate tunnel information of the first tunnel.
In a possible implementation manner, the tunnel information is further used to indicate a second tunnel, where the second tunnel belongs to the second management domain.
In a possible implementation manner, the first control device corresponds to the second management domain, and the processing unit is further configured to generate tunnel information of the second tunnel.
In a possible implementation manner, the obtaining unit is further configured to obtain tunnel information of the second tunnel from the third control device, where the third control device corresponds to the second management domain.
In a possible implementation manner, the third control device belongs to the second management domain.
In a possible implementation manner, the acquiring unit is configured to acquire the link information from a border device of the first management domain and/or from a border device of the second management domain.
In a possible implementation manner, the obtaining unit is configured to obtain the link information from a control device corresponding to the first management domain and/or from a control device corresponding to the second management domain.
In a possible implementation manner, the network further includes a third management domain, the third management domain is adjacent to the first management domain and the second management domain, the tunnel information is further used to indicate a third tunnel, the third tunnel belongs to the third management domain, the first cross-domain link includes a second cross-domain link between a boundary device of the first management domain and a boundary device of the third management domain, and a third cross-domain link between a boundary device of the third management domain and a boundary device of the second management domain.
In a possible implementation manner, the processing unit is further configured to generate tunnel information of the third tunnel, and the first control device corresponds to the third management domain.
In a possible implementation manner, the obtaining unit is further configured to obtain tunnel information of the third tunnel from a fourth control device, where the fourth control device corresponds to the third management domain.
In a possible implementation manner, the fourth control device belongs to the third management domain.
In a possible implementation manner, the acquiring unit is configured to acquire link information of the second cross-domain link from a boundary device of the first management domain and/or from a boundary device of the third management domain.
In a possible implementation manner, the acquiring unit is configured to acquire, from a border device of the second management domain, and/or from a border device of the third management domain, link information of the third cross-domain link.
In a possible implementation manner, the acquiring unit is configured to acquire link information of the second cross-domain link from a control device corresponding to the first management domain and/or from a control device corresponding to the third management domain.
In a possible implementation manner, the acquiring unit is configured to acquire, from a control device corresponding to the second management domain, and/or acquire, from a control device corresponding to the third management domain, link information of the third cross-domain link.
In one possible implementation, the first tunnel is spliced from one or more segmented tunnels in the first management domain, or the first tunnel is a segmented tunnel in the first management domain.
In a possible implementation manner, the processing unit is further configured to determine the target source device according to first device information, and determine the target destination device according to the second device information, where the first device information is used to identify the target source device, and the second device information is used to identify the target destination device.
In a possible implementation manner, the method is further used for obtaining a path establishment request, wherein the path establishment request is a path establishment request sent by the second control device to the first control device, and the path establishment request comprises the first device information and the second device information;
the processing unit is further configured to obtain the first device information and the second device information according to the path establishment request.
In a possible implementation manner, the first device information and the second device information are stored in a management system, and the obtaining unit is further configured to obtain the first device information and the second device information from the management system.
In one possible implementation, the first device information includes a network address of the target source device, and the second device information includes a network address of the target destination device.
In one possible implementation, the first device information includes a device identifier of the target source device, and the second device information includes a device identifier of the target destination device.
In one possible implementation, the first device information includes location information of the target source device, and the second device information includes location information of the target destination device.
In a possible implementation manner, the processing unit is configured to determine the first path based on the target source device, the target destination device, the tunnel information and the link information, and obtain the first path information based on the first path.
In one possible implementation manner, the processing unit determines the first path based on the target source device, the target destination device, the tunnel information, and the link information, including:
the processing unit constructs a network topology based on the tunnel information and the link information, the network topology being composed of a tunnel indicated by the tunnel information and a cross-domain link indicated by the link information, and determines the first path based on the target source device, the target destination device, and the network topology.
In a possible implementation manner, the processing unit is configured to determine the first path based on the first traffic requirement, the target source device, the target destination device, the tunnel information, and the link information, where the first traffic requirement is used to indicate a transmission requirement of the first path, and acquire the first path information based on the first path.
In one possible implementation, the processing unit determining the first path based on the first traffic demand, the target source device, the target destination device, the tunnel information, and the link information includes:
the processing unit constructs a network topology based on the tunnel information and the link information, the network topology being composed of a tunnel indicated by the tunnel information and a cross-domain link indicated by the link information, and determines the first path based on one or more of the tunnel information and the link information, the first traffic demand, the target source device, the target destination device, and the network topology.
In a possible implementation manner, the tunnel information includes a device identifier of a tunnel entering device and a device identifier of a tunnel exiting device, the tunnel entering device is a tunnel entering device indicated by the tunnel information, the tunnel exiting device is a tunnel exiting device indicated by the tunnel information, the link information includes a device identifier of a first endpoint device and a device identifier of a second endpoint device, and the first endpoint device and the second endpoint device are devices at two ends of a cross-domain link indicated by the link information;
The processing unit constructs a network topology based on the tunnel information and the link information, including:
the processing unit determines the tunnel indicated by the tunnel information according to the equipment identifier of the tunnel entering equipment and the equipment identifier of the tunnel exiting equipment, determines the cross-domain link indicated by the link information according to the equipment identifier of the first end point equipment and the equipment identifier of the second end point equipment, and constructs network topology according to the tunnel indicated by the tunnel information and the cross-domain link indicated by the link information.
In a possible implementation manner, the tunnel information further includes a first tunnel identifier, where the first tunnel identifier is used to identify a traffic attribute of a tunnel indicated by the tunnel information;
the processing unit determining the first path based on one or more of the tunnel information and the link information, the first traffic demand, the target source device, the target destination device, and the network topology, comprising:
the processing unit determines the first path using a path computation algorithm based on the first tunnel identification, the first traffic demand, the target source device, the target destination device, and the network topology.
In one possible implementation, the first tunnel identifier is a color identifier.
In a possible implementation manner, the tunnel information further includes tunnel operation information, where the tunnel operation information is used to indicate an operation state of a tunnel indicated by the tunnel information, and the link information further includes link operation information, where the link operation information is used to indicate an operation state of a cross-domain link indicated by the link information;
the processing unit determining the first path based on one or more of the tunnel information and the link information, the first traffic demand, the target source device, the target destination device, and the network topology, comprising:
the processing unit determines the first path using a path computation algorithm based on one or more of the tunnel operation information and the link operation information, the first traffic demand, the target source device, the target destination device, and the network topology.
In one possible implementation manner, the tunnel operation information includes first service level agreement SLA information, where the first SLA information is used to indicate operation performance of the tunnel indicated by the tunnel information.
In one possible implementation, the link operation information includes second SLA information, where the second SLA information is used to indicate the operation performance of the cross-domain link indicated by the link information.
In a possible implementation manner, the obtaining unit is further configured to obtain a second service requirement, where the second service requirement is used to indicate a transmission requirement of a second path, the second path is a path of the first path in a management domain corresponding to the first control device, and in response to determining that the second path does not meet the transmission requirement indicated by the second service requirement, obtain second path information, where the second path information is used to indicate that the target source device forwards a message based on a third path, where the third path is obtained by replacing the second path in the first path with a fourth path, and source devices of the fourth path are the same as source devices of the second path, and destination devices of the fourth path are the same as destination devices of the second path.
In a possible implementation manner, the second path information is further used for sending the second path information to the second control device, and the second control device corresponds to the first management domain.
In a possible implementation manner, the first control device corresponds to the first management domain, and the sending unit is further configured to send the second path information to the target source device.
In one possible implementation, the tunnel information includes a second tunnel identifier, where the second tunnel identifier is used to identify a tunnel indicated by the tunnel information, and the link information includes a link identifier, where the link identifier is used to identify a cross-domain link indicated by the link information.
In one possible implementation, the first path information includes the second tunnel identification and the link identification.
In one possible implementation, the second tunnel identity is a binding segment identity BSID.
In one possible implementation, the link identification is a segment identification SID.
In a possible implementation manner, the device further includes a display unit, where the display unit is configured to display one or more of the first path information and the network topology of the first path.
In a fourth aspect, the present application provides a device for establishing a path, where the device is a second control device, where the second control device belongs to a network, where the network includes a first management domain and a second management domain, where the first management domain includes a target source device, and the second management domain includes a target destination device, and where the device includes:
An obtaining unit, configured to obtain first path information sent by a first control device, where the first path information is used to indicate a first path, the first path is a path from the target source device to the target destination device, and the second control device corresponds to the first management domain;
the sending unit is used for sending the first path information to the target source equipment, and the first path information is used for indicating the target source equipment to forward a message based on the first path.
In a possible implementation manner, the obtaining unit is further configured to obtain tunnel information, where the tunnel information is used to indicate a first tunnel, and the first tunnel belongs to the first management domain;
the sending unit is further configured to send the tunnel information to the first control device.
In one possible implementation, the first tunnel is spliced from one or more segmented tunnels in the first management domain, or the first tunnel is a segmented tunnel in the first management domain.
In a possible implementation manner, the second control device further corresponds to the second management domain, and the tunnel information is further used to indicate a second tunnel, where the second tunnel belongs to the second management domain.
In a possible implementation manner, the second control device further corresponds to a third management domain, and the tunnel information is further used to indicate a third tunnel, where the third tunnel belongs to the third management domain, and the third management domain is adjacent to the first management domain and the second management domain respectively.
In a possible implementation manner, the second control device corresponds to the first management domain, the first management domain is adjacent to the second management domain, and the obtaining unit is further configured to obtain first link information, where the first link information is used to indicate a cross-domain link between a boundary device of the first management domain and a boundary device of the second management domain;
the sending unit is further configured to send the first link information to the first control device.
In a possible implementation manner, the second control device corresponds to the first management domain, the first management domain is adjacent to a third management domain, and the obtaining unit is further configured to obtain second link information, where the second link information is used to indicate a cross-domain link between a boundary device of the first management domain and a boundary device of the third management domain;
The sending unit is further configured to send the second link information to the first control device.
In a possible implementation manner, the second control device corresponds to the first management domain and the second management domain, and the obtaining unit is further configured to obtain third link information, where the third link information is used to indicate a cross-domain link between a border device of the first management domain and a border device of the second management domain;
the sending unit is further configured to send the third link information to the first control device.
In a possible implementation manner, the second control device corresponds to the first management domain and the third management domain, the third management domain is adjacent to the first management domain and the second management domain respectively, the obtaining unit is further configured to obtain fourth link information, and the fourth link information is used to indicate a cross-domain link between a boundary device of the first management domain and a boundary device of the third management domain, and/or a cross-domain link between a boundary device of the third management domain and a boundary device of the second management domain;
the sending unit is further configured to send the fourth link information to the first control device.
In a possible implementation manner, the obtaining unit is further configured to obtain first device information and second device information, where the first device information is used to identify the target source device, and the second device information is used to identify the target destination device;
the sending unit is further configured to send a first request to the first control device, where the first request includes the first device information and the second device information.
In a possible implementation, the apparatus further includes a processing unit;
the processing unit is used for determining that the fifth path meets a first preset condition;
the sending unit is further configured to send third path information to the target source device in response to the processing unit determining that the fifth path meets a first preset condition, where the third path information is used to instruct the target source device to forward a packet based on a seventh path, where the seventh path is obtained by replacing the fifth path in the first path with the sixth path, the fifth path is a path of the first path in a management domain corresponding to the second control device, a source device of the sixth path is the same as a source device of the fifth path, and a destination device of the sixth path is the same as a destination device of the fifth path.
In one possible implementation manner, the first preset condition includes that the fifth path fails, and the fifth path does not meet one or more of transmission requirements indicated by a third service requirement, where the third service requirement is used to indicate the transmission requirement of the fifth path.
In a possible implementation manner, the processing unit is further configured to determine that a second preset condition is met;
the sending unit is further configured to send a second request to the first control device, where the second request is used to instruct the first control device to redetermine a path from the target source device to the target destination device.
In one possible implementation manner, the second preset condition is that a fifth path fails, the fifth path does not meet a transmission requirement indicated by a third service requirement, and the second control device redetermines one or more of the fifth path failures, where the fifth path is a path of the first path in the first management domain, and the third service requirement is used to indicate the transmission requirement of the fifth path.
In a possible implementation manner, the device further includes a display unit, where the display unit is configured to display one or more of the first path information and the network topology of the first path.
In a fifth aspect, the present application provides an apparatus, the apparatus being a first control apparatus, the apparatus comprising a processor chip and a memory, the memory being for storing instructions or program code, the processor chip being for invoking and executing the instructions or program code from the memory to perform the method of the first aspect or any one of the possible implementations of the first aspect.
In a sixth aspect, the present application provides an apparatus, the apparatus being a second control apparatus, the apparatus comprising a processor chip and a memory, the memory being for storing instructions or program code, the processor chip being for invoking and executing the instructions or program code from the memory to perform the method of the second aspect or any one of the possible implementations of the second aspect.
In a seventh aspect, the present application provides a network system comprising an apparatus according to the fifth aspect.
In an eighth aspect, the present application provides a network system comprising an apparatus according to the fifth aspect and an apparatus according to the sixth aspect.
In a ninth aspect, the present application provides a computer readable storage medium comprising instructions, a program or code which, when executed on a computer, causes the computer to perform the method of establishing a path as described in the first aspect above.
In a tenth aspect, the present application provides a computer program product which, when run on a device, causes the device to perform the method of establishing a path as described in the first aspect.
In an eleventh aspect, the present application provides a chip comprising a memory and a processor. The memory is used to store instructions or program code. The processor is configured to call and execute the instructions or the program code from the memory to perform the method of the first aspect or any one of the possible implementation manners of the first aspect; or, the processor performs the method of the second aspect or any one of the possible implementations of the second aspect.
In one possible design, the chip includes only a processor for reading and executing instructions or program code stored in a memory, the processor performing the method of the first aspect or any one of the possible implementations of the first aspect when the instructions or program code is executed; or, the processor performs the method of the second aspect or any one of the possible implementations of the second aspect.
Drawings
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present application;
fig. 2 is a schematic diagram of another network architecture according to an embodiment of the present application;
FIG. 3 is a schematic diagram of yet another network architecture according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of another network architecture according to an embodiment of the present application;
fig. 5 is a schematic diagram of yet another network architecture according to an embodiment of the present application;
FIG. 6 is a flowchart of a method for establishing a path according to an embodiment of the present disclosure;
fig. 7 is a schematic diagram of a network topology according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a first path according to an embodiment of the present disclosure;
FIG. 9 is a schematic diagram of another first path provided in an embodiment of the present application;
FIG. 10 is a schematic diagram of an operation and maintenance interface according to an embodiment of the present disclosure;
FIG. 11 is a schematic diagram of another network topology according to an embodiment of the present application;
FIG. 12 is a schematic diagram of yet another first path provided by an embodiment of the present application;
FIG. 13 is a flowchart of another method for establishing a path according to an embodiment of the present disclosure;
fig. 14 is a schematic structural diagram of a device for establishing a path according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of another apparatus for establishing a path according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of a network system according to an embodiment of the present application;
Fig. 17 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
Detailed Description
The following describes a conventional technology and a path establishing method provided by the embodiment of the application with reference to the accompanying drawings.
Referring to fig. 1, a schematic diagram of a network architecture according to an embodiment of the present application is shown. The network 100 is composed of a backbone network 101 and a metropolitan network 102, a metropolitan network 103, and a metropolitan network 104. Metropolitan area network 102, metropolitan area network 103, and metropolitan area network 104 are connected to backbone network 101. When a user needs to establish a dedicated line for traffic from a source device 105 in a metropolitan area network 102 to a destination device 106 in a metropolitan area network 104, resources are configured in the respective managed networks by a network management department a in charge of the metropolitan area network 102, a network management department B in charge of the backbone network 101, and a network management department C in charge of the metropolitan area network 104, respectively. And then the network management department A responsible for the metropolitan area network 102, the network management department B responsible for the backbone network 101 and the network management department C responsible for the metropolitan area network 104 coordinate and configure the resources between the networks together to finish the opening of the special line of the business from the source equipment 105 in the metropolitan area network 102 to the destination equipment 106 in the metropolitan area network 104.
Based on the above description, in the current process of opening a dedicated line, multiple network management departments are required to configure resources respectively, and then coordinate and integrate. The process of opening the special business line is complicated, the period is long, and the requirement of a user for quickly constructing the special business line is difficult to meet.
In view of the foregoing, an embodiment of the present application provides a method for establishing a path, which can be applied to a network including a first management domain to which a target source device belongs and a second management domain to which a target destination device belongs. The first control device obtains tunnel information and link information, and obtains first path information. The tunnel information is used for indicating a first tunnel in the first management domain. The link information is used to indicate a first cross-domain link from a boundary device of a first management domain to a boundary device of a second management domain. The first control device can determine a first path based on the target source device, the target destination device, the tunnel information, and the link information, and obtain first path information indicating the first path. The first control device is capable of automatically generating a path from the target source device to the target destination device across a plurality of management domains. Thus, the automatic construction of the path crossing the plurality of management domains can be realized, and the efficiency of establishing the path crossing the plurality of management domains is improved.
The following describes a system architecture related to a path establishment method provided in an embodiment of the present application. Fig. 2-5 are schematic diagrams of possible system architectures according to embodiments of the present application. It should be noted that the system architectures shown in fig. 2-5 are merely exemplary implementations provided by embodiments of the present application. The application scenario of the path establishment method provided in the embodiment of the present application is not limited to the system architecture shown in fig. 2 to 5.
Referring to fig. 2, a system 200 includes a control device 201, a control device 202, and a control device 203. The control device 201 belongs to the management domain a. The control device 202 belongs to the management domain B. The control device 203 belongs to the management domain C. The management domain A is connected with the management domain B, and the management domain B is connected with the management domain C. A communication connection is established between the control device 201 and the control device 202, and a communication connection is established between the control device 202 and the control device 203. The control device 201, control device 202, or control device 203 may be deployed locally or may be deployed based on a private cloud or public cloud.
Wherein, the management domain A and the management domain C can be metropolitan area networks at the network edge. The management domain a and the management domain C may include Provider Edge (PE) devices, provider (P) devices, and autonomous system border routers (autonomous systems border router, ASBR). Interior gateway protocol (interior gateway protocol, IGP) based connections between PE devices, P devices and ASBRs within management domain a and management domain C. The management domain B may be a backbone network located at a hub. The management domain B may include ASBR and P devices. The management of ASBRs and P devices within domain B is based on IGP connections. The ASBR of management domain a and the ASBR of management domain B are connected based on an export peer engineering (egress peer engineering, EPE) protocol. The ASBR of the management domain B and the ASBR of the management domain C are connected based on EPE protocol.
The control device 201, the control device 202, and the control device 203 may be referred to as intra-domain control devices based on the scope of the management domain managed by the control device. The intra-domain control device is used for controlling a network device in a management domain.
Further, the control device 201 and the control device 203 may also be referred to as metropolitan area control devices or intra-provincial control devices, and the control device 203 may also be referred to as backbone control devices, based on the location in the network where the control device is located.
Referring to fig. 3, a system 300 includes a control device 301, a control device 302, a control device 303, and a control device 304. The control device 301 belongs to the management domain a. The control device 302 belongs to the management domain B. The control device 303 belongs to the management domain C. The control device 304 establishes communication connections with the control device 301, the control device 302, and the control device 303, respectively. Wherein the control device 304 may be referred to as a cross-domain control device. The cross-domain control device is used for controlling a plurality of control devices corresponding to different management domains.
Referring to fig. 4, a system 400 includes a control device 401, a control device 402, and a control device 403. The control device 401 corresponds to the management domain a and the management domain B. The control device 402 corresponds to the management domain C. The control device 403 establishes communication connections with the control device 401 and the control device 402, respectively. Among them, the control device 401 may be referred to as a zone control device. The area control device is used for controlling network devices in a plurality of management domains.
Referring to fig. 5, a system 500 includes a control device 501. The control device 501 corresponds to a management domain a, a management domain B, and a management domain C. Among them, the control device 501 may be referred to as a unified control device. The unified control device is used for controlling network devices in all management domains in the network.
The control device in the system architecture may be a device having a network management function, and the control device may be, for example, a network management device, a controller, a Control Plane (CP) device, or the like. The management domain is a network domain which can be managed by the control device. A management domain may include one or more autonomous systems (autonomous systems, AS).
The method for establishing the path provided by the embodiment of the application can be applied to a network comprising at least two management domains and is used for establishing the path crossing a plurality of management domains. Wherein the management domain may be divided according to a management range of the control device. One management domain can also be divided into a plurality of ases in an autonomous division manner, that is, one management domain may include a plurality of ases.
The network may include a first management domain and a second management domain. The first management domain is a management domain to which the target source device belongs. The second management domain is a management domain to which the target destination device belongs. The target source device is the source device that needs the path established. The target destination device is a destination device of a path that needs to be established. The path from the target source device to the target destination device needs to span the first management domain and the second management domain.
For convenience of description, a control device that manages network devices in a first management domain, that is, a control device corresponding to the first management domain, is referred to as a second control device, and a control device that manages network devices in a second management domain, that is, a control device corresponding to the second management domain, is referred to as a third control device.
The second control device may be a control device belonging only to the first management domain, i.e. an intra-domain control device. The second control device may also be a control device that manages a plurality of management domains including the first management domain, that is, a zone control device. The second control device may also be a control device that manages all management domains including the first management domain, that is, a unified control device. The third control device is similar to the second control device and will not be described in detail herein.
The method 200 for establishing a path according to the embodiment of the present application will be described with reference to the system structure of fig. 2.
In one possible implementation, the first control device may determine the target source device according to the first device information and determine the target destination device according to the second device information. Wherein the first device information is used to identify the target source device. The second device information is used to identify the target destination device.
It should be noted that the target source device and the target destination device may be determined by a user selection. Correspondingly, the first device information and the second device information may be generated by triggering by the user, or may be generated based on the requirement of the user for establishing the path.
The first control device may obtain the route establishment request. The route request includes first device information and second device information.
In one implementation, the first control device belongs to a first administrative domain. The request for a path may be reported by a network device in the first management domain to the first control device.
In the example of fig. 2, the first control device may be the control device 201. The network device in the management domain a may generate a route establishment request based on the selection of the user and report to the control device 201.
In another implementation, the first control device is not a control device belonging to the first management domain. The first control device may receive a path establishment request transmitted by a control device belonging to the first management domain.
Taking fig. 2 as an example, the first control device may be the control device 202, and the first management domain is the management domain a. The network device in the management domain a may generate a route establishment request based on the selection of the user and report to the control device 201. Specifically, the control device 201 can analyze the first device information and the second device information included in the path establishment request. If the target destination device identified by the second device information does not belong to the first management domain, it is indicated that a link crossing the management domain needs to be established. The control device 201 reports a request for a route to the control device 202.
The first control device may also acquire the first device information and the second device information from the management system. Wherein the management system may be connected to the first control device for managing the control devices comprised by the network. The management system may be, for example, an operations support system (operations support system, OSS). The management system may acquire and store the first device information and the second device information provided by the user. The management system may issue the first device information and the second device information to the first control device. The first control device may also acquire the first device information and the second device information from the management system. The embodiment of the application does not limit the manner of the management system to issue the first device information and the second device information, and may be, for example, timing issue. The first control device may also periodically acquire the first device information and the second device information from the management system.
The contents included in the first device information and the second device information are described below.
As one example, the first device information includes a network address of the target source device and the second device information includes a network address of the target destination device. The first control device is capable of determining the target source device and the target destination device, respectively, based on the network address of the target source device and the network address of the target destination device. The network address may be an internet protocol (internet protocol, IP) address, specifically an internet protocol version4 (internet protocol version, IPv 4) address or an internet protocol version6 (internet protocol version, IPv 6) address, and the kind of address may be specifically determined according to the network.
As another example, the first device information includes a device identification of the target source device and the second device information includes a device identification of the target destination device. The device identification may be an IPv6 router (ID) identification (Identity) of the device, a device name, a label switching router (label switching router, LSR) identification, a border gateway protocol (border gateway protocol, BGP) router-ID, an end segment identification (segment identifier, SID), etc. The device identification is used to uniquely identify a device in the network. The first control device is capable of uniquely determining the target source device and the target destination device based on the device identification of the target source device and the device identification of the target destination device.
As yet another example, the first device information includes location information of the target source device and the second device information includes location information of the target destination device. The location information may refer to a location where the device is located. In one possible implementation, a schematic diagram may be provided to a user that includes location information for each device, and the user may trigger generation of the first device information and the second device information by selecting a device at a particular location. The first control device is capable of determining a target source device and a target destination device based on a correspondence between predetermined location information and devices.
In one possible implementation scenario, a user needs to enable communication between a device in a metropolitan area network and a device in a backbone network that provides cloud services. The device providing the cloud service may be a cloud PE.
In this scenario, the target source device and the target destination device may each belong to a neighboring administrative domain. The first management domain and the second management domain may be adjacent management domains. For example, the target source device belongs to the management domain a, and the target destination device belongs to the management domain B. The first management domain is management domain a, and the second management domain is management domain B.
In another possible implementation scenario, a user needs to enable communication between a device in a metropolitan area network and a device in another metropolitan area network.
In this scenario, the target source device and the target destination device may belong to non-adjacent management domains, respectively, and then the first management domain and the second management domain are non-adjacent management domains. For example, the target source device belongs to the management domain a, and the target destination device belongs to the management domain C. The first management domain is management domain a, and the second management domain is management domain C.
The method 300 for establishing a path provided in the embodiment of the present application will be described below by taking a first management domain and a second management domain as adjacent management domains as an example.
Referring to fig. 6, a flowchart of a method for establishing a path according to an embodiment of the present application is shown. Referring to fig. 6, the method may include S601-S602.
S601: the first control device acquires tunnel information and link information.
The first control device is a control device capable of determining a path from the target source device to the target destination device. The first control device has the capability to determine a path.
In the embodiment of the present application, the first control device may be one of a plurality of control devices of the same level. Wherein, the same level refers to that the control devices do not have management relation. For example, in the scenario shown in fig. 2, the control device 201 and the control device 202 are both control devices for controlling forwarding devices in the management domain to which they belong, and are capable of centrally managing, controlling, and analyzing network devices of the connected management domain. The control device 201 and the control device 202 are controllers belonging to the same level, and have no management relationship with each other. Wherein the first control device may be the control device 201 or the control device 202. The embodiment of the application is not limited to the determination manner of the first control device, for example, the first control device may be preconfigured, or may be selected and determined by the control devices at the same level.
The tunnel information acquired by the first control device is used for indicating the tunnel in the management domain. Referring to fig. 2, the tunnel in the management domain may be a tunnel between network devices in the management domain.
As one example, the tunnel information includes a second tunnel identification, a device identification of the tunneling device, and a device identification of the tunneling device.
Wherein the second tunnel identification is used to identify the tunnel. The second tunnel identifier comprises an identifier or an identifier list of a plurality of identifiers.
In one possible implementation, the second tunnel identification may be, for example, a binding segment identification (binding segment identifier, BSID). The BSID is a basic instruction of Segment Routing (SR), and is used to identify a tunnel, provide functions of tunnel connection, traffic guidance, and the like. If the message carries the BSID corresponding to the tunnel, the message is guided to the corresponding tunnel. BSID is designed to achieve better network opening, scalability, isolation of network changes and service decoupling. BSID represents an IPv6 based segment routing (segment routing over IPv, SRv) tunnel, whose value is an IPv6 address, is a SRv segment identification (segment identifier, SID), and can also be routed across domains.
In another possible implementation, the second tunnel identifier may be, for example, a multiprotocol label switching (multi-protocol label switch, MPLS) label, or a label stack made up of a plurality of MPLS labels. MPLS labels are used to indicate tunnels. Wherein the MPLS label may be a SID defined by segment routing-multiprotocol label switching (SR-MPLS).
The device identification of the tunnel entrance device is used to identify the entrance device of the tunnel. The device identification of the tunnel egress device is used to identify the egress device of the tunnel. Based on the device identification of the tunnel entrance device and the device identification of the tunnel exit device, the tunnel entrance device and the tunnel exit device can be determined. The device identifier of the tunneled device may be one or more of a network address of the tunneled device, a router identifier, and an LSR identifier. Similarly, the device identification of the tunnelling device may be one or more of a network address, a router identification, and an LSR identification of the tunnelling device.
The tunnel information may also include one or more of a first tunnel identification and tunnel operation information.
The first tunnel identifier is used for identifying the service attribute of the tunnel indicated by the tunnel information. Traffic attributes may include, for example, slice attributes, transport attributes, and the like. When the first tunnel is a SRv policy (policy) tunnel, the first tunnel identification may be a color (color) identification. Based on the color identification, the service guarantee level of the corresponding tunnel can be indicated, for example, the color identification A indicates that the service guarantee level of the corresponding tunnel is gold (gold), and the gold level indicates that the tunnel can guarantee that the service enjoys the service guarantee with low time delay and large bandwidth; for example, the color identifier B indicates that the service guarantee level of the corresponding tunnel is silver (driver), and the silver level indicates that the tunnel can guarantee that the service enjoys service guarantee with lower delay and moderate bandwidth.
The tunnel operation information is used to indicate the operation state of the tunnel. The tunnel operation information may include first service level agreement (service level agreement, SLA) information. The first SLA information can indicate the operational performance of the tunnel, such as latency, bandwidth, etc. The tunnel operation information may also include tunnel failure information. The tunnel failure information can indicate that the tunnel is failed and is not available. It should be noted that, the tunnel operation information may be updated in real time. The first control device can acquire the tunnel operation information in real time or acquire the tunnel operation information at intervals to determine the operation state of the tunnel. The first control device can determine a first path that satisfies the user demand based on the tunnel operation information.
In addition, the tunnel information may further include information such as a tunnel name and a management domain number to which the tunnel belongs.
The tunnel information can be used to indicate a first tunnel within the first administrative domain. Alternatively still, the tunnel information can be used to indicate a first tunnel within a first administrative domain and a second tunnel within a second administrative domain.
These two cases are respectively described below.
First kind: the tunnel information is used to indicate a first tunnel within the first administrative domain.
It should be noted that the first control device may be the same control device as the control device that manages the first management domain, that is, the second control device, or may be a different control device from the second control device.
As an example, the first control device is a control device of a first management domain. The first control device and the second control device are the same control device. The first control device is capable of acquiring tunnel information of a first tunnel belonging to a first management domain. Taking the first management domain as management domain a as an example, the first control device is control device 201. The control device 201 can acquire tunnel information of the first tunnel included in the management domain a.
In one possible implementation, the first control device establishes a border gateway protocol-link state (BGP-LS) protocol connection with an RR in the first management domain. The first control device acquires tunnel information of the first tunnel through a Route Reflector (RR) in the first management domain.
As another example, when the first control device is different from the control device belonging to the first management domain, the control device belonging to the first management domain is the second control device. The first control device can acquire tunnel information of the first tunnel through the second control device. For example, the first management domain is management domain a, and the first control device is control device 202. The control device 202 is able to acquire the tunnel information of the first tunnel through the second control device, that is, the control device 201. Wherein the control device 201 may acquire tunnel information of the first tunnel based on the RR in the management domain a. Specifically, the control device 201 can report the tunnel information of the first tunnel to the control device 202 through the interface after acquiring the tunnel information of the first tunnel.
Second kind: the tunnel information is used to indicate a first tunnel within a first administrative domain and to indicate a second tunnel within a second administrative domain.
In this case, the first control device is a control device belonging to one of the first management domain and the second management domain.
The first control device acquires tunnel information of a tunnel in the management domain to which the first control device belongs, and acquires tunnel information of a tunnel in another management domain through the control device belonging to the other management domain.
The first control device may belong to a first management domain and be the same control device as the second control device. For example, the first management domain is management domain a, and the second management domain is management domain B. In one example, the first control device is control device 201 and the third control device is control device 202. The third control device is a control device corresponding to the second management domain. The control device 201 acquires the tunnel information of the first tunnel from the management domain a, and acquires the tunnel information of the second tunnel through the control device 202.
The first control device may also belong to the second management domain. The control device belonging to the first management domain may be referred to as a second control device.
In another example, the first management domain is management domain a and the second management domain is management domain B. The first control device is a control device 202 and the second control device is a control device 201. The control device 202 acquires the tunnel information of the first tunnel through the control device 201, and acquires the tunnel information of the second tunnel from the management domain B.
The first tunnel and the second tunnel may be SR tunnels or MPLS tunnels. The SR tunnel may specifically BE one of a SRv policy tunnel, an SR-MPLS tunnel, a segment routing-best effort forwarding (segment routing best effort, SR-BE) tunnel, and an SR traffic engineering (traffic engineering, TE) tunnel. The MPLS tunnel may be, for example, a resource reservation protocol traffic engineering (RSVP-TE) tunnel. The tunnel type of the first tunnel may be determined by network transport technologies supported by the first management domain. Similarly, the tunnel type of the second tunnel may be determined by network transport technologies supported by the second administrative domain.
The first tunnel indicated by the tunnel information may be a segmented tunnel, or may be an end-to-end tunnel obtained by splicing one or more segmented tunnels. Where an end-to-end tunnel may refer to an edge device-to-edge device tunnel within a management domain. Segmented tunneling may refer to tunneling of non-edge devices within a management domain, as well as tunneling of non-edge devices to edge devices. The edge device may comprise a border device. In which, referring to fig. 2, the tunnel from PE device to P device in the management domain and the tunnel from P device to ASBR are referred to as segmented tunnels. The tunnel of PE devices to ASBRs within the management domain is referred to as an end-to-end tunnel.
The control device to which the first management domain belongs may first splice the segmented tunnels after obtaining the segmented tunnels in the first management domain, so as to obtain the end-to-end tunnels. The control equipment belonging to the first management domain firstly splices the segmented tunnel to obtain an end-to-end tunnel, so that the calculation pressure of the first control equipment when determining the first path can be reduced, and the efficiency of the first control equipment in determining the first path is improved. And the control equipment to which the first management domain belongs splices the segmented tunnels, so that hierarchical management can be realized, and the tunnels in the management domain can be flexibly managed by the control equipment.
The link information acquired by the first control device is used for indicating a first cross-domain link from the boundary device of the first management domain to the boundary device of the second management domain. It should be noted that, the first cross-domain link indicated by the link information may include one or more cross-domain links between the border device of the first management domain and the border device of the second management domain. The first cross-domain link may specifically be an EPE link. The boundary device may specifically be an ASBR. Referring to fig. 2, the link between the ASBR of the management domain a and the ASBR of the management domain B is a cross-domain link.
As one example, the link information includes a link identification, a device identification of the first endpoint device, and a device identification of the second endpoint device.
The link information may include a link identification. The link identification is used to indicate the first cross-domain link. Specifically, the link identifier may be a tag identifier of the first cross-domain link or a link name, for example, a SID of the first cross-domain link or a name L-AB of the first cross-domain link, etc.
The link information may include a device identification of the first endpoint device and/or a device identification of the second endpoint device. The first endpoint device and the second endpoint device are two endpoint devices of the first cross-domain link, and may specifically be boundary devices at two ends of the first cross-domain link. The device identification may be one or more of a network address of the device, a name of the device, a network address of a link port included by the device, and a name of a link port included by the device. The network address of the device may be an IPv4 address or an IPv6 address, which may be specifically determined according to the network in which the device is located.
In addition, the link information may further include link operation information, a number of a management domain to which the link belongs, and the like.
The link operation information is used to indicate an operation state of the first cross-domain link. In particular, the link operation information may include second SLA information. The second SLA information is used to indicate the operational performance of the first cross-domain link, such as latency, bandwidth, etc. The link operation information may also include link failure information. The link failure information can indicate that the first cross-domain link failed. It should be noted that, the link operation information may be updated in real time. The first control device may acquire link operation information in real time, or acquire link operation information at intervals of a certain time, and determine an operation state of the link. The first control device can determine a first path that meets the user traffic demand based on the link operation information.
In one possible implementation, the first control device is capable of acquiring link information of the cross-domain link based on a management domain to which the two boundary devices connected to the cross-domain link belong. That is, the first control device can acquire link information indicating the first cross-domain link based on one or more of the first management domain and the second management domain.
Specifically, the first control device can acquire link information of the first cross-domain link from the management domain to which it belongs. For example, the first management domain is management domain a, and the first control device is control device 201. The control device 201 can acquire link information of the first cross-domain link. In one possible implementation, the first control device may obtain link information of the first cross-domain link from an RR of the first management domain. In another possible implementation, the first control device may obtain the link information of the first cross-domain link from the boundary device within the first management domain.
The first control device can also acquire link information of the first cross-domain link from control devices belonging to other management domains. For example, the first management domain is management domain a, and the first control device is control device 201. The control device 201 can acquire link information of the first cross-domain link from the control device 202.
The first control device can also be directly connected to the boundary device. The boundary device belonging to the second management domain can report the link information of the first cross-domain link to the first control device.
It should be noted that, the link information of the first cross-domain link acquired by the first control device based on the two modes may be the same. The first control device can integrate the acquired link information of the first cross-domain link and delete the repeated content.
In one possible implementation manner, the first control device can periodically acquire the tunnel information and the link information, so as to update the tunnel information and the link information. Therefore, the first control equipment can acquire the tunnel information and the link information with higher timeliness, and the acquired first path information is more accurate.
For example, the first control device can determine to delete or newly add a tunnel based on the device identification of the tunneling device and the device identification of the tunneling device included in the updated tunnel information. The first control device can determine an added or deleted cross-domain link between the management domains based on the device identification of the first endpoint device and the device identification of the second endpoint device included in the updated link information. The first control device can also determine the operation condition and the service attribute of the tunnel based on the information such as the tunnel operation information and the first tunnel identifier included in the updated tunnel information. The first control device can also determine the operation condition of the link based on the link operation information included in the updated link information.
S602: the first control device acquires first path information.
The first path information is used for indicating the target source equipment to forward the message based on the first path. Wherein the first path is a path from the target source device to the target destination device.
The first control device is capable of determining a path from the target source device to the target destination device based on the target source device, the target destination device, the tunnel information, and the link information. The path from the target source device to the target destination device is the first path. Based on the determined first path, the first control device can acquire first path information.
In one possible implementation, the embodiments of the present application provide two specific implementations of determining the first path.
Mode one: the first path is determined based on the target source device, the target destination device, the tunnel information, and the link information.
The tunnel information indicates a tunnel within the administrative domain. The link information indicates a first cross-domain link. The first control device is capable of determining a tunnel within the management domain and a cross-domain link between the management domains based on the tunnel information and the link information. The first control device can determine the first path according to the target source device and the target destination device.
In one possible implementation, the first control device may determine the first path using a path computation algorithm based on the target source device, the target destination device, the tunnel information, and the link information. The embodiments of the present application do not limit the type of path computation algorithm, and may be, for example, a shortest path algorithm. The tunnel information at least comprises the equipment identification of the tunnel-in equipment and the equipment identification of the tunnel-out equipment. The link information includes at least a device identification of the first endpoint device and a device identification of the second endpoint device.
In another possible implementation, the first control device may first construct a network topology based on the tunnel information and the link information.
The network topology is constituted by tunnels indicated by tunnel information and cross-domain links indicated by link information. Taking a management domain a and a management domain B as examples, a network topology schematic provided in the embodiments of the present application is provided. Referring to fig. 7, the management domain a includes a network device a, a network device B, a network device C, and a network device D. Wherein network device a and network device B are edge devices of management domain a. Network device C and network device D are boundary devices of management domain a. The management domain B includes a network device E, a network device F, a network device G, and a network device H. Wherein, the network device E, the network device F, the network device G, and the network device H are boundary devices of the management domain B. Each two of the network devices a, B, C and D form a tunnel in the management domain a. The network device E, the network device F, the network device G, and the network device H form a tunnel within the management domain B between every two network devices. A cross-domain link is formed between network device C and network device E, and between network device D and network device F.
It should be noted that, the network topology provided in the embodiments of the present application may be an Overlay (Overlay) network topology. An Overlay network is one or more virtual logical networks built on the same underlying bearer (Underlay) network through network virtualization technology. Although the different Overlay networks share devices and lines in the underway network, traffic in the Overlay network is decoupled from physical networking and interconnection techniques in the underway network.
Specifically, the tunnel information includes a device identifier of the tunnel-in device and a device identifier of the tunnel-out device. The first control device can determine devices at two ends of a tunnel based on the device identification of the tunnel entrance device and the device identification of the tunnel exit device, and determine the tunnel indicated by the tunnel information. Taking fig. 7 as an example, the tunnel information includes a device identifier of the network device a and a device identifier of the network device B. Based on the tunnel information, the first control device can determine a tunnel between network device a and network device B in the management domain a. Similarly, the link information includes a device identification of the first endpoint device and a device identification of the second endpoint device. The first control device can determine devices at two ends of the link based on the device identification of the first end point device and the device identification of the second end point device, and determine a first cross-domain link indicated by the link information. Taking fig. 7 as an example, the link information includes a device identifier of the network device C and a device identifier of the network device E. Based on the link information, the first control device is able to determine a cross-domain link between the network device C in the management domain a and the network device E in the management domain B.
The first control device is capable of constructing a network topology based on the tunnel indicated by the tunnel information and the cross-domain link indicated by the link information. The first control device is capable of determining a first path based on the constructed network topology, the target source device, and the target destination device.
Specifically, the first control device may also determine the first path by calculating using a path calculation algorithm based on the network topology, the target source device, and the target destination device.
The method for determining the first path described in the first mode can be applied to a scenario where the user has no service requirement on the first path. In some possible implementations, the determined first path needs to satisfy the service requirement of the user. The embodiment of the application provides a second method for determining a first path, which is used for determining the first path meeting the service requirement of a user.
Mode two: the first path is determined based on the first traffic demand, the target source device, the target destination device, the tunnel information, and the link information.
The first traffic demand is used to indicate a transmission requirement of the first path. The first service requirement may be obtained from the road establishment request by the first control device, or may be issued to the first control device by the management system, or may be obtained from the management system by the first control device.
The first business requirement may be, for example, an SLA requirement. Specifically, for example, the maximum delay requirement of transmission, the maximum bandwidth requirement, etc. may be mentioned.
The first service requirement may be, for example, a service security level. Specifically, for example, the service guarantee levels may be classified according to the service guarantee requirements: grade gold, grade silver, grade copper, etc.
The first service requirement may be, for example, a service cost level. Specifically, for example, the cost levels may be classified according to the service cost requirements: high, medium, low, etc.
The first control device can determine a first path that meets the first traffic demand based on the first traffic demand, the target source device, the target destination device, the tunnel information, and the link information.
The tunnel information includes information related to the service requirement, in addition to information indicating the tunnel, such as the device identifier of the tunneling device and the device identifier of the tunneling device. Alternatively, the link information includes information related to the traffic demand in addition to information indicating the cross-domain link, such as a device identification of the first endpoint device and a device identification of the second endpoint device. Thus, the first control device can determine the first path meeting the first service requirement according to the first service requirement.
The first business requirement may include one or more of a business requirement in terms of business attributes, and a business requirement in terms of operating conditions. Two possible scenarios are described below.
Case one: the first business requirement includes a business requirement in terms of a business attribute.
The tunnel information acquired by the first control device includes a first tunnel identifier in addition to the device identifier of the tunnel-in device and the device identifier of the tunnel-out device. The first tunnel identifier is used for identifying a traffic attribute of a tunnel indicated by the tunnel information. For example, the first tunnel identifier is a color (color) identifier.
As an example, the first control device can determine the first path based on the first tunnel identification, the device identification of the tunneling device, the link information, the first traffic demand, the target source device, and the target destination device. Wherein the link information includes at least a device identification of the first endpoint device and a device identification of the second endpoint device.
In one possible implementation, the first control device may determine the first path computationally using a path computation algorithm.
And a second case: the first business requirement includes a business requirement in terms of an operational state.
The first control device acquires one or more of tunnel information including tunnel operation information and link information including link operation information. The tunnel operation information is used for indicating the operation state of the tunnel indicated by the tunnel information. The tunnel operation information may include first SLA information. The first SLA information is used for indicating the operation performance of the tunnel indicated by the tunnel information. The link operation information is used for indicating the operation state of the cross-domain link indicated by the link information. The link operation information includes second SLA information. The second SLA information is used for indicating the operation performance of the cross-domain link indicated by the link information.
As an example, the first control device can determine the first path based on one or more of the tunnel operation information and the link operation information, a device identification of the tunnel-in device, a device identification of the tunnel-out device, a device identification of the first endpoint device, a device identification of the second endpoint device, the first traffic demand, the target source device, and the target destination device.
In one possible implementation, the first control device may determine the first path computationally using a path computation algorithm.
In another possible implementation, the first control device may first construct a network topology based on the tunnel information and the link information. And determining a first path based on one or more of the tunnel information and the link information, the network topology, the first service requirement, the target source equipment and the target destination equipment.
The method for constructing the network topology based on the tunnel information and the link information is similar to the method for constructing the network topology in the first embodiment, and is specifically referred to above, and will not be described herein.
It should be noted that at least one of the tunnel information and the link information includes information related to the service, so that the first path meeting the first service requirement can be determined.
Similarly, as an example, when the first traffic demand includes a traffic demand in terms of a traffic attribute, the first control device can determine the first path based on the first tunnel identification, the network topology, the first traffic demand, the target source device, and the target destination device.
As another example, when the first traffic demand includes a traffic demand in terms of an operational state, the first control device can determine the first path based on one or more of tunnel operational information and link operational information, a network topology, the first traffic demand, the target source device, and the target destination device.
Wherein the first control device may determine the first path using a path computation algorithm calculation based on the network topology.
Based on the two methods provided in the embodiments of the present application, the first control device can determine the first path. It should be noted that, the first control device may determine a plurality of first paths that meet the needs of the user, which is not limited in the embodiment of the present application.
The tunnels constituting the first path may be different based on the target source device and the target destination device having different network locations.
First kind: the first path is formed by a first tunnel and a first cross-domain link.
In one possible implementation, the target destination device is an endpoint of the first cross-domain link in the second management domain, i.e. a border device of the second management domain connected to a border device of the first management domain. The first path between the target source device and the target destination device is formed by a first tunnel and a first cross-domain link.
Taking the topology of fig. 7 as an example, the target source device may be the network device a, and the target destination device may be the network device E. The first path may be constituted by a first tunnel from network device a to network device C and a first cross-domain link from network device C to network device E.
Referring to fig. 8, a schematic diagram of a first path according to an embodiment of the present application is shown. The management domain A is a first management domain, and the network device A is a target source device. The control device 201 is a second control device. The control device 202 is a first control device. The network equipment E is cloud PE and is target destination equipment. The control device 202 acquires tunnel information indicating the first tunnel and link information indicating the first cross-domain link, which are transmitted by the control device 201. The control device 202 determines the first path based on the tunnel information, the link information, the network device a, and the network device E. The first path is from network device a to network device C and from network device C to network device E. Wherein, the network device a to the network device C are the first tunnels included in the first path. Network device C through network device E are first cross-domain links included for the first path.
Second kind: the first path is formed by a first tunnel, a first cross-domain link, and a second tunnel.
In another possible implementation, the target destination device is a non-boundary device of the second management domain, or an endpoint of a non-first cross-domain link. The first path between the target source device and the target destination device is formed by a first tunnel, a first cross-domain link, and a second tunnel.
Taking the topology of fig. 7 as an example, the target source device may be the network device a, and the target destination device may be the network device H. The first path may be constituted by a first tunnel from network device a to network device C, a first cross-domain link from network device C to network device E, and a second tunnel from network device E to network device H.
Referring to fig. 9, a schematic diagram of another first path according to an embodiment of the present application is shown. The management domain A is a first management domain, and the network device A is a target source device. The control device 201 is a second control device. The control device 202 is a first control device. The network device H is a cloud PE, and is a target destination device. The control device 202 acquires tunnel information indicating the first tunnel and link information indicating the first cross-domain link, which are transmitted by the control device 201. The control device 202 acquires tunnel information indicating the second tunnel and link information indicating the first cross-domain link. The control device 202 determines the first path based on the tunnel information, the link information, the network device a, and the network device H. The first path is from network device a to network device C, from network device C to network device E, and finally from network device E to network device H. Wherein, the network device a to the network device C are the first tunnels included in the first path. Network device C through network device E are first cross-domain links included for the first path. Network device E through network device H are second tunnels comprised by the first path.
Based on the above provided possible method for determining the first path, the first control device can acquire first path information for indicating the first path.
The first path information may include an identification indicating a tunnel and an identification indicating a cross-domain link.
In one possible implementation, the first path information may include a second tunnel identification and a link identification. The second tunnel identifier may be a BSID, and the link identifier may be a SID.
For example, the first path is formed by the first tunnel and the first cross-domain link, and the corresponding first path information includes the BSID of the first tunnel and the SID of the first cross-domain link.
For another example, the first path is formed by the first tunnel, the first cross-domain link and the second tunnel, and the corresponding first path information includes the BSID of the first tunnel, the SID of the first cross-domain link and the BSID of the second tunnel.
In one possible implementation manner, the first control device displays the network topology of the first path and/or the first path information on an operation and maintenance interface of the first control device, so that the user can conveniently view the first path information.
Referring to fig. 10, a schematic diagram of an operation and maintenance interface according to an embodiment of the present application is shown. The network topology of the first path is displayed in a left broken line area 1001 of the operation and maintenance interface, and the first path information is displayed in a right broken line area 1002. The network comprises five management domains of AS1, AS2, AS3, AS4 and AS 5.AS 1, AS2, AS3, AS4, and AS5 each comprise six network devices. The IP addresses of the six network devices included in AS1 are 192.1.1.0-192.1.1.5, respectively. The IP addresses of the six network devices included in AS2 are 192.1.2.0-192.1.2.5, respectively. The IP addresses of the six network devices included in AS3 are 192.1.3.0-192.1.3.5, respectively. The IP addresses of the six network devices included in AS4 are 192.1.4.0-192.1.4.5, respectively. The device identifiers of the six network devices included in the AS5 are Network Elements (NEs) 1-NE6, respectively. The network topology of the first path includes network devices with an IP address of 192.1.1.0, network devices with an IP address of 192.1.1.5, NE1, NE3, network devices with an IP address of 192.1.3.3, and network devices with an IP address of 192.1.3.2, and tunnel or link structures between adjacent network devices in the six network devices.
The first path information includes BSID1, SID1, BSID2, SID2, and BSID3. Where BSID1 is the tunnel identification of the tunnel between the network device with IP address 192.1.1.0 and the network device with IP address 192.1.1.5. SID1 is the link identification of the cross-domain link EPE1 between the network device with IP address 192.1.1.5 and NE 1. BSID2 is the tunnel identity of the tunnel between NE1 and NE 3. SID2 is the link identification of the cross-domain link EPE2 between NE3 and IP address 192.1.3.3. BSID3 is the tunnel identification of the tunnel between the network device with IP address 192.1.3.3 and the network device 192.1.3.2. It should be noted that, compared with the transmission technologies used by different networks in the conventional technology, it is difficult to coordinate the allocation of different types of network resources when the dedicated service line is opened. The method for establishing the path can establish the first path based on the SRv6 network, and can realize uniform distribution of network resources. After the first control device obtains the first path information, the first path information is issued to the target source device. The target source device can forward the message based on the first path according to the first path information.
In one possible implementation, the first control device belongs to a first management domain. The first control device sends first path information to the target source device.
Specifically, the first control device may establish BGP SR Policy neighbors with the target source device. The BGP SR Policy neighbor is configured to send a path to a target source device by using a first control device, so that the target source device may forward data according to the path. BGP SR Policy neighbors may be BGP SRv6 Policy neighbors in particular.
Taking the above fig. 2 as an example, the first management domain may be the management domain a, and the first control device may be the control device 201, where the control device 201 belongs to the management domain a. After acquiring the first path information, the control device 201 may send the first path information to the target source device in the management domain a.
In another possible implementation, the first control device does not belong to the first management domain. The first control device transmits the first path information to the control device belonging to the first management domain, that is, the second control device. The second control device may acquire the first path information and issue the first path information to the target source device.
Taking the above fig. 2 as an example, the first management domain may be management domain a, and the second management domain may be management domain B. The second control device may be the control device 201 and the first control device may be the control device 202.
After acquiring the first path information, the control apparatus 202 transmits the first path information to the control apparatus 201. The control device 201, after receiving the first path information, transmits the first path information to the target source device.
Specifically, the second control device may establish BGP SR Policy neighbors with the target source device. The BGP SR Policy neighbor is configured to send a path to the target source device by using the second control device, so that the target source device may forward data according to the path. BGP SR Policy neighbors may be BGP SRv6 Policy neighbors in particular.
After the target source device obtains the first path information, the target source device can determine the first tunnel based on the first path information. And the target source equipment encapsulates the first path information in the message and forwards the encapsulated message through a first tunnel. The device that receives the message can determine the next hop for forwarding the message based on the first path information encapsulated in the message. Thus, the message transmission from the target source equipment to the target destination equipment can be realized through the message forwarding of the first path.
After the first path is determined, there may be a case where a part of paths in the first path cannot meet the service requirement of the user. Based on this, the first control device can adjust the partial path of the first path in the management domain to which the first control device belongs based on the service requirement of the user, for example, the second service requirement.
In one possible implementation manner, the first control device can periodically acquire the tunnel information and the link information, so as to update the tunnel information and the link information. Thus, the first control device can acquire the tunnel information and the link information with higher timeliness, and determine whether the second path meets the second service requirement.
The first path is a second path in part of the management domain to which the first control device belongs. Taking the first path in fig. 9 as an example, the second path is a path from the network device E to the network device H as an example.
In response to determining that the second path does not meet the transmission requirement indicated by the second traffic demand, the first control device obtains second path information.
The second service requirement may be obtained in advance by the first control device. The second traffic demand is used to indicate a transmission requirement of the second path. The second service requirement may be determined by the first control device based on the first service requirement, or may be provided by the user based on the first service requirement.
For example, the second traffic demand may be a path normal transmission. And when the second path is determined to be faulty and cannot be transmitted normally, the first control equipment acquires the second path information. For another example, the second traffic demand may be a maximum transmission delay value. And when the delay value of the second path is determined to be larger than the maximum transmission delay value, the first control equipment acquires the second path information. Also for example, the second traffic demand may be a maximum transmission bandwidth. And when the transmission bandwidth of the second path is determined to be larger than the maximum transmission bandwidth, the first control equipment acquires the second path information. The second path information is used for indicating the target source equipment to forward the message based on the third path. The third path is obtained by replacing the second path in the first path with the fourth path.
Specifically, the first control device can determine the fourth path based on the tunnel information of the tunnel of the belonging management domain. The fourth path is an alternate path to the second path. The source device of the fourth path is identical to the source device of the second path. The destination device of the fourth path is identical to the destination device of the second path. Taking the second path as the path from the network device E to the network device H as an example, the fourth path is a tunnel from the network device E other than the second path to the network device H. The fourth path may be, for example, one of a tunnel from network device E to network device F, a tunnel from network device F to network device H, and a tunnel from network device E to network device G, a tunnel from network device G to network device H.
In one possible implementation, the first control device can determine the fourth path based on tunnel information of a tunnel of the associated management domain, a source device of the second path, a destination device of the second path, and the second traffic demand.
The first control device may obtain the device identifier of the tunnel-in device, the device identifier of the tunnel-out device, and the information of the tunnel related to the service of the tunnel in the management domain. The first control device selects a tunnel meeting the second service requirement from tunnels in the affiliated management domain based on the source device of the second path, the destination device of the second path and the second service requirement.
As an example, the tunnel in the management domain to which the first control device belongs may be a tunnel obtained by splicing segmented tunnels. The first control device can determine a fourth path from the spliced and integrated end-to-end tunnel based on the source device of the second path, the destination device of the second path, and the second service requirement.
As another example, the tunnel within the administrative domain acquired by the first control device may also be a segmented tunnel. When the tunnel is a segmented tunnel, the first control device can splice a fourth path meeting the transmission requirement of the second service requirement based on the tunnel information, the source device of the second path, the destination device of the second path and the second service requirement.
Further, in one possible implementation, the first control device belongs to a first management domain. The first control device sends the second path information to the target source device so that the target source device sends the message based on the second path information. The second path information is used for indicating the target source equipment to forward the message based on the third path. The third path is obtained by replacing the second path in the first path with the fourth path. In another possible implementation, the first control device does not belong to the first management domain. The first control device transmits second path information to the control device belonging to the first management domain, i.e., the second control device. The second control device may acquire the second path information, and issue the second path information to the target source device, so as to update the path.
The foregoing describes a specific implementation manner of a possible path establishment method provided in the embodiments of the present application when the first management domain and the second management domain are adjacent management domains. A specific implementation of the method 220 of establishing a path is described below using the first management domain and the second management domain as non-adjacent management domains as an example. Specifically, the method also comprises two steps:
step one: the first control device acquires tunnel information and link information.
The first control device is a control device capable of determining a path from the target source device to the target destination device. The first control device has the capability to determine a path.
In the embodiment of the present application, the first control device may be one of a plurality of control devices at the same level. For example, in the scenario shown in fig. 2, the control device 201, the control device 202, and the control device 203 are control devices for controlling forwarding devices in the management domain to which they belong, and are capable of centrally managing, controlling, and analyzing network devices of the connected management domain. The control device 201, the control device 202, and the control device 203 are controllers belonging to the same level. The first control device may be any one of the control device 201, the control device 202, and the control device 203. The embodiment of the application is not limited to the determination manner of the first control device, for example, the first control device may be preconfigured, or may be selected and determined by the control devices at the same level.
The tunnel information acquired by the first control device is used for indicating the tunnel in the management domain. The contents included in the tunnel information are similar to those included in the tunnel information described in the above method 210, and will not be described again.
When the first management domain and the second management domain are non-adjacent management domains, the first path constructed by the first control device is related to the first management domain, the second management domain and the third management domain.
The third management domain is adjacent to the first management domain and the second management domain respectively. Taking fig. 2 as an example, the first management domain may be management domain a, the second management domain may be management domain C, and the third management domain may be management domain B. For convenience of description, the control device corresponding to the third management domain will be referred to as a fourth control device. The fourth control device is similar to the second control device described above, see above for a detailed description.
The tunnel information acquired by the first control device indicates the first tunnel, the third tunnel and the second tunnel.
The first control device can acquire tunnel information of a tunnel in the affiliated management domain, and acquire tunnel information of a tunnel in a non-affiliated management domain through other control devices.
As an example, taking fig. 2 as an example, the first control device is a control device 202, the second control device is a control device 201, and the third control device is a control device 203. The control device 202 acquires tunnel information of a tunnel in the management domain B, acquires tunnel information of a tunnel in the management domain a through the control device 201, and acquires tunnel information of a tunnel in the management domain C through the control device 203.
The manner in which the first control device obtains the tunnel information of the tunnel in the administrative domain to which the first control device belongs is similar to that in the above embodiment, and the manner in which the first control device obtains the tunnel information of the tunnel in the administrative domain to which the first control device does not belong through other control devices is also similar to that in the above embodiment, and detailed description is omitted here.
The link information acquired by the first control device indicates a first cross-domain link. The content included in the link information is similar to that included in the link information described in the above embodiment, and will not be described here.
Wherein the first cross-domain link comprises a second cross-domain link between the boundary device of the first management domain and the boundary device of the third management domain, and a third cross-domain link between the boundary device of the third management domain and the boundary device of the second management domain.
In some possible implementations, embodiments of the present application provide specific implementations in which three first control devices acquire link information of a second cross-domain link.
First kind: the first control device belongs to a first management domain. That is, the first control device and the second control device are the same control device.
As an example, the first control device can obtain link information of the second cross-domain link from a boundary device of the first management domain.
As another example, the first control device can establish a connection with a border device of the third management domain. The first control device can obtain link information of the second cross-domain link from the boundary device of the third management domain.
As yet another example, the first control device may also obtain link information of the second cross-domain link from a control device belonging to the third management domain. Wherein the control device belonging to the third management domain is a fourth control device. Specifically, the fourth control device may acquire link information of the second cross-domain link from the boundary device of the third management domain, and report the link information of the second cross-domain link to the first control device.
Second kind: the first control device belongs to a third management domain. That is, the first control device and the fourth control device are the same control device.
As an example, the first control device can obtain link information of the second cross-domain link from a boundary device of the third management domain.
As another example, the first control device can establish a connection with a boundary device of the first management domain. The first control device may also obtain link information of the second cross-domain link from a boundary device of the first management domain.
As yet another example, the first control device can obtain link information of the second cross-domain link from a control device belonging to the first management domain, i.e. the second control device.
Third kind: the first control device belongs to the second management domain. That is, the first control device and the third control device are the same control device.
The first control device is able to obtain link information of the second cross-domain link from a control device belonging to the third management domain, i.e. the fourth control device.
In other possible implementations, similarly, the embodiments of the present application provide three possible specific implementations in which the first control device obtains the link information of the third cross-domain link.
First kind: the first control device belongs to a first management domain. That is, the first control device and the second control device are the same control device
The first control device can obtain the link information of the third cross-domain link from the control device belonging to the third management domain, that is, the fourth control device.
Second kind: the first control device belongs to a third management domain. That is, the first control device and the fourth control device are the same control device.
As an example, the first control device can obtain link information of the third cross-domain link from a boundary device of the third management domain.
As another example, similarly, the first control device can establish a connection with a boundary device of the second management domain. The first control device can obtain link information of the third cross-domain link from the boundary device of the second management domain.
As yet another example, the first control device can obtain link information of the third cross-domain link from a control device belonging to the second management domain, i.e. the third control device.
Third kind: the first control device belongs to the second management domain, that is to say the first control device is the same control device as the third control device.
As an example, the first control device can obtain link information of the third cross-domain link from the boundary device of the second management domain.
As another example, the first control device may be capable of establishing a connection with a border device of the third management domain, and the first control device may also obtain link information of the third cross-domain link from the border device of the third management domain.
As yet another example, the first control device may also obtain link information of the second cross-domain link from a control device belonging to the third management domain, i.e. a fourth control device. The fourth control device may acquire link information of the third cross-domain link from the boundary device of the third management domain, and report the link information of the third cross-domain link to the first control device.
Step two: the first control device acquires first path information.
The specific implementation of the first control device determining the first path is similar to the specific description of the specific implementation of determining the first path in S602, see above.
An embodiment of the present application provides a schematic diagram of another network topology, please refer to fig. 11.
The management domain A comprises a network device A, a network device B, a network device C and a network device D. The network device a and the network device B are edge devices of the management domain a. Network device C and network device D are boundary devices of management domain a. The management domain B includes a network device E, a network device F, a network device G, and a network device H. Wherein, the network device E, the network device F, the network device G, and the network device H are boundary devices of the management domain B. The management domain C includes network device I, network device J, and network device K. Wherein, the network device J and the network device K are boundary devices of the management domain C. Network device I is an edge device of management domain 206.
Each two of the network devices a, B, C and D form a tunnel in the management domain a. The network device E, the network device F, the network device G, and the network device H form a tunnel within the management domain B between every two network devices. The network device I, the network device J and the network device K form a tunnel within the management domain C between each two network devices. A cross-domain link is formed between network device C and network device E, and between network device D and network device F. A cross-domain link is formed between the network device G and the network device J, and between the network device H and the network device K.
In the case where the first management domain and the second management domain are not adjacent to each other, the first path is configured of a first tunnel, a second cross-domain link, a third tunnel, a third cross-domain link, and a second tunnel.
Referring to fig. 12, a schematic diagram of yet another first path according to an embodiment of the present application is shown. The management domain A is a first management domain, and the network device A is a target source device. The control device 201 is a second control device. The control device 202 is a first control device. The management domain C is a second management domain, and the network device K is a target destination device. The control device 203 is a third control device.
The control device 202 acquires tunnel information indicating the first tunnel and link information indicating the second cross-domain link, which are transmitted by the control device 201. The control device 202 acquires tunnel information of the third tunnel, link information indicating the second cross-domain link, and link information indicating the third cross-domain link. The control device 202 acquires tunnel information indicating the second tunnel and link information indicating the third cross-domain link, which are transmitted by the control device 203.
The control device 202 determines the first path based on the tunnel information, the link information, the network device a, and the network device K. The first path is constituted by tunnels or links between network device a, network device C, network device E, network device G, network device I and network device K.
Wherein, the network device a to the network device C are the first tunnels included in the first path. Network device C through network device E are second cross-domain links comprised by the first path. Network device E through network device G are third tunnels comprised by the first path. Network device G through network device I are third cross-domain links included in the first path. Network device I through network device K are second tunnels comprised by the first path.
The first path information may include an identification indicating a tunnel and an identification indicating a cross-domain link.
In one possible implementation, the first path information may include a second tunnel identification and a link identification. The second tunnel identifier may be a BSID, and the link identifier may be a SID.
For example, the first path shown in fig. 12, the corresponding first path information includes the BSID of the first tunnel, the SID of the second cross-domain link, the BSID of the third tunnel, the SID of the third cross-domain link, and the BSID of the second tunnel.
After the first control device obtains the first path information, the first path information is issued to the target source device. The manner of issuing the first path information to the target source device is similar to the manner of issuing the first path information to the target source device provided in S602, specifically please refer to the above.
Similarly, the first control device may also adjust a portion of the path of the first path within the associated administrative domain. The specific implementation manner is similar to the implementation manner that the first control device provided in the foregoing embodiment can adjust, based on the second service requirement, a part of the path of the first path in the management domain to which the first control device belongs, and please refer to the foregoing.
In the system configuration shown in fig. 2, the first control device is selectively determined from among the control devices of the same level. In other possible implementations, the first control device may also be a control device for controlling other control devices.
The method 300 for establishing a path provided in the embodiment of the present application is described below with reference to the system structure of fig. 3.
In fig. 3, a control device 304 is connected to a control device 301, a control device 302, and a control device 303, respectively. The control device 304 may be a first control device for acquiring first path information.
The first control device may determine the target source device based on the first device information and the target destination device based on the second device information.
In one possible implementation, the first control device can obtain a request for a route establishment reported by the other control devices. The route request includes first device information and second device information.
Wherein the request for the establishment of a path may be sent by the second control device to the first control device. The second control device may be a control device belonging to the first management domain.
In connection with fig. 3, for example, the second control device may be the control device 301, and the first management domain may be the management domain a. The control device 301 is capable of analyzing the first device information and the second device information included in the path establishment request. If it is determined that the target destination device identified by the second device information does not belong to the management domain a, it is indicated that a link crossing the management domain needs to be established. The control device 301 reports a request for a path establishment to the control device 304.
In another possible implementation, the first control device is capable of being connected to a management system. The first control device is capable of acquiring first device information and second device information from the management system. The manner in which the first control device obtains the first device information and the second device information from the management system is similar to the method 200 described above, and will not be described in detail herein. The specific content included in the first device information and the second device information is also referred to above.
Similarly, the first management domain and the second management domain may also be adjacent management domains. For example, the first management domain is management domain a, and the second management domain is management domain B. The first management domain and the second management domain may also be non-adjacent management domains. For another example, the first management domain is management domain a, and the second management domain is management domain C.
For different relative positions of the first management domain and the second management domain, the tunnel indicated by the tunnel information acquired by the first control device and the first cross-domain link are different. The first path information determined by the first control device indicates a different composition of the first path.
Similar to the method 210 for establishing a path described above, please refer to above for the case where the first management domain is adjacent to the second management domain. For the case that the first management domain is not adjacent to the second management domain, similar to the method 220 for establishing a path described above, please refer to above.
It should be noted that, based on the system structure shown in fig. 3, the manner in which the first control device obtains the tunnel information is different from the manner in which the first control device obtains the tunnel information in the above-mentioned method 200 for establishing a path.
In the method 300 provided in the embodiment of the present application, the first control device obtains tunnel information through the control devices in each management domain. In connection with fig. 3 as an example, the control device 304 can acquire tunnel information from the control device 301, the control device 302, and the control device 303, respectively.
In the method 300 provided in the embodiment of the present application, the first control device obtains the link information through the control devices in each management domain. In connection with fig. 3 as an example, the control device 304 can acquire link information from the control device 301, the control device 302, and the control device 303, respectively. The first control device can also establish a connection with a boundary device within the administrative domain, and obtain link information from the boundary device within the administrative domain.
In the method 300 provided in the embodiment of the present application, a method for the first control device to obtain the first path information is similar to the method 200 described above, and please refer to the above.
In addition, in the method 300 provided in the embodiment of the present application, the first control device does not belong to any management domain. After the first control device acquires the first path information, the first control device sends the first path information to the second control device in the first management domain. And the second control equipment sends the first path information to the target source node after acquiring the first path information.
In further implementations, portions of the control device can correspond to multiple administrative domains. The control device may be a zone control device. The control device is capable of controlling network devices within a plurality of administrative domains.
As shown in fig. 4, the control device 401 corresponds to the management domain a and the management domain B. The control device 401 is used to manage network devices within the management domain a and the management domain B.
The following describes a method 400 for establishing a path according to an embodiment of the present application with reference to the system architecture of fig. 4.
In fig. 4, a control device 403 is connected to a control device 401 and a control device 402, respectively. The control device 403 may be a first control device for acquiring the first path information.
The first control device acquires the first device information and the second device information, and determines a target source device based on the first device information, and a target destination device based on the second device information. The method for determining the target source device and the target destination device by the first control device is similar to the method 300 described above, and specific reference is made to the above.
Similarly, the first management domain and the second management domain may also be adjacent management domains. For example, the first management domain is management domain a, and the second management domain is management domain B. The first management domain and the second management domain may also be non-adjacent management domains. For another example, the first management domain is management domain a, and the second management domain is management domain C.
For different relative positions of the first management domain and the second management domain, the tunnel indicated by the tunnel information acquired by the first control device and the first cross-domain link are different. The first path information determined by the first control device indicates a different composition of the first path.
Similar to the method 210 for establishing a path described above, please refer to above for the case where the first management domain is adjacent to the second management domain. For the case that the first management domain is not adjacent to the second management domain, similar to the method 220 for establishing a path described above, please refer to above.
It should be noted that, in the method 400 provided in the embodiment of the present application, the first control device may obtain the tunnel information through the control device corresponding to the management domain. The control device to which the management domain corresponds may be a zone control device, that is, a control device capable of managing a plurality of management domains.
In connection with fig. 4 as an example, the control device 401 can acquire tunnel information of a tunnel in the management domain a and tunnel information of a tunnel in the management domain B. The control device 401 is also able to acquire a cross-domain link between the border device of the management domain a and the border device of the management domain B, and a cross-domain link between the border device of the management domain B and the border device of the management domain C. The control device 401 can report the acquired tunnel information and link information to the control device 403.
In the method 400 provided in the embodiment of the present application, a method for the first control device to obtain the first path information is similar to the method 200 described above, and please refer to the above.
In the method 400 provided in the embodiment of the present application, the first control device is not a control device corresponding to the management domain. After the first control device acquires the first path information, the first control device sends the first path information to the second control device. And the second control equipment sends the acquired first path information to the target source equipment so as to realize the forwarding of the message based on the first path.
In further implementations, the first path information may be acquired by control devices corresponding to a plurality of management domains. The control devices corresponding to the plurality of management domains may be area control devices or unified control devices.
As shown in fig. 5, the control device 501 corresponds to a management domain a, a management domain B, and a management domain C. The control device 501 is used to manage the management domain a, the management domain B, and the network devices within the management domain C.
The method 500 for establishing a path provided in the embodiment of the present application is described below with reference to the system structure of fig. 5.
In fig. 5, the control device 501 may be a first control device for acquiring first path information.
The first control device obtains the first device information and the second device information, and determines the target source device based on the first device information, and the method of determining the target destination device based on the second device information is similar to the method 200 described above, and specific reference is made to the above.
Similarly, the first management domain and the second management domain may also be adjacent management domains. For example, the first management domain is management domain a, and the second management domain is management domain B. The first management domain and the second management domain may also be non-adjacent management domains. For another example, the first management domain is management domain a, and the second management domain is management domain C.
For different positions of the first management domain and the second management domain, the tunnel indicated by the tunnel information acquired by the first control device and the first cross-domain link are different. The first path information determined by the first control device indicates a different composition of the first path.
Similar to the method 210 for establishing a path described above, please refer to above for the case where the first management domain is adjacent to the second management domain. For the case that the first management domain is not adjacent to the second management domain, similar to the method 220 for establishing a path described above, please refer to above.
It should be noted that, based on the system structure shown in fig. 5, in the method 500, the first control device can directly acquire the tunnel information and the link information, and does not need to acquire the tunnel information and the link information through other control devices.
In the method 500 provided in the embodiment of the present application, a method for the first control device to obtain the first path information is similar to the method 200 described above, and please refer to the above.
The method for establishing the path is applied to the control equipment for acquiring the first path information. A method for establishing a path applied to a control device corresponding to a first management domain is described below.
The method for establishing the path provided by the embodiment of the application can be applied to a network comprising at least two management domains and is used for establishing the path crossing a plurality of management domains. Wherein the management domain may be divided according to a management range of the control device. One management domain can also be divided into a plurality of ases in an autonomous division manner, that is, one management domain may include a plurality of ases.
The network may include a first management domain and a second management domain. The first management domain is a management domain to which the target source device belongs. The second management domain is a management domain to which the target destination device belongs. The target source device is the source device that needs the path established. The target destination device is a destination device of a path that needs to be established. The path from the target source device to the target destination device needs to span the first management domain and the second management domain.
The method for establishing the path provided by the embodiment of the application can be applied to the second control equipment. The second control device may be a control device capable of managing the target source device. The second control device corresponds to the first management domain.
Wherein the second control device is a control device for managing network devices within the first management domain. The second control device may be an intra-domain control device belonging to the first management domain, an area control device that manages a plurality of management domains including the first management domain, or a unified control device that manages all the management domains. The second control device is different from the first control device, that is, the second control device is not a control device for acquiring the first path information.
Referring to fig. 13, a flowchart of another method for establishing a path according to an embodiment of the present application is shown. Referring to fig. 13, the method may include S1301-S1302.
S1301: the second control device acquires the first path information sent by the first control device.
The first control device is a control device that acquires first path information. The second control device acquires the first path information sent by the first control device.
In one possible implementation, the second control device is capable of acquiring the first path information through an interface connected to the first control device.
The first path information may be generated by the first control device based on the method for establishing a path.
S1302: the second control device sends the first path information to the target source device.
The second control device is used for managing the target source device.
As an example, the second control device may be an intra-domain control device belonging to the first management domain. As shown in connection with fig. 2, the first management domain is management domain a. The second control device is the control device 201.
As another example, the second control device may be an area control device that manages a plurality of management domains including the first management domain. As shown in connection with fig. 4, the first management domain may be management domain a and the second control device may be control device 401.
As yet another example, the second control device may be a unified control device for managing all management domains. As shown in connection with fig. 5, the first management domain may be management domain a and the second control device may be control device 501.
The second control device sends the first path information to the target source device. The target source device can package a message including the first path information based on the first path information. The target source device is capable of forwarding the message based on the first path.
The message encapsulated by the target source device may be a SRv message. The first path information may be carried in a segment routing header (segment routing header, SRH) of the SRv message.
In one possible implementation, the second control device is capable of acquiring tunnel information of the first tunnel within the first management domain. And transmitting tunnel information of the first tunnel to the first control device.
The contents of the tunnel information may be referred to in the description of the tunnel information in the above method 200.
As an example, the second control device establishes a BGP-LS protocol connection with the RR in the first administrative domain. The second control device obtains tunnel information of the first tunnel through the RR in the first management domain.
The first tunnel may be a segmented tunnel in the first management domain, or may be a tunnel obtained by splicing segmented tunnels. The embodiment of the application does not limit the mode of splicing the first tunnel by the second control device. As an example, the second control device can splice the end-to-end tunnel based on the acquired tunnel information of the segmented tunnel and the path calculation algorithm.
In another possible implementation manner, the second control device further corresponds to the second management domain, that is, the second control device may be an area control device that manages a plurality of management domains including the first management domain and the second management domain, or a unified control device.
The second control device can also acquire the tunnel information of the second tunnel in the second management domain and send the tunnel information of the second tunnel to the first control device.
In a further possible implementation, the second control device further corresponds to a third management domain. That is, the second control device may be an area control device that manages a plurality of management domains including the first management domain and the third management domain, or a unified control device. The second control device may also be a zone control device that manages a plurality of management domains including the first management domain, the second management domain, and the third management domain, or a unified control device.
The second control device can also acquire the tunnel information of the third tunnel in the third management domain and send the tunnel information of the third tunnel to the first control device.
In one possible implementation, the second control device is also capable of acquiring link information. The link information which can be acquired by the second control device is different based on the second control device of different types.
In some possible implementations, embodiments of the present application provide three possible specific implementations in which the second control device obtains the link information.
First kind: the second control device is a control device belonging to the first management domain.
As an example, the first management domain is adjacent to the second management domain. The link information acquired by the second control is used for indicating a cross-domain link between the boundary device of the first management domain and the boundary device of the second management domain.
As another example, the first management domain is adjacent to the third management domain. The link information acquired by the second control is used for indicating a cross-domain link between the boundary device of the first management domain and the boundary device of the third management domain.
Second kind: the second control device is a control device corresponding to the first management domain. The second control device also corresponds to one or more of the second management domain and the third management domain.
As one example, the second control device corresponds to a first management domain and a second management domain.
The link information acquired by the second control can be used to indicate a cross-domain link between the edge device of the first management domain and the edge device of the second management domain.
As another example, the second control device corresponds to the first management domain and the third management domain. The third management domain is adjacent to the first management domain and the second management domain, respectively.
The link information acquired by the second control can be used to indicate a cross-domain link between the boundary device of the first management domain and the boundary device of the third management domain.
The link information acquired by the second control can also be used to indicate a cross-domain link between the edge device of the third management domain and the edge device of the second management domain.
As yet another example, the second control device corresponds to a first management domain, a third management domain, and a second management domain. The third management domain is adjacent to the first management domain and the second management domain, respectively.
The link information acquired by the second control can be used to indicate a cross-domain link between the boundary device of the first management domain and the boundary device of the third management domain.
The link information acquired by the second control can also be used to indicate a cross-domain link between the edge device of the third management domain and the edge device of the second management domain.
In one possible implementation, the second control device is further capable of acquiring the first device information and the second device information. The second control device can send a first request including the first device information and the second device information to the first control device. The first request is the set-up request in the methods 200-500 described above. The first control device is capable of determining a target source device and a target destination device, respectively, based on the acquired first device information and second device information.
The first device information and the second device information can be generated based on user triggers. The generation manner and the specific content of the first device information and the second device information are referred to above for description of the first device information and the second device information, which are not described herein.
In addition to the above functions, the second control device can also have the capability to monitor a partial path of the first path within the management domain to which the second control device corresponds. The second control device can monitor the tunnel in the corresponding management domain and the running condition of the cross-domain links between the corresponding management domains, so as to realize the segment management of the first path.
The second control device is capable of monitoring the operation of the fifth path. The fifth path is a path of the first path in a management domain corresponding to the second control device.
When the second control device belongs to the first management domain, the fifth path is a first tunnel in the first path, that is, a tunnel in the first management domain included in the first path.
In the case that the second control device corresponds to the plurality of management domains, the fifth path includes tunnels in the plurality of management domains corresponding to the second control device and cross-domain links between the plurality of management domains corresponding to the second control device.
For example, the second control device corresponds to the first management domain and the third management domain, and the fifth path is a path of the first path within the first management domain, within the third management domain, and between the first management domain and the third management domain. The fifth path includes the first tunnel, the second cross-domain link, and the third tunnel in the first path. Wherein the first tunnel in the first path is a tunnel within a first administrative domain that the first path includes. The third tunnel in the first path is a tunnel within a third administrative domain that the first path includes. The second cross-domain link included in the first path is a cross-domain link from the boundary device of the first management domain to the boundary device of the third management domain included in the first path.
In one possible implementation, the second control device may send the second request to the first control device when the second control device determines that the fifth path fails.
Wherein, the failure of the fifth path may mean that the device included in the fifth path is not reachable. Specifically, it may be that the devices included in the fifth path fail, or that links between the devices included in the fifth path fail.
The second request is for instructing the first control device to re-determine the path from the target source device to the target destination device.
In one possible implementation manner, when the second control device determines that the fifth path fails, the second control device updates tunnel operation information corresponding to the fifth path, and sends a first message to the first control device, where the first message is used to report the tunnel operation information to the first control device. In one possible implementation manner, the second control device may periodically report the tunnel operation information, and synchronize the tunnel operation information maintained by the second control device to the first control device.
In another possible implementation, the second control device further obtains a third service requirement. The third traffic requirement is used to indicate a transmission requirement of the fifth path, such as a maximum transmission bandwidth, a maximum transmission delay, and a traffic attribute of the fifth path. The third service requirement may be obtained by the second control device from the first control device, or may be generated by the second control device based on a requirement of the user.
When the second control device determines that the fifth path does not meet the transmission requirement indicated by the third service requirement, the second control device sends a second request to the first control device.
The second control device can also have the capability to calculate the path. The second control device can recalculate the path when it is determined that the fifth path satisfies the first preset condition. The second control device recalculates the fifth path, so that hierarchical management can be realized, and the calculation pressure of the first control device can be shared.
The first preset condition may include one or more of failure of the fifth path and failure of the fifth path to meet the transmission requirement indicated by the third service requirement.
And the second control equipment sends third path information to the target source equipment after determining that the fifth path meets the first preset condition.
The second control device can determine an alternate path of the fifth path, that is, the sixth path, based on the tunnel information in the corresponding management domain, or the tunnel information and the link information in the corresponding management domain. The source device of the sixth path is the same as the source device of the fifth path. The destination device of the sixth path is the same as the destination device of the fifth path. The second control device can replace the fifth path in the first path with the sixth path, resulting in a seventh path from the target source device to the target destination device. The second control device generates third path information indicating the seventh path and transmits the third path information to the target source device. After the target source device obtains the third path information, the target source device can package the message including the third path information and forward the message based on the seventh path.
In one possible implementation, there may be a case where the second control device fails to calculate the alternate path of the fifth path. The second control device cannot achieve convergence of the path from the source device of the fifth path to the destination device of the fifth path in the corresponding management domain. In this case, the second control device can send a second request to the first control device requesting the first control device to recalculate the path of the target source device to the target destination device.
In one possible implementation, the second control device is capable of generating a network topology of the first path based on the acquired first path information. The second control device can display the network topology of the first path and/or the first path information on an operation and maintenance interface of the first control device, so that the user can conveniently view the network topology and/or the first path information. The second control device displays the network topology of the first path and/or the first path information in a similar manner to the first control device displays the network topology of the first path and/or the first path information described above, and specific reference is made to the foregoing.
Fig. 14 shows a schematic diagram of one possible configuration of the control device involved in the above embodiment, and the device 1400 may implement the functions of the first control device in the embodiments of the methods 200, 300, 400 and 500.
Referring to fig. 14, the apparatus 1400 includes: an acquisition unit 1401, and a processing unit 1402. These units may perform the corresponding functions of the first control device in the method example described above. An acquisition unit 1401 for supporting the apparatus 1400 to execute S601 in fig. 6; a processing unit 1402 for supporting the device 1400 to execute S602 in fig. 6; and/or other processes performed by the first control device in the techniques described herein. For example, an acquisition unit 1401 for performing various acquisition operations performed by the first control device in the above-described method embodiment; a processing unit 1402, configured to execute operations of various processes of the first control device in the foregoing method embodiment. For example, the obtaining unit 1401 is configured to obtain tunnel information and link information, where the tunnel information is used to indicate a first tunnel, the first tunnel belongs to the first management domain, and the link information is used to indicate a first cross-domain link from a border device of the first management domain to a border device of the second management domain. A processing unit 1402, configured to obtain first path information, where the first path information is used to instruct the target source device to forward a packet based on a first path, where the first path is a path from the target source device to the target destination device, and the first path is determined based on the target source device, the target destination device, the tunnel information, and the link information. Please refer to the method embodiments corresponding to any one of the methods 200-500.
Fig. 15 shows a schematic diagram of a possible configuration of the control device according to the above embodiment, and the device 1500 may implement the functions of the second control device in the embodiments corresponding to the methods 200, 300, 400, 500 and fig. 13.
Referring to fig. 15, the apparatus 1500 includes: an acquisition unit 1501 and a transmission unit 1502. These units may perform the corresponding functions of the second control device in the method example described above. An acquisition unit 1501 for supporting the apparatus 1500 to execute S1301 in fig. 13; a transmission unit 1502 for supporting the apparatus 1500 to execute S1302 in fig. 13; and/or other processes performed by the second control device in the techniques described herein. For example, an acquisition unit 1501 for executing various acquisition operations performed by the second control apparatus in the above-described method embodiment; and a sending unit 1502, configured to perform various sending operations of the second control device in the foregoing method embodiment. For example, an obtaining unit 1501 is configured to obtain first path information sent by a first control device, where the first path information is used to indicate a first path, and the first path is a path from the target source device to the target destination device, and the second control device corresponds to the first management domain; the sending unit 1502 is configured to send the first path information to the target source device, where the first path information is used to instruct the target source device to forward a packet based on the first path. For specific execution, please refer to the method embodiment corresponding to any one of the methods 200-500 or the detailed description of the corresponding steps in the embodiment shown in fig. 13, and the detailed description is omitted herein.
It should be noted that, in the embodiment of the present application, the division of the units is schematic, which is merely a logic function division, and other division manners may be implemented in actual practice. Each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. For example, in the above embodiment, the acquisition unit and the processing unit may be the same unit or different units. The integrated units may be implemented in hardware or in software functional units.
Based on the method for establishing a path provided in the embodiment of the present application, the embodiment of the present application further provides a network system 1600. Referring to fig. 16, a schematic structural diagram of a network system according to an embodiment of the present application is shown. The network system 1600 includes a first control device 1601 and a second control device 1602. The first control device 1601 may be a method embodiment corresponding to the method 200-500, or a first control device in the embodiment shown in fig. 6. The second control device 1602 may be the second control device in the embodiment shown in fig. 13.
Specifically, the first control device 1601 is configured to obtain tunnel information and link information, obtain first path information, and send the first path information to the second control device 1602, where the tunnel information is used to indicate a first tunnel, the first tunnel belongs to the first management domain, the link information is used to indicate a first cross-domain link from a border device of the first management domain to a border device of the second management domain, the first path information is used to indicate the target source device to forward a message based on a first path, and the first path is a path from the target source device to the target destination device, and is determined based on the target source device, the target destination device, the tunnel information, and the link information.
The second control device 1602 is configured to obtain first path information sent by the first control device, send the first path information to the target source device, where the first path information is used to indicate a first path, the first path is a path from the target source device to the target destination device, the second control device corresponds to the first management domain, and the first path information is used to indicate the target source device to forward a message based on the first path.
For specific execution, please refer to the method embodiments corresponding to the method 200-500 and the detailed descriptions of the corresponding steps in the embodiments shown in fig. 6 and fig. 13, which are not repeated here.
Fig. 17 is a schematic structural diagram of an apparatus according to an embodiment of the present application. The control apparatus 1400 in fig. 14 and the control apparatus 1500 in fig. 15 can be implemented by the apparatus shown in fig. 17. The device may include one or more processors 1701, a communication bus 1702, memory 1703, and one or more communication interfaces 1704.
The processor 1701 may be a general purpose central processing unit (central processing unit, CPU), network processor (network processor, NP), microprocessor, or may be one or more integrated circuits for implementing aspects of the present application, such as an application-specific integrated circuit (ASIC), programmable logic device (programmable logic device, PLD), or a combination thereof. The PLD may be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), general-purpose array logic (generic array logic, GAL), or any combination thereof.
Communication bus 1702 is used to transfer information between the above-described components. Communication bus 1702 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The memory 1703 may be, but is not limited to, a read-only memory (ROM), a random-access memory (random access memory, RAM), an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), an optical disk (including a compact disk (compact disc read-only memory, CD-ROM), a compact disk, a laser disk, a digital versatile disk, a blu-ray disk, etc.), a magnetic disk storage medium, or other magnetic storage device, or any other medium capable of carrying or storing desired program code in the form of instructions or data structures and capable of being accessed by a computer. The memory 1703 may be self-contained and coupled to the processor 1701 via the communications bus 1702. The memory 1703 may also be integrated with the processor 1701.
The communication interface 1704 uses any transceiver or like device for communicating with other devices or communication networks. The communication interface 1704 includes a wired communication interface and may also include a wireless communication interface. The wired communication interface may be, for example, an ethernet interface. The ethernet interface may be an optical interface, an electrical interface, or a combination thereof. The wireless communication interface may be a wireless local area network (wireless local area networks, WLAN) interface, a cellular network communication interface, a combination thereof, or the like.
In some embodiments, the device may include multiple processors, such as processor 1701 and processor 1705 shown in fig. 17. Each of these processors may be a single-core processor or a multi-core processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
In a particular implementation, the devices may also include, as one embodiment, an output device 1706 and an input device 1707. The output device 1706 communicates with the processor 1701 and can display information in a variety of ways. For example, the output device 1706 may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a Cathode Ray Tube (CRT) display device, or a projector (projector), or the like. The input device 1707 is in communication with the processor 1701 and may receive input from a user in a variety of ways. For example, the input device 1707 may be a mouse, keyboard, touch screen device, or sensing device, among others.
In some embodiments, the memory 1703 is used to store program code 1708 for executing aspects of the present application, and the processor 1701 may execute the program code 1708 stored in the memory 1703. The program code may include one or more software modules, and the apparatus may implement the method of establishing a path described above by the processor 1701 and the program code 1708 in the memory 1703.
The embodiment of the application also provides a chip system, which comprises: and a processor coupled to the memory, the memory for storing a program or instructions that, when executed by the processor, cause the system-on-a-chip to implement the method of the first control device in the embodiment shown in fig. 6 or the second control device in the embodiment shown in fig. 13.
Alternatively, the processor in the system-on-chip may be one or more. The processor may be implemented in hardware or in software. When implemented in hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented in software, the processor may be a general purpose processor, implemented by reading software code stored in a memory.
Alternatively, the memory in the system-on-chip may be one or more. The memory may be integral with the processor or separate from the processor, and is not limited in this application. For example, the memory may be a non-transitory processor, such as a ROM, which may be integrated on the same chip as the processor, or may be separately provided on different chips, and the type of memory and the manner of providing the memory and the processor are not specifically limited in this application.
The system-on-chip may be, for example, an FPGA, an ASIC, a system-on-chip (SoC), a CPU, an NP, a digital signal processing circuit (digital signal processor, DSP), a microcontroller (micro controller unit, MCU), a programmable controller (programmable logic device, PLD) or other integrated chips.
The terms first, second, third, fourth and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural. "A and/or B" is considered herein to include A alone, B alone, and A+B.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, and the division of the units, for example, is merely a logic module division, and there may be additional divisions when actually implemented, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be acquired according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each module unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units described above may be implemented either in hardware or in software module units.
The integrated units, if implemented in the form of software module units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the present invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above embodiments are further described in detail for the purpose, technical solution and advantageous effects of the present invention, and it should be understood that the above description is only an embodiment of the present invention.
The above embodiments are merely for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (39)

1. A method of establishing a path, the method being applied to a network comprising a first management domain and a second management domain, the first management domain comprising a target source device and the second management domain comprising a target destination device, the method comprising:
the first control device obtains tunnel information and link information, wherein the tunnel information is used for indicating a first tunnel, the first tunnel belongs to the first management domain, and the link information is used for indicating a first cross-domain link from boundary equipment of the first management domain to boundary equipment of the second management domain;
the first control device obtains first path information, wherein the first path information is used for indicating the target source device to forward a message based on a first path, the first path is a path from the target source device to the target destination device, and the first path is determined based on the target source device, the target destination device, the tunnel information and the link information.
2. The method according to claim 1, wherein the method further comprises:
the first control device sends the first path information to a second control device, which corresponds to the first management domain.
3. The method of claim 2, wherein the second control device belongs to the first management domain.
4. A method according to claim 2 or 3, characterized in that the tunnel information of the first tunnel is obtained by the first control device from the second control device.
5. The method of claim 1, wherein the first control device corresponds to the first administrative domain, the method further comprising:
the first control device sends the first path information to the target source device.
6. The method of claim 5, wherein the tunnel information for the first tunnel is generated by the first control device.
7. The method of claim 1, wherein the tunnel information is further used to indicate a second tunnel, the second tunnel belonging to the second administrative domain.
8. The method according to any of claims 1-7, wherein the link information is obtained by the first control device from a border device of the first management domain and/or from a border device of the second management domain.
9. The method according to any of claims 1-7, wherein the link information is obtained by the first control device from a control device corresponding to the first management domain and/or from a control device corresponding to the second management domain.
10. The method of claim 1, wherein the network further comprises a third management domain, the third management domain being adjacent to the first management domain and the second management domain, respectively, the tunnel information further being used to indicate a third tunnel, the third tunnel belonging to the third management domain, the first cross-domain link comprising a second cross-domain link between a boundary device of the first management domain and a boundary device of the third management domain, and a third cross-domain link between a boundary device of the third management domain and a boundary device of the second management domain.
11. The method of any of claims 1-10, wherein the first tunnel is spliced from one or more segmented tunnels in the first administrative domain or the first tunnel is a segmented tunnel in the first administrative domain.
12. The method according to any of claims 1-11, wherein the target source device is determined by the first control device based on first device information, the target destination device is determined by the first control device based on second device information, the first device information is used to identify the target source device, and the second device information is used to identify the target destination device.
13. The method of claim 12, wherein the first device information and the second device information are obtained by the first control device according to a path establishment request sent by the second control device to the first control device.
14. The method according to any one of claims 1-13, wherein the first control device obtaining first path information includes:
the first control device determines the first path based on the target source device, the target destination device, the tunnel information, and the link information;
and acquiring the first path information based on the first path.
15. The method of claim 14, wherein the first control device determining the first path based on the target source device, the target destination device, the tunnel information, and the link information comprises:
the first control equipment constructs a network topology based on the tunnel information and the link information, wherein the network topology is composed of a tunnel indicated by the tunnel information and a cross-domain link indicated by the link information;
The first control device determines the first path based on the target source device, the target destination device, and the network topology.
16. The method according to any one of claims 1-13, wherein the first control device obtaining first path information includes:
the first control device determines the first path based on the first service requirement, the target source device, the target destination device, the tunnel information and the link information, wherein the first service requirement is used for indicating the transmission requirement of the first path;
and acquiring the first path information based on the first path.
17. The method of claim 16, wherein the first control device determining the first path based on the first traffic demand, the target source device, the target destination device, the tunnel information, and the link information comprises:
the first control equipment constructs a network topology based on the tunnel information and the link information, wherein the network topology is composed of a tunnel indicated by the tunnel information and a cross-domain link indicated by the link information;
the first control device determines the first path based on one or more of the tunnel information and the link information, the first traffic demand, the target source device, the target destination device, and the network topology.
18. The method of claim 16, wherein the tunnel information further comprises a first tunnel identification, the first tunnel identification being used to identify a traffic attribute of a tunnel indicated by the tunnel information;
the first control device determining the first path based on one or more of the tunnel information and the link information, the first traffic demand, the target source device, the target destination device, and the network topology, comprising:
the first control device determines the first path using a path computation algorithm based on the first tunnel identification, the first traffic demand, the target source device, the target destination device, and the network topology.
19. The method of claim 18, wherein the first tunnel identifier is a color identifier.
20. The method of claim 16, wherein the tunnel information further comprises tunnel operation information for indicating an operation state of a tunnel indicated by the tunnel information, and wherein the link information further comprises link operation information for indicating an operation state of a cross-domain link indicated by the link information;
The first control device determining the first path based on one or more of the tunnel information and the link information, the first traffic demand, the target source device, the target destination device, and the network topology, comprising:
the first control device determines the first path using a path computation algorithm based on one or more of the tunnel operation information and the link operation information, the first traffic demand, the target source device, the target destination device, and the network topology.
21. The method according to any one of claims 1-20, further comprising:
the first control device obtains a second service requirement, wherein the second service requirement is used for indicating a transmission requirement of a second path, and the second path is a path of the first path in a management domain corresponding to the first control device;
in response to determining that the second path does not meet the transmission requirement indicated by the second service requirement, the first control device acquires second path information, where the second path information is used to instruct the target source device to forward a message based on a third path, where the third path is obtained by replacing the second path in the first path with a fourth path, a source device of the fourth path is the same as a source device of the second path, and a destination device of the fourth path is the same as a destination device of the second path.
22. The method of any of claims 1-21, wherein the tunnel information comprises a second tunnel identification, the second tunnel identification being used to identify a tunnel indicated by the tunnel information, the link information comprising a link identification, the link identification being used to identify a cross-domain link indicated by the link information.
23. The method of claim 22, wherein the first path information comprises the second tunnel identification and the link identification.
24. The method of claim 23, wherein the second tunnel identity is a binding segment identity BSID.
25. The method of claim 24, wherein the link identification is a segment identification SID.
26. The method according to any one of claims 1-25, further comprising:
the first control device displays one or more of the first path information and a network topology of the first path.
27. A method of establishing a path, the method being applied to a network comprising a first management domain and a second management domain, the first management domain comprising a target source device and the second management domain comprising a target destination device, the method comprising:
The second control device obtains first path information sent by a first control device, wherein the first path information is used for indicating a first path, the first path is a path from the target source device to the target destination device, and the second control device corresponds to the first management domain;
the second control device sends first path information to the target source device, wherein the first path information is used for indicating the target source device to forward a message based on the first path.
28. The method of claim 27, wherein the method further comprises:
the second control device obtains tunnel information, wherein the tunnel information is used for indicating a first tunnel, and the first tunnel belongs to the first management domain;
the second control device sends the tunnel information to the first control device.
29. The method of claim 27, wherein the first tunnel is spliced from one or more segmented tunnels in the first administrative domain or the first tunnel is a segmented tunnel in the first administrative domain.
30. The method according to claim 28 or 29, wherein the second control device further corresponds to the second management domain, and the tunnel information is further used to indicate a second tunnel, the second tunnel belonging to the second management domain.
31. The method according to any of claims 28-30, wherein the second control device further corresponds to a third management domain, the tunnel information further being used to indicate a third tunnel, the third tunnel belonging to the third management domain, the third management domain being adjacent to the first management domain and the second management domain, respectively.
32. The method according to any one of claims 27-31, further comprising:
in response to determining that a fifth path meets a first preset condition, the second control device sends third path information to the target source device, wherein the third path information is used for indicating the target source device to forward a message based on a seventh path, the seventh path is obtained by replacing the fifth path in the first path with the sixth path, the fifth path is a path of the first path in a management domain corresponding to the second control device, source devices of the sixth path are identical to source devices of the fifth path, and destination devices of the sixth path are identical to destination devices of the fifth path.
33. The method of claim 32, wherein the first preset condition includes one or more of failure of the fifth path and failure of the fifth path to meet a transmission requirement indicated by a third traffic demand, the third traffic demand being indicative of the transmission requirement of the fifth path.
34. The method according to any one of claims 27-33, further comprising:
the second control device displays one or more of the first path information and a network topology of the first path.
35. An apparatus, characterized in that the apparatus is applied to a first control apparatus, the apparatus comprising:
a memory comprising instructions;
a processor, which when executing the instructions, causes the apparatus to carry out the method of establishing a path according to any one of claims 1-26.
36. An apparatus, characterized in that the apparatus is applied to a second control apparatus, the apparatus comprising:
a memory comprising instructions;
a processor, which when executing the instructions causes the apparatus to carry out the method of establishing a path as claimed in any one of claims 27 to 34.
37. A network system comprising a first control device implementing a method of establishing a path as claimed in any one of claims 1 to 26.
38. A network system comprising a first control device implementing the method of establishing a path according to any one of claims 1-26 and a second control device implementing the method of establishing a path according to any one of claims 27-34.
39. A computer readable storage medium comprising instructions, a program or code which, when executed on a processor, implements the method of establishing a path of any of claims 1-26 or implements the method of establishing a path of any of claims 27-34.
CN202111679355.4A 2021-12-31 2021-12-31 Method, equipment and system for establishing path Pending CN116418727A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111679355.4A CN116418727A (en) 2021-12-31 2021-12-31 Method, equipment and system for establishing path

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111679355.4A CN116418727A (en) 2021-12-31 2021-12-31 Method, equipment and system for establishing path

Publications (1)

Publication Number Publication Date
CN116418727A true CN116418727A (en) 2023-07-11

Family

ID=87048483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111679355.4A Pending CN116418727A (en) 2021-12-31 2021-12-31 Method, equipment and system for establishing path

Country Status (1)

Country Link
CN (1) CN116418727A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117499296A (en) * 2023-11-01 2024-02-02 南凌科技股份有限公司 Route optimization method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117499296A (en) * 2023-11-01 2024-02-02 南凌科技股份有限公司 Route optimization method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109257278B (en) Segmented routing label switched path method for non-segmented routing enabled routers
CN111865796B (en) Path Computation Element Central Controller (PCECC) for network traffic
EP4102785A1 (en) Message processing method and apparatus, and network device and storage medium
CN110445649B (en) Method and apparatus for implementing connections between edge devices via a switching fabric
US8942256B1 (en) Advertising with a layer three routing protocol constituent link attributes of a layer two bundle
CN111385207B (en) Service data forwarding method, network device and network system
US7889675B2 (en) Method and system for multi-layer network routing
EP2685685B1 (en) Method and related apparatus for establishing link-diverse traffic paths in a telecommunications network
US20230300070A1 (en) Packet Sending Method, Device, and System
US9246838B1 (en) Label switched path setup using fast reroute bypass tunnel
US11743204B2 (en) Tunnel establishment method, apparatus, and system
CN103477612A (en) Cloud service control and management architecture expanded to interface the network stratum
JP2010520663A (en) Software control plane for switches and routers
CN113452610B (en) Seamless end-to-end segmented routing method across metropolitan area network and area border router
WO2020186803A1 (en) Fault protection method, node, and storage medium
EP4398520A1 (en) Packet processing method, network device and system
CN109788018B (en) Cross-domain service intercommunication method, network equipment and storage medium
US11425056B1 (en) Dynamic computation of SR-TE policy for SR-enabled devices connected over non-SR-enabled devices
CN116418727A (en) Method, equipment and system for establishing path
CN115550252A (en) Method, device, equipment and storage medium for routing publishing and forwarding message
CN114531360A (en) Semantic name acquisition method, device, equipment and storage medium
US20240235994A1 (en) Packet processing method, network device, and network system
US20230336458A1 (en) Route Transmission Method and Apparatus
US20210234796A1 (en) Link resource transmission method and apparatus
Taniguchi Dynamic network service control and management techniques across multi-provider networks.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination