WO2007016841A1 - Procédé de mise en œuvre de détection de panne de plan de transfert ip - Google Patents

Procédé de mise en œuvre de détection de panne de plan de transfert ip Download PDF

Info

Publication number
WO2007016841A1
WO2007016841A1 PCT/CN2006/001563 CN2006001563W WO2007016841A1 WO 2007016841 A1 WO2007016841 A1 WO 2007016841A1 CN 2006001563 W CN2006001563 W CN 2006001563W WO 2007016841 A1 WO2007016841 A1 WO 2007016841A1
Authority
WO
WIPO (PCT)
Prior art keywords
bfd
node
session
nodes
domain
Prior art date
Application number
PCT/CN2006/001563
Other languages
English (en)
French (fr)
Inventor
Suping Zhai
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CNA2005100877052A external-priority patent/CN1909470A/zh
Priority claimed from CN 200510087706 external-priority patent/CN1909471A/zh
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to CNA2006800121781A priority Critical patent/CN101160855A/zh
Priority to EP06753099A priority patent/EP1921809A4/en
Priority to US11/526,567 priority patent/US7664044B2/en
Publication of WO2007016841A1 publication Critical patent/WO2007016841A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/10Routing in connection-oriented networks, e.g. X.25 or ATM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

Definitions

  • the invention relates to a bidirectional forwarding detection (BFD) technology, in particular to a method for realizing IP forwarding plane fault detection by using bidirectional forwarding detection.
  • BFD bidirectional forwarding detection
  • BFD detects a link through a fast, negotiated rate Hello mechanism.
  • BFD can be used to detect multiple types of transmission accuracy, including Ethernet, Multiprotocol Label Switching (MPLS) paths, common routing encapsulation, and IP Security Protocol (IPSec) tunneling.
  • MPLS Multiprotocol Label Switching
  • IPSec IP Security Protocol
  • BFD is gradually developed from the basic transmission technology, so BFD can detect faults at various layers in the network.
  • the goal of BFD is to provide a low-overhead, short-detection failure detection mechanism on the path between adjacent routers.
  • the neighboring router refers to a router with any one or more logical links connected. Not limited to one hop. BFD can perform detection including interfaces, data links, and extensions to the forwarding engine itself.
  • BFD As a light-load link or node or interface fault detection method, BFD has great advantages for detecting data level faults.
  • BFD is used to detect the faulty state machine and some parameters necessary for establishing a BFD session and maintaining a BFD session, and are expressed in the form of data payload for various protocols.
  • BFD is used as the data plane for various media.
  • the fault detection mechanism is used as a data load.
  • BFD itself does not define how to start a BFD session under various media and various protocols. Therefore, for specific applications. In the scenario, if BFD is used to implement fault detection on the data forwarding plane, there is no specific implementation.
  • LSP label switching path
  • MPLS multi-protocol label switching
  • a method for detecting faults in the MPLS LSP data plane The corresponding intra-domain LSP is as shown in FIG. 1 , and may be a path between the LSR A and the LSR B in the domain A ( Domain A ), and the corresponding inter-domain LSP is as shown in FIG. 2 . Is the path between LSR A and LSR B between Domain A and Domain B.
  • the BFD load is defined as a User Datagram Protocol (UDP) payload encapsulated in IP packets.
  • UDP User Datagram Protocol
  • BFD is not considered as a detection method for IP forwarding plane faults.
  • the main purpose of the present invention is to provide a method for implementing IP forwarding plane fault detection, which can utilize BFD to implement IP forwarding plane fault detection.
  • a method for implementing IP forwarding plane fault detection comprising the following steps:
  • the IP node obtains BFD identifier information for bidirectional forwarding detection BFD and starts a BFD session.
  • the IP node encapsulates the BFD 4 message and transfers it between the IP nodes of the BFD session;
  • the IP node is an inter-domain IP node, and the route is dynamically configured.
  • Step A specifically includes:
  • the BFD identifier information is carried in a new capability code of the OPEN packet of the BGP packet;
  • the newly added capability code is set in the capability option of the OPEN message.
  • the IP node is an inter-domain IP node, and the route is dynamically configured.
  • Step A specifically includes:
  • the corresponding BFD identifier information is configured on the IP node, and the BFD session between the IP nodes is started by using the configured BFD identifier information.
  • the IP node is an inter-domain IP node or two intra-domain IP nodes, and the route is statically configured.
  • Step A specifically includes:
  • the corresponding BFD identifier information is configured on the IP node, and the BFD session between the IP nodes is started by using the configured BFD identifier information.
  • the IP node is an inter-domain IP node or two intra-domain IP nodes, and the route is statically configured.
  • Step A specifically includes:
  • the IP nodes obtain the BFD identifier information and initiate the BFD session between the IP nodes through the ICMPv44 message.
  • the BFD identifier information is carried in a new local identifier field of the ICMPv4 information request or the ICMPv4 information response message of the ICMPv4 message.
  • the step A further includes: starting the BFD session and then starting the BGP session.
  • the C bit in the BFD packet is used to declare whether the BFD session is associated with the control plane.
  • the step A further includes:
  • the peer IP address of the BFD session determines whether to stop the BGP smooth restart process of the control plane according to the C bit information. If the C bit information is not associated, and the BFD session detects a fault, the BGP smooth restart process is stopped; If the bit information is displayed as related, and the BFD session detects a fault, the BGP graceful restart process is continued. Before the BFD session is started in step A, the method further includes:
  • the IP node After obtaining the BFD identifier information, the IP node determines whether to enable the BFD to detect the static route forwarding plane fault.
  • the method for encapsulating the BFD packet is as follows: The user data protocol UDP packet is encapsulated.
  • the present invention obtains the BFD session information for the BFD detection by using the BFD session, and uses the obtained BFD identifier to start the BFD session to implement BFD fault detection.
  • the method for obtaining the BFD identifier may be an inter-domain IP through the Border Gateway Protocol (BGP) Open (OPEN) message.
  • BGP Border Gateway Protocol
  • OPEN Border Gateway Protocol
  • the method for obtaining the BFD identifier may be to configure corresponding BFD identifier information on each IP node, or by extending the Internet.
  • the Control Information Protocol (ICCMP4) message conveys BFD identifier information between the IP nodes.
  • the method of the invention initiates a BFD session and implements fault detection by transmitting BFD packets between the inter-domain/intra-domain IP nodes.
  • Figure 1 is a schematic diagram of LSPs in the detected domain
  • 2 is a schematic diagram of detected inter-domain LSPs
  • FIG. 3 is a schematic structural diagram of a BFD session implemented by an IP node in a domain
  • FIG. 4 is a schematic structural diagram of an inter-domain IP node implementing a BFD session
  • FIG. 5 is a flow chart of the method of the present invention. Mode for carrying out the invention
  • the core idea of the present invention is: the IP node obtains the BFD identifier information for the BFD session and starts the BFD session, and encapsulates and transmits the BFD packet between the IP nodes of the BFD session; Fault detection.
  • the IP forwarding plane includes the IP domain and the IP domain, as shown in Figure 3 and Figure 4, respectively.
  • Figure 3 is a schematic diagram of the structure of the BFD session implemented by the IP node in the domain
  • Figure 4 is the BFD session of the inter-domain IP node. Schematic diagram of the structure, in which the configuration of routes between IP nodes can be dynamically configured or statically configured.
  • the concept of the IP forwarding plane belongs to common knowledge of the prior art, and FIG. 3 and FIG. 4 are not described in detail herein.
  • the method of the present invention is directed to the case where the BFD session is an inter-domain IP node and the route is dynamically configured, and the BFD session is an inter-domain/intra-domain IP node and the route is statically configured.
  • Figure 5 is a flow chart of the method of the present invention, comprising the following steps:
  • Step 500 The IP node obtains the BFD identifier information used for BFD detection and starts a BFD session.
  • the capability value is a variable.
  • the actual BFD session identifier information is the BFD identifier information.
  • the Capability Value field can also be called the local discriminator. Field
  • the peer-to-domain inter-domain IP node can obtain the BFD identifier of the peer end of the session based on the BFD capability indication information, and perform correct detection to avoid false detection. For example, if Router A and Router B are BGP neighbors, if the forwarding path between Router A and Router B is faulty for UDP packet forwarding, and there is no fault in the transmission control protocol (TCP) packet forwarding, then BFD packets are sent. The forwarding path is faulty. The BGP packet forwarding path is normal. If the BFD session does not use the BGP OPEN packet to announce the BFD processing capability, the BFD session between Router A and Router B fails. The BGP information is forwarded normally. In the case of the protocol, the BFD session fails and the peers in the BGP adjacency do not support the BFD session. BGP considers that the forwarding path is normal and continues to operate normally when the data plane is faulty.
  • TCP transmission control protocol
  • the BGP session is started.
  • the BGP session is started.
  • the BFD session can be started after the BGP session.
  • the BGP session may be established in some cases, and a restart is required. For example, when Router A and Router B are BGP neighbors, if the forwarding path between Router A and Router A is correct, the BGP packet forwarding path is normal, and the packets of other protocol types are UDP. The file forwarding fails.
  • the data plane can pass. There are some methods to detect the fault status of the forwarding path, which may cause the system to restart. At this time, if the BGP session waits for the BFD session to start before starting, there will be no repeated startup. Because, in the above case, when the BFD session cannot be activated, the BGP session will always be in the non-established state, that is, the OPEN state.
  • the BFD session is started through the BGP OPEN message. After the BFD session is in the UP state, the BGP session is started to enter the established state. This prevents the above problem.
  • the hold time refers to the time that the BGP session waits to move from the OPEN state to the established state.
  • the method of the present invention can use the following processing method for the relationship between the BFD session and the existing BGP graceful restart: If the C bit in the BFD session of the BFD session is That is, the Control Plane Independent bit declaration does not affect the BFD session because the control plane fails (down), that is, the BFD session is not associated with the control plane. When the BFD session detects the fault and the BGP graceful restart is in progress, it should be The BGP graceful restart process is aborted. Because the data plane has also failed, the system restart should be performed.
  • the BFD session is associated with the control plane, the BFD session is not affected by the BGP graceful restart process.
  • the BFD session is associated with the control plane. It is all failure.
  • the Cbit bit is 0 to indicate no association, and the Cbit bit is 1 to indicate association. Then, BFD After the session peer IP node receives the BFD packet, if the C bit is 0, and the BFD session detects the fault, the BGP graceful restart process is stopped. If the C bit is 1, and the BFD session detects the fault, the continuation is performed. BGP smoothly restarts the process.
  • the BFD identifier can be obtained by static configuration. Specifically, the BFD identifier information is configured on the inter-domain IP node, and the method of actively or passively transmitting BFD packets is configured.
  • the BFD packet can be configured to be active on both ends, or one end is active, and the other end is in the passive mode.
  • the BFD function is enabled.
  • the inter-domain IP node uses the BFD identifier to guide BFD. The function starts the BFD detection process.
  • the BFD ID information is statically configured.
  • the configuration can be configured as active on both ends.
  • the other end is active and the other end is in the passive mode.
  • the inter-domain/intra-domain IP node initiates the BFD detection process using the BFD identifier.
  • ICMPv4 Information Request (ICMPv4 Information Request Message)
  • I ICMPv4 Information Reply Message (ICMPv4 Information Reply Message) sends a BFD identifier between the IP nodes to enable the peer to obtain the BFD identifier and start a BFD session.
  • the source (or terminal) of the forwarding path between the IP nodes sends an ICMPv4 Information Request message, and the source (or terminal) BFD identifier is sent to the terminal (or the source). At the same time, the terminal (or source) returns.
  • the ICMPv4 Information Reply message carries the BFD identifier of the terminal (or source) and is sent to the source (or terminal).
  • the ICMPv4 message is transmitted between the IP nodes, so that the IP nodes at both ends of the static route link obtain the BFD identifier information of the peer node.
  • Step 501 The IP node encapsulates the BFD packet and transfers it between the IP nodes of the BFD session.
  • the BFD packet can be encapsulated by UDP packets.
  • the BFD packet and the BFD payload are transmitted between the IP nodes at both ends of the link.
  • the corresponding UDP source port number and destination port number can be obtained from the Internet address.
  • the Assigned Body (IANA) organization is uniformly distributed. The specific encapsulation method can be found in the relevant draft regulations, and will not be described here.
  • the application can determine whether to enable the BFD function to detect faults on the static route forwarding plane.
  • Step 502 Perform fault detection according to the BFD packet transmitted between the IP nodes.
  • the present invention can use the BFD to detect the forwarding plane fault between the forwarding paths of the BGP neighbors, and can avoid using the BFD in some cases to detect the false detections that may occur when the forwarding path is faulty.
  • the present invention uses the BFD to detect the IP forwarding plane fault for the static route, thereby improving the reliability of the fault detection of the static route forwarding plane.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

实现 IP转发平面故障检测的方法
技术领域
本发明涉及双向转发检测 (BFD )技术, 尤指一种利用双向转发检 测实现 IP转发平面故障检测的方法。 发明背景
随着通信技术的发展, 如何保障数据传送质量, 在数据传送出现问 题时, 快速对故障进行定位, 已经成为了一个亟待解决的重要问题, 因 此, BFD作为一种快速检测机制, 应运而生, BFD是通过一种快速的可 协商速率的 Hello机制来对链路进行检测的。
BFD可以用于检测以太网、 多协议标记交换(MPLS )路径、 普通 路由封装以及 IP网络安全协议(IPSec )隧道在内的多种类型的传输正确 性。
BFD是从基础传输技术中经过逐步发展而来的, 因此 BFD可以检测 网络中各层的故障。 BFD的目标是在相邻路由器之间的路径上, 提供一 种低开销、 短检测周期的失败检测机制, 该相邻路由器是指有任意一条 或多条逻辑链路相连的路由器, 路由器之间不限于一跳。 BFD可以进行 包括接口、 数据链路和扩展到转发引擎自身的检测。
BFD作为一种轻载的链路或节点或接口故障的检测方法, 对于检测 数据层面的故障有很大的优势。目前定义了 BFD用于检测故障的状态机 和用于建立 BFD会话和维护 BFD会话的必须的一些参数, 并且以数据 负荷的形式表达出来, 以供各种协议,各种介质采用 BFD作为数据平面 故障检测机制时作为数据负荷使用。 但是, BFD本身没有定义在各种介 质、各种协议情况下如何启动 BFD会话的方法, 因此, 对于具体的应用 场景,如果利用 BFD实现数据转发平面的故障检测, 目前没有具体实现 方案。
目前, 定义了如何在多协议标签交换(MPLS ) 网络中采用 BFD作 为标签交换路径 (LSP )故障检测的方法, 还规定了 BFD负荷在 MPLS 中的封装方法, 同时对于 BFD会话启动, 使用一种检测 MPLS LSP数据 平面故障的方法。 相应的被检测的域内 LSP如图 1所示, 具体可以为域 A ( Domain A )内的 LSR A和 LSR B之间的路径,相应的被检测的域间 LSP 如图 2所示,具体可以为 Domain A和 Domain B之间的 LSR A和 LSR B之间 的路径。 另外, 定义了 BFD负荷作为用户数据报协议(UDP ) 负荷在 IP 报文中封装等。
上述技术方案是针对 MPLS LSP使用 BFD作为故障检测的一种方 法, 没有考虑使用 BFD作为 IP转发平面故障的检测方法。 发明内容
有鉴于此,本发明的主要目的在于提供一种实现 IP转发平面故障检 测的方法, 能够利用 BFD实现 IP转发平面故障的检测。
为达到上述目的, 本发明的技术方案具体是这样实现的:
一种实现 IP转发平面故障检测的方法, 该方法包括以下步骤:
A. IP节点获取用于双向转发检测 BFD的 BFD标识符信息并启动 BFD会话;
B. IP节点封装 BFD 4艮文并在 BFD会话的 IP节点间传递;
C. 根据 IP节点间传递的 BFD报文进行故障检测。
所述 IP节点为两个域间 IP节点, 且路由动态配置, 步驟 A具体包 括:
所述 IP节点间通过交互的边界网关协议 BGP报文获取 BFD标识符 信息并启动所述 IP节点间的 BFD会话。
所述 BFD标识符信息携带在所述 BGP报文的打开 OPEN报文的新 增能力编码中;
所述新增能力编码设置在 OPEN报文的能力选项中。
所述 IP节点为两个域间 IP节点, 且路由动态配置, 步骤 A具体包 括:
分别在所述 IP节点上配置相应的 BFD标识符信息, 并利用所配置 的 BFD标识符信息启动所述 IP节点间的 BFD会话。
所述 IP节点为两个域间 IP节点或两个域内 IP节点,且路由静态配 置, 步骤 A具体包括:
分别在所述 IP节点上配置相应的 BFD标识符信息, 并利用所配置 的 BFD标识符信息启动所述 IP节点间的 BFD会话。
所述 IP节点为两个域间 IP节点或两个域内 IP节点,且路由静态配 置, 步驟 A具体包括:
所述 IP节点间通过交互的 ICMPv44艮文获取 BFD标识符信息并启 动所述 IP节点间的 BFD会话。
所述 BFD标识符信息携带在所述 ICMPv4报文的 ICMPv4信息请求 或 ICMPv4信息回应消息的新增本端识别器域中。
所述步骤 A进一步包括: 所述启动 BFD会话后再启动 BGP会话。 所述 BFD报文中的 C比特位用于声明 BFD会话是否和控制层面相关 联; 所述步骤 A进一步包括:
BFD会话对端 IP节点根据所述 C比特位信息确定是否停止控制层面 BGP平稳重启过程, 若 C比特位信息显示为不相关联, 且 BFD会话检测 到故障, 则停止 BGP平稳重启过程; 若 C比特位信息显示为相关联, 且 BFD会话检测到故障, 则继续执行 BGP平稳重启过程。 步骤 A中所述启动 BFD会话之前, 该方法还包括:
所述 IP节点获得 BFD标识符信息后 , 根据需要确定是否启动 BFD进 行静态路由转发平面故障的检测。
步驟 B中所述对 BFD报文进行封装的方法为: 采用用户数据协议 UDP报文进行封装。
由上述技术方案可见, 本发明通过使 IP节点获取用于 BFD检测的 BFD标识符信息, 并利用获得的 BFD标识符启动 BFD会话, 以实现 BFD故障检测。 在作为 BFD会话端点的 IP节点双方为域间 IP节点, 且路由动态配置时,上述获取 BFD标识符的方法可以是通过边界网关协 议( BGP )的打开( OPEN )报文在所述域间 IP节点间传递 BFD标识符 信息, 或者分别在各域间 IP节点上预先配置相应的 BFD标识符信息。 在作为 BFD会话端点的 IP节点双方为域间 /域内 IP节点, 且路由静态 配置时, 上述获取 BFD标识符的方法可以是分别在各 IP节点上配置相 应的 BFD标识符信息, 或者通过扩展因特网控制信息协议 ( ICMPv4 ) 报文在所述 IP节点间传递 BFD标识符信息。
本发明方法启动了 BFD会话,并利用 BFD报文在域间 /域内 IP节点 间的传递实现了故障检测。 附图简要说明
图 1是被检测的域内 LSP示意图;
图 2是被检测的域间 LSP示意图;
图 3是域内 IP节点实现 BFD会话的结构示意图;
图 4是域间 IP节点实现 BFD会话的结构示意图;
图 5是本发明方法的流程图。 实施本发明的方式
本发明的核心思想是: IP节点获取用于 BFD检测的 BFD标识符信 息并启动 BFD会话, 在 BFD会话的 IP节点间进行 BFD报文的封装及 传递; 根据 IP节点间传递的 BFD报文进行故障检测。
为使本发明的目的、 技术方案及优点更加清楚明白, 以下参照附图 并举较佳实施例, 对本发明进一步详细说明。
IP转发平面包括 IP域内和 IP域间两种情况, 分别如图 3和图 4所示, 其中, 图 3是域内 IP节点实现 BFD会话的结构示意图, 图 4是域间 IP节点 实现 BFD会话的结构示意图, 其中 IP节点间路由的配置可以有动态配置 和静态配置两种情况。 IP转发平面的概念属于本领预技术人员公知常识, 这里不再对图 3和图 4进行详细描述。
本发明方法分别针对 BFD会话双方为域间 IP节点且路由动态配置, 以及 BFD会话双方为域间 /域内 IP节点且路由静态配置两种情况, 具体描 述实现故障检测的方法。
图 5是本发明方法的流程图, 包括以下步骤:
步骤 500: IP节点获取用于 BFD检测的 BFD标识符信息并启动 BFD 会话。
(一)在 IP节点为两个域间 IP节点, 且路由动态配置时, 获取用于 BFD检测的 BFD标识符信息并启动 BFD会话的方法有下面两种。
(1)对 BGP的 OPEN报文中的选项参数 ( option parameters ) 中能力 ( capabilities )选项进行扩展, 增加新的能力编码( Capability Code ) , 用于携带 BFD会话 ( session )标识符, 作为 BFD能力指示信息指示是否 具有 BFD处理能力。 具体的 OPEN报文的格式如下所述:
Capability Code (1 octet): 具体的编码值;
Capability Length (1 octet): 能力字段长度为 4; Capability Value (variable): 用于携带能力值,该能力值为一个变量, 具体为实际的 BFD session标识符信息即 BFD标识符信息, 该 Capability Value字段也可以称为本端识别器 (my discriminator )字段;
当启动 BFD session时, 在对端域间 IP节点上可以根据所述的 BFD能 力指示信息获取会话的对端的 BFD标识符, 进行正确的检测, 避免了误 检测。例如, 当 Router A和 Router B是 BGP邻居时,如果 Router A和 Router B之间转发路径对于 UDP报文转发有故障, 对于传输控制协议(TCP ) 报文转发没有故障, 那么, 对于 BFD报文转发路径有故障, 对于 BGP报 文转发路径正常。 如果 BFD不采用 BGP OPEN报文宣告是否具备 BFD处 理能力, 而以其它方式启动如静态配置, 那么会造成 Router A和 Router B 之间的 BFD session失败, 因为此时, BGP信息转发正常, 对于 BGP协议 而言, 无法区分 BFD session失败情况和 BGP邻接中对端不支持 BFD处理 能力的情况, 可能会造成 BGP认为转发路径正常, 在数据平面有故障时 还继续正常运行。
本步骤中, 如果利用 BGP OPEN报文携带是否具备 BFD处理能力信 息以启动 BFD session, 在 BGP两个 IP端点上, 除了存在对 BFD session的 启动外, 还需要启动现有的 BGP session, 为了防止重复启动, 本发明方 法进一步对启动 BFD session和启动 BGP session的顺序进行如下处理: 在启动 BGP session的过程中, 通过 BGP OPEN报文启动 BFD session 时, 如果 BGP session的启动不考虑 BFD session是否启动, 则 BFD session 可以在 BGP session之后启动。 但是, 如果 BFD处于激活(UP )状态, 可 能会在某些情况下造成 BGP session刚建立, 就需要重新启动的情况。 例 如, 当 Router A和 Router B是 BGP邻居时, 如果 Router A和 Router A之间 转发路径对于 TCP报文转发没有故障即对 BGP报文转发路径正常 , 而对 其它协议类型的报文如 UDP报文转发发生故障, 此时在数据平面可以通 过一些方法检测出转发路径的故障状态, 这样可能会造成系统重启, 此 时, 如果 BGP会话在启动之前等待 BFD session启动, 则不会出现重复 启动。 因为, 在上述情况下 BFD session不能激活时, BGP session也会一 直处于非建立 (establish )状态即 OPEN状态。
为此, 如果在 BGP session启动时, 通过 BGP OPEN报文启动 BFD session,在 BFD session处于 UP状态后,再启动 BGP session使其进入建立 ( established )状态, 这样可以避免上述的问题发生。 在 BGP session等 待 BFD session启动的过程中,需要对 BGP session的保持时间( Hold time ) 作相应处理,例如可以不刷新,这样 BGP session不会超时,避免造成 BGP session因超时而失败。 按照协议规定, 该保持时间是指 BGP session在从 OPEN状态迁移至 established状态所需等待的时间。
在实际应用过程中, 可以根据实际情况决定是否考虑启动 B GP session和 BFD session的顺序关系 , 启动 BGP session和 BFD session也可以 是独立进行的。
进一步地, 在 BGP两个 IP端点上, 本发明方法对 BFD session和现有 BGP平稳启动( BGP graceful restart )之间的关系可以采用以下处理方法: 如果 BFD session的 BFD报文中的 C bit位即独立的控制平面( Control Plane Independent )位声明不因为控制层面失败( down )影响 BFD session 即 BFD session和控制层面不相关联, 则当 BFD session正好检测到故障 而且 BGP graceful restart正在进行时, 应该中止 BGP graceful restart过程 , 因为此时数据层面也发生了故障, 应该进行系统重启;
如果在 BFD报文的 C bit位声明 BFD session和控制层面相关联, 则对 BGP graceful restart过程不会有影响,因为此时 BFD session和控制层面相 关联, 不管转发平面是否故障, BFD session此时都是失败的。
假设 Cbit位为 0表示不相关联, Cbit位为 1表示相关联, 那么, BFD 会话对端 IP节点收到 BFD报文后, 若 C比特位为 0, 且 BFD会话检测到故 障, 则停止 BGP平稳重启过程; 若 C比特位为 1 ,且 BFD会话检测到故障, 则继续执行 BGP平稳重启过程。
(2) 本发明中还可以采用静态配置的方式获取 BFD标识符, 具体为 在域间 IP节点上配置相应的 BFD标识符信息, 且配置本端的主动 /被动发 送 BFD报文的方式即是否主动发送 BFD报文, 具体可以配置为两端均为 主动, 或一端为主动, 另一端为被动方式; 并且配置 BFD功能使能信息, 域间 IP节点利用所述的 BFD标识符弓 I导执行 BFD功能即启动 BFD检测过 程。
^ 1导执行 BFD功能即启动 BFD检测过程的具体实现可参见相关草案 规定, 这里不再赘述, 本步骤强调的是获取 BFD标识符信息的方法。
(二)在 IP节点为两个域间 IP节点或两个域内 IP节点, 且路由静态 配置时, 获取用于 BFD检测的 BFD标识符信息并启动 BFD会话的方法有 下面两种。
(1)静态配置 BFD标识符。
在运行 BFD的链路两端 IP节点上, 静态配置 BFD标识符信息, 且配 可以配置为两端均为主动, 或一端为主动, 另一端为被动方式; 并且配 置 BFD功能使能信息, 域间 /域内 IP节点利用所述的 BFD标识符启动 BFD 检测过程。
(2)扩展 ICMPv4信息请求( ICMPv4 Information Request ) I ICMPv4 信息回应消息 ( ICMPv4 Information Reply Message )报文在 IP节点间传 递 BFD标识符 , 以使对端获取 BFD标识符并启动 BFD会话。
在 ICMPv4 Information Request/ ICMPv4 Information Reply Message 报文中增加 my discriminator域, 用于 7?载本端的 BFD标识符信息, 并通 过在 IP节点间转发路径源端 (或终端)发送 ICMPv4 Information Request 报文, 将源端(或终端) BFD标识符发送给终端(或源端); 同时, 在 终端 (或源端)返回的 ICMPv4 Information Reply Message报文中携带终 端 (或源端) 的 BFD标识符, 并发送给源端 (或终端) 。 通过 ICMPv4 报文在 IP节点间的传递, 使得静态路由链路的两端 IP节点获得了对端节 点的 BFD标识符信息。
步骤 501: IP节点对 BFD报文进行封装并在 BFD会话的 IP节点间 传递。
对 BFD报文可以采用 UDP报文进行封装 , 即将 BFD报文及 BFD负荷 用 UDP报文承载在链路两端 IP节点之间进行传输, 相应的 UDP源端口号 和目的端口号可以由互联网地址指派机构 (IANA )组织统一分配。 具 体封装方法可参见相关草案规定, 这里不再赘述。
在实际应用过程中, 应用程序可以根据需要决定是否启动运行 BFD 功能, 以对静态路由转发平面的故障进行检测。
步骤 502: 根据 IP节点间传递的 BFD报文进行故障检测。
具体的 BFD检测过程在 BFD协议中已有明确说明, 这里不再详述。 综上所述, 本发明可以在 BGP邻居的转发路径之间使用 BFD检测转 发平面故障, 并可以在 IP域间避免某些情况下使用 BFD作为检测转发路 径故障时可能出现的误检测情况。 同时, 本发明针对静态路由采用 BFD 检测 IP转发平面故障, 从而提高了静态路由转发平面的故障检测的可靠 性。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的 保护范围, 凡在本发明的精神和原则之内所做的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种实现 IP转发平面故障检测的方法, 其特征在于, 该方法包 括以下步骤:
A. IP节点获取用于双向转发检测 BFD的 BFD标识符信息并启动 BFD会话;
B. IP节点封装 BFD报文并在 BFD会话的 IP节点间传递;
C. 根据 IP节点间传递的 BFD报文进行故障检测。
2、 根据权利要求 1所述的方法, 其特征在于, 所述 IP节点为两个 域间 IP节点, 且路由动态配置, 步骤 A具体包括:
所述 IP节点间通过交互的边界网关协议 BGP 4艮文获取 BFD标识符 信息并启动所述 IP节点间的 BFD会话。
3、 根据权利要求 2所述的方法, 其特征在于, 所述 BFD标识符信 息携带在所述 BGP报文的打开 OPEN报文的新增能力编码中;
所述新增能力编码设置在 OPEN报文的能力选项中。
4、 根据权利要求 1所述的方法, 其特征在于, 所述 IP节点为两个 域间 IP节点, 且路由动态配置, 步骤 A具体包括:
分别在所述 IP节点上配置相应的 BFD标识符信息, 并利用所配置 的 BFD标识符信息启动所述 IP节点间的 BFD会话。
5、 根据权利要求 1所述的方法, 其特征在于, 所述 IP节点为两个 域间 IP节点或两个域内 IP节点, 且路由静态配置, 步骤 A具体包括: 分别在所述 IP节点上配置相应的 BFD标识符信息, 并利用所配置 的 BFD标识符信息启动所述 IP节点间的 BFD会话。
6、 居权利要求 1所述的方法, 其特征在于, 所述 IP节点为两个 域间 IP节点或两个域内 IP节点, 且路由静态配置, 步骤 A具体包括: 所述 IP节点间通过交互的 ICMPv4报文获取 BFD标识符信息并启 动所述 IP节点间的 BFD会话。
7、 根据权利要求 6所述的方法, 其特征在于, 所述 BFD标识符信 息携带在所述 ICMPv4报文的 ICMPv4信息请求或 ICMPv4信息回应消 息的新增本端识别器域中。
8、 根据权利要求 2所述的方法, 其特征在于, 所述步骤 A进一步 包括: 所述启动 BFD会话后再启动 BGP会话。
9、 根据权利要求 2所述的方法, 其特征在于, 所述 BFD报文中的 C 比特位用于声明 BFD会话是否和控制层面相关联; 所述步骤 A进一步包 括:
BFD会话对端 IP节点根据所述 C比特位信息确定是否停止控制层面 BGP平稳重启过程, 若 C比特位信息显示为不相关联, 且 BFD会话检测 到故障, 则停止 BGP平稳重启过程; 若 C比特位信息显示为相关联, 且 BFD会话检测到故障, 则继续执行 BGP平稳重启过程。
10、 根据权利要求 5或 6所述的方法, 其特征在于, 步骤 A中所述启 动 BFD会话之前, 该方法还包括:
所述 IP节点获得 BFD标识符信息后, 根据需要确定是否启动 BFD进 行静态路由转发平面故障的检测。
11、 根据权利要求 1 所述的方法, 其特征在于, 步骤 B 中所述对 BFD 4艮文进行封装的方法为: 采用用户数据协议 UDP报文进行封装。
PCT/CN2006/001563 2005-08-05 2006-07-04 Procédé de mise en œuvre de détection de panne de plan de transfert ip WO2007016841A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CNA2006800121781A CN101160855A (zh) 2005-08-05 2006-07-04 实现ip转发平面故障检测的方法
EP06753099A EP1921809A4 (en) 2005-08-05 2006-07-04 METHOD FOR OBTAINING AN ERROR DETECTION OF AN IP FORWARDING LEVEL
US11/526,567 US7664044B2 (en) 2005-08-05 2006-09-26 Method of failure detection in an IP forwarding plane

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN200510087705.2 2005-08-05
CNA2005100877052A CN1909470A (zh) 2005-08-05 2005-08-05 检测静态路由转发平面故障的实现方法
CN 200510087706 CN1909471A (zh) 2005-08-05 2005-08-05 检测域间ip转发平面故障的实现方法
CN200510087706.7 2005-08-05

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/526,567 Continuation US7664044B2 (en) 2005-08-05 2006-09-26 Method of failure detection in an IP forwarding plane

Publications (1)

Publication Number Publication Date
WO2007016841A1 true WO2007016841A1 (fr) 2007-02-15

Family

ID=37727082

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/001563 WO2007016841A1 (fr) 2005-08-05 2006-07-04 Procédé de mise en œuvre de détection de panne de plan de transfert ip

Country Status (3)

Country Link
US (1) US7664044B2 (zh)
EP (1) EP1921809A4 (zh)
WO (1) WO2007016841A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009012684A1 (fr) * 2007-07-20 2009-01-29 Huawei Technologies Co., Ltd. Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd
US7822047B2 (en) 2006-07-04 2010-10-26 Tellabs Oy Method and arrangement for processing management and control messages
US8144601B2 (en) 2007-05-30 2012-03-27 Huawei Technologies Co., Ltd. Fault detection method, communication system and label switching router
US8787313B2 (en) 2007-02-02 2014-07-22 Huawei Technologies Co., Ltd. Method, network system and destination network for transmitting QoS during a handover process between systems

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7558263B1 (en) 2004-08-30 2009-07-07 Juniper Networks, Inc. Reliable exchange of control information for multicast virtual private networks
US7564803B1 (en) 2005-08-29 2009-07-21 Juniper Networks, Inc. Point to multi-point label switched paths with label distribution protocol
US7839862B1 (en) 2006-06-30 2010-11-23 Juniper Networks, Inc. Upstream label assignment for the label distribution protocol
US7742482B1 (en) 2006-06-30 2010-06-22 Juniper Networks, Inc. Upstream label assignment for the resource reservation protocol with traffic engineering
US7787380B1 (en) 2006-06-30 2010-08-31 Juniper Networks, Inc. Resource reservation protocol with traffic engineering point to multi-point label switched path hierarchy
US7860981B1 (en) * 2006-09-29 2010-12-28 Juniper Networks, Inc. Systems and methods for IP session keepalive using BFD protocols
CN100558055C (zh) * 2006-11-10 2009-11-04 华为技术有限公司 减少错误平滑重启状态持续时长的方法及路由器
US20080172582A1 (en) * 2007-01-12 2008-07-17 David Sinicrope Method and system for providing peer liveness for high speed environments
US8374164B2 (en) * 2007-04-06 2013-02-12 Cisco Technology, Inc. Detection of specific BFD path failures
CN101437021B (zh) * 2007-11-16 2013-08-07 华为技术有限公司 一种对接入提示信息的处理方法、系统及装置
CN101459594B (zh) * 2007-12-14 2011-04-13 华为技术有限公司 Bfd报文的发送方法、链路故障的探测方法及装置
US7936780B1 (en) * 2008-03-12 2011-05-03 Juniper Networks, Inc. Hierarchical label distribution protocol for computer networks
US7969894B2 (en) * 2008-05-07 2011-06-28 Hewlett-Packard Development Company, L.P. System and method for dead gateway detection
US8422362B2 (en) * 2008-08-05 2013-04-16 At&T Intellectual Property I, Lp Reliability as an interdomain service
US8169921B2 (en) 2008-09-30 2012-05-01 At&T Intellectual Property I, Lp Methods and apparatus to monitor border gateway protocol sessions
US7929557B2 (en) * 2008-11-14 2011-04-19 Juniper Networks, Inc. Summarization and longest-prefix match within MPLS networks
US8493872B2 (en) * 2009-08-12 2013-07-23 Fujitsu Limited System and method for monitoring the connectivity of a path between nodes in a network
WO2014075213A1 (zh) * 2012-11-13 2014-05-22 华为技术有限公司 双向转发检测bfd会话协商方法、设备及系统
CN103067220B (zh) * 2012-12-19 2016-02-10 中兴通讯股份有限公司 参数更新情况下双向链路转发检测方法及装置
US8953500B1 (en) 2013-03-29 2015-02-10 Juniper Networks, Inc. Branch node-initiated point to multi-point label switched path signaling with centralized path computation
US9497107B1 (en) * 2013-06-06 2016-11-15 Cisco Technology, Inc. Seamless path monitoring and rapid fault isolation using bidirectional forwarding detection in a network environment
JP2016048850A (ja) * 2014-08-27 2016-04-07 富士通株式会社 パケット転送装置、パケット転送システム、及びパケット転送方法
US10243781B1 (en) * 2017-07-05 2019-03-26 Juniper Networks, Inc. Detecting link faults in network paths that include link aggregation groups (LAGs)
US11115342B2 (en) 2019-04-16 2021-09-07 Hewlett Packard Enterprise Development Lp Using BFD packets in a virtualized device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5987629A (en) * 1996-02-22 1999-11-16 Fujitsu Limited Interconnect fault detection and localization method and apparatus
CN1501644A (zh) * 2002-11-19 2004-06-02 ��Ϊ�������޹�˾ Ip网络设备间可达性的检测方法和其在公共拨号网络平台接入备份中的应用

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6553423B1 (en) * 1999-05-27 2003-04-22 Cisco Technology, Inc. Method and apparatus for dynamic exchange of capabilities between adjacent/neighboring networks nodes
US7327683B2 (en) * 2000-03-16 2008-02-05 Sri International Method and apparatus for disseminating topology information and for discovering new neighboring nodes
US7561527B1 (en) * 2003-05-02 2009-07-14 David Katz Bidirectional forwarding detection
WO2005006671A1 (ja) * 2003-07-09 2005-01-20 Fujitsu Limited ネットワークにおける特定サービスの最適ルーティング方法並びに同ネットワークに用いられるサーバ及びルーティングノード
US7406030B1 (en) * 2003-08-25 2008-07-29 Juniper Networks, Inc. Dynamic renegotiation of graceful restart time to avoid double-failure traffic loss
KR20050062025A (ko) * 2003-12-19 2005-06-23 삼성전자주식회사 Ip 패킷의 다중 필드 에러에 대한 icmp 패킷 생성시스템 및 방법
US20060198322A1 (en) * 2005-03-03 2006-09-07 Susan Hares Method and apparatus for BGP peer prefix limits exchange with multi-level control
US7499395B2 (en) * 2005-03-18 2009-03-03 Cisco Technology, Inc. BFD rate-limiting and automatic session activation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5987629A (en) * 1996-02-22 1999-11-16 Fujitsu Limited Interconnect fault detection and localization method and apparatus
CN1501644A (zh) * 2002-11-19 2004-06-02 ��Ϊ�������޹�˾ Ip网络设备间可达性的检测方法和其在公共拨号网络平台接入备份中的应用

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SALAS: "MAKING CREDIBLE IP METROPOLITAN AREA CORE NETWORK", CHINESE COMMUNICATION NEWS NETWORK, 13 May 2005 (2005-05-13), pages 1 - 3 *
See also references of EP1921809A4 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7822047B2 (en) 2006-07-04 2010-10-26 Tellabs Oy Method and arrangement for processing management and control messages
US8787313B2 (en) 2007-02-02 2014-07-22 Huawei Technologies Co., Ltd. Method, network system and destination network for transmitting QoS during a handover process between systems
US8144601B2 (en) 2007-05-30 2012-03-27 Huawei Technologies Co., Ltd. Fault detection method, communication system and label switching router
CN101316225B (zh) * 2007-05-30 2012-12-12 华为技术有限公司 一种故障检测方法、通信系统和标签交换路由器
WO2009012684A1 (fr) * 2007-07-20 2009-01-29 Huawei Technologies Co., Ltd. Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd
CN101087211B (zh) * 2007-07-20 2010-08-11 华为技术有限公司 一种实现bfd机制中回声功能的方法及系统及功能实体

Also Published As

Publication number Publication date
EP1921809A4 (en) 2008-10-01
US20070189177A1 (en) 2007-08-16
EP1921809A1 (en) 2008-05-14
US7664044B2 (en) 2010-02-16

Similar Documents

Publication Publication Date Title
WO2007016841A1 (fr) Procédé de mise en œuvre de détection de panne de plan de transfert ip
US7561527B1 (en) Bidirectional forwarding detection
US9166877B2 (en) Distinguishing between connectivity verification availability and forwarding protocol functionality in a computer network
TWI461030B (zh) 在快速重新路由條件下之資源保留協定訊務工程平穩重新啟動
JP5992602B2 (ja) IPv6ネットワークにおいてラベル配布プロトコル(LDP)を使用するためのシステムおよび方法
US7765306B2 (en) Technique for enabling bidirectional forwarding detection between edge devices in a computer network
US10044610B2 (en) System, method and apparatus providing bi-directional forwarding detection support to unnumbered IP interfaces
US9407526B1 (en) Network liveliness detection using session-external communications
JP5200170B2 (ja) トラフィック接続および関連監視接続を確立する方法
US7921219B2 (en) Maintaining protocol adjacency state with forwarding failure
EP1779568B1 (en) Graceful shutdown of ldp on specific interfaces between label switched routers
US20070180105A1 (en) Technique for distinguishing between link and node failure using bidirectional forwarding detection (BFD)
WO2007016833A1 (fr) Procédé de déclenchement de détection de panne de détection de transfert bidirectionnel
WO2006099784A1 (fr) Procédé de détection d’un défaut de liaison entre des noeuds d’une extrémité à l’autre dans un réseau hybride
WO2009089713A1 (fr) Procédé de transmission d'un message bfd, procédé et dispositif de détection d'une défaillance de liaison
WO2008077300A1 (fr) Procédé et système permettant de négocier le discriminateur de session de détection de transmission bidirectionnelle d'un pseudo-fil
WO2009056034A1 (fr) Procédé, système et équipement pour établir une détection bfd pour un tunnel lsp
WO2008031334A1 (fr) Procédé et système de mise à jour de chemin, et routage
WO2015184739A1 (zh) 故障检测方法及装置
WO2009012684A1 (fr) Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd
WO2014019348A1 (zh) 操作、管理和维护oam配置的方法、设备及系统
Katz et al. Generic application of bidirectional forwarding detection (BFD)
JP5204308B2 (ja) トラフィック接続および関連監視接続を確立する方法
WO2006089490A1 (fr) Méthode d’implémentation de fec bfd
US11343332B2 (en) Method for seamless migration of session authentication to a different stateful diameter authenticating peer

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 11526567

Country of ref document: US

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWP Wipo information: published in national office

Ref document number: 11526567

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 200680012178.1

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006753099

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2006753099

Country of ref document: EP