WO2008080311A1 - Méthode de couplage de liaisons et dispositif de communication - Google Patents

Méthode de couplage de liaisons et dispositif de communication Download PDF

Info

Publication number
WO2008080311A1
WO2008080311A1 PCT/CN2007/070460 CN2007070460W WO2008080311A1 WO 2008080311 A1 WO2008080311 A1 WO 2008080311A1 CN 2007070460 W CN2007070460 W CN 2007070460W WO 2008080311 A1 WO2008080311 A1 WO 2008080311A1
Authority
WO
WIPO (PCT)
Prior art keywords
downlink
route
routing entry
association group
module
Prior art date
Application number
PCT/CN2007/070460
Other languages
English (en)
Chinese (zh)
Inventor
Shi Tang
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2008080311A1 publication Critical patent/WO2008080311A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method for link linkage and a communication device.
  • IP Internet Protocol
  • FRR Fast Reroute
  • the key to implementing FRR technology is how to detect network changes more quickly.
  • most network devices notify the network of changes by detecting the link status of the network (whether it is faulty). Therefore, it is proposed to notify the downstream device of the FRR switching as soon as possible after the upstream device finds the link fault.
  • the monitoring link (MonitorLink) determines the state of one or a group of downlinks by checking the status of the uplink of the device. If the uplink fails, the downlink (or one) link is forcibly set to down, so that the downstream device can also detect the change of the network status as soon as possible.
  • the existing MonitorLink detects the status of the entire uplink to determine whether the downlink is down, but sometimes the uplink does not fail (ie, up), but a critical route is unreachable, so even if the link is normal, traffic is Still interrupted. At this time, the existing MonitorLink cannot be perceived, and the linkage of the downlink cannot be implemented, which causes the FRR to fail to start quickly.
  • device D in the network accesses network segment X through device 8 and device B (as indicated by the solid arrow in the figure). At this time, enable MonitorLink on device A to associate link 10 with link 20.
  • the link 20 is automatically shut down, at which point the device D senses the anomaly of the link 20, thereby triggering the FRR to cause the data flow to follow the dashed arrow path in the figure.
  • device D senses the anomaly of the link 20, thereby triggering the FRR to cause the data flow to follow the dashed arrow path in the figure.
  • the existing MonitorLink technology only monitors the uplink. The working state of the link to determine whether the downlink is off. Closed, but when a specific route does not exist, it cannot close the downlink and notify the downstream device.
  • the embodiments of the present invention provide a method and a device for link linkage, which can implement link linkage according to a specific route state.
  • the embodiment of the invention discloses a method for link linkage, which includes:
  • an embodiment of the present invention further discloses a communication device, including:
  • a detecting module configured to determine, when a deletion event of the routing entry is received, whether the route is associated with the downlink
  • an execution module configured to: when the detecting module detects that the route is associated with a downlink, shut down the downlink.
  • the route that is forwarded by the downlink and the change that is more easily changed is monitored by one or several routing entries.
  • the routing entry concerned is invalid, the pre-bound chain is closed.
  • the route is used to notify the downstream device to re-select the forwarding path to achieve fast convergence of the entire network.
  • FIG. 1 is a schematic diagram of networking in which downlink linkage is implemented according to an uplink condition in the prior art
  • FIG. 2 is a schematic diagram of networking in which downlink linkage is implemented according to a routing situation in the embodiment of the present invention
  • FIG. 3 is a method embodiment of the present invention. Schematic diagram of the process
  • FIG. 4 is a schematic flowchart of performing association group configuration in an embodiment of the method provided by the present invention
  • FIG. 5 is a schematic flowchart of a method for deleting a routing entry in an embodiment of the method provided by the present invention
  • FIG. 6 is a schematic diagram of a process when a routing entry creation event is received in an embodiment of the method provided by the present invention
  • FIG. 7 is a schematic diagram of a communication device according to an embodiment of the present invention.
  • the path when the routing entry that directs forwarding is invalid, the path is closed.
  • the downlink associated with the entry when the routing entry that directs forwarding is invalid, the path is closed.
  • the communication device when receiving the routing entry deletion event, or after a certain time (the time can be arbitrarily set), the communication device may first determine the state of the link where the route is located. When the link does not fail, it is determined whether the route is associated with the downlink, and if it is associated, the downlink is closed. Of course, it is also possible to directly determine whether the route is associated with the downlink, or directly after the time when the routing entry deletion event is received, or after a certain time (the time can be arbitrarily set).
  • the entry can also be associated with the network management software according to the process in Figure 3. When the route is deleted, the alarm mechanism is enabled to allow the administrator to perform specific operations.
  • Step 001 Configure an association group, and add an association group identifier to the routing entry that guides the forwarding.
  • the association group includes a route and a downlink corresponding to the route, that is, a configuration process, which will be described in detail later.
  • Step 002 When the routing entry deletion event is received, it is determined whether the association group identifier exists in the routing entry, that is, the deletion procedure of the routing entry, which will be described in detail later.
  • the determining operation may be performed within a certain period of time after receiving the routing entry deletion event, and the time may be arbitrarily set.
  • Step 003 If an association group identifier exists in the routing entry, the downlink is closed.
  • the link state can be determined, that is, whether the link state of the route is down. If yes, the downlink can be closed. If not, the alarm mechanism can be started for management. The staff will confirm it or take other treatments. Of course, it is not necessary to perform the foregoing determination, but only to determine whether the downlink state is down, or to perform the foregoing determination, and further determine whether the downlink state is down. If the downlink state is down, then it is not necessary to The downlink is closed separately, and the process is directly terminated or other related processing is performed. If the downlink status is up, the downlink can be closed.
  • step 001 For the configuration process in step 001, specifically, according to the flowchart shown in FIG. 4, the process is as follows: Next:
  • Step 100 Create an association group and give the association group identifier.
  • This identifier can be unique, such as a group number or a group name.
  • Step 101 Configure the downlink route R corresponding to the critical route R and the critical route R in the association group. You can also configure the expected delay recovery time W. These configurations do not require timing guarantees in the sequence relationship, and if the delay recovery time W is not configured, a default delay recovery time W can be specified by the system. For example, the default delay recovery time W can be Is 0, which means no delay is required for recovery.
  • Step 102 The program automatically determines whether the entry of the critical route R concerned has already existed.
  • Step 103 If it does not exist, the program automatically creates an entry for the critical route R, and sets no. If the route that should be deleted is hit during forwarding, and finds that it has no invalid flag, a forwarding error occurs.
  • Step 104 Add an association group tag to the entry of the critical route R. For example, record the unique identifier of the association group in the agreed location in the entry of the critical route R.
  • Step 105 The program automatically determines whether the downlink L state is up. If the state of the downlink L is not up, the configuration process ends.
  • Step 106 If the status of the downlink L is up, continue to determine whether the entry of the critical route R is valid. If the entry of the critical route R is valid, the process ends.
  • Step 107 If the entry of the critical route R is invalid, the downlink L is closed, and the process ends.
  • the communication device is usually notified by means of a message or a function call.
  • the key can be detected by existing technologies such as Bidirectional Forwarding Detection (BFD), Operation Management and Maintenance (OAM). Whether the entry of route R is unreachable.
  • BFD Bidirectional Forwarding Detection
  • OAM Operation Management and Maintenance
  • the device B After receiving the packet, it will respond to the device A according to the configuration. When the device does not receive the response packet within the specified time, the device considers that the route is unreachable, that is, invalid, triggering the deletion of the routing entry.
  • Step 200 The program determines whether the entry of the key route R to be deleted has an associated tag. Step 201: If there is no associated tag, the entry resource (such as a memory resource) occupied by the entry is automatically released, and the entire process is ended.
  • the entry resource such as a memory resource
  • Step 202 If an association flag exists, obtain the identifier of the association group, and set an invalid flag in the entry of the key route R, so that the actual forwarding is not performed according to the invalid entry when actually forwarding.
  • Step 203 The program automatically determines whether the downlink L state is up. When the state of the downlink L is not up, the process ends.
  • Step 204 If it is found that the downlink L state is up, initiate the operation of closing the downlink L, and then end the process.
  • the action to be closed here may be at the same time as the discovery, or may be arbitrarily set after a certain time after the state of the downlink L is found to be up.
  • Step 300 The program automatically determines whether the entry of the critical route R to be established exists.
  • Step 301 If the program determines that the entry does not exist, the resource required for the entry is automatically applied.
  • Step 302 If the program determines that the entry exists, the entry is set to be valid, that is, the invalidation flag is removed, so that the entry can be forwarded during the true data forwarding process.
  • Step 303 The program automatically determines whether an association group identifier exists in the entry. If not, the entire process ends.
  • Step 304 If the program determines that the association group identifier exists, obtain the unique identifier of the association group, and start a delay recovery time (WTR) timer according to the delay recovery time W set by the association group, and wait for recovery. Time, of course, if you don’t set it, you can also get the associated group label. Open the downlink directly after you know it! ⁇ .
  • the delay recovery time W can be set to a predetermined invalid value, such as OxFFFFFFFF, so that when the critical route R is restored, when the device determines that the delay recovery time W is an invalid value of the agreement, a special alarm is reported. It is convenient for the user to manually enable the downlink L, instead of automatically starting the downlink L by the program after the WTR times out. In this way, the user has a choice, and the network maintenance personnel can decide whether to perform the traffic back-cutting, instead of relying on the program to automatically perform the traffic back-cut after the WTR times out.
  • Step 305 When the delay recovery time W is set, if the WTR timer timeout event is received, the downlink 1_ is turned on, and if the program finds that the delay recovery time W is 0, the downlink L can be directly executed. Operation, or start a WTR timer with a timeout of W, to complete the process of establishing the entry.
  • the critical route R may not be one, but multiple. When there are multiple routes, when all these routes fail, all downlinks are closed, or all the downlinks are closed when the preset threshold is reached. For example, if there are three key routes R in the uplink, if the threshold is set to 2, then when one of the three routes is found to be invalid (for example, deleted), no action is taken; and when two of the three routes are found to be invalid, Turn off the downlink L; if the three routes are not reachable, of course, you must turn off the downlink L.
  • the downlink L associated with the route may not be one, and may be extended to multiple. When there are multiple downlinks, if the route fails (for example, delete), multiple downlinks will be closed.
  • the routing entry type that can be forwarded can be an IP routing entry, which can be a Label Switching Path (LSP) entry, a virtual channel (VC) entry, or a media access control.
  • LSP Label Switching Path
  • VC virtual channel
  • MAC Media Access Control
  • the downlink and the changeable forwarding entries are associated with each other, and the routing entries are closed, and when the routing entry concerned is invalid, the pre-bound link is closed. In order to notify the downstream device to re-select the forwarding path, the fast convergence of the entire network is achieved.
  • the embodiment of the present invention further provides a communication device. As shown in FIG. 7, at least the detection module 602 and the execution module 603 are included. In addition, the association module 601 and/or the tag module 604 may be further included. among them: The detecting module 602 can be configured to determine whether the route is associated with the downlink when receiving the deletion event of the routing entry.
  • an association module 601 is further configured to configure and store the association group, and add an association group identifier to the routing entry that is forwarded in the association group.
  • the association group may include a route and a downlink corresponding to the route.
  • the detection module 602 determines whether the route is associated with the downlink according to the configuration content of the association module 601.
  • marking module 604 If the marking module 604 is still present, when the execution module 603 closes the downlink or after, it is used to set an invalid flag for the routing entry; if the routing entry of the routing entry is received, the Invalid tag
  • the detecting module 602 is further configured to determine whether the association group identifier of the association module 601 exists; if the detecting module 602 detects that the association exists in the routing entry The group identifier is then triggered by the execution module 603 to enable the downlink.
  • the storage medium is, for example, a ROM/RAM, a magnetic disk, an optical disk, or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention porte sur une méthode de liaisons et sur un dispositif de communication qui, selon que l'entrée d'une table de routes indiquant la transmission est ou non invalide, peut déclencher la fermeture de la liaison descendante associée à une route. En utilisant les modèles utilitaires fournis, la liaison descendante est associée à une entrée de table de routes plus mutable et le défaut selon lequel la fermeture de la liaison descendante ne peut pas être déclenchée alors que la liaison ascendante physique reste en bon état peut être évitée. En contrôlant une ou plusieurs des entrées de table de routes, quand l'entrée de table d'itinéraire ciblée est invalide, la liaison lui étant liée est fermée d'avance pour informer le dispositif aval de rechoisir la liaison vers l'avant pour assurer la convergence rapide du réseau entier.
PCT/CN2007/070460 2006-12-29 2007-08-13 Méthode de couplage de liaisons et dispositif de communication WO2008080311A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2006100646758A CN101001205B (zh) 2006-12-29 2006-12-29 一种链路联动的方法和一种通信设备
CN200610064675.8 2006-12-29

Publications (1)

Publication Number Publication Date
WO2008080311A1 true WO2008080311A1 (fr) 2008-07-10

Family

ID=38693021

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/070460 WO2008080311A1 (fr) 2006-12-29 2007-08-13 Méthode de couplage de liaisons et dispositif de communication

Country Status (2)

Country Link
CN (1) CN101001205B (fr)
WO (1) WO2008080311A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113992583A (zh) * 2021-10-26 2022-01-28 新华三信息安全技术有限公司 一种表项维护方法及装置

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101001205B (zh) * 2006-12-29 2010-08-11 华为技术有限公司 一种链路联动的方法和一种通信设备
CN102316018B (zh) * 2010-07-09 2014-12-31 中国移动通信集团公司 一种网络节点设备中路由表的更新方法以及网络节点设备
CN103067291B (zh) * 2012-12-24 2016-08-17 杭州华三通信技术有限公司 一种上下行链路关联的方法和装置
CN104378287B (zh) * 2014-08-26 2018-02-09 新华三技术有限公司 一种拓扑计算方法和装置
CN104363235A (zh) * 2014-11-20 2015-02-18 成都博高科技有限责任公司 一种通信方法、装置、系统及通信通道建立方法和装置
CN111314215A (zh) * 2020-02-17 2020-06-19 华云数据有限公司 数据报文转发控制方法及计算装置
CN114006800B (zh) * 2021-10-11 2023-12-05 中盈优创资讯科技有限公司 一种基于igp-spf算法的设备脱网告警方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1505409A (zh) * 2002-11-27 2004-06-16 华为技术有限公司 一种基于网络入口节点的重路由方法
US20050276216A1 (en) * 2004-06-15 2005-12-15 Jean-Philippe Vasseur Avoiding micro-loop upon failure of fast reroute protected links
CN1835478A (zh) * 2005-03-14 2006-09-20 国际商业机器公司 用于重定向虚拟局域网网络业务的系统和方法
US20060221813A1 (en) * 2005-04-04 2006-10-05 Scudder John G Loop prevention techniques using encapsulation manipulation of IP/MPLS field
CN101001205A (zh) * 2006-12-29 2007-07-18 华为技术有限公司 一种链路联动的方法和一种通信设备

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100414898C (zh) * 2002-09-23 2008-08-27 华为技术有限公司 多个因特网服务提供商的接入用户路由方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1505409A (zh) * 2002-11-27 2004-06-16 华为技术有限公司 一种基于网络入口节点的重路由方法
US20050276216A1 (en) * 2004-06-15 2005-12-15 Jean-Philippe Vasseur Avoiding micro-loop upon failure of fast reroute protected links
CN1835478A (zh) * 2005-03-14 2006-09-20 国际商业机器公司 用于重定向虚拟局域网网络业务的系统和方法
US20060221813A1 (en) * 2005-04-04 2006-10-05 Scudder John G Loop prevention techniques using encapsulation manipulation of IP/MPLS field
CN101001205A (zh) * 2006-12-29 2007-07-18 华为技术有限公司 一种链路联动的方法和一种通信设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113992583A (zh) * 2021-10-26 2022-01-28 新华三信息安全技术有限公司 一种表项维护方法及装置

Also Published As

Publication number Publication date
CN101001205B (zh) 2010-08-11
CN101001205A (zh) 2007-07-18

Similar Documents

Publication Publication Date Title
WO2008080311A1 (fr) Méthode de couplage de liaisons et dispositif de communication
EP2222023B1 (fr) Procédé de traitement de défaut de liaison et dispositif de transfert de données
CN107547383B (zh) 路径检测方法及装置
WO2020020144A1 (fr) Procédé de commutation de liaison, dispositif de commutation de liaison, système de communication de réseau et support de stockage lisible par ordinateur
CA2431988C (fr) Interface de reserve pour reseau du type open shortest path first (ospf)
US10530641B2 (en) Uninterrupted flow processing by a software defined network (SDN) appliance despite a lost or disrupted connection with an SDN controller
WO2009046644A1 (fr) Procédé et dispositif pour la commutation de flux de trafic
EP2274878B1 (fr) Réduction de perte de trafic dans un système eaps
EP1766828B1 (fr) Coherence entre les entites de transmission et de commande d'ingenierie du trafic mpls
WO2007016834A1 (fr) Procede rapide de convergence de services de point a point et dispositif associe cote fournisseur de services
WO2008089701A1 (fr) Procédé, dispositif et système de protection d'anneau
WO2009056053A1 (fr) Procédé, dispositif et système de commutateur de capacité de flux à ingénierie de trafic et commutation multiprotocole par étiquette
EP1936882B1 (fr) Procede de reparation de trajet de reacheminement de service et systeme associe
WO2009024040A1 (fr) Procédé et équipement de routage pour envoyer une route
US8520509B2 (en) System and a method for routing data traffic
CN104283790B (zh) Sdn中弹性分组环rpr的拓扑发现方法和设备
US20070133394A1 (en) Communication connection control systems and methods
US7974188B2 (en) Repeater and communication method
WO2012016458A1 (fr) Procédé et appareil de transmission de données dans un réseau privé virtuel de couche 2
EP2658177B1 (fr) Procédé de détection de défauts de tunnel et noeud d'ingénierie de trafic
CN100466583C (zh) 基于rrpp的快速环网防攻击的方法、装置和系统
WO2008031352A1 (fr) Procédé et appareil de récupération d'un effacement anormal survenu dans le lsp d'un réseau optique
CN102238067B (zh) 一种快速环网保护协议环上的切换方法和装置
WO2008119275A1 (fr) Procédé et dispositif de surveillance de panne pour ligne virtuelle louée
WO2014048126A1 (fr) Procédé et appareil de protection du trafic d'un service

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07800936

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07800936

Country of ref document: EP

Kind code of ref document: A1