WO2007016841A1 - Procédé de mise en œuvre de détection de panne de plan de transfert ip - Google Patents
Procédé de mise en œuvre de détection de panne de plan de transfert ip Download PDFInfo
- Publication number
- WO2007016841A1 WO2007016841A1 PCT/CN2006/001563 CN2006001563W WO2007016841A1 WO 2007016841 A1 WO2007016841 A1 WO 2007016841A1 CN 2006001563 W CN2006001563 W CN 2006001563W WO 2007016841 A1 WO2007016841 A1 WO 2007016841A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bfd
- node
- session
- nodes
- domain
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/10—Routing in connection-oriented networks, e.g. X.25 or ATM
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/50—Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
Definitions
- the invention relates to a bidirectional forwarding detection (BFD) technology, in particular to a method for realizing IP forwarding plane fault detection by using bidirectional forwarding detection.
- BFD bidirectional forwarding detection
- BFD detects a link through a fast, negotiated rate Hello mechanism.
- BFD can be used to detect multiple types of transmission accuracy, including Ethernet, Multiprotocol Label Switching (MPLS) paths, common routing encapsulation, and IP Security Protocol (IPSec) tunneling.
- MPLS Multiprotocol Label Switching
- IPSec IP Security Protocol
- BFD is gradually developed from the basic transmission technology, so BFD can detect faults at various layers in the network.
- the goal of BFD is to provide a low-overhead, short-detection failure detection mechanism on the path between adjacent routers.
- the neighboring router refers to a router with any one or more logical links connected. Not limited to one hop. BFD can perform detection including interfaces, data links, and extensions to the forwarding engine itself.
- BFD As a light-load link or node or interface fault detection method, BFD has great advantages for detecting data level faults.
- BFD is used to detect the faulty state machine and some parameters necessary for establishing a BFD session and maintaining a BFD session, and are expressed in the form of data payload for various protocols.
- BFD is used as the data plane for various media.
- the fault detection mechanism is used as a data load.
- BFD itself does not define how to start a BFD session under various media and various protocols. Therefore, for specific applications. In the scenario, if BFD is used to implement fault detection on the data forwarding plane, there is no specific implementation.
- LSP label switching path
- MPLS multi-protocol label switching
- a method for detecting faults in the MPLS LSP data plane The corresponding intra-domain LSP is as shown in FIG. 1 , and may be a path between the LSR A and the LSR B in the domain A ( Domain A ), and the corresponding inter-domain LSP is as shown in FIG. 2 . Is the path between LSR A and LSR B between Domain A and Domain B.
- the BFD load is defined as a User Datagram Protocol (UDP) payload encapsulated in IP packets.
- UDP User Datagram Protocol
- BFD is not considered as a detection method for IP forwarding plane faults.
- the main purpose of the present invention is to provide a method for implementing IP forwarding plane fault detection, which can utilize BFD to implement IP forwarding plane fault detection.
- a method for implementing IP forwarding plane fault detection comprising the following steps:
- the IP node obtains BFD identifier information for bidirectional forwarding detection BFD and starts a BFD session.
- the IP node encapsulates the BFD 4 message and transfers it between the IP nodes of the BFD session;
- the IP node is an inter-domain IP node, and the route is dynamically configured.
- Step A specifically includes:
- the BFD identifier information is carried in a new capability code of the OPEN packet of the BGP packet;
- the newly added capability code is set in the capability option of the OPEN message.
- the IP node is an inter-domain IP node, and the route is dynamically configured.
- Step A specifically includes:
- the corresponding BFD identifier information is configured on the IP node, and the BFD session between the IP nodes is started by using the configured BFD identifier information.
- the IP node is an inter-domain IP node or two intra-domain IP nodes, and the route is statically configured.
- Step A specifically includes:
- the corresponding BFD identifier information is configured on the IP node, and the BFD session between the IP nodes is started by using the configured BFD identifier information.
- the IP node is an inter-domain IP node or two intra-domain IP nodes, and the route is statically configured.
- Step A specifically includes:
- the IP nodes obtain the BFD identifier information and initiate the BFD session between the IP nodes through the ICMPv44 message.
- the BFD identifier information is carried in a new local identifier field of the ICMPv4 information request or the ICMPv4 information response message of the ICMPv4 message.
- the step A further includes: starting the BFD session and then starting the BGP session.
- the C bit in the BFD packet is used to declare whether the BFD session is associated with the control plane.
- the step A further includes:
- the peer IP address of the BFD session determines whether to stop the BGP smooth restart process of the control plane according to the C bit information. If the C bit information is not associated, and the BFD session detects a fault, the BGP smooth restart process is stopped; If the bit information is displayed as related, and the BFD session detects a fault, the BGP graceful restart process is continued. Before the BFD session is started in step A, the method further includes:
- the IP node After obtaining the BFD identifier information, the IP node determines whether to enable the BFD to detect the static route forwarding plane fault.
- the method for encapsulating the BFD packet is as follows: The user data protocol UDP packet is encapsulated.
- the present invention obtains the BFD session information for the BFD detection by using the BFD session, and uses the obtained BFD identifier to start the BFD session to implement BFD fault detection.
- the method for obtaining the BFD identifier may be an inter-domain IP through the Border Gateway Protocol (BGP) Open (OPEN) message.
- BGP Border Gateway Protocol
- OPEN Border Gateway Protocol
- the method for obtaining the BFD identifier may be to configure corresponding BFD identifier information on each IP node, or by extending the Internet.
- the Control Information Protocol (ICCMP4) message conveys BFD identifier information between the IP nodes.
- the method of the invention initiates a BFD session and implements fault detection by transmitting BFD packets between the inter-domain/intra-domain IP nodes.
- Figure 1 is a schematic diagram of LSPs in the detected domain
- 2 is a schematic diagram of detected inter-domain LSPs
- FIG. 3 is a schematic structural diagram of a BFD session implemented by an IP node in a domain
- FIG. 4 is a schematic structural diagram of an inter-domain IP node implementing a BFD session
- FIG. 5 is a flow chart of the method of the present invention. Mode for carrying out the invention
- the core idea of the present invention is: the IP node obtains the BFD identifier information for the BFD session and starts the BFD session, and encapsulates and transmits the BFD packet between the IP nodes of the BFD session; Fault detection.
- the IP forwarding plane includes the IP domain and the IP domain, as shown in Figure 3 and Figure 4, respectively.
- Figure 3 is a schematic diagram of the structure of the BFD session implemented by the IP node in the domain
- Figure 4 is the BFD session of the inter-domain IP node. Schematic diagram of the structure, in which the configuration of routes between IP nodes can be dynamically configured or statically configured.
- the concept of the IP forwarding plane belongs to common knowledge of the prior art, and FIG. 3 and FIG. 4 are not described in detail herein.
- the method of the present invention is directed to the case where the BFD session is an inter-domain IP node and the route is dynamically configured, and the BFD session is an inter-domain/intra-domain IP node and the route is statically configured.
- Figure 5 is a flow chart of the method of the present invention, comprising the following steps:
- Step 500 The IP node obtains the BFD identifier information used for BFD detection and starts a BFD session.
- the capability value is a variable.
- the actual BFD session identifier information is the BFD identifier information.
- the Capability Value field can also be called the local discriminator. Field
- the peer-to-domain inter-domain IP node can obtain the BFD identifier of the peer end of the session based on the BFD capability indication information, and perform correct detection to avoid false detection. For example, if Router A and Router B are BGP neighbors, if the forwarding path between Router A and Router B is faulty for UDP packet forwarding, and there is no fault in the transmission control protocol (TCP) packet forwarding, then BFD packets are sent. The forwarding path is faulty. The BGP packet forwarding path is normal. If the BFD session does not use the BGP OPEN packet to announce the BFD processing capability, the BFD session between Router A and Router B fails. The BGP information is forwarded normally. In the case of the protocol, the BFD session fails and the peers in the BGP adjacency do not support the BFD session. BGP considers that the forwarding path is normal and continues to operate normally when the data plane is faulty.
- TCP transmission control protocol
- the BGP session is started.
- the BGP session is started.
- the BFD session can be started after the BGP session.
- the BGP session may be established in some cases, and a restart is required. For example, when Router A and Router B are BGP neighbors, if the forwarding path between Router A and Router A is correct, the BGP packet forwarding path is normal, and the packets of other protocol types are UDP. The file forwarding fails.
- the data plane can pass. There are some methods to detect the fault status of the forwarding path, which may cause the system to restart. At this time, if the BGP session waits for the BFD session to start before starting, there will be no repeated startup. Because, in the above case, when the BFD session cannot be activated, the BGP session will always be in the non-established state, that is, the OPEN state.
- the BFD session is started through the BGP OPEN message. After the BFD session is in the UP state, the BGP session is started to enter the established state. This prevents the above problem.
- the hold time refers to the time that the BGP session waits to move from the OPEN state to the established state.
- the method of the present invention can use the following processing method for the relationship between the BFD session and the existing BGP graceful restart: If the C bit in the BFD session of the BFD session is That is, the Control Plane Independent bit declaration does not affect the BFD session because the control plane fails (down), that is, the BFD session is not associated with the control plane. When the BFD session detects the fault and the BGP graceful restart is in progress, it should be The BGP graceful restart process is aborted. Because the data plane has also failed, the system restart should be performed.
- the BFD session is associated with the control plane, the BFD session is not affected by the BGP graceful restart process.
- the BFD session is associated with the control plane. It is all failure.
- the Cbit bit is 0 to indicate no association, and the Cbit bit is 1 to indicate association. Then, BFD After the session peer IP node receives the BFD packet, if the C bit is 0, and the BFD session detects the fault, the BGP graceful restart process is stopped. If the C bit is 1, and the BFD session detects the fault, the continuation is performed. BGP smoothly restarts the process.
- the BFD identifier can be obtained by static configuration. Specifically, the BFD identifier information is configured on the inter-domain IP node, and the method of actively or passively transmitting BFD packets is configured.
- the BFD packet can be configured to be active on both ends, or one end is active, and the other end is in the passive mode.
- the BFD function is enabled.
- the inter-domain IP node uses the BFD identifier to guide BFD. The function starts the BFD detection process.
- the BFD ID information is statically configured.
- the configuration can be configured as active on both ends.
- the other end is active and the other end is in the passive mode.
- the inter-domain/intra-domain IP node initiates the BFD detection process using the BFD identifier.
- ICMPv4 Information Request (ICMPv4 Information Request Message)
- I ICMPv4 Information Reply Message (ICMPv4 Information Reply Message) sends a BFD identifier between the IP nodes to enable the peer to obtain the BFD identifier and start a BFD session.
- the source (or terminal) of the forwarding path between the IP nodes sends an ICMPv4 Information Request message, and the source (or terminal) BFD identifier is sent to the terminal (or the source). At the same time, the terminal (or source) returns.
- the ICMPv4 Information Reply message carries the BFD identifier of the terminal (or source) and is sent to the source (or terminal).
- the ICMPv4 message is transmitted between the IP nodes, so that the IP nodes at both ends of the static route link obtain the BFD identifier information of the peer node.
- Step 501 The IP node encapsulates the BFD packet and transfers it between the IP nodes of the BFD session.
- the BFD packet can be encapsulated by UDP packets.
- the BFD packet and the BFD payload are transmitted between the IP nodes at both ends of the link.
- the corresponding UDP source port number and destination port number can be obtained from the Internet address.
- the Assigned Body (IANA) organization is uniformly distributed. The specific encapsulation method can be found in the relevant draft regulations, and will not be described here.
- the application can determine whether to enable the BFD function to detect faults on the static route forwarding plane.
- Step 502 Perform fault detection according to the BFD packet transmitted between the IP nodes.
- the present invention can use the BFD to detect the forwarding plane fault between the forwarding paths of the BGP neighbors, and can avoid using the BFD in some cases to detect the false detections that may occur when the forwarding path is faulty.
- the present invention uses the BFD to detect the IP forwarding plane fault for the static route, thereby improving the reliability of the fault detection of the static route forwarding plane.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006800121781A CN101160855A (zh) | 2005-08-05 | 2006-07-04 | 实现ip转发平面故障检测的方法 |
EP06753099A EP1921809A4 (en) | 2005-08-05 | 2006-07-04 | METHOD FOR OBTAINING AN ERROR DETECTION OF AN IP FORWARDING LEVEL |
US11/526,567 US7664044B2 (en) | 2005-08-05 | 2006-09-26 | Method of failure detection in an IP forwarding plane |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200510087706.7 | 2005-08-05 | ||
CN 200510087706 CN1909471A (zh) | 2005-08-05 | 2005-08-05 | 检测域间ip转发平面故障的实现方法 |
CN200510087705.2 | 2005-08-05 | ||
CNA2005100877052A CN1909470A (zh) | 2005-08-05 | 2005-08-05 | 检测静态路由转发平面故障的实现方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/526,567 Continuation US7664044B2 (en) | 2005-08-05 | 2006-09-26 | Method of failure detection in an IP forwarding plane |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007016841A1 true WO2007016841A1 (fr) | 2007-02-15 |
Family
ID=37727082
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2006/001563 WO2007016841A1 (fr) | 2005-08-05 | 2006-07-04 | Procédé de mise en œuvre de détection de panne de plan de transfert ip |
Country Status (3)
Country | Link |
---|---|
US (1) | US7664044B2 (zh) |
EP (1) | EP1921809A4 (zh) |
WO (1) | WO2007016841A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009012684A1 (fr) * | 2007-07-20 | 2009-01-29 | Huawei Technologies Co., Ltd. | Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd |
US7822047B2 (en) | 2006-07-04 | 2010-10-26 | Tellabs Oy | Method and arrangement for processing management and control messages |
US8144601B2 (en) | 2007-05-30 | 2012-03-27 | Huawei Technologies Co., Ltd. | Fault detection method, communication system and label switching router |
US8787313B2 (en) | 2007-02-02 | 2014-07-22 | Huawei Technologies Co., Ltd. | Method, network system and destination network for transmitting QoS during a handover process between systems |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7519010B1 (en) | 2004-08-30 | 2009-04-14 | Juniper Networks, Inc. | Inter-autonomous system (AS) multicast virtual private networks |
US7564803B1 (en) | 2005-08-29 | 2009-07-21 | Juniper Networks, Inc. | Point to multi-point label switched paths with label distribution protocol |
US7839862B1 (en) | 2006-06-30 | 2010-11-23 | Juniper Networks, Inc. | Upstream label assignment for the label distribution protocol |
US7742482B1 (en) | 2006-06-30 | 2010-06-22 | Juniper Networks, Inc. | Upstream label assignment for the resource reservation protocol with traffic engineering |
US7787380B1 (en) | 2006-06-30 | 2010-08-31 | Juniper Networks, Inc. | Resource reservation protocol with traffic engineering point to multi-point label switched path hierarchy |
US7860981B1 (en) * | 2006-09-29 | 2010-12-28 | Juniper Networks, Inc. | Systems and methods for IP session keepalive using BFD protocols |
CN100558055C (zh) * | 2006-11-10 | 2009-11-04 | 华为技术有限公司 | 减少错误平滑重启状态持续时长的方法及路由器 |
US20080172582A1 (en) * | 2007-01-12 | 2008-07-17 | David Sinicrope | Method and system for providing peer liveness for high speed environments |
US8374164B2 (en) * | 2007-04-06 | 2013-02-12 | Cisco Technology, Inc. | Detection of specific BFD path failures |
CN101437021B (zh) * | 2007-11-16 | 2013-08-07 | 华为技术有限公司 | 一种对接入提示信息的处理方法、系统及装置 |
CN101459594B (zh) * | 2007-12-14 | 2011-04-13 | 华为技术有限公司 | Bfd报文的发送方法、链路故障的探测方法及装置 |
US7936780B1 (en) * | 2008-03-12 | 2011-05-03 | Juniper Networks, Inc. | Hierarchical label distribution protocol for computer networks |
US7969894B2 (en) * | 2008-05-07 | 2011-06-28 | Hewlett-Packard Development Company, L.P. | System and method for dead gateway detection |
US8422362B2 (en) * | 2008-08-05 | 2013-04-16 | At&T Intellectual Property I, Lp | Reliability as an interdomain service |
US8169921B2 (en) | 2008-09-30 | 2012-05-01 | At&T Intellectual Property I, Lp | Methods and apparatus to monitor border gateway protocol sessions |
US7929557B2 (en) * | 2008-11-14 | 2011-04-19 | Juniper Networks, Inc. | Summarization and longest-prefix match within MPLS networks |
US8493872B2 (en) * | 2009-08-12 | 2013-07-23 | Fujitsu Limited | System and method for monitoring the connectivity of a path between nodes in a network |
CN104040984B (zh) * | 2012-11-13 | 2017-05-10 | 华为技术有限公司 | 双向转发检测bfd会话协商方法、设备及系统 |
CN103067220B (zh) * | 2012-12-19 | 2016-02-10 | 中兴通讯股份有限公司 | 参数更新情况下双向链路转发检测方法及装置 |
US8953500B1 (en) | 2013-03-29 | 2015-02-10 | Juniper Networks, Inc. | Branch node-initiated point to multi-point label switched path signaling with centralized path computation |
US9497107B1 (en) * | 2013-06-06 | 2016-11-15 | Cisco Technology, Inc. | Seamless path monitoring and rapid fault isolation using bidirectional forwarding detection in a network environment |
JP2016048850A (ja) * | 2014-08-27 | 2016-04-07 | 富士通株式会社 | パケット転送装置、パケット転送システム、及びパケット転送方法 |
US10243781B1 (en) * | 2017-07-05 | 2019-03-26 | Juniper Networks, Inc. | Detecting link faults in network paths that include link aggregation groups (LAGs) |
US11115342B2 (en) | 2019-04-16 | 2021-09-07 | Hewlett Packard Enterprise Development Lp | Using BFD packets in a virtualized device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987629A (en) * | 1996-02-22 | 1999-11-16 | Fujitsu Limited | Interconnect fault detection and localization method and apparatus |
CN1501644A (zh) * | 2002-11-19 | 2004-06-02 | ��Ϊ��������˾ | Ip网络设备间可达性的检测方法和其在公共拨号网络平台接入备份中的应用 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6553423B1 (en) * | 1999-05-27 | 2003-04-22 | Cisco Technology, Inc. | Method and apparatus for dynamic exchange of capabilities between adjacent/neighboring networks nodes |
US7327683B2 (en) * | 2000-03-16 | 2008-02-05 | Sri International | Method and apparatus for disseminating topology information and for discovering new neighboring nodes |
US7561527B1 (en) * | 2003-05-02 | 2009-07-14 | David Katz | Bidirectional forwarding detection |
WO2005006671A1 (ja) * | 2003-07-09 | 2005-01-20 | Fujitsu Limited | ネットワークにおける特定サービスの最適ルーティング方法並びに同ネットワークに用いられるサーバ及びルーティングノード |
US7406030B1 (en) * | 2003-08-25 | 2008-07-29 | Juniper Networks, Inc. | Dynamic renegotiation of graceful restart time to avoid double-failure traffic loss |
KR20050062025A (ko) * | 2003-12-19 | 2005-06-23 | 삼성전자주식회사 | Ip 패킷의 다중 필드 에러에 대한 icmp 패킷 생성시스템 및 방법 |
US20060198322A1 (en) * | 2005-03-03 | 2006-09-07 | Susan Hares | Method and apparatus for BGP peer prefix limits exchange with multi-level control |
US7499395B2 (en) * | 2005-03-18 | 2009-03-03 | Cisco Technology, Inc. | BFD rate-limiting and automatic session activation |
-
2006
- 2006-07-04 EP EP06753099A patent/EP1921809A4/en not_active Withdrawn
- 2006-07-04 WO PCT/CN2006/001563 patent/WO2007016841A1/zh active Application Filing
- 2006-09-26 US US11/526,567 patent/US7664044B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987629A (en) * | 1996-02-22 | 1999-11-16 | Fujitsu Limited | Interconnect fault detection and localization method and apparatus |
CN1501644A (zh) * | 2002-11-19 | 2004-06-02 | ��Ϊ��������˾ | Ip网络设备间可达性的检测方法和其在公共拨号网络平台接入备份中的应用 |
Non-Patent Citations (2)
Title |
---|
SALAS: "MAKING CREDIBLE IP METROPOLITAN AREA CORE NETWORK", CHINESE COMMUNICATION NEWS NETWORK, 13 May 2005 (2005-05-13), pages 1 - 3 * |
See also references of EP1921809A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7822047B2 (en) | 2006-07-04 | 2010-10-26 | Tellabs Oy | Method and arrangement for processing management and control messages |
US8787313B2 (en) | 2007-02-02 | 2014-07-22 | Huawei Technologies Co., Ltd. | Method, network system and destination network for transmitting QoS during a handover process between systems |
US8144601B2 (en) | 2007-05-30 | 2012-03-27 | Huawei Technologies Co., Ltd. | Fault detection method, communication system and label switching router |
CN101316225B (zh) * | 2007-05-30 | 2012-12-12 | 华为技术有限公司 | 一种故障检测方法、通信系统和标签交换路由器 |
WO2009012684A1 (fr) * | 2007-07-20 | 2009-01-29 | Huawei Technologies Co., Ltd. | Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd |
CN101087211B (zh) * | 2007-07-20 | 2010-08-11 | 华为技术有限公司 | 一种实现bfd机制中回声功能的方法及系统及功能实体 |
Also Published As
Publication number | Publication date |
---|---|
US7664044B2 (en) | 2010-02-16 |
US20070189177A1 (en) | 2007-08-16 |
EP1921809A1 (en) | 2008-05-14 |
EP1921809A4 (en) | 2008-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007016841A1 (fr) | Procédé de mise en œuvre de détection de panne de plan de transfert ip | |
US7561527B1 (en) | Bidirectional forwarding detection | |
US9166877B2 (en) | Distinguishing between connectivity verification availability and forwarding protocol functionality in a computer network | |
TWI461030B (zh) | 在快速重新路由條件下之資源保留協定訊務工程平穩重新啟動 | |
JP5992602B2 (ja) | IPv6ネットワークにおいてラベル配布プロトコル(LDP)を使用するためのシステムおよび方法 | |
US7765306B2 (en) | Technique for enabling bidirectional forwarding detection between edge devices in a computer network | |
US10044610B2 (en) | System, method and apparatus providing bi-directional forwarding detection support to unnumbered IP interfaces | |
US9407526B1 (en) | Network liveliness detection using session-external communications | |
JP5200170B2 (ja) | トラフィック接続および関連監視接続を確立する方法 | |
US7921219B2 (en) | Maintaining protocol adjacency state with forwarding failure | |
EP1779568B1 (en) | Graceful shutdown of ldp on specific interfaces between label switched routers | |
WO2007016833A1 (fr) | Procédé de déclenchement de détection de panne de détection de transfert bidirectionnel | |
WO2006099784A1 (fr) | Procédé de détection d’un défaut de liaison entre des noeuds d’une extrémité à l’autre dans un réseau hybride | |
WO2009089713A1 (fr) | Procédé de transmission d'un message bfd, procédé et dispositif de détection d'une défaillance de liaison | |
WO2008077300A1 (fr) | Procédé et système permettant de négocier le discriminateur de session de détection de transmission bidirectionnelle d'un pseudo-fil | |
WO2009056034A1 (fr) | Procédé, système et équipement pour établir une détection bfd pour un tunnel lsp | |
WO2008031334A1 (fr) | Procédé et système de mise à jour de chemin, et routage | |
WO2009012684A1 (fr) | Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd | |
WO2015096409A1 (zh) | 软件定义网络中的链路发现方法、装置及系统 | |
WO2014019348A1 (zh) | 操作、管理和维护oam配置的方法、设备及系统 | |
Katz et al. | Generic application of bidirectional forwarding detection (BFD) | |
JP5204308B2 (ja) | トラフィック接続および関連監視接続を確立する方法 | |
WO2006089490A1 (fr) | Méthode d’implémentation de fec bfd | |
US11343332B2 (en) | Method for seamless migration of session authentication to a different stateful diameter authenticating peer | |
CN102457404A (zh) | 检测通信路径mtu的方法、装置和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 11526567 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 11526567 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200680012178.1 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006753099 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2006753099 Country of ref document: EP |