WO2016107156A1 - Procédé et dispositif de contrôle de bout en bout pour réseau en pont - Google Patents

Procédé et dispositif de contrôle de bout en bout pour réseau en pont Download PDF

Info

Publication number
WO2016107156A1
WO2016107156A1 PCT/CN2015/085103 CN2015085103W WO2016107156A1 WO 2016107156 A1 WO2016107156 A1 WO 2016107156A1 CN 2015085103 W CN2015085103 W CN 2015085103W WO 2016107156 A1 WO2016107156 A1 WO 2016107156A1
Authority
WO
WIPO (PCT)
Prior art keywords
oam
packet
network
bridge network
monitoring
Prior art date
Application number
PCT/CN2015/085103
Other languages
English (en)
Chinese (zh)
Inventor
王月梅
刘爱华
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201410852250.8A external-priority patent/CN105812198B/zh
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016107156A1 publication Critical patent/WO2016107156A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/34Signalling channels for network management communication

Definitions

  • the present invention relates to the field of network detection, and in particular, to a method and apparatus for monitoring end-to-end of a bridge network.
  • the network is usually divided into: an access layer, an aggregation layer, and a core layer.
  • the aggregation layer or the access layer is deployed as an L2VPN (Layer 2 Virtual Private Network)
  • the core layer is deployed as a Layer 3 Virtual Private Network (Layer 3 Virtual Private Network).
  • the L2VPN mainly adopts the MPLS-TP (Muti-protocol label switching-transport profile) OAM (Operation Administration and Maintenance) and Ethernet OAM detection.
  • MPLS-TP OAM and IP layer OAM mechanisms are adopted.
  • the access layer generally uses L2VPN networking
  • the aggregation or core layer generally adopts L3VPN networking
  • the bearer service traverses L2VPN and L3VPN networks
  • the L2VPN and L3VPN borders have bridge devices to complete L2VPN and L3VPN services.
  • the MPLS-TP OAM does not provide the OAM function of the end-to-end bearer service of the L2L3 network.
  • the existing L2VPN end-to-end OAM mechanism (such as the Ethernet service OAM mechanism) cannot traverse the L3VPN network; and the L3VPN end-to-end OAM mechanism (such as IP ping) does not support the L2VPN network; resulting in the L2+L3 group.
  • OAM can only be deployed in segments.
  • this type of deployment cannot quickly and uniformly perform fault detection and performance measurement of the OAM from the edge node of the L2VPN network to the edge node of the L3VPN network (the UNI side, that is, the user network interface side) and the network intermediate node (the NNI side, that is, the network interface side). (such as connectivity, packet loss rate, frame delay, throughput, etc.); in addition, this segmented OAM deployment mode has complex OAM management and poor fault location and ease of use. Therefore, how to locate the internal fault of L2L3 bridge and how to implement L2VPN network or L3VPN network, how to achieve unified end-to-end OAM fault detection and performance measurement is an urgent problem to be solved.
  • the main purpose of the embodiments of the present invention is to provide a network end-to-end monitoring method and device, which aims to solve the problem that the connectivity of the OAM detection link in the L2VPN and the L3VPN bridge network is poor and cannot be detected.
  • the connectivity of the L2VPN network access device cannot detect the connectivity of the link across the L2VPN network or the L3VPN network, and cannot detect the internal fault of the L2L3 bridge.
  • an embodiment of the present invention provides an end-to-end monitoring method for a bridge network, where the monitoring method of the bridge network end-to-end includes:
  • the OAM function is executed to complete the end-to-end OAM monitoring of the bridged network.
  • the step of generating the OAM packet feature information and the packet format includes:
  • the operation management and maintenance OAM model is constructed, and the maintenance endpoint MEP/maintenance intermediate point MIP node and the OAM function set are defined.
  • the performing the OAM function according to the generated packet format, and completing the end-to-end OAM monitoring of the bridge network includes:
  • the encapsulated OAM message is sent to the target MEP or MIP node.
  • the method further includes:
  • the device determines whether the received packet is an OAM packet according to the characteristic information of the OAM packet.
  • the method further includes:
  • the received packet is an OAM packet, it is determined whether the current node needs to be processed
  • the OAM message is forwarded to the next node of the bridged network.
  • an embodiment of the present invention further provides an end-to-end monitoring device for a bridge network, where the bridge network end-to-end monitoring device includes:
  • the generating module is configured to generate OAM packet feature information and a packet format.
  • the identification module is configured to identify the OAM packet according to the generated OAM packet feature information
  • the execution module is configured to perform OAM function according to the generated packet format, and complete end-to-end OAM monitoring of the bridge network.
  • the monitoring device for bridging the network end-to-end further includes:
  • the build module is set to build an OAM model based on the bridged network, defining the MEP/MIP node and the OAM feature set.
  • the execution module includes:
  • the selected unit is set to the OAM function in the selected OAM function set
  • the encapsulating unit is configured to encapsulate the OAM packet according to the selected OAM function and the defined packet format;
  • the sending unit is configured to send the encapsulated OAM message to the target MEP or MIP node.
  • the monitoring device for bridging the network end-to-end further includes:
  • the determining module is configured to determine whether the received packet is an OAM packet according to the characteristic information of the OAM packet.
  • the monitoring device for bridging the network end-to-end further includes:
  • the forwarding module is configured to determine whether the received packet is an OAM packet, and then determines whether the current node needs to be processed. If the current node processing is not required, the OAM packet is forwarded to the next node of the bridge network.
  • the end-to-end monitoring method of the bridge network provided by the embodiment of the present invention generates the OAM packet feature information and the packet format, identifies the OAM packet according to the generated OAM packet feature information, and performs the OAM function according to the generated packet format. , complete end-to-end OAM monitoring of the bridge network.
  • the invention is simple and easy to use, and can directly bridge the network through the L2VPN and the L3VPN; the end-to-end OAM fault detection and performance measurement can be flexibly implemented, and the service monitoring can be realized conveniently and quickly.
  • Figure 1 is a schematic diagram of an existing L2VPN and L3VPN bridge network
  • FIG. 2 is a schematic diagram of networking of an L2VPN and an L3VPN bridge network according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of an OAM model constructed by an L2VPN network and an L3VPN bridge network according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a first embodiment of a method for monitoring an end-to-end bridging network according to the present invention
  • FIG. 5 is a schematic flowchart of a second embodiment of a method for monitoring an end-to-end bridging network according to the present invention
  • FIG. 6 is a schematic flowchart of the steps of performing OAM function according to the generated packet format in FIG. 4 to complete end-to-end OAM monitoring of the bridge network;
  • FIG. 7 is a schematic flowchart diagram of a third embodiment of a method for monitoring an end-to-end bridging network according to the present invention.
  • FIG. 8 is a schematic diagram of functional modules of a first embodiment of a bridge network end-to-end monitoring apparatus according to the present invention.
  • FIG. 9 is a schematic diagram of functional modules of a second embodiment of a bridge network end-to-end monitoring apparatus according to the present invention.
  • FIG. 10 is a schematic diagram of a refinement function module of the execution module in FIG. 8;
  • FIG. 11 is a schematic diagram of functional modules of a third embodiment of a bridge network end-to-end monitoring apparatus according to the present invention.
  • the bridge network is an L2VPN and an L3VPN bridge network, as shown in FIG. 2,
  • FIG. 2 is a schematic diagram of the L2VPN and the L3VPN bridge network, and the L2VPN and the L3VPN bridge network, including the first CE.
  • CE1 Customer Edge, user edge device
  • CE2 CE2
  • PE Provider Edge, edge device
  • PE2 PE2
  • PE3 PE
  • P1 Provider Edge, intermediate point device
  • P1 Provider, intermediate point device
  • FIG. 3 is a schematic diagram of an OAM model constructed by an L2VPN network and an L3VPN bridge network according to an embodiment of the present invention.
  • the OAM model includes a first MEP (Maintenance Association End Point) and a first MIP (Maintenance Domain).
  • the intermediate point, the maintenance intermediate point, the second MIP, and the second MEP, the first MEP, the first MIP, the second MIP, and the second MEP are sequentially connected in sequence.
  • FIG. 4 is a schematic flowchart of the first embodiment of the method for monitoring the end-to-end of the bridge network according to the present invention.
  • the method for monitoring the end-to-end of the bridge network provided by the first implementation includes:
  • Step S100 Generate OAM packet feature information and a message format.
  • the end-to-end monitoring device of the bridge network generates OAM packet feature information and packet format according to the defined MEP/MIP node.
  • the format of the packet is shown in Table 1:
  • the OAM packet feature information includes an Ether-type, an OAM tag, and an MEG ID number.
  • Step S200 Identify an OAM packet according to the generated OAM packet feature information.
  • the end-to-end monitoring device of the bridge network identifies the OAM packet according to the defined OAM packet feature information on the defined MEP/MIP node, wherein only the layer 2 feature information and the layer 3 feature information can be valid, or both of them are valid. Used to indicate that it is an OAM message.
  • the L2VPN domain only the Layer 2 feature information of the OAM packet can be identified.
  • the L3VPN domain can only identify the Layer 3 feature information.
  • the L2/L3 bridge point in the MEG group completes the conversion of the Layer 2 feature information and the Layer 3 feature information.
  • the Layer 2 and Layer 3 feature information can be mixed and identified. At this time, the L2 endpoint in the MEG group needs to identify the Layer 3 feature information.
  • the OAM message feature information includes an Ether-type, an OAM tag, and an MEG ID number, wherein the custom Ether-type is used to mark the OAM type of L2+L3.
  • the OAM flag in the reserved field of the IP packet header is used to define the flag OLAG when the OAM is the IP OAM function set, and is used to distinguish the specific OAM type in the L2+L3OAM.
  • the custom MEG ID number indicates the ID number of the MEG group configured by the user to distinguish specific OAM instances.
  • Step S300 Perform an OAM function according to the generated packet format, and complete end-to-end OAM monitoring of the bridged network.
  • the end-to-end monitoring device of the bridge network selects and executes the OAM function from the OAM function set according to the defined message format and the OAM function set, and encapsulates the OAM message according to the selected OAM function and the defined packet format;
  • the OAM packet is sent to the target MEP or MIP node to complete the end-to-end OAM monitoring of the bridged network.
  • the end-to-end monitoring method of the bridge network provided by the invention is simple and easy to use, and can directly bridge the network through the L2VPN and the L3VPN; the end-to-end OAM fault detection and performance measurement can be flexibly implemented, and the service monitoring can be realized conveniently and quickly.
  • FIG. 5 is a schematic flowchart of the second embodiment of the method for monitoring the end-to-end of the bridge network according to the first embodiment.
  • the monitoring method to the end, before step S100 includes:
  • the OAM model is constructed according to the bridge network, and the MEP/MIP node and the OAM function set are defined, that is, the OAM function is executed according to the defined message format and the OAM function is performed, and the end-to-end OAM detection of the bridge network is completed.
  • the end-to-end monitoring device of the bridge network constructs an OAM model according to the bridge network, and defines a MEP/MIP node and an OAM function set.
  • the bridged network and the constructed OAM model are further shown in FIG. 2 and FIG. 3.
  • the OAM model supports the L2+L3 networking, that is, the typical end is an OAM endpoint in the L2VPN, and the other end is an endpoint in the L3VPN.
  • the first MEP, the first MIP, the second MIP, and the second MEP are defined.
  • the OAM model which defines the MEP on the user side of the edge node of the L2VPN network and the L3VPN network, and defines the MIP on the network side of the intermediate node of the L2VPN network and the L3VPN network, and joins the same MEG (Maintenance entity group). )in.
  • the defined MEP and MIP have the common attributes of the L2+L3VPN network, and can traverse the L2VPN and L3VPN networks to provide end-to-end OAM monitoring.
  • the L2+L3OAM MEP/MIP common attribute can be a unified L2VPN attribute (including but not limited to port, VLAN, MAC address, etc.) or a unified L3VPN attribute (including but not limited to IP address, IP DSCP (Differentiated Services Code Point). , differential service code point) or other IP header fields, etc., or a mixed L2+L3VPN attribute.
  • the MEG group maintains the common attributes of the L2+L3MEP/MIP and identifies the group information by using the MEG ID.
  • the defined OAM feature set includes IP (internet protocol) OAM function, TWAMP (two-way active measurement pro-tocol) and OAM function and Ethernet Y.1731OAM function.
  • the function set can refer to Y.1731 definition such as CC (Continuity Check), LB (Loopback), LT (Link Trace), and AIS (Alarm Indication Signal).
  • Alarm indication signal LCK (Lock Signal), LM (Frame Loss Measurement), DM (frame delay measurement), and TST (TEST).
  • FIG. 6 is a schematic flowchart of the refinement of step S300 in FIG. 4, where the step S300 includes:
  • Step S310 selecting an OAM function in the OAM function set.
  • the end-to-end monitoring device of the bridge network selects the OAM function from the OAM function set, selects one of the OAM function set IP OAM function, the TWAMP OAM function, and the Ethernet Y.1731OAM function, for example, selects the OAM function set IP OAM.
  • step S320 the OAM packet is encapsulated according to the selected OAM function and the defined packet format.
  • the end-to-end monitoring device of the bridge network encapsulates OAM packets according to the selected OAM function and the defined packet format.
  • the encapsulated OAM packet may be a connectivity detection packet or a measurement packet.
  • Step S330 Send the encapsulated OAM message to the target MEP or MIP node.
  • the end-to-end monitoring device of the bridge network sends the encapsulated OAM message to the target MEP or the MIP node. For example, as shown in FIG. 3, the first MEP forwards the encapsulated OAM message to the first MIP and the second MIP2. Send to the second MEP to complete the end-to-end OAM monitoring of the bridged network.
  • FIG. 7 is a schematic flowchart of a third embodiment of a method for monitoring an end-to-end bridging network according to the present invention.
  • the method for monitoring the end-to-end bridging network provided by the third implementation, step S200 It also includes:
  • Step S200A Determine, according to the feature information of the OAM packet, whether the received packet is an OAM packet.
  • the end-to-end monitoring device of the bridge network determines whether the received packet is an OAM packet according to the characteristic information of the OAM packet. For example, when the first MIP receives the packet, it determines whether the received packet is based on the ETHER-TYPE value. OAM packet; determines whether the OAM type is an IP OAM type according to the L2+L3OAM flag.
  • Step S200B If it is determined that the received packet is an OAM packet, it is determined whether the current node processing is needed; if the current node processing is not required, the OAM packet is forwarded to the next node of the bridge network.
  • the end-to-end monitoring device of the bridge network determines that the received message is an OAM packet, and determines the OAM packet according to the OAM packet characteristic information, for example, according to the Layer 3 attribute in the packet, and the Dest IP (destination IP) value. Yes The current node processing is required. If the current node processing is required, the processing is performed according to the content corresponding to the OAM function in the OAM packet, and the processing flow is ended. If the current node processing is not needed, it is forwarded to the second MIP.
  • IP OAM function takes the IP OAM function, TWAMP OAM function and Ethernet Y.1731OAM application as examples to further explain the end-to-end monitoring method of the bridge network:
  • IP OAM Internet Control Message Protocol
  • ICMP Internet Control Message Protocol
  • Step S510 Construct an IP OAM model according to the bridged network, and define a maintenance endpoint MEP/maintenance intermediate point MIP node.
  • the end-to-end monitoring device of the bridge network creates an OAM model, defines the MEP or MIP node, and adds it to the same MEG.
  • the ID number of the MEG group is set to 1, and the MEG1 is referred to as MEG1.
  • the O2 model of the L2+L3 network is shown in Figure 3.
  • the L2VPN attributes include: port, VLAN, DMAC, SMAC, and Ether Type (custom Ether-Type, which is used to indicate the L2+L3OAM type).
  • the L3VPN attribute settings include: IP address, priority, and lifetime (TTL).
  • the IP address of the first MEP port is the same as the IP address of the first network segment (referred to as the first IP address).
  • the first MIP is configured with Layer 2 and Layer 3 bridge forwarding, and the PORT+VLAN to IP mapping relationship is created.
  • the IP address of the MIP port is set to the second IP, and the IP address of the second MEP port is set to the third IP.
  • Step S520 Define IP OAM packet feature information and a packet format according to the defined MEP/MIP node.
  • the end-to-end monitoring device of the bridge network defines the packet format according to the defined MEP/MIP node as shown in Table 2:
  • DEST MAC Destination MAC, using multicast MAC.
  • ETHER-TYPE Custom Ether-type tag L2+L3OAM type.
  • the L2+L3OAM flag in the IP message header reserved field When the OAM is the IP OAM function set, the definition is marked as the first Flag (this value can be customized to distinguish the specific OAM type in the L2+L3OAM).
  • the MEG ID number indicates the ID number of the MEG group configured by the user and distinguishes the specific OAM instance.
  • SRC IP is the IP address of the port that initiated the ping.
  • DEST IP is the destination IP of the ping.
  • Step S530 The first MEP in the L2VPN network starts and performs an IP OAM function, and sets a destination IP of the PING and a gateway IP.
  • the IP OAM function is enabled and executed, including selecting the IP OAM function set, selecting the MIP or MEP of the receiving end, and using the IP of the receiving MIP or MEP as the destination IP and the IP of the MEP1 as the source IP.
  • the selected IP OAM function, the source IP address, and the destination IP are saved as configuration information and transmitted to the receiving end.
  • Step S540 The first MEP encapsulates the L2+L3 connectivity detection packet by using the source IP address, the destination IP address, and the selected IP OAM function, the L2VPN attribute, and the L3VPN attribute.
  • Step S550 The first MEP forwards the encapsulated L2+L3 connectivity detection packet to the first MIP by the router node where the L2VPN is located according to the Layer 2 information PORT and the VLAN.
  • Step S560 When the first MIP receives the encapsulated L2+L3 connectivity detection packet, determines whether the received packet is an L2+L3 connectivity detection packet according to the Ether-type value, and determines the OAM type according to the L2+L3OAM flag. Whether it is an IP OAM type, and if so, whether the L2+L3 connectivity detection packet needs to be processed by the current node according to the Layer 3 attribute and the Dest IP value in the L2+L3 connectivity detection packet, and if necessary, according to the L2+ The content corresponding to the OAM function in the L3OAM packet is processed. The processing of the OAM function belongs to the prior art, and is not described here again.
  • the first MIP bridge node determines that the L2+L3 connectivity check packet is mapped to the 8-bit protocol type custom protocol in the IP packet header according to the Ether-type value of the connectivity check packet.
  • the type value Type (which can use the unused protocol type value) is converted to an IP packet according to the mapping of PORT+VLAN and IP, and forwarded to the second MIP.
  • Step S570 After receiving the packet, the second MIP, as the MEP node of the L3VPN network, determines whether the protocol type of the received IP packet header and the L2+L3OAM flag bit are customized protocol type values and Flag flags. If yes, it determines whether the current node needs to be processed according to the Dest IP. If not, it is processed according to the existing process.
  • the processing of the OAM function is performed according to the OAM PDU protocol data unit corresponding to the OAM function in the L2+L3 connectivity detection packet, and the processing of the OAM function belongs to the prior art, and is not described here. If no processing is required, the OAM message is forwarded to the second MEP.
  • Step S570 After receiving the packet, the second MEP determines that the L2+L3 connectivity detection packet needs to be processed by itself, and then processes according to the content of the OAM in the packet according to the prior art.
  • the One-Way Active Measurement Protocol (OWAMP) and the Two-Way Active Measurement Protocol (TWAMP) are becoming active IP performance measurement tools in mobile networks, but cannot span L2VPN networks. In this implementation, they can be in the middle or edge of L2VPN edge nodes and L3VPNs.
  • the OWAMP and TWAMP protocols are deployed in the node to complete the performance measurement of the L2+L3 network.
  • the OWAMP protocol is similar to the TWAMP protocol deployment and implementation. The difference is that OWAMP is a one-way active measurement, and TWAMP is a two-way active measurement.
  • the TWAMP is taken as an example to describe the packet loss rate of the edge node of the L3VPN network to the edge node of the L2VPN network.
  • the specific processing flow of delay, delay jitter, and packet out-of-order performance, and the performance monitoring processing method of the L3VPN network intermediate node to the L2VPN network edge node are also the same, and will not be described in detail here.
  • Step S610 Create an OAM model according to the bridged network.
  • the TWAMP protocol is deployed on the first MEP and the second MEP.
  • the Control-Client and the Session-Sender are deployed on the second MEP and serve as the control terminal.
  • the Server and the Session-Reflector are deployed on the first MEP and serve as the responding end.
  • Step S620 Define IP OAM packet feature information and a packet format according to the defined MEP/MIP node.
  • Test message of the TWAMP protocol is shown in Table 3:
  • the DEST IP in the packet is the IP address of the destination port.
  • the IP packet header reserved field is marked with the L2+L3OAM and identified as the second Flag.
  • Step S630 establishing a configuration control connection according to the TWAMP Control protocol second MEP and the first MEP.
  • the second MEP initiates a performance measurement to the first MEP.
  • the second MEP acts as the monitoring initiator and begins to perform the TWAMP OAM function.
  • Step S640 The second MEP uses the source IP address, the destination IP address, and the selected TWAMP OAM function, the L2VPN attribute, and the L3VPN attribute to form an L2+L3TWAMP measurement message.
  • Step S650 The second MEP sends the L2+L3OAM message to the second MIP.
  • Step S660 The second MIP receives the L2+L3OAM packet, and determines whether it is an L2+L3OAM packet according to the second Flag identifier in the L2+L3OAM flag in the packet IP header reserved field, and then determines according to the Dest IP. Whether the OAM packet needs to be processed by the current node, if not, the OAM packet is forwarded to the first MIP; otherwise, the content is processed according to the OAM function in the L2+L3OAM packet, and the processing flow is ended.
  • Step S670 The first MIP receives the L2+L3OAM packet, and determines whether it is an L2+L3OAM packet according to the L2+L3OAM flag in the reserved field of the packet IP header. If yes, it determines whether the current node needs to be processed according to the Dest IP. If not required, the Layer 2 and Layer 3 OAM packet mapping and IP mapping are performed to the specified PORT+VLAN (the ETHER-TYPE uses the custom ETYPE, and the DAMC uses the multicast MAC). After the Layer 2 and Layer 3 bridged network is forwarded, the OAM packet is forwarded. Send to the first MEP.
  • Step S670 The first MEP receives the L2+L3OAM packet, determines whether it is an L2+L3OAM packet according to the ETHER-TYPE value, and then determines the L2+L3OAM according to the second Flag identifier in the L2+L3OAM flag in the IP header reserved field. Whether the type is TWAMP or not, and whether the Dest IP in the packet is the IP address of the port. If it is determined that the L2+L3OAM packet needs to be processed by itself, the response packet is encapsulated according to the content of the OAM in the OAM packet. The response message is processed.
  • the Ethernet OAM mechanism of the L2VPN network cannot traverse the L3VPN network. If the Ethernet OAM mechanism is used, the connectivity and performance of the L2+L3 network can be detected.
  • the ITU-T Y.1731 protocol is deployed in PE1, PE2, P1, and PE3, and the connectivity between PE1 and PE2 or PE3 is detected by Y.1731, and the link is detected.
  • the performance, the specific processing flow is as follows:
  • Step S710 Construct an L2+L3OAM model according to the bridge network.
  • the specific method is as described in the first embodiment.
  • On the first MIP (bridge node) node but not limited to PORT+VLAN and IP mapping, ETHER-TYPE and IP packet protocol type mapping, complete Layer 2 and Layer 3 bridge forwarding of L2+L3OAM packets.
  • Step S720 Define an L2+L3OAM message format.
  • the CCM (Continuity Check Message) packet is used as an example.
  • the format of the specific packet is shown in Table 4.
  • the ETHER-TYPE is a custom value used to mark L2+L3OAM packets.
  • the DMAC is a group.
  • the broadcast MAC; the L2+L3OAM flag Flag recorded in the IP packet header reserved field is used to indicate the Y.1731 protocol type Ethernet OAM.
  • Step S730 The first MEP selects the Y.1731OAM function, starts OAM detection, and performs the Y.1731OAM function.
  • the Y.1731 OAM functions selected by the first MEP include: CC, LB, LT, AIS, LCK, LM, DM, and TST.
  • Step S740 Encapsulate the L2+L3OAM packet according to the defined packet format and the OAM function.
  • the encapsulated CCM message is as described in Table 4. For other functional message formats, only the OAM PDU part content and the Opcode and TLV Offset values need to be replaced.
  • Step S750 The first MEP forwards the L2+L3OAM packet to the first MIP by the router node where the L2VPN is located.
  • Step S760 The first MIP receives the L2+L3OAM packet, and determines whether it is an L2+L3OAM packet according to the Ether-Type value. If yes, the L2+L3OAM type identifier in the IP packet header reserved field and the corresponding OAM. The value of the OpCode (opcode) in the PDU is used to determine whether the L2+L3OAM needs to be processed by the current node. If not, the L2+L3OAM packet is forwarded and forwarded according to the Layer 2 and Layer 3 OAM packet forwarding rules, and the L2+L3OAM packet is sent.
  • the L2+L3OAM packet is forwarded and forwarded according to the Layer 2 and Layer 3 OAM packet forwarding rules, and the L2+L3OAM packet is sent.
  • the Layer 2 and Layer 3 OAM packet forwarding in the above process is based on the L2+L3OAM Ether-Type mapping.
  • the protocol type value in the IP packet header protocol type field is used to identify the L2+L3OAM packet.
  • Step S770 The second MIP receives the L2+L3OAM packet, and determines whether it is an L2+L3OAM packet according to the IP packet header protocol type field. If yes, it determines whether the current node needs to be processed according to the Dest IP.
  • the Layer 3 forwarding protocol forwards the OAM packet to the second MEP.
  • Step S780 After receiving the OAM packet, the second MEP determines whether it needs to be processed according to the IP packet header protocol type field and the Dest IP, and if necessary, according to the L2+L3OAM type in the IP packet header reserved field. The flag is used to determine whether it is an OAM type. If it is an OAM type, the content of the OAM is processed according to the prior art.
  • FIG. 8 is a schematic diagram of a functional module of a bridge network end-to-end monitoring apparatus according to a first embodiment of the present invention.
  • the bridge network end-to-end monitoring apparatus provided by the first embodiment includes:
  • the generating module 10 defines the OAM packet feature information and the packet format according to the defined MEP/MIP node.
  • the identification module 20 is configured to identify the OAM packet according to the defined OAM packet feature information on the defined MEP/MIP node;
  • the executing module 30 is configured to perform an OAM function according to the defined packet format and the OAM function set, and complete end-to-end OAM monitoring of the bridge network.
  • the generating module 10 of the monitoring device of the bridge network end-to-end generates the OAM packet characteristic information and the packet format according to the defined MEP/MIP node, and the packet format is further shown in Table 1.
  • the OAM packet feature information includes an Ether-type, an OAM tag, and an MEG ID number.
  • the identification module 20 of the monitoring device of the bridge network end-to-end identifies the OAM packet according to the defined OAM packet feature information on the defined MEP/MIP node, wherein only the layer 2 feature information and the layer 3 feature information may be valid, or Both are valid and are used to indicate that they are OAM messages.
  • the L2VPN domain only the Layer 2 feature information of the OAM packet can be identified.
  • the L3VPN domain can only identify the Layer 3 feature information.
  • the L2/L3 bridge point in the MEG group completes the conversion of the Layer 2 feature information and the Layer 3 feature information.
  • the Layer 2 and Layer 3 feature information can be mixed and identified.
  • the L2 endpoint in the MEG group needs to identify the Layer 3 feature information.
  • the OAM message feature information includes an Ether-type, an OAM tag, and an MEG ID number, wherein the custom Ether-type is used to mark the OAM type of L2+L3.
  • the OAM flag in the reserved field of the IP packet header is used to define the flag OLAG when the OAM is the IP OAM function set, and is used to distinguish the specific OAM type in the L2+L3OAM.
  • the custom MEG ID number indicates the ID number of the MEG group configured by the user to distinguish specific OAM instances.
  • the execution module 30 of the end-to-end monitoring device of the bridge network selects and executes the OAM function from the OAM function set according to the defined message format and the OAM function set, and encapsulates the OAM message according to the selected OAM function and the defined packet format.
  • the encapsulated OAM message is sent to the target MEP or MIP node to complete the end-to-end OAM monitoring of the bridged network.
  • the end-to-end monitoring device of the bridge network provided by the invention is simple and easy to use, and can directly bridge the network through the L2VPN and the L3VPN; the end-to-end OAM fault detection and performance measurement can be flexibly implemented, and the service monitoring can be realized conveniently and quickly.
  • FIG. 9 is a schematic diagram of a functional module of a second embodiment of a bridge network end-to-end monitoring apparatus according to the present invention.
  • the bridge network end-to-end monitoring apparatus provided by the second embodiment is provided. include:
  • the building module 40 is configured to construct an OAM model according to the bridged network, and define a MEP/MIP node and an OAM function set.
  • the building block 40 of the bridge network end-to-end monitoring device constructs an OAM model according to the bridge network, and defines a MEP/MIP node and an OAM function set.
  • the bridged network and the constructed OAM model are further shown in Figure 2 and As shown in Figure 3, the OAM model supports L2+L3 networking, that is, the typical end is the OAM endpoint in the L2VPN, and the other end is the endpoint in the L3VPN.
  • the first MEP, the first MIP, the second MIP, and the second MEP are defined.
  • the OAM model defines the MEP on the edge node user side endpoints of the L2VPN network and the L3VPN network respectively, and defines the MIP on the L2VPN network and the L3VPN network intermediate node network side endpoint, and joins the same MEG.
  • the defined MEP and MIP have the common attributes of the L2+L3VPN network, and can traverse the L2VPN and L3VPN networks to provide end-to-end OAM monitoring.
  • the L2+L3OAM MEP/MIP common attribute can be a unified L2VPN attribute (including but not limited to port, VLAN, MAC address, etc.), or it can be a unified L3VPN attribute (including but not limited to IP address, IP DSCP or other IP header field). Etc.), or a mixed L2+L3VPN attribute.
  • the MEG group maintains the common attributes of the L2+L3MEP/MIP and identifies the group information by using the MEG ID.
  • the defined OAM feature set includes IP OAM functionality, TWAMP OAM functionality, and Ethernet Y.1731OAM functionality. Specifically, the function set can be defined with reference to Y.1731 such as CC, LB, LT, AIS, LCK, LM, DM, TST, and the like.
  • FIG. 10 is a schematic diagram of a refinement function module of the execution module in FIG. 8.
  • the execution module 30 includes:
  • the selecting unit 31 is set to select the OAM function in the OAM function set
  • the encapsulating unit 32 is configured to encapsulate the OAM packet according to the selected OAM function and the defined packet format.
  • the sending unit 33 is configured to send the encapsulated OAM message to the target MEP or MIP node.
  • the selected unit 31 of the monitoring device for bridging the network end-to-end selects the OAM function from the OAM function set, selects one of the OAM function set IP OAM function, the TWAMP OAM function, and the Ethernet Y.1731OAM function, for example, selects OAM. IP OAM function in the function set.
  • the encapsulation unit 32 of the end-to-end monitoring device of the bridge network encapsulates the OAM message according to the selected OAM function and the defined message format.
  • the encapsulated OAM packet may be a connectivity detection packet or a measurement packet.
  • the transmitting unit 33 of the monitoring device that bridges the network end sends the encapsulated OAM message to the target MEP or the MIP node.
  • the first MEP sends the encapsulated OAM message to the first MIP and the second MIP2. After forwarding, it is sent to the second MEP, thereby completing the end-to-end OAM monitoring of the bridged network.
  • FIG. 11 is a schematic diagram of a functional module of a third embodiment of a bridge network end-to-end monitoring apparatus according to the present invention.
  • the bridge network end-to-end monitoring apparatus provided by the third embodiment is provided. Also includes:
  • the determining module 50 is configured to determine, according to the OAM packet feature information, whether the received packet is an OAM packet.
  • the forwarding module 60 is configured to determine whether the current node processing is required if the received message is an OAM message, and forward the OAM message to the next node of the bridge network if the current node processing is not required.
  • the judging module 50 of the monitoring device of the bridge network end-to-end determines whether the received packet is an OAM packet according to the characteristic information of the OAM packet. For example, when the first MIP receives the packet, it determines that the received packet is received according to the ETHER-TYPE value. Whether the packet is an OAM packet; whether the OAM type is an IP OAM type according to the L2+L3OAM flag.
  • the forwarding module 60 of the end-to-end monitoring device of the bridge network determines that the received message is an OAM message, and determines the location according to the OAM message characteristic information, for example, according to the three-layer attribute in the message, the Dest IP (destination IP) value. Whether the OAM packet needs to be processed by the current node, if the current node processing is required, the processing is performed according to the content corresponding to the OAM function in the OAM packet, and the processing flow is ended. If the current node processing is not needed, it is forwarded to the second MIP.
  • the technical solution provided by the embodiment of the present invention can be applied to the end-to-end monitoring process of the bridge network, generating the OAM packet feature information and the packet format, and identifying the OAM packet according to the generated OAM packet feature information;
  • the message format, the OAM function is implemented, and the end-to-end OAM monitoring of the bridge network is completed.
  • the invention is simple and easy to use, and can directly bridge the network through the L2VPN and the L3VPN; the end-to-end OAM fault detection and performance measurement can be flexibly implemented, and the service monitoring can be realized conveniently and quickly.

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un procédé de contrôle de bout en bout pour un réseau en pont. Le procédé consiste : à générer des informations de caractéristiques de paquets OAM et un format de paquets; à identifier un paquet OAM selon les informations de caractéristiques de paquets OAM générées; et à exécuter une fonction OAM selon le format de paquets généré pour terminer le contrôle OAM de bout en bout pour un réseau en pont. L'invention concerne également un dispositif de contrôle de bout en bout pour un réseau en pont. La présente invention est simple et facile à mettre en œuvre, des réseaux en pont L2VPN et L3VPN peuvent être croisés directement, la détection de défaut OAM de bout en bout et la mesure de performance peuvent être mises en œuvre de manière flexible, et le contrôle de service peut être mis en œuvre de manière pratique et rapide.
PCT/CN2015/085103 2014-12-31 2015-07-24 Procédé et dispositif de contrôle de bout en bout pour réseau en pont WO2016107156A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410852250.8A CN105812198B (zh) 2014-12-26 2014-12-31 桥接网络端到端的监测方法和装置
CN201410852250.8 2014-12-31

Publications (1)

Publication Number Publication Date
WO2016107156A1 true WO2016107156A1 (fr) 2016-07-07

Family

ID=56284111

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/085103 WO2016107156A1 (fr) 2014-12-31 2015-07-24 Procédé et dispositif de contrôle de bout en bout pour réseau en pont

Country Status (1)

Country Link
WO (1) WO2016107156A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110971520A (zh) * 2019-11-01 2020-04-07 烽火通信科技股份有限公司 一种用overlay技术实现二三层桥接的方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090059799A1 (en) * 2007-08-28 2009-03-05 Nortel Networks Limited Scaling oam for point-to-point trunking
CN101527645A (zh) * 2008-03-03 2009-09-09 华为技术有限公司 网络拓扑信息收集方法、系统及相关设备
CN103475588A (zh) * 2013-09-10 2013-12-25 神州数码网络(北京)有限公司 Oam报文的发送处理方法和装置、接收处理方法和装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090059799A1 (en) * 2007-08-28 2009-03-05 Nortel Networks Limited Scaling oam for point-to-point trunking
CN101527645A (zh) * 2008-03-03 2009-09-09 华为技术有限公司 网络拓扑信息收集方法、系统及相关设备
CN103475588A (zh) * 2013-09-10 2013-12-25 神州数码网络(北京)有限公司 Oam报文的发送处理方法和装置、接收处理方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110971520A (zh) * 2019-11-01 2020-04-07 烽火通信科技股份有限公司 一种用overlay技术实现二三层桥接的方法及系统
CN110971520B (zh) * 2019-11-01 2022-02-08 烽火通信科技股份有限公司 一种用overlay技术实现二三层桥接的方法及系统

Similar Documents

Publication Publication Date Title
US11979322B2 (en) Method and apparatus for providing service for traffic flow
JP5345942B2 (ja) Pbtネットワークの中間ノードにおけるイーサネットoam
WO2013097459A1 (fr) Procédé et dispositif de détection de chemin de service
US8125914B2 (en) Scaled Ethernet OAM for mesh and hub-and-spoke networks
US8023506B2 (en) Method and provider edge device for advertising and processing pseudo-wire information
WO2014019348A1 (fr) Procédé, dispositif et système pour l'exploitation, la gestion et la maintenance de configuration oam
WO2014032435A1 (fr) Procédé et dispositif de traitement des informations de localisation d'un point de défaut
WO2015000375A1 (fr) Procédé, appareil et système d'acheminement de paquets
EP2068506B1 (fr) Procédé, système et routeur de frontière du fournisseur pour la détection de défaut de pseudo-fil
WO2013182059A1 (fr) Procédé et dispositif pour établir un tunnel d'ingénierie de trafic de commutation multiprotocole par étiquette
CN105812198B (zh) 桥接网络端到端的监测方法和装置
WO2007082429A1 (fr) Procédés et dispositifs de détermination de l'état de connexion d'un pseudo-câble et de notification de l'état de connexion d'un circuit annexe
WO2016041379A1 (fr) Procédé et appareil pour mettre en œuvre un nni ping
US20230156523A1 (en) Message interaction method and apparatus, and device and storage medium
WO2009067917A1 (fr) Procede, systeme et dispositif d'echantillonnage de message
US9680769B2 (en) Method for implementing E-tree service and provider edge device
CN103067278B (zh) 一种数据帧的传输处理方法、设备及系统
CN103973825A (zh) 叠加网络中通告mac地址可达性的方法、节点设备及发送方法
WO2019157802A1 (fr) Procédé, dispositif, et système de réseau pour mesurer la performance d'un réseau
CN102255787B (zh) 一种基于服务质量的报文处理方法和运营商网络边缘设备
CN101160862A (zh) 一种实现虚电路状态一致的方法及系统
WO2013166911A1 (fr) Procédé permettant de traiter un conflit entre les identifiants des groupes de dispositifs dans un réseau et pont de route
WO2012106872A1 (fr) Procédé, dispositif d'agrégation et système pour mettre en œuvre un contrôle de continuité
WO2013075476A1 (fr) Procédé et dispositif de détection de liaison ethernet
US8817648B2 (en) Pseudowire extended group messaging in a packet switched network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15874845

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15874845

Country of ref document: EP

Kind code of ref document: A1