CN1905516A - Method of allocating bidirection forwarding detecting conversational authentication code - Google Patents

Method of allocating bidirection forwarding detecting conversational authentication code Download PDF

Info

Publication number
CN1905516A
CN1905516A CNA2005100873511A CN200510087351A CN1905516A CN 1905516 A CN1905516 A CN 1905516A CN A2005100873511 A CNA2005100873511 A CN A2005100873511A CN 200510087351 A CN200510087351 A CN 200510087351A CN 1905516 A CN1905516 A CN 1905516A
Authority
CN
China
Prior art keywords
bfd
blade
index
target
authenticator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2005100873511A
Other languages
Chinese (zh)
Other versions
CN1905516B (en
Inventor
谭学飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN200510087351A priority Critical patent/CN1905516B/en
Publication of CN1905516A publication Critical patent/CN1905516A/en
Application granted granted Critical
Publication of CN1905516B publication Critical patent/CN1905516B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for allocating BFD session identifier, at least comprising the steps of: A. determining Target_Blade and BFD_Index of BFD session; B. constructing an identifier containing Target_Blade and BFD_Index and allocating the constructed identifier to BFD session. Because the identifier directly reflects Target_Blade and BFD_Index, a router need not find and obtain Target_Blade and BFD_Index through any mapping relation, largely raising the BFD message receiving and processing efficiency of the router. And the identifier need not establish any mapping relation with Target_Blade and BFD_Index, saving memory resources of the router and largely reducing system loss of the router.

Description

A kind of method of distributing bidirection forwarding detecting conversational authentication code
Technical field
The two-way forwarding that the present invention relates in the data communication field detects (BFD, Bidirectional ForwardingDetection) technology, particularly a kind of method of distributing the BFD conversational authentication code.
Background technology
The BFD technology is a kind of Fast Detection Technique, can position fault fast when transfer of data goes wrong, and finds out the communication link that breaks down.
The realization principle of BFD technology is as follows: two routers periodically send the BFD message to the other side after setting up the BFD session, and periodically detect the arrival situation of the other side BFD message in the BFD message that receives the other side's transmission.If do not receive the BFD message that the other side sends in detecting at certain time intervals, just can assert that fault has taken place the communication link with the other side, thereby realize fast detecting communication link.
When the arrival situation of router detection the other side BFD message, because a router may be set up the BFD session with a plurality of routers simultaneously, also may set up a plurality of BFD sessions between two routers, so after router receives the BFD message, the BFD message that needs the right area branch to receive belongs to which the BFD session which router sends over, and promptly needs to discern the BFD session of the BFD message ownership that receives.
The BFD session of the BFD message ownership that router identification receives is to carry out according to the entrained authenticator of BFD message.Authenticator is that router is that each BFD session relevant with self freely distributes, and has certain mapping relations between the positional information of authenticator and BFD message ownership BFD session, and these mapping relations are stored in the memory cell of router.The positional information of BFD message ownership BFD session comprises disposable plates number (Target-Blade) and BFD index (BFD-Index).
Router all is different for the authenticator that each BFD session distributes, and for same router, it all is unique for the authenticator that each BFD session distributes, and each BFD session also all has a unique authenticator corresponding with it.
As shown in Figure 1, Fig. 1 is a BFD technology applied environment schematic diagram.Have two BFD sessions on the link AC between router-A and the router C simultaneously, when setting up these two BFD sessions, router C need distribute an authenticator respectively for these two BFD sessions.If router C is 1 for the authenticator that one of them BFD session distributes, the authenticator that distributes for another BFD session is 2.If also need to set up a BFD session on the link BC between router B and the router C at this moment, so when setting up this BFD session, router C is that the authenticator that this BFD session distributes can not be 1 or 2, but can be other any numerical value except that 1 and 2.
After router distributed authenticator for the BFD session, router can be informed the other side with the authenticator of distribution by variety of way, modes such as for example manual appointment, negotiation in addition, the interior negotiation of automated bag.The other side must be with this authenticator in the BFD message that sends after knowing this authenticator.Router is after receiving the BFD message, just can be according to the mapping relations between the entrained authenticator of BFD message and authenticator and the BFD message ownership BFD session location information, determine the positional information of this BFD message ownership BFD session, and then discern the BFD session of this BFD message ownership.
Because the mapping relations between authenticator and the BFD message ownership BFD session location information can have the multiple form of expression, so router determines that according to authenticator and this mapping relations the positional information of BFD message ownership BFD session can realize in several ways.Chang Yong implementation mainly contains following three kinds in the prior art:
1, setting up one is the search tree of KEY with the authenticator, searches for this search tree by authenticator at every turn, obtains leaf node, finds corresponding BFD session location information, the i.e. Target_Blade of this BFD session and BFD_Index according to the leaf node content.
2, utilize three-state content addressing memory (TCAM) mode to search, find corresponding BFD session location information, i.e. the Target_Blade of this BFD session and BFD_Index.
3, set up the static table of a 4G, each list item is deposited the BFD session attribute, utilizes this static table of authenticator static index then, finds corresponding BFD session location information, i.e. the Target_Blade of this BFD session and BFD_Index.
For above-mentioned 1 and 2 two kind of implementation, how soon the speed of no matter determining BFD message ownership BFD session location information has, owing to utilized tree resource or TCAM resource, all will take and expend the valuable in a large number memory sources of router, simultaneously also will the inevitable handling property of lossy router greatly.For above-mentioned implementation 3, need to take the memory source of router four G at least, also very big to the loss of router-processing performance.
Except above-mentioned three kinds of modes, router determines that according to authenticator and above-mentioned mapping relations the implementation of BFD message ownership BFD session location information is a variety of in addition in the prior art, these implementations all have a something in common, i.e. have certain mapping relations between the positional information of authenticator and BFD message ownership BFD session.Router will be determined the positional information Target_Blade and the BFD_Index of BFD session, must can realize according to authenticator and above-mentioned mapping relations.
Because the existence of mapping relations between the positional information of authenticator and BFD message ownership BFD session, router is after receiving the BFD message, must experience one when the BFD message that receives is handled authenticator is mapped to the process of BFD session location information, will reduce the efficient that router receives treatments B FD message so greatly.
Simultaneously, because the existence of mapping relations between the positional information of authenticator and BFD message ownership BFD session, router need take and expend self a large amount of valuable memory source when receiving treatments B FD message, internal memory to router has proposed very high requirement like this, loss the handling property of router, improved system loss greatly to router.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of method of the BFD of distribution conversational authentication code, to improve the efficient that router receives treatments B FD message, reduces the system loss to router.
For achieving the above object, the invention provides a kind of method of the BFD of distribution conversational authentication code, may further comprise the steps:
A, determine that two-way forwarding detects the disposable plates Target_Blade and the BFD index BFD_Index of BFD session;
B, structure include the authenticator of described Target_Blade and BFD_Index, and the authenticator of structure is distributed to the BFD session.
This method further comprises: router receives after the BFD message, according to Target_Blade and the BFD_Index in the entrained authenticator of BFD message, discerns the BFD session of this BFD message ownership.
In the such scheme, described steps A comprises: select one to be provided with the business board that two-way forwarding detects BFD session storage list according to the attribute of business board, in the BFD of this business board session storage list, select an idle list item, the Target_Blade of the business board of determine selecting and the BFD_Index of idle list item are described Target_Blade and BFD_Index, and in the memory cell that the Target_Blade that determines and BFD_Index are recorded router.
In the such scheme, the authenticator that structure described in the step B includes described Target_Blade and BFD_Index comprises: the authenticator of dividing the BFD session according to the Target_Blade that determines is two parts, fill in described Target_Blade in a part, fill in described BFD_Index at another part.
In the such scheme, can support at most that with described Target_Blade corresponding service plate the number of BFD session is m, the authenticator that the Target_Blade that described basis is determined divides the BFD session is that two parts comprise:
A, according to formula 2 N-1<m≤2 nDetermine that the shared bit of BFD_Index is n in the authenticator;
B, determine that according to the shared bit n of BFD_Index the shared bit of Target_Blade in the authenticator is (32-n).
In the such scheme, describedly fill in the Target_Blade of record in a part, the BFD_Index that fills in record at another part comprises: the high n bit at authenticator is filled in BFD_Index, fills in Target_Blade at low (32-n) of authenticator bit.
In the such scheme, describedly fill in the Target_Blade of record in a part, the BFD_Index that fills in record at another part comprises: the height (32-n) at authenticator is filled in Target_Blade, fills in BFD_Index at the low n bit of authenticator.
In the such scheme, the high n bit of described authenticator is filled in BFD_Index, and low (32-n) bit is filled in Target_Blade, and this method further comprises:
Router receives after the BFD message, obtains the described authenticator for BFD session distribution that carries in the BFD message; The authenticator that obtains (32-n) position that moves to right is obtained BFD_Index, the authenticator that the obtains n position that moves to right again, n position that moves to left is earlier obtained Target_Blade; Discern the BFD session that this BFD message belongs to according to BFD_Index that obtains and Target_Blade.
In the such scheme, the high n bit of described authenticator is filled in BFD_Index, and low (32-n) bit is filled in Target_Blade, and this method further comprises:
Router receives after the BFD message, obtains the described authenticator for BFD session distribution that carries in the BFD message; With the authenticator that obtains move to right (32-n) position obtain BFD_Index, according to formula Target_Blade=My_Disc﹠amp; (2 (32-n)-1) calculates Target_Blade; Discern the BFD session that this BFD message belongs to according to BFD_Index that obtains and Target_Blade.
In the such scheme, the height of described authenticator (32-n) bit is filled in Target_Blade, and low n bit is filled in BFD_Index, and this method further comprises:
Router receives after the BFD message, obtains the described authenticator for BFD session distribution that carries in the BFD message; The authenticator that the obtains n position that moves to right is obtained Target_Blade, the authenticator that obtains (32-n) position that moves to right again, (32-n) position that moves to left is earlier obtained BFD_Index; Discern the BFD session that this BFD message belongs to according to Target_Blade that obtains and BFD_Index.
In the such scheme, the height of described authenticator (32-n) bit is filled in Target_Blade, and low n bit is filled in BFD_Index, and this method further comprises:
Router receives after the BFD message, obtains the described authenticator for BFD session distribution that carries in the BFD message; The authenticator that the obtains n position that moves to right is obtained Target_Blade, according to formula BFD_Index=My_Disc﹠amp; (2 n-1) calculates BFD_Index; Discern the BFD session that this BFD message belongs to according to Target_Blade that obtains and BFD_Index.
Therefore, the method of this distribution BFD conversational authentication code provided by the invention, the authenticator that includes BFD session location information Target_Blade and BFD_Index by structure, and the authenticator that includes Target_Blade and BFD_Index that will construct distributes to the BFD session, and the authenticator that makes router distribute to the BFD session can directly embody Target_Blade and BFD_Index.
Utilize the present invention, because distributing to the authenticator of BFD session, router directly embodied Target_Blade and BFD_Index, after router receives the BFD message, need not to search and obtain Target_Blade and BFD_Index by any mapping relations, directly just can obtain Target_Blade and BFD_Index, so improved the efficient of router reception treatments B FD message greatly according to authenticator.Because distributing to the authenticator of BFD session, router directly embodied Target_Blade and BFD_Index simultaneously, needn't set up any mapping relations between the positional information of authenticator and BFD message ownership BFD session, saved the memory source of router, reduced requirement, greatly reduced system loss router to router memory.
Description of drawings
Fig. 1 is a BFD technology applied environment schematic diagram;
Fig. 2 distributes the method flow diagram of BFD conversational authentication code overall technological scheme for the present invention;
Fig. 3 is the method flow diagram that distributes the BFD conversational authentication code in the one embodiment of the invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, by the following examples, and with reference to accompanying drawing, the present invention is described in more detail.
Core content of the present invention is: the authenticator that includes BFD session location information Target_Blade and BFD_Index by structure, and the authenticator that includes Target_Blade and BFD_Index that will construct distributes to the BFD session, and the authenticator that makes router distribute to the BFD session can directly embody Target_Blade and BFD_Index.
As shown in Figure 2, Fig. 2 distributes the method flow diagram of BFD conversational authentication code overall technological scheme for the present invention, and this method may further comprise the steps:
Step 201: the Target_Blade and the BFD_Index that determine the BFD session;
Step 202: structure includes the authenticator of described Target_Blade and BFD_Index, and the authenticator of structure is distributed to the BFD session.
After knowing the authenticator that router distributes for the BFD session, the other side will be with this authenticator in the BFD message that sends.Router receives the BFD message that the other side sends, according to the Target_Blade and the BFD_Index that comprise in the entrained authenticator of BFD message, and BFD session that can this BFD message ownership of Direct Recognition.
In above-mentioned steps 201, the process of determining the Target_Blade of BFD session and BFD_Index is as follows: select one to be provided with the business board that two-way forwarding detects BFD session storage list according to the attribute of business board, select an idle list item in the BFD of this business board session storage list, the Target_Blade of definite business board of selecting and the BFD_Index of idle list item are described Target_Blade and BFD_Index.
In the attribute of business board, generally include the type of service that this business board is supported, and on business board, preserve and this business board supporting business type information corresponding.
If business board is supported the BFD business, on business board, just preserve professional corresponding BFD session storage list with BFD.In BFD session storage list, comprise Target_Blade, BFD_Index at least, receive contents such as the time of BFD message, the time-out time that receives the BFD message, the time of detecting the BFD message and BFD session place link information.The BFD session of preserving in the BFD session storage list is stored and index according to linear list.
In the BFD of business board session storage list, select an idle list item to be used to deposit the BFD session.After having determined Target_Blade and BFD_Index, in the memory cell that router will record self to the Target_Blade that determines and BFD_Index.
In above-mentioned steps 202, the process of constructing the authenticator that includes described Target_Blade and BFD_Index is as follows: router is two parts according to the authenticator that the Target_Blade that determines divides the BFD session, fill in described Target_Blade in a part, fill in described BFD_Index at another part.
When the authenticator of router division BFD session is two parts, need to determine earlier shared number of bits in each comfortable authenticator of two parts of authenticator.Because shared number of bits of authenticator of agreement regulation is 32 bits, so in case determined the shared bit of a part in two parts of authenticator, the shared bit of another part is also just corresponding have been determined.
Because a business board can support that at most the number of BFD session is certain, the shared bit of BFD_Index is decided by that business board can support the number of BFD session at most, so the shared bit of BFD_Index can determine that it determines that method is as follows according to the business board of selecting:
Suppose that a business board can support that at most the number of BFD session is m, the shared bit of the BFD_Index in the authenticator is n, and m, n are positive integer, then according to formula 2 N-1<m≤2 nCan determine the shared bit n of BFD_Index in the authenticator.Because the number of the BFD session that business board can be supported is in a foreseeable future less than 2 32Individual, so n should be less than 32, promptly the shared bit n of BFD_Index should be less than 32 in the authenticator.
Determined that the shared bit of BFD_Index is after the n in the authenticator (My_Disc), the shared bit of Target_Blade is also with regard to corresponding being defined as (32-n) in the authenticator.At this moment, router can distribute authenticator for the BFD session according to any one formula in following two formula:
My_Disc=BFD_Index<<(32-n)+and Target_Blade, n is a positive integer;
My_Disc=Target_Blade<<n+BFD_Index, n is a positive integer;
If router according to formula My_Disc=BFD_Index<<(32-n)+Target_Blade is that the BFD session distributes authenticator, BFD_Index takies the high n bit of My_Disc, Target_Blade takies low (32-n) bit of My_Disc, then router is filled in BFD_Index at the high n bit of authenticator, fills in Target_Blade at low (32-n) of authenticator bit.
Have on the road device according to formula My_Disc=BFD_Index<<(32-n)+after Target_Blade distributes authenticator for the BFD session, the other side send to router about the BFD message of this BFD session just must with on the authenticator of this distribution.There is device on the road after receiving the BFD message, can directly from the entrained authenticator of BFD message, directly parse the positional information BFD_Index and the Target_Blade of BFD session, and then discern the BFD session that this BFD message belongs to according to BFD_Index that obtains and Target_Blade by twice shifting function.Shifting function is wherein carried out according to following formula:
BFD_Index=My_Disc>>(32-n);
Target_Blade=(My_Disc<<n)>>n;
Being router obtains BFD_Index with the authenticator that obtains (32-n) position that moves to right, and the authenticator that the obtains n position that moves to right again, n position that moves to left is earlier obtained Target_Blade.In addition, router also can be according to formula Target_Blade=My_Disc﹠amp; (2 (32-n)-1) calculates Target_Blade.Router obtains after BFD_Index and the Target_Blade, just can discern the BFD session that this BFD message belongs to according to BFD_Index that obtains and Target_Blade.
If router according to formula My_Disc=Target_Blade<<n+BFD_Index is that the BFD session distributes authenticator, Target_Blade takies height (32-n) bit of My_Disc, BFD_Index takies the low n bit of My_Disc, then router is filled in Target_Blade at the height (32-n) of authenticator, fills in BFD_Index at the low n bit of authenticator.
At this moment, router carries out according to following formula for resolving the shifting function that Target_Blade and BFD_Index carried out:
Target_Blade=My_Disc>>n;
BFD_Index=(My_Disc<<(32-n))>>(32-n);
Being router obtains Target_Blade with the authenticator that the obtains n position that moves to right, and the authenticator that obtains (32-n) position that moves to right again, (32-n) position that moves to left is earlier obtained BFD_Index.In addition, router also can be according to formula BFD_Index=My_Disc﹠amp; (2 n-1) calculates BFD_Index.Router obtains after BFD_Index and the Target_Blade, just can discern the BFD session that this BFD message belongs to according to BFD_Index that obtains and Target_Blade.
For this method of distributing authenticator for the BFD session provided by the invention can more clearly be described,, and this is elaborated with reference to accompanying drawing below in conjunction with specific embodiment.
As shown in Figure 3, Fig. 3 is the method flow diagram that distributes the BFD conversational authentication code in the one embodiment of the invention.In the present embodiment, router D distributes authenticator for the BFD session of setting up on link DE.This method may further comprise the steps:
Step 301: router D selects one to be provided with the business board that two-way forwarding detects BFD session storage list according to the attribute of business board, and the Target_Blade that supposes this business board is 5, and this business board can be supported 64K BFD session at most;
Router D selects an idle list item in the BFD of this business board session storage list, the BFD_Index that supposes this free time list item is 6;
The Target_Blade of the business board of determine selecting and the BFD_Index of idle list item are described Target_Blade and BFD_Index, and in the memory cell that the Target_Blade that determines and BFD_Index are recorded router.
Step 302: because router D can support 64K BFD session at most, according to 2 15<64K<2 16Determine n=16, then according to formula My_Disc=Target_Blade<<n+BFD_Index fills in value 5 into Target_Blade at the height (32-n)=16 of authenticator, fill in the value 6 into BFD_Index in the low n=16 position of authenticator, router D distributes authenticator 0x00050006 to give this BFD session.
In authenticator 0x00050006,0x is used to show that authenticator is 16 systems, and each numeral takies 4 bits in 0005, and 0005 has taken high 16 bits of authenticator, and 0006 has taken low 16 bits of authenticator.
After router D distributes to the BFD session with authenticator 0x00050006, router E sends in the BFD message of router D will carry authenticator 0x00050006.Router D obtains authenticator 0x00050006 after receiving in the BFD message that router E sends, and according to formula Target_Blade=My_Disc>>n obtains Target_Blade=5 with the authenticator n position that moves to right, according to formula BFD_Index=(My_Disc<<(32-n))>>(32-n) authenticator is moved to left earlier (32-n) position that moves to right again, (32-n) position obtains BFD_Index=6.Router just can be discerned the BFD session of this BFD message ownership according to Target_Blade=5 and BFD_Index=6 like this.
The present invention for this embodiment in, router D according to formula My_Disc=Target_Blade<<n+BFD_Index fills in authenticator, fills in Target_Blade high 16 of authenticator, fills in BFD_Index low 16 of authenticator.In actual applications, router D also can according to formula My_Disc=BFD_Index<<(32-n)+Target_Blade fills in authenticator, fill in BFD_Index high 16 of authenticator, fill in Target_Blade low 16 of authenticator.Such technical scheme is consistent with technical scheme of the present invention, just repeats no more here.
From top embodiment as can be seen, the method of this distribution BFD conversational authentication code provided by the invention, the authenticator that includes BFD session location information Target_Blade and BFD_Index by structure, and the authenticator that includes Target_Blade and BFD_Index that will construct distributes to the BFD session, and the authenticator that makes router distribute to the BFD session can directly embody Target_Blade and BFD_Index.
Utilize the present invention, because distributing to the authenticator of BFD session, router directly embodied Target_Blade and BFD_Index, after router receives the BFD message, need not to search and obtain Target_Blade and BFD_Index by any mapping relations, directly just can obtain Target_Blade and BFD_Index, so improved the efficient of router reception treatments B FD message greatly according to authenticator.Because distributing to the authenticator of BFD session, router directly embodied Target_Blade and BFD_Index simultaneously, needn't set up any mapping relations between the positional information of authenticator and BFD message ownership BFD session, saved the memory source of router, reduced requirement, greatly reduced system loss router to router memory.
Above-described specific embodiment; purpose of the present invention, technical scheme and beneficial effect are further described; institute is understood that; the above only is specific embodiments of the invention; be not limited to the present invention; within the spirit and principles in the present invention all, any modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1, a kind of method of distributing bidirection forwarding detecting conversational authentication code is characterized in that, may further comprise the steps at least:
A, determine that two-way forwarding detects the disposable plates Target_Blade and the BFD index BFD_Index of BFD session;
B, structure include the authenticator of described Target_Blade and BFD_Index, and the authenticator of structure is distributed to the BFD session.
2, method according to claim 1 is characterized in that, this method further comprises:
Router receives after the BFD message, according to Target_Blade and the BFD_Index in the entrained authenticator of BFD message, discerns the BFD session of this BFD message ownership.
3, method according to claim 1 is characterized in that, described steps A comprises:
Select one to be provided with the business board that two-way forwarding detects BFD session storage list according to the attribute of business board, in the BFD of this business board session storage list, select an idle list item, the Target_Blade of the business board of determine selecting and the BFD_Index of idle list item are described Target_Blade and BFD_Index, and in the memory cell that the Target_Blade that determines and BFD_Index are recorded router.
4, method according to claim 1 is characterized in that, the authenticator that the structure described in the step B includes described Target_Blade and BFD_Index comprises:
The authenticator of dividing the BFD session according to the Target_Blade that determines is two parts, fills in described Target_Blade in a part, fills in described BFD_Index at another part.
5, method according to claim 4 is characterized in that, can support at most that with described Target_Blade corresponding service plate the number of BFD session is m, and the authenticator that the Target_Blade that described basis is determined divides the BFD session is that two parts comprise:
A, according to formula 2 N-1<m≤2 nDetermine that the shared bit of BFD_Index is n in the authenticator;
B, determine that according to the shared bit n of BFD_Index the shared bit of Target_Blade in the authenticator is (32-n).
6, method according to claim 5 is characterized in that, describedly fills in the Target_Blade of record in a part, and the BFD_Index that fills in record at another part comprises:
High n bit at authenticator is filled in BFD_Index, fills in Target_Blade at low (32-n) of authenticator bit.
7, method according to claim 5 is characterized in that, describedly fills in the Target_Blade of record in a part, and the BFD_Index that fills in record at another part comprises:
Height (32-n) at authenticator is filled in Target_Blade, fills in BFD_Index at the low n bit of authenticator.
8, method according to claim 5 is characterized in that, the high n bit of described authenticator is filled in BFD_Index, and low (32-n) bit is filled in Target_Blade, and this method further comprises:
Router receives after the BFD message, obtains the described authenticator for BFD session distribution that carries in the BFD message;
The authenticator that obtains (32-n) position that moves to right is obtained BFD_Index, the authenticator that the obtains n position that moves to right again, n position that moves to left is earlier obtained Target_Blade;
Discern the BFD session that this BFD message belongs to according to BFD_Index that obtains and Target_Blade.
9, method according to claim 5 is characterized in that, the high n bit of described authenticator is filled in BFD_Index, and low (32-n) bit is filled in Target_Blade, and this method further comprises:
Router receives after the BFD message, obtains the described authenticator for BFD session distribution that carries in the BFD message;
With the authenticator that obtains move to right (32-n) position obtain BFD_Index, according to formula Target_Blade=My_Disc﹠amp; (2 (32-n)-1) calculates Target_Blade;
Discern the BFD session that this BFD message belongs to according to BFD_Index that obtains and Target_Blade.
10, method according to claim 5 is characterized in that, the height of described authenticator (32-n) bit is filled in Target_Blade, and low n bit is filled in BFD_Index, and this method further comprises:
Router receives after the BFD message, obtains the described authenticator for BFD session distribution that carries in the BFD message;
The authenticator that the obtains n position that moves to right is obtained Target_Blade, the authenticator that obtains (32-n) position that moves to right again, (32-n) position that moves to left is earlier obtained BFD_Index;
Discern the BFD session that this BFD message belongs to according to Target_Blade that obtains and BFD_Index.
11, method according to claim 5 is characterized in that, the height of described authenticator (32-n) bit is filled in Target_Blade, and low n bit is filled in BFD_Index, and this method further comprises:
Router receives after the BFD message, obtains the described authenticator for BFD session distribution that carries in the BFD message;
The authenticator that the obtains n position that moves to right is obtained Target_Blade, according to formula BFD_Index=My_Disc﹠amp; (2 n-1) calculates BFD_Index;
Discern the BFD session that this BFD message belongs to according to Target_Blade that obtains and BFD_Index.
CN200510087351A 2005-07-28 2005-07-28 Method of allocating bidirection forwarding detecting conversational authentication code Expired - Fee Related CN1905516B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200510087351A CN1905516B (en) 2005-07-28 2005-07-28 Method of allocating bidirection forwarding detecting conversational authentication code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200510087351A CN1905516B (en) 2005-07-28 2005-07-28 Method of allocating bidirection forwarding detecting conversational authentication code

Publications (2)

Publication Number Publication Date
CN1905516A true CN1905516A (en) 2007-01-31
CN1905516B CN1905516B (en) 2010-05-05

Family

ID=37674648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200510087351A Expired - Fee Related CN1905516B (en) 2005-07-28 2005-07-28 Method of allocating bidirection forwarding detecting conversational authentication code

Country Status (1)

Country Link
CN (1) CN1905516B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009012684A1 (en) * 2007-07-20 2009-01-29 Huawei Technologies Co., Ltd. A method, system and function entity for achieving the echo function of the bfd mechanism
CN101252476B (en) * 2008-03-18 2010-09-22 华为技术有限公司 Apparatus and method for malfunction detection
CN101425929B (en) * 2008-12-01 2011-02-09 成都市华为赛门铁克科技有限公司 Board number table allocation method, device and system
WO2014075213A1 (en) * 2012-11-13 2014-05-22 华为技术有限公司 Bidirectional forwarding detection (bfd) session negotiation method, device and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI109511B (en) * 1997-06-03 2002-08-15 Nokia Corp Short message routing
TWI246285B (en) * 2002-02-08 2005-12-21 Matsushita Electric Ind Co Ltd Gateway apparatus and its controlling method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009012684A1 (en) * 2007-07-20 2009-01-29 Huawei Technologies Co., Ltd. A method, system and function entity for achieving the echo function of the bfd mechanism
CN101087211B (en) * 2007-07-20 2010-08-11 华为技术有限公司 A method and system for realizing echo function in BFD mechanism and its function entity
CN101252476B (en) * 2008-03-18 2010-09-22 华为技术有限公司 Apparatus and method for malfunction detection
CN101425929B (en) * 2008-12-01 2011-02-09 成都市华为赛门铁克科技有限公司 Board number table allocation method, device and system
WO2014075213A1 (en) * 2012-11-13 2014-05-22 华为技术有限公司 Bidirectional forwarding detection (bfd) session negotiation method, device and system
CN104040984A (en) * 2012-11-13 2014-09-10 华为技术有限公司 Bidirectional forwarding detection (BFD) session negotiation method, device and system
US9444709B2 (en) 2012-11-13 2016-09-13 Huawei Technologies Co., Ltd. Bidirectional forwarding detection BFD session negotiation method, device, and system
CN104040984B (en) * 2012-11-13 2017-05-10 华为技术有限公司 Bidirectional forwarding detection (BFD) session negotiation method, device and system

Also Published As

Publication number Publication date
CN1905516B (en) 2010-05-05

Similar Documents

Publication Publication Date Title
CN1183718C (en) System and method for packet data servicing node (PDSN) initial assignment and reselection
CN1664790A (en) Method and apparatus for increasing data storage capacity
CN101043695A (en) Method for storing and maintaining user equipment information in mobile communication system
CN1826591A (en) Reverse path forwarding protection
CN1794208A (en) Mass storage device and method for dynamically managing a mass storage device
CN1905531A (en) Method for processing data being transmitted and method and apparatus for transmitting data
CN1283063C (en) Method and apparatus for layout data in communication equipment
CN1929447A (en) Method and device for searching address prefixion and message transfer method and system
CN1801679A (en) Mobile broadcast service distributing method and system
CN1816055A (en) Method of assigning address to mobile node in a wireless network
CN1913454A (en) Method and device for implementing sharing IP message load
CN1905516A (en) Method of allocating bidirection forwarding detecting conversational authentication code
CN101047580A (en) Method for setting point-to-point data channel
CN1917521A (en) Method and system for realizing load balancing, and load balancing equipment
CN101052011A (en) MPLS label distribution method, system and device
CN1878147A (en) Method for balancing load between multi network cards of network file system server
CN1768546A (en) Wireless channel distribution method
CN1897560A (en) Method for improving routing list capacity
CN1866218A (en) Source management method for software system
CN1845531A (en) Data forwarding controlling method and apparatus
CN1914887A (en) Automatic prefix allocation to IPV6 communication network equipment
CN1728698A (en) Parallel structured order preserved flow equilibrium system, and method for dispatching message based on sorted sream
CN1968135A (en) Flow distribution system and method
CN1477825A (en) Address conversion method for simultaneously supporting one-to-one and many-to-many under the PAT mode
JP2011509567A5 (en)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100505

Termination date: 20170728

CF01 Termination of patent right due to non-payment of annual fee