WO2009012684A1 - Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd - Google Patents
Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd Download PDFInfo
- Publication number
- WO2009012684A1 WO2009012684A1 PCT/CN2008/071542 CN2008071542W WO2009012684A1 WO 2009012684 A1 WO2009012684 A1 WO 2009012684A1 CN 2008071542 W CN2008071542 W CN 2008071542W WO 2009012684 A1 WO2009012684 A1 WO 2009012684A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- echo
- packet
- message
- functional entity
- module
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method, system, and functional entity for implementing an echo function in a BFD mechanism.
- BFD Bidirectional Forwarding Detection
- BFD can be abstracted into a simple service, which provides services such as detecting network reachability and providing reachability status information (UP/DOWN information) for the application layer.
- UP/DOWN information reachability status information
- BFD is similar to the "Hello" protocol. After a BFD session is established, the two parties periodically send BFD packets to the peer. The format of the BFD packets is as shown in Figure 1. A peer BFD can also periodically detect the arrival of the other party's packets on the BFD-enabled link. If the BFD packet from the remote end is not received within a certain interval, the network can be considered faulty. The purpose of rapid fault detection.
- BFD can work in asynchronous mode, or in query mode.
- the BFD control packets are periodically sent to each other. If a system does not receive the BFD control packet from the remote end within the agreed detection time, the system announces the session as In the query mode, it is assumed that each system after the agreement has an independent method to confirm that it is connected to other systems, so that once a BFD session is established, the system stops sending BFD control messages unless If the system needs to explicitly verify the connectivity, the system sends a short sequence of BFD control packets. If the returned packets are not received within the agreed detection interval, the system announces that the session is Down. In response to the message, the agreement remains silent again.
- the two routers In the asynchronous detection mode, the two routers (R OU terA, Router B) send BFD control packets to the remote end.
- the situation is as shown in Figure 2 to maintain the BFD detection.
- the BFD fast asynchronous detection packets of large traffic will impact the smoothness of the network. If the query mode is used for detection, the system cannot detect the link. The failure caused the loss of data.
- ECHO echo
- the ECHO function uses a short ECHO message and a method in which the remote router does not process the message, and sends a series of BFDs in the local system.
- the remote system loops back through its forwarding channel, reducing the load on the network and the router CPU.
- the main technical problem to be solved by the embodiments of the present invention is to provide a method, system and functional entity for implementing the echo function in the BFD mechanism, thereby ensuring the correct use of the echo function in the BFD mechanism.
- An embodiment of the present invention provides a method for implementing an echo function in a BFD mechanism, where the method includes: sending an echo message to a remote end, where a source address and a destination address in the IP header of the echo message are sent echoes IP address of the interface of the packet;
- the echo message is analyzed and processed according to the authentication parameter in the echo message of the remote loopback.
- the embodiment of the present invention further provides a system for implementing an echo function in a BFD mechanism, where the system includes a first functional entity and a second functional entity, where:
- the first function entity is configured to send the echo message to the second function entity, where the source end and the destination end address in the IP header of the echo message are the IP address of the interface that sends the echo message;
- a second function entity configured to receive an echo message sent by the first function entity, and loop the received echo message back to the first functional entity
- the first functional entity is further configured to receive an echo message of the loopback of the second functional entity, and analyze and process the packet according to the authentication parameter in the packet.
- An embodiment of the present invention further provides a functional entity, where the functional entity includes:
- the sending module is configured to set the source and destination addresses in the IP header of the echo packet to the IP address of the interface that sends the echo packet, and send the configured echo message to other functional entities on the network side.
- the processing module is configured to receive an echo message of the loopback of other functional entities on the network side, and analyze and process the packet according to the authentication parameter in the packet.
- the receiving module is configured to receive an echo message sent by the network side functional entity, and trigger the redirection module after receiving the echo message;
- the redirection module is configured to: when triggered by the receiving module, start an internet protocol message protocol redirection function, and perform a redirection operation on the echo message received by the receiving module;
- the loopback module is configured to loop back the echo packets processed by the redirection module to the network side functional entity.
- the embodiment of the present invention further provides a functional entity, where the functional entity includes a receiving module, a first determining triggering module, a second determining triggering module, and an echo function starting module, where:
- a receiving module configured to receive a packet sent by a network side functional entity
- the first determining triggering module is configured to determine whether the packet received by the receiving module is an echo function negotiation packet, and trigger the second determining triggering module after determining that the packet is an echo function negotiation packet;
- the echo function startup module is configured to start the echo function in the bidirectional forwarding detection mechanism under the trigger of the first judgment trigger module.
- the source end and the destination end address in the IP header of the echo packet are set as the IP address of the interface that sends the echo packet, and Set the authentication parameters of the echo packets, and send the echo packets that have been set to the remote end.
- Receive the echo packets of the remote loopback and analyze and process the packets based on the authentication parameters in the packets.
- the echo function in the two-way forwarding detection mechanism is correctly implemented, and the detection of the link failure is ensured.
- Figure 1 shows the format of a BFD packet in the prior art
- FIG. 2 is a schematic diagram of a detection process of BFD in the prior art
- FIG. 5 is a flowchart of determining an ECHO function startup according to Embodiment 1 of the present invention
- FIG. 6 is a schematic structural diagram 1 of a system for implementing a BFD ECHO function according to Embodiment 2 of the present invention
- FIG. 9 is a schematic structural diagram of a functional entity according to Embodiment 4 of the present invention.
- FIG. 10 is a schematic structural diagram of a functional entity according to Embodiment 5 of the present invention.
- the first embodiment of the present invention provides a method for implementing a BFD (bidirectional forwarding detection) ECHO (echo) function, in which the IP header address and the authentication parameter of the ECHO packet can be set, and the setting is completed.
- the ECHO packet is sent to the remote end, and then the remote loopback ECHO packet is received, and the packet is analyzed and processed according to the authentication parameter in the packet, thereby simply and correctly implementing the BFD ECHO auxiliary detection function to ensure The discovery of link failures.
- the ECHO packet actually detects the remote forwarding channel.
- the packet does not need to be uploaded to the remote BFD module.
- the remote forwarding layer directly loops the packet back to the sending end.
- the ECHO packet is actually sent.
- the origin of the ECHO message is detected.
- the originating end uniformly sets the source end (ie, the transmitting end) and the destination end (ie, the far end) address in the IP head of the ECHO packet to the IP address of the interface that sends the ECHO packet, so that The packet is sent to the remote end.
- the destination address is not matched with the remote address. This triggers the remote ICMP (Internet Control Message Protocol) redirection function and loops the ECHO packet back to the packet originating end.
- ICMP Internet Control Message Protocol
- the originator needs to separate the ECHO packet into the correct BFD session according to the information in the packet. Because the association between BFD packets and sessions is session-based.
- the embodiment of the present invention performs special processing on the issued ECHO message based on the original message format, and the session's My Discriminator and Your
- the sending end may be Router A (Router A), and the remote end may be Router B.
- the processing flow of the method of the ECHO function may specifically include:
- Step 41 Determine whether to activate the ECHO auxiliary detection function.
- the packet sent by the remote end may be filtered during the session establishment phase, so that the ECHO function is enabled only on a specific link, and the detection modes are more flexibly used. Achieve the best detection results.
- the ACL Access Control List
- the process may specifically include:
- Step 41A Receive the negotiation packet sent by the remote end.
- Step 41B Determine whether the received packet is an ECHO negotiation packet.
- step 41C If the received message is an ECHO negotiation message, step 41C is performed;
- Step 41C Determine whether the received ECHO negotiation packet meets the ACL rule.
- a series of ordered rules consisting of statements based on the source address, destination address, port number, etc. of the packet.
- ACLs can be divided into three types, as shown in the following table.
- the ACL uses the source address information as an element that defines the ACL rule.
- the basic ACL rule can filter the packets based on the source address information. Therefore, by configuring the corresponding ACL rules, you can use the ECHO function to detect only the specific links.
- step 41D if the received ECHO negotiation message satisfies the ACL rule, step 41D is performed;
- the ACH rule is not limited to the received ECH.
- the ECHO negotiation packet can be filtered by other rules to implement detection only by using the ECHO function for a specific link.
- Step 41D Start ECHO detection function.
- step 42 If the received ECHO negotiation packet satisfies the ACL rule, the ECHO detection function is enabled, and step 42 is performed.
- Step 42 Set the IP header address and authentication parameters of the ECHO packet, and send the configured ECHO packet to the remote end.
- the source end (ie, the sender end) and the destination end (ie, the far end) address in the IP header address of the ECHO packet are uniformly set to the interface IP address of the ECHO packet. And the positions of the My Discriminator and Your Discriminator parameters in the ECHO message are exchanged.
- the format of the ECHO packet is not separately designed, and only the existing BFD control packet format is modified to meet the needs of the ECHO detection, thereby reducing the impact on the existing process and reducing the protocol implementation. the complexity.
- Step 43 Remotely loop back ECHO messages.
- RouterB After receiving the ECHO packet sent by RouterA, RouterB does not process the ECHO packet. It only triggers the ICMP redirection function, redirects the ECHO packet, and sends the ECHO packet at the forwarding level. Wenhuan returns to RouterA.
- Step 44 Receive an ECHO packet of the remote loopback, and analyze and process the packet according to the authentication parameter in the packet.
- Router A receives the ECHO packet from Router B and obtains the ECHO packet.
- the Discriminator parameter is used to analyze and process the packet according to the parameter.
- Router A considers the packet sent by Router B as the packet to analyze whether the link is faulty, thus maintaining the normal detection of Router A.
- the process of analyzing the received ECHO packet in this step may be: according to the authentication parameter in the packet, the session to which the packet belongs may be determined, and then the session to which the packet belongs may be determined to be a normal state. Further, it can be determined whether the link used by the session is in a normal state.
- the session to which the ECHO message belongs is declared Down.
- the number of specified diurnal and ECHO messages mentioned above may be determined by the local system (such as Ro uterA) and the remote system (such as Router B) at the beginning of the session establishment.
- the method of the ECHO function can be used together with the two existing detection modes of the BFD. This method can also be used instead of the detection task of the BFD control packet. This can reduce the transmission period of the control packet (in asynchronous mode) or completely cancel the BFD. Control message (in query mode).
- the ECHO function method can also be used as a link fault detection method and becomes the object of patent law protection.
- the BFD can be implemented according to the embodiment of the present invention.
- the specific implementation process of the method of the ECHO function is performed, and the ECHO packet of the remote loopback is received, and then the transmission link that the session to which the ECHO packet belongs is determined to be in a normal state, and the transmission link is found to be faulty. Hey, report the situation.
- step 41 may be omitted, and step 42 may be directly performed, and whether the ECHO function is enabled on a specific link is not performed. Judgment. In addition, you can also not change My in the specific application process.
- the location of the discriminator parameter is different from the port number of the common BFD packet.
- the port number of the ECHO packet is 3785, and the port number of the common BFD packet is 3784.
- the packet is received according to the received packet, and the received packet is the ECHO packet.
- the discriminator parameter is used to find the local discriminator parameter of the common BFD packet, and then determine the authentication parameter to be obtained, and analyze the packet according to the authentication parameter to determine whether the link is faulty. .
- a system for implementing a BFD (Bidirectional Forwarding Detection) ECHO (Echo) function comprising a first functional entity and a second functional entity, wherein:
- the first functional entity is configured to set the source and destination addresses in the IP header of the ECHO packet to the IP address of the interface that sends the echo message, and set the authentication parameter of the ECHO packet, and set the The completed ECH 0 packet is sent to the second functional entity.
- the first functional entity is further configured to receive the ECHO packet that is looped back by the second functional entity, and analyze and process the ECHO packet according to the authentication parameter in the ECHO packet. .
- the first functional entity may specifically include:
- [89] A. Set the sending module, which is used to set the source and destination addresses in the IP header of the echo packet to the IP address of the interface that sends the echo message, and set the authentication parameters of the echo message, and complete the setting.
- the ECHO message is sent to the second functional entity in the system.
- Setting the sending module can include:
- [91] Al setting unit, used to set the source and destination addresses in the IP header of the echo packet to the IP address of the interface that sends the echo message, and the authentication parameter of the echo message.
- the specific operation procedure of the setting unit can be:
- the address of the source (ie, the sender) and the destination (that is, the remote) in the IP header address of the ECHO packet are uniformly set to the IP address of the interface that sends the ECHO packet.
- the sending unit is configured to send the ECHO message that is set by the setting unit to the second functional entity in the system.
- An analysis processing module configured to receive an ECHO message of a loopback of a second functional entity in the system, and according to E
- the analysis processing module may specifically include:
- the receiving unit is configured to receive an ECHO packet that is looped back by the second functional entity in the system.
- the process of analyzing and processing the received ECHO packet by the analysis processing module may be: according to the authentication parameter in the packet, the session to which the packet belongs may be determined, and then the session to which the packet belongs may be determined to be a normal state. Further, it can be determined whether the link used by the session is in a normal state.
- the first functional entity may be a router or other functional entity.
- the second function entity is configured to receive the echo message sent by the first function entity, and loop back the received echo message to the first functional entity.
- the redirection function loops the received ECHO packet back to the first functional entity.
- the second functional entity may include a receiving module, a redirection module, and a loopback module, where: 104: C.
- the receiving module is configured to receive an ECHO packet sent by the first functional entity in the system, and receive the E
- the redirection module is triggered.
- the D.Redirecting module is configured to enable the ICMP redirection function to perform the redirection operation on the ECHO packet received by the receiving module.
- the loopback module is configured to loop back the echo message processed by the redirection module to the first functional entity in the system.
- the second functional entity may be a router or other functional entity.
- the system provided by the embodiment of the present invention may further include: 109) 3)
- the third function entity is configured to receive the packet sent by the network side, and determine whether the received packet is The rule is satisfied; when the received message satisfies the rule, the first functional entity is triggered.
- the third functional entity may specifically include a receiving module, a first determining triggering module, a second determining triggering module, and a first functional entity starting module, where:
- the receiving module is configured to receive a packet sent by a network side functional entity.
- the first judgment triggering module is configured to determine whether the packet received by the receiving module is an ECHO function negotiation message, and trigger the second judgment triggering module after determining that the message is an ECHO function negotiation message. [113] If the first judgment triggering module determines that the message received by the receiving module is not an ECHO function negotiation message, it is regarded as an invalid message and is not processed.
- the second judgment triggering module is configured to determine, by the first judgment triggering module, whether the ECHO function negotiation packet determined by the first judgment triggering module meets the filtering rule, and the ECHO function negotiation packet satisfies the rule. ⁇ , trigger the first functional entity to start the module.
- the second judgment triggering module determines that the ECHO function negotiation message determined by the first judgment triggering module does not meet the filtering rule, it is regarded as an invalid message and is not processed.
- the second judgment triggering module may specifically adopt an ACL (Access Control List) mechanism as its filtering rule, and set the filtering rule of the ACL at the beginning of the network system construction.
- ACL Access Control List
- the embodiment of the present invention may also filter the received message by using other similar rules or mechanisms.
- the first functional entity starting module is configured to start the first functional entity in the system under the trigger of the second determining triggering module.
- the third functional entity may be independently disposed in the system, or may be disposed in other functional entities in the system, for example, in the first functional entity, thereby The first functional entity has the specific operational functions of the third functional entity.
- FIG. 6 A schematic diagram of a specific implementation structure of the ECHO function system is shown in FIG. 6 or FIG.
- the detection mechanism of the ECHO function provides a simple mechanism to enable the use of E CHO functions only on specific links, thereby making it more flexible to use various detection modes to solve complex networking requirements.
- the third embodiment of the present invention provides a functional entity, which is used to set the source and destination addresses in the IP header of the ECHO packet to the IP address of the interface that sends the ECHO packet, and set the ECHO report.
- the authentication parameter of the text, and the set ECHO message is sent to other functional entities on the network side; the functional entity can also be used to receive the ECHO message looped back by other functional entities on the network side, according to the authentication parameter in the ECHO message. , Analyze and process ECHO messages.
- the functional entity may specifically include:
- the sending module is configured to set the source and destination addresses in the IP header of the ECHO packet to the IP address of the interface that sends the E CHO packet, and set the authentication parameter of the ECHO packet, and set the Completed E
- the CHO message is sent to other functional entities on the network side.
- Setting the sending module can include:
- the setting unit is configured to set the source and destination addresses in the IP header of the ECHO packet to the IP address of the interface that sends the ECHO packet, and set the authentication parameter of the ECHO packet.
- the specific operation procedure of the setting unit can be:
- the address of the source (ie, the sender) and the destination (that is, the remote) in the IP header address of the ECHO packet are uniformly set to the IP address of the interface that sends the ECHO packet.
- the sending unit is configured to send the ECHO message that is set by the setting unit to other functional entities on the network side.
- the authentication parameters in the CHO message analyze and process the ECHO message.
- Kl receiving unit, configured to receive ECHO packets looped back by other functional entities on the network side.
- the process of analyzing and processing the received ECHO packet by the analysis processing module may be: according to the authentication parameter in the packet, the session to which the packet belongs may be determined, and then the session to which the packet belongs may be determined to be a normal state. Further, it can be determined whether the link used by the session is in a normal state.
- the functional entity provided by the embodiment of the present invention may be a router or other functional entity.
- Embodiments of the present invention provide a functional entity that clarifies BFD
- the embodiment of the present invention provides a functional entity, which is configured to trigger an ICMP redirection function after receiving an ECHO packet sent by another functional entity on the network side, and loop back the received ECHO packet to the network side.
- Functional entity may specifically include a receiving module, a redirecting module, and a loopback module, where:
- the receiving module is configured to receive an ECHO packet sent by another functional entity on the network side, and receive the E
- the redirection module is triggered.
- M redirection module, used to trigger ICMP redirection function under the trigger of the receiving module, The ECHO packet received by the module is redirected.
- the loopback module is used to loop back the echo packets processed by the redirection module to other functional entities on the network side.
- the functional entity provided by the embodiment of the present invention may specifically be a router or other functional entity.
- the detection mechanism of the ECHO function is used to determine whether the transmission link is faulty or not.
- the ninth embodiment of the present invention provides a functional entity, which is configured to receive a packet sent by the network, determine whether the received packet satisfies the rule, and trigger the ECHO function if the received packet satisfies the rule.
- the functional entity includes a receiving module, a first determining triggering module, a second determining triggering module, and an echo function starting module, where:
- the receiving module is configured to receive a packet sent by a network side functional entity.
- the first judgment triggering module is configured to determine whether the packet received by the receiving module is an echo function negotiation message, and trigger the second judgment triggering module after determining that the packet is an echo function negotiation message.
- the first judgment triggering module determines that the packet received by the receiving module is not an ECHO function negotiation message, it is regarded as an invalid message and is not processed.
- the second determining triggering module is configured to determine, by the first determining triggering module, whether the echo function negotiation packet determined by the first determining triggering module meets the filtering rule, and the echoing function negotiation message is satisfied. Rule ⁇ , triggers the echo function to start the module.
- the second judgment triggering module determines that the ECHO function negotiation packet determined by the first judgment triggering module does not meet the filtering rule, it is regarded as an invalid packet and is not processed.
- the second judgment triggering module may specifically adopt an ACL (Access Control List) mechanism as its filtering rule, and set the filtering rule of the ACL at the beginning of the network system construction.
- ACL Access Control List
- the embodiment of the present invention may also filter the received message by using other similar rules or mechanisms.
- the functional entity provided by the embodiment of the present invention may be independently set on the network side or in other functional entities on the network side, so that other functional entities on the network side have the specific operations of the functional entity.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
La présente invention concerne un procédé, un système et une entité de fonction pour parvenir à la fonction d'écho du mécanisme BFD, qui comprend les étapes suivantes : - paramétrage de l'adresse source et de l'adresse de destination dans l'en-tête IP d'un paquet d'écho qui sera l'adresse IP du port qui envoie le paquet d'écho, le paramètre d'identification du paquet d'écho est également défini, puis le paquet d'écho est envoyé à l'extrémité distante, - après réception du paquet d'écho, l'extrémité distante analyse et traite le paquet d'écho en fonction du paramètre d'identification. La fonction d'écho du mécanisme de détection de transfert bidirectionnel est réalisée de manière simple et précise et les défaillances de liens sont découvertes dans les temps.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710130170.1 | 2007-07-20 | ||
CN2007101301701A CN101087211B (zh) | 2007-07-20 | 2007-07-20 | 一种实现bfd机制中回声功能的方法及系统及功能实体 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009012684A1 true WO2009012684A1 (fr) | 2009-01-29 |
Family
ID=38937990
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2008/071542 WO2009012684A1 (fr) | 2007-07-20 | 2008-07-03 | Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101087211B (fr) |
WO (1) | WO2009012684A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114268561A (zh) * | 2020-09-15 | 2022-04-01 | 烽火通信科技股份有限公司 | 一种bfd报文发送装置与方法 |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101087211B (zh) * | 2007-07-20 | 2010-08-11 | 华为技术有限公司 | 一种实现bfd机制中回声功能的方法及系统及功能实体 |
CN101252528B (zh) * | 2008-04-14 | 2011-04-13 | 华为技术有限公司 | 一种故障检测方法及设备 |
CN101399714B (zh) * | 2008-08-29 | 2012-09-05 | 中兴通讯股份有限公司 | 双向收发检测报文的传输方法和装置 |
CN102377606A (zh) * | 2010-08-11 | 2012-03-14 | 鸿富锦精密工业(深圳)有限公司 | 网络连接设备及其端口测试方法 |
CN102457409B (zh) * | 2010-11-02 | 2014-04-30 | 中兴通讯股份有限公司 | 链路故障检测方法及系统 |
CN102624584B (zh) * | 2012-03-01 | 2018-02-23 | 中兴通讯股份有限公司 | 链路检测方法及装置 |
CN103067220B (zh) * | 2012-12-19 | 2016-02-10 | 中兴通讯股份有限公司 | 参数更新情况下双向链路转发检测方法及装置 |
CN104468286A (zh) * | 2014-12-31 | 2015-03-25 | 迈普通信技术股份有限公司 | 实现多跳链路检测的方法及系统 |
CN106209517A (zh) * | 2016-07-22 | 2016-12-07 | 安徽皖通邮电股份有限公司 | 一种实现多跳bfd单臂回声功能的方法 |
US10541904B2 (en) | 2016-12-14 | 2020-01-21 | Hewlett Packard Enterprise Development Lp | Establishing a network fault detection session |
CN109245961B (zh) * | 2018-09-29 | 2020-12-22 | 优刻得科技股份有限公司 | 链路质量检测方法、装置、存储介质和设备 |
CN112448877B (zh) * | 2019-09-05 | 2022-07-22 | 华为技术有限公司 | 一种sbfd会话的建立方法、设备及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060209685A1 (en) * | 2005-03-18 | 2006-09-21 | Cisco Technology, Inc. | BFD rate-limiting and automatic session activation |
CN1838620A (zh) * | 2005-03-25 | 2006-09-27 | 华为技术有限公司 | 检测混合网络中端到端节点间链路故障的方法 |
WO2006128895A1 (fr) * | 2005-06-02 | 2006-12-07 | Nokia Siemens Networks Gmbh & Co. Kg | Procede de traitement efficace de perturbations dans la transmission par paquets de communications |
CN1905516A (zh) * | 2005-07-28 | 2007-01-31 | 华为技术有限公司 | 一种分配双向转发检测会话鉴别符的方法 |
WO2007016841A1 (fr) * | 2005-08-05 | 2007-02-15 | Huawei Technologies Co., Ltd. | Procédé de mise en œuvre de détection de panne de plan de transfert ip |
CN101087211A (zh) * | 2007-07-20 | 2007-12-12 | 华为技术有限公司 | 一种实现bfd机制中回声功能的方法及系统及功能实体 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1901468A (zh) * | 2006-07-19 | 2007-01-24 | 华为技术有限公司 | 网际协议多跳情况下进行特定路径故障检测的方法和网络 |
-
2007
- 2007-07-20 CN CN2007101301701A patent/CN101087211B/zh active Active
-
2008
- 2008-07-03 WO PCT/CN2008/071542 patent/WO2009012684A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060209685A1 (en) * | 2005-03-18 | 2006-09-21 | Cisco Technology, Inc. | BFD rate-limiting and automatic session activation |
CN1838620A (zh) * | 2005-03-25 | 2006-09-27 | 华为技术有限公司 | 检测混合网络中端到端节点间链路故障的方法 |
WO2006128895A1 (fr) * | 2005-06-02 | 2006-12-07 | Nokia Siemens Networks Gmbh & Co. Kg | Procede de traitement efficace de perturbations dans la transmission par paquets de communications |
CN1905516A (zh) * | 2005-07-28 | 2007-01-31 | 华为技术有限公司 | 一种分配双向转发检测会话鉴别符的方法 |
WO2007016841A1 (fr) * | 2005-08-05 | 2007-02-15 | Huawei Technologies Co., Ltd. | Procédé de mise en œuvre de détection de panne de plan de transfert ip |
CN101087211A (zh) * | 2007-07-20 | 2007-12-12 | 华为技术有限公司 | 一种实现bfd机制中回声功能的方法及系统及功能实体 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114268561A (zh) * | 2020-09-15 | 2022-04-01 | 烽火通信科技股份有限公司 | 一种bfd报文发送装置与方法 |
CN114268561B (zh) * | 2020-09-15 | 2023-06-09 | 烽火通信科技股份有限公司 | 一种bfd报文发送装置与方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101087211A (zh) | 2007-12-12 |
CN101087211B (zh) | 2010-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009012684A1 (fr) | Procédé, système et entité de fonction pour parvenir à la fonction d'écho du mécanisme bfd | |
WO2007016833A1 (fr) | Procédé de déclenchement de détection de panne de détection de transfert bidirectionnel | |
WO2008098448A1 (fr) | Procédé, appareil et système de diagnostic des acheminements dans un réseau sous protocole diameter | |
WO2007016841A1 (fr) | Procédé de mise en œuvre de détection de panne de plan de transfert ip | |
WO2006099784A1 (fr) | Procédé de détection d’un défaut de liaison entre des noeuds d’une extrémité à l’autre dans un réseau hybride | |
US6061728A (en) | Arrangement for controlling network proxy device traffic on a transparently-bridged local area network using a master proxy device | |
WO2009056034A1 (fr) | Procédé, système et équipement pour établir une détection bfd pour un tunnel lsp | |
WO2009036705A1 (fr) | Procédé de détection de panne d'interface et équipement de nœud de réseau | |
WO2012155817A1 (fr) | Procédé, dispositif et système d'essai de bouclage | |
JP2004515182A (ja) | 分散されたネットワークアクセスシステムのためのメッセージ、制御および報告インターフェイス | |
WO2007121633A1 (fr) | Procédé de réacheminement rapide en cas de partage de liaisons de transmission par de multiples ports | |
WO2011144158A1 (fr) | Procédé et système de mise en œuvre indépendante d'une localisation de dérangement par un nœud intermédiaire | |
US9923995B1 (en) | Methods, systems, and computer program products for sharing information for detecting an idle TCP connection | |
CN104541483B (zh) | 用于连接性故障时为家庭网络启用重新路由的方法和系统 | |
WO2011144068A2 (fr) | Procédé et appareil adaptés pour rapporter des informations de perte de paquets sur un réseau | |
WO2014176975A1 (fr) | Procédé et système d'interaction d'informations parmi des systèmes dans la même extrémité en drni | |
WO2013071801A1 (fr) | Procédé, dispositif et système pour détecter un réseau en anneau à commutation multiprotocole par étiquette | |
WO2012149862A1 (fr) | Procédé et appareil de basculement de réseau en anneau | |
WO2014019348A1 (fr) | Procédé, dispositif et système pour l'exploitation, la gestion et la maintenance de configuration oam | |
Mizrahi et al. | An overview of operations, administration, and maintenance (OAM) tools | |
WO2015149353A1 (fr) | Procédé de traitement de paquets oam, dispositif de réseau, et système de réseau | |
WO2006089490A1 (fr) | Méthode d’implémentation de fec bfd | |
US20110213893A1 (en) | Methods, systems, and computer program products for detecting an idle tcp connection | |
CN102457404B (zh) | 检测通信路径mtu的方法、装置和系统 | |
WO2015123988A1 (fr) | Procédé, appareil et dispositif de commande de congestion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08773102 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08773102 Country of ref document: EP Kind code of ref document: A1 |