WO2016197613A1 - 一种静态伪线状态检测方法及装置 - Google Patents

一种静态伪线状态检测方法及装置 Download PDF

Info

Publication number
WO2016197613A1
WO2016197613A1 PCT/CN2016/071602 CN2016071602W WO2016197613A1 WO 2016197613 A1 WO2016197613 A1 WO 2016197613A1 CN 2016071602 W CN2016071602 W CN 2016071602W WO 2016197613 A1 WO2016197613 A1 WO 2016197613A1
Authority
WO
WIPO (PCT)
Prior art keywords
pseudowire
edge device
static
state
state detection
Prior art date
Application number
PCT/CN2016/071602
Other languages
English (en)
French (fr)
Inventor
朱春
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016197613A1 publication Critical patent/WO2016197613A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes

Definitions

  • Embodiments of the present invention relate to, but are not limited to, end-to-end pseudowire emulation technology, and more particularly to a static pseudowire state detection method and apparatus.
  • PWE3 Pseudo-Wire Emulation Edge-to-Edge
  • IP/MPLS packet-switched networks
  • FR Frame Relay
  • Layer 2 virtual private network (VPN) protocol such as ATM (Asynchronous Transfer Mode), Ethernet (Ethernet), Time Division Multiplexing (TDM), and Optical Synchronous Digital Transmission (SONET/SDH).
  • ATM Asynchronous Transfer Mode
  • Ethernet Ethernet
  • TDM Time Division Multiplexing
  • SONET/SDH Optical Synchronous Digital Transmission
  • Pseudo Wire is a point-to-point virtual private line technology that provides transparent transmission of Layer 2 data through pseudowires, such as Ethernet services, FR services, and ATMs.
  • the text format is specifically encapsulated and transparently transmitted on a pseudowire established between the operator's edge devices. By deploying this transparent transmission service, operators ensure the connectivity of the same customers separated in different regions and the isolation between different users.
  • a pseudowire is a schematic diagram of a network reference model of a typical pseudowire in the related art.
  • a user edge device 1 (CE1) of a user's local area network 1 accesses an operator through an access link 1 (AC1).
  • User Edge Device 2 (CE2) of the user's LAN 2 accesses the edge device of the carrier's MPLS backbone network through access link 2 (AC2) 2 (PE2);
  • the operator deploys a pseudowire for this service between PE1 and PE2.
  • a pseudowire is a set of unidirectional label switching paths (LSPs) that are opposite in direction, such as a single-segment pseudowire (SSPW) in FIG.
  • LSPs unidirectional label switching paths
  • the packet forwarding process of the CE1 to the CE2 includes: a protocol data unit (PDU) encapsulated into a pseudowire in a local area network 1 of the user, which is sent from the AC1, and transparently transmitted through the pseudowire.
  • PDU protocol data unit
  • PE2 is restored to the local form after being processed locally, and forwarded to the network of the user's LAN 2 through AC2.
  • the packet forwarding from CE2 to CE1 is similar to the above procedure, and is not mentioned here.
  • Dynamic pseudowires refer to PWE3 signaling, such as Label Distribution Protocol (LDP) extension or Border Gateway Protocol (BGP, Border). Gateway Protocol) is used to extend the distribution of pseudo-line labels and negotiate parameters.
  • Static pseudo-line refers to manually assigning forwarding labels to a pseudo-line. This process does not require negotiation of signaling. It is completely planned and static by the operator. deploy.
  • Dynamic pseudowires established through PWE3 signaling are better in maintainability and scalability, but require additional signaling overhead.
  • the labels of each pseudowire need to be planned and allocated by the operator. The configuration is cumbersome. Moreover, the maintainability is poor.
  • the static pseudowire mode is suitable for establishing a pseudowire between the low-end devices on the access side. For example, on the access ring of the Packet Transport Network (PTN), low-end access routers are used, and the dynamic PWE3 protocol function is generally not available. In this case, static pseudowires need to be deployed.
  • PTN Packet Transport Network
  • a feasible technical solution may be considered to implement an end-to-end Bidirectional Forwarding Detection (BFD) technique for static pseudowires, which is responsible for detecting the pseudowire state.
  • BFD Bidirectional Forwarding Detection
  • the router mentioned above is a low-end access router, it is possible that a router that deploys a static pseudowire does not have the BFD function.
  • the static pseudowire is deployed more, the device itself cannot withstand the deployment of BFD technology. The processing overhead brought.
  • An object of the present invention is to provide a static pseudowire state detection method and apparatus, which can easily detect the state of a static pseudowire.
  • an embodiment of the present invention provides a static pseudowire state detection method, including:
  • the first edge device and the second edge device respectively start a keep-alive timer, and send a pseudo-line state detection message to the peer end;
  • the first edge device and the second edge device are edge devices at both ends of the static pseudowire.
  • the method further includes: enabling a pseudowire state detection function on the first edge device and the second edge device, respectively.
  • the method further includes: configuring a pseudowire state detection packet sending period for sending the pseudowire state detection packet to the peer end, and a duration of the keepalive timer;
  • the duration of the keep-alive timer is N times the preset value of the pseudo-line state detection packet sending period, or a configured value, and N is a natural number greater than 1.
  • the startup protection timer includes:
  • the keepalive timer is turned on;
  • the keepalive timer is turned on when the first pseudowire state detection message from the peer is received.
  • the pseudowire status detection packet needs to carry a control word for distinguishing different packet types
  • the control word includes at least an identifier field for indicating a message type.
  • control word further includes a reserved Reserved field for subsequent extension.
  • control word further includes: a pseudowire state detection packet sending period field for carrying a detection packet sending period set by the first edge device or the second edge device itself, and for carrying The keepalive timer duration field of the duration of the keepalive timer set by the first edge device or the second edge device itself.
  • the method further includes:
  • the first edge device or the second edge device determines the transmission period of the pseudowire state detection packet and the duration of the keepalive timer of the peer end in the received pseudowire state detection packet.
  • the pseudowire status detection packet transmission period and/or the keepalive timer are different in duration, and negotiation is performed to ensure the same.
  • the determining whether the forwarding state of the current static pseudowire is valid includes:
  • the first edge device or the second edge device determines, according to the identifier field in the control word of the received pseudowire state detection packet, that the packet is a pseudowire state detection packet.
  • keepalive timer of the first edge device or the second edge device does not time out, it is determined that the forwarding state of the current static pseudowire is valid, and the own keepalive timer is reset.
  • the method further includes:
  • the method further includes: the first edge device or the second edge device receives a keepalive timer from the peer pseudowire state detection packet and restarts itself.
  • the method further includes:
  • the first edge device or the second edge device associates the user edge device with the access link of the user, and prohibits the user edge device from forwarding the traffic.
  • the method further includes:
  • the first edge device or the second edge device detects that an access link between the user edge device connected to itself or the user edge device itself fails, the first edge device or the second edge device Stop sending the pseudowire status detection message.
  • the embodiment of the invention further provides a static pseudowire state detecting device, which comprises at least a timing module, a first processing module, wherein
  • a timing module configured with a keep-alive timer, configured to start a keep-alive timer
  • the first processing module is configured to send a pseudowire state detection packet to the peer end, and determine whether the forwarding state of the current static pseudowire is valid according to the state of the keepalive timer of the pseudowire state detection packet received from the peer end.
  • the timer module is further configured to: notify the first processing module when the keep-alive timer expires; receive a reset notification from the first processing module, restart the keep-alive Timer
  • the first processing module is configured to: detect a packet transmission period according to the configured pseudowire state, periodically generate a pseudowire state detection packet, and send the packet to the peer end; and detect the pseudowire status from the peer end according to the received status
  • the identifier field in the control word of the packet determines that the packet is a pseudowire state detection packet, and the keepalive timer of the packet is not timed out, and the forwarding state of the current static pseudowire is determined to be valid; the reset is output to the timing module.
  • the reset notification of the keep-alive timer is configured to: detect a packet transmission period according to the configured pseudowire state, periodically generate a pseudowire state detection packet, and send the packet to the peer end; and detect the pseudowire status from the peer end according to the received status
  • the identifier field in the control word of the packet determines that the packet is a pseudowire state detection packet, and the keepalive timer of the packet is not timed out, and the forwarding state of the current static pseudowire is determined to be valid; the reset
  • the first processing module is further configured to: receive a notification that the keep alive timer expires from the timing module, and do not receive a pseudowire state detection packet, and determine that the current static pseudowire is forwarded. The status is invalid; the timing module is notified to turn off the keep-alive timer.
  • the first processing module is further configured to: receive a pseudowire state detection packet from the peer end, re-determine that the forwarding state of the current pseudowire is valid, notify the timing module, to trigger the timing module to start to protect Live timer.
  • the first processing module is further configured to: if the received pseudowire state detection packet from the peer end carries the pseudowire state detection packet sending period and the duration of the keepalive timer, if the setting is set by itself
  • the pseudowire state detection packet transmission period and/or the keepalive timer are different from the peer end, and are negotiated to ensure the same.
  • an enabling module is further configured to enable the pseudowire state detection function, and output an enable indication to the timing module to trigger the timing module to start the keep alive timer.
  • the first processing module is further configured to: receive the first pseudowire state detection packet from the peer end, notify the timing module, to trigger the timing module to start the keepalive timer.
  • the device further includes: a second processing module
  • the first processing module is further configured to notify the second processing module when determining that the forwarding state of the current static pseudowire is invalid;
  • the second processing module is configured to: link the user edge device to access the access link of the user, and prohibit the user edge device from forwarding the traffic.
  • the first processing module is further configured to: detect that an access link between the user edge device connected to the user device or the user edge device itself fails, and stop sending the pseudowire state detection message.
  • the device is a separate entity or is disposed in an edge device at both ends of a static pseudowire or a static pseudowire segment.
  • the present invention also provides a computer readable storage medium storing computer executable instructions for performing the base station registration method of any of the above.
  • the technical solution of the present application includes that the first edge device and the second edge device respectively start a keep-alive timer, and send a pseudo-line state detection message to the opposite end; the first edge device or the second edge device detects the report according to the received pseudo-line state.
  • the state of the keepalive timer of the current time is determined, and the forwarding state of the current static pseudowire is determined to be valid.
  • the first edge device and the second edge device are edge devices at both ends of the static pseudowire.
  • the technical solution provided by the embodiment of the present invention directly detects the forwarding state of the static pseudowire by introducing a pseudowire state detection packet in the process of user traffic forwarding, just like a heartbeat signal.
  • the edge device that receives the pseudowire state detection packet may detect the transmission period of the packet and the duration of the keepalive timer according to the pseudowire state carried therein, and determine the transmission period and keep alive of the pseudowire state detection packet set by itself. Whether the duration of the timer is the same as that of the peer. If the difference is different, you can perform further negotiation to ensure that the interval between the sending of the pseudowire state detection packet and the duration of the keepalive timer of the edge device at both ends of the static pseudowire are consistent. The reliability of static pseudowire state detection.
  • FIG. 1 is a schematic diagram of a network reference model of a typical pseudowire in the related art
  • FIG. 2 is a flowchart of a method for detecting a static pseudowire state according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a format of a control word of a pseudowire state detection message according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of a network reference model of a first embodiment of a static pseudowire state detecting method according to the present invention
  • FIG. 5 is a schematic diagram of a network reference model of a second embodiment of a static pseudowire state detecting method according to the present invention.
  • FIG. 6 is a schematic diagram of a network reference model of a third embodiment of a static pseudowire state detecting method according to the present invention.
  • FIG. 7 is a schematic diagram of a network reference model of a fourth embodiment of a static pseudowire state detecting method according to the present invention.
  • FIG. 8 is a schematic structural diagram of a structure of a static pseudowire state detecting apparatus according to an embodiment of the present invention.
  • the first edge device and the second edge device are edge devices at both ends of a static pseudowire or a static pseudowire segment, and may be a PE. , can also be SPE; including:
  • Step 200 The first edge device and the second edge device respectively start a keep-alive timer, and send a pseudo-line state detection message to the opposite end.
  • the method further includes: enabling the pseudowire state detection function on the edge devices at both ends of the static pseudowire, that is, the first edge device and the second edge device.
  • the pseudowire state detection function can be disabled by default. If necessary, the enable operation can be performed by using the command line configuration or the network management mode to enable the pseudowire state detection function. The conventional technical means belonging to those skilled in the art will not be described herein. Of course, the pseudowire status detection function can also be turned on by default.
  • the method further includes:
  • the sending period of the pseudowire state detection packet is a mandatory configuration item, and the smaller the transmission period of the pseudowire state detection packet is, indicating the pseudowire state.
  • the response time of the detection is faster.
  • step 200 starting the keep-alive timer specifically includes:
  • the keep-alive timer is turned on when the first pseudowire state detection from the peer is received. This method effectively avoids the problem that the edge device at both ends of the static pseudowire enables the detection state false alarm caused by the excessive operation time difference of the pseudowire state detection function.
  • the sending of the pseudowire state detection packet to the peer end includes:
  • the detection of the packet transmission period is performed according to the configured pseudowire state, and the pseudowire state detection packet is periodically generated and sent to the peer end. among them,
  • FIG. 3 is a schematic diagram of a control word format of a pseudowire state detection packet according to an embodiment of the present invention. As shown in FIG. 3, the control word includes at least:
  • the first four bits of the common user message control word in the related protocol are 0000. Therefore, the 4 bits of the control word of the pseudowire state detection message may be defined as 1000, indicating that the message is a pseudowire state detection message. Instead of user messages.
  • control word of the pseudowire state detection message may further include a reserved field for subsequent extension, such as a reserved field of 12 bits.
  • the control word of the pseudowire state detection packet may further include: The interval of the pseudo-line state detection packet (Interval Time) of the detection packet transmission period set by the edge device itself, and the duration of the keep-alive timer for carrying the duration of the keep-alive timer set by the edge device itself (KeepAlive)
  • the Time field for example, the Interval Time field and the KeepAlive Time field can each occupy 1 byte.
  • the length of the control word is set to 4 bytes (32 bits) as an example, the first 4 The bit is an identification field, and the 12 bits after the identification field are reserved fields, and the reserved field is followed by an Interval Time field and a KeepAlive Time field each occupying 1 byte.
  • the generated pseudo-line state detection packet in step 200 includes:
  • a pseudo-line state detection message is constructed, and the pseudo-line label and the outer tunnel label are marked on the header of the pseudo-line state detection packet to ensure the forwarding of the pseudo-line detection packet.
  • the path and the forwarding path of actual user packets are the same.
  • Step 201 The first edge device or the second edge device determines whether the forwarding state of the current static pseudowire is valid according to the state of the keepalive timer of the packet when the pseudowire state detection packet is received.
  • This step specifically includes:
  • the first edge device or the second edge device determines, according to the identifier field in the control word of the received pseudowire state detection packet, whether the packet is a user packet or a pseudowire state detection packet:
  • the forwarding operation is continued to the user-side device according to the processing mode of the existing user packet.
  • the keepalive timer of the first edge device or the second edge device itself does not time out, it is determined that the forwarding state of the current static pseudowire is valid; meanwhile, the first edge device or the second The edge device resets its own keepalive timer and waits to receive the next pseudowire status detection message from the peer.
  • the first edge device or the second edge device does not receive the pseudowire state detection packet after the keepalive timer expires, it determines that the current static pseudowire forwarding state is invalid, and closes its keepalive. Timer. After the pseudowire state is determined to be invalid, further,
  • the method of the present invention further includes: the first edge device or the second edge device restarts the keep-alive timer, and continues to detect subsequent pseudo-line state detection messages. Further, here, a certain recovery strategy may also be set. For example, if a preset number of, for example, three pseudowire state detection messages are continuously received, it is determined that the forwarding state of the static pseudowire is restored to be effective, so that the pseudo can be avoided well. Line status false positives, And suppress the oscillation problem of the pseudowire state.
  • the method for detecting a static pseudowire state in the embodiment of the present invention by introducing a pseudowire state detection packet in the process of user traffic forwarding, is similar to the heartbeat signal detection, and simply realizes the detection of the forwarding state of the static pseudowire, without Pseudowires deploy additional detection techniques.
  • the method in the embodiment of the present invention further includes:
  • the edge device that receives the pseudo-line state detection packet can detect the packet sending period and the duration of the keep-alive timer according to the pseudo-line state of the peer end carried therein, and determine the pseudo-setting of the packet.
  • the length of the line state detection packet sending period and/or the keepalive timer is the same as that of the peer end. If the difference is different, the negotiation can be performed to ensure the same. For example, it is agreed to take the smaller interval of the pseudowire state detection packet sending period of the two devices.
  • a value is used as the pseudo-wire state detection packet transmission period after the negotiation to ensure that the pseudo-line state detection packet sending period of the edge device at both ends of the static pseudo-wire is consistent with the duration of the keep-alive timer, thereby ensuring a static The reliability of pseudowire status detection.
  • the method of the embodiment of the present invention includes:
  • the first edge device or the second edge device associates the user edge device with the access link of the user, and prohibits the user edge device from forwarding the traffic.
  • the specific implementations are well known to those skilled in the art, and are not intended to limit the scope of the present invention, and are not described herein again.
  • the method further includes:
  • the first edge device or the second edge device detects that the access link between the user edge device connected to itself or the user edge device itself fails, and the first edge device or the second edge device actively stops sending the pseudowire state detection report. Text.
  • FIG. 4 is a schematic diagram of a network reference model of a first embodiment of a method for detecting a static pseudowire state according to the present invention.
  • the first embodiment uses a static pseudowire state and a scenario of linkage between the access side as an example.
  • PE1 and A static pseudowire PW12 has been established between PE2 (shown by hatching in the figure).
  • the traffic sent from CE1 to CE2 is used as an example.
  • the traffic of CE1 is sent to PE1.
  • PE1 encapsulates the user traffic sent by CE1 with PW, and passes the P device (including P1 and P2) to PE2.
  • PE2 strips the Pseudowire. Encapsulate and restore the user packets of CE1 and forward them to CE2.
  • both PE1 and PE2 detect the packet sending period according to the set pseudowire status, and send the pseudowire status detection packet to the peer end periodically.
  • the fault point (c) will cause PE2.
  • the pseudowire status detection packet cannot be sent to PE1.
  • PE1 determines that the forwarding state of the current static pseudowire is invalid.
  • PE1 can associate CE1 to access the access link of PE1, and prohibit CE1 traffic from continuing to be forwarded.
  • the pseudowire status detection packet of PE1 cannot be sent to PE2.
  • PE2 also determines that the forwarding state of the current static pseudowire is invalid.
  • CE1 is connected to the access link of PE2 in parallel, and CE2 traffic is prohibited from being forwarded. Narration.
  • the link between PE2 and CE2 is as shown in Figure 4 (d), or the fault occurs on the CE2 device in Figure 4 (e).
  • PE2 will detect the link failure between CE2 and CE2.
  • the pseudowire state can be linked, that is, the PE2 actively stops sending the pseudowire state detection packet, and the PE1 expires in the keepalive timer.
  • the current pseudowire forwarding state can be determined to be invalid.
  • CE1 accesses the access link of PE1 and prohibits CE1 traffic from continuing to be forwarded.
  • the specific implementation of how the PE2 senses the link failure with the CE2 belongs to the well-known technology of the present invention, and is not intended to limit the scope of protection of the present invention, and details are not described herein again.
  • FIG. 5 is a schematic diagram of a network reference model of a second embodiment of a static pseudowire state detection method according to the present invention.
  • the second embodiment uses a static pseudowire state linkage fast reroute (FRR) protection scenario as an example, as shown in FIG. 5.
  • FRR static pseudowire state linkage fast reroute
  • PE1 and PE2 and PE3 have established a primary static pseudowire PW12 and a static pseudowire PW13 respectively.
  • the traffic sent from CE1 to CE2 is taken as an example.
  • the traffic sent by CE1 to PE1 is the default between PE1 and PE2.
  • PW is PW12 to PE2, and PE2 forwards it to CE2.
  • both PE1 and PE2 are set according to the pseudo.
  • the line state detection packet is sent periodically, and the pseudowire state detection packet is sent to the peer end.
  • the PE1 When the P1 device is in the fault point (a) in Figure 5, or the link between the P devices is as shown in Figure 5, the fault point (b), or PE2 (such as the fault point (c) in Figure 5, the PE2 will be caused.
  • the pseudo-line state detection packet cannot be sent to PE1.
  • PE1 determines that the forwarding state of the current static pseudowire is invalid.
  • PE1 switches the user traffic sent by CE1 to The alternate pseudowire PW13 transmits and finally sends it to the CE2 device, and timely switching ensures uninterrupted user traffic.
  • PE2 will detect that the link between CE2 and CE2 is invalid.
  • the pseudowire can be linked to the active line. If the PE1 device times out, the PE1 device can determine that the current static pseudowire forwarding state is invalid according to the static pseudowire state detection method of the present invention. At this time, PE1 switches the user traffic sent by CE1 to the standby state. The pseudowire PW13 transmits and finally transmits to the CE2 device. User traffic is guaranteed to be uninterrupted.
  • FIG. 6 is a schematic diagram of a network reference model of a third embodiment of a method for detecting a static pseudowire state according to the present invention.
  • the third embodiment is a scenario in which a static multi-segment pseudowire state is transmitted as an example, wherein the multi-segment pseudowire is a single-segment pseudowire.
  • the multi-segment pseudowire allows multiple segmented pseudowires between the two PEs.
  • the PW segments on both sides are connected through the switched pseudowire device (SPE, Switch-PE), and the pseudowires are completed in the SPE. Level label switching operations.
  • SPE switched pseudowire device
  • Switch-PE switched pseudowire device
  • Level label switching operations As shown in FIG. 6, it is assumed that a static multi-segment pseudo-segment is formed on PE1, SPE, and PE2. It is assumed that the traffic sent to PE1 on CE1 is forwarded to the SPE through the static segment PW1, and then forwarded to the PE2 by the S
  • both PE1 and PE2 detect the packet sending period according to the set pseudowire status, and send the pseudowire status detection packet to the peer end periodically.
  • the SPE does not need to distinguish whether the received packet is a pseudo-line state detection packet or a user packet, and is uniformly forwarded according to the forwarding rule of the user packet.
  • the static pseudowire state detection is enabled on the PEs at both ends, and does not need to be in the SPE.
  • the detection function in the present invention is enabled, that is, the detection message does not need to be identified and operated at the SPE node.
  • the static PW The SPE is terminated on the SPE.
  • the static pseudowire status detection function of the present invention needs to be enabled on the SPE.
  • the pseudowire status detection packet needs to be identified and processed on the SPE.
  • the link between PE2 and CE2 is as shown in Figure 6 (f) or the failure of the CE2 device in Figure 6 (g).
  • PE2 will detect the link failure with CE2.
  • the pseudowire state detection packet is actively stopped, and the PE1 expires in the keepalive timer.
  • the current pseudowire forwarding state may be determined to be invalid, and the CE1 access is performed in parallel. On the access link of PE1, CE1 traffic is prohibited from being forwarded.
  • FIG. 7 is a schematic diagram of a network reference model of a fourth embodiment of a method for detecting a static pseudowire state according to the present invention.
  • the fourth embodiment uses a scenario in which a dynamic and static hybrid multi-segment pseudowire state is transmitted as an example. As shown in FIG. 7, it is assumed that PE1, SPE, A multi-segment pseudo-line has been established on PE2, and it is assumed that there is a static pseudo-line between PE1 and SPE, and a dynamic pseudo-line between SPE and PE2.
  • both PE1 and SPE detect the packet transmission period according to the set pseudowire status, and send the pseudowire status detection packet to the peer end periodically.
  • the SPE's pseudowire status detection packet cannot be sent to the device.
  • PE1 determines that the forwarding state of the current static pseudowire is invalid.
  • PE1 can associate CE1 to access the access link of PE1, and prohibit CE1 traffic from continuing to be forwarded.
  • the SPE detects that the pseudowire link between the SPE and the PE2 is invalid through the dynamic pseudowire state advertisement protocol. In this case, the static link state between the association and the PE1 is triggered, that is, the SPE actively stops sending the pseudowire state detection packet to the PE1.
  • the static pseudowire state detection method PE1 when the keepalive timer of the PE1 expires, the static pseudowire state detection method PE1 according to the present invention can determine that the current pseudowire forwarding state is invalid, and the CE1 is connected to the access link of the PE1 in parallel, and the CE1 flow is prohibited. The amount continues to be forwarded.
  • the specific implementation of the dynamic pseudo-wire state advertisement protocol belongs to the well-known technology of the present invention, and the specific implementation is not limited to the scope of protection of the present invention, and details are not described herein again.
  • the fault between the PE2 and the CE2 is as shown in Figure 7 (f), or the failure of the fault (g) in CE2 is taken as an example.
  • PE2 will detect the link failure between CE2 and CE2.
  • the PE2 is notified to the local access side of the SPE through the dynamic pseudo-wire state notification protocol.
  • the SPE triggers the static link state between the association and the PE1, that is, the SPE actively stops sending the pseudowire status detection packet to the PE1.
  • the static pseudowire state detecting method PE1 according to the present invention can determine that the forwarding state of the current static pseudowire is invalid, and the CE1 is connected to the access link of the PE1 in parallel, and the CE1 traffic is prohibited from being forwarded.
  • FIG. 8 is a schematic structural diagram of a static pseudowire state detecting apparatus according to the present invention. As shown in FIG. 8, at least a timing module, a first processing module;
  • the timing module is configured with a keep-alive timer for starting the keep-alive timer.
  • the first processing module is configured to send a pseudowire state detection packet to the peer end, and determine whether the forwarding state of the current static pseudowire is valid according to the state of the keepalive timer of the pseudowire state detection packet received from the peer end.
  • the timer module is further configured to: notify the first processing module when the keep-alive timer expires; receive a reset notification from the first processing module, and restart the keep-alive timer;
  • the first processing module is configured to: detect a packet transmission period according to the configured pseudowire state, periodically generate a pseudowire state detection packet, and send the packet to the peer end; and detect the packet according to the received pseudowire state from the peer end.
  • the identification field in the control word determines that the message is a pseudo-line state detection message, and its own keep-alive timer does not time out, determining that the current static pseudo-line forwarding state is valid; outputting the reset keep-alive timing to the timing module Reset notification.
  • the first processing module is further configured to: receive a notification indicating that the keep-alive timer expires from the timing module, and receive no pseudo-line state detection packet, determine that the current static pseudo-line forwarding state is invalid; notify the timing module to close Keep-alive timer; at this time,
  • the first processing module is further configured to: receive the pseudowire state detection packet from the peer end, re-determine that the forwarding state of the current pseudowire is valid, and notify the timing module to trigger the timing module to start the keepalive timer.
  • the first processing module is further configured to: when the received pseudowire state detection packet from the peer end carries the pseudowire state detection packet sending period and the duration of the keep-alive timer, if the pseudowire state detection report is set by itself The duration of the text transmission period and/or keepalive timer is different from that of the peer end, and negotiation is performed to ensure the same.
  • the apparatus of the present invention further includes an enabling module for enabling the pseudowire state detection function and outputting an enable indication to the timing module to trigger the timing module to activate the keep alive timer.
  • the first processing module is further configured to receive the first pseudowire state detection message from the peer end, and notify the timing module to trigger the timing module to start the keepalive timer.
  • the device of the present invention further includes: a second processing module, at this time,
  • the first processing module is further configured to notify the second processing module when determining that the forwarding state of the current static pseudowire is invalid;
  • the second processing module is configured to: link the user edge device to access the access link of the user, and prohibit the user edge device from forwarding the traffic.
  • the first processing module is further configured to detect that the access link between the user edge device connected to the user or the user edge device itself fails, and actively stop sending the pseudowire state detection message.
  • the device of the present invention may be an independent entity, or may be disposed on an edge device such as a PE or an SPE at both ends of the static pseudowire.
  • the method and device for detecting a static pseudowire state include: the first edge device and the second edge device respectively start a keep-alive timer, and send a pseudo-line state detection message to the opposite end; the first edge device or the first The second edge device determines whether the forwarding state of the current static pseudowire is valid according to the state of the keepalive timer of the pseudowire state detection packet; wherein, the first edge device and the first edge device The two edge devices are edge devices at both ends of the static pseudowire.
  • the technical solution provided by the present invention simply detects the forwarding state of the static pseudowire by introducing a pseudowire state detection packet in the user traffic forwarding process, just like a heartbeat signal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

一种静态伪线状态检测方法及装置,包括第一边缘设备与第二边缘设备分别启动保活定时器,并向对端发送伪线状态检测报文;第一边缘设备或第二边缘设备根据接收到伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效;其中,第一边缘设备和第二边缘设备为处于静态伪线两端的边缘设备。本发明提供的技术方案,通过在用户流量转发过程中引入伪线状态检测报文,就像心跳信号一样,简单地实现了对静态伪线的转发状态的检测。

Description

一种静态伪线状态检测方法及装置 技术领域
本发明实施例涉及但不限于端到端伪线仿真技术,尤指一种静态伪线状态检测方法及装置。
背景技术
端到端伪线仿真(PWE3,Pseudo-Wire Emulation Edge-to-Edge)是在分组交换网(IP/MPLS)上提供隧道,以便仿真一些业务如帧中继(FR,Frame Relay)、异步传输模式(ATM,Asynchronous Transfer Mode)、以太网(Ethernet)、时分复用模式(TDM)、光同步数字传输(SONET/SDH)等的二层虚拟专用网络(VPN)协议。通过PWE3协议,可以将传统的网络与分组交换网络互连起来,从而实现资源的共用和网络的拓展。
伪线(PW,Pseudo Wire)是一种点到点的虚拟专线技术,通过伪线提供二层数据的透传服务,如Ethernet服务、FR服务和ATM等,都可以通过将相应的二层报文格式进行特定封装,并在运营商边缘设备之间建立的伪线上进行透明传输。运营商通过部署该透传服务,保证了分隔在不同地域的相同客户的连通性以及不同用户之间的隔离性。
图1为相关技术中一个典型的伪线的网络参考模型示意图,如图1所示,某用户的局域网1的用户边缘设备1(CE1)通过接入链路1(AC1)接入到运营商多协议标签交换(MPLS)骨干网络的边缘设备1(PE1);该用户的局域网2的用户边缘设备2(CE2)通过接入链路2(AC2)接入到运营商MPLS骨干网络的边缘设备2(PE2);运营商在PE1和PE2之间为该业务部署一条伪线。伪线是一对方向相反的单向的标签转发路径(LSP,Label Switch Path)的集合,如图1中的单段伪线(SSPW)。如图1所示,CE1到CE2的报文转发过程大致包括:从AC1上发送的该用户的局域网1内的报文被封装成伪线的协议数据单元(PDU),通过该伪线透传给对端的PE2;当报文到达PE2时,PE2经过本地处理后重新恢复为本地形式,并通过AC2转发到该用户的局域网2的网络中去。CE2到CE1的报文转发与上述过程类似,这里不再赘述。
伪线根据其建立的方式分为动态伪线和静态伪线,其中,动态伪线是指通过PWE3信令,如标签分发协议(LDP,Label Distribution Protocol)扩展方式或者边界网关协议(BGP,Border Gateway Protocol)扩展方式来完成伪线标签的分发和参数的协商;而静态伪线是指手动为某个伪线指定转发标签,该过程并不需要信令的协商,完全由运营商规划和静态部署。
通过PWE3信令建立的动态伪线,维护性和扩展性比较好,但是需要额外的信令开销;而静态伪线,每个伪线的标签需要运营商规划和分配好,其配置比较繁琐,且可维护性较差,但是,一方面,由于静态伪线的部署不需要PWE3信令建立和状态维护,因此,静态伪线的方式适用于在接入侧的低端设备间建立伪线。比如,在包传输网络(PTN,Packet Transport Network)的接入环上,使用的都是低端的接入路由器,一般不具备动态PWE3协议功能,此时就需要通过部署静态伪线的方式来完成基站业务到汇聚层/核心层的传输;另一方面,由于静态伪线的建立没有任何控制协议,所以,当整个伪线路径上的某个设备或者链路发生故障时,处于伪线边缘的PE是无法感知到的,也就是说,这种情况下是无法切换到备用伪线链路上的,而最终造成用户流程的中断。
目前,为了检测静态伪线状态,可行的技术方案可以考虑为静态伪线部署端到端的双向转发检测(BFD,Bidirectional Forwarding Detection)技术,来负责伪线状态的检测。但是,由于上面提到这种路由器是低端的接入路由器,因此,有可能部署静态伪线的路由器不具备BFD功能,而且,当静态伪线部署较多时,设备本身也不能承受部署BFD技术带来的处理开销。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例的目的在于提供一种静态伪线状态检测方法及装置,能够简单实现对静态伪线状态的检测。
为了达到本发明目的,本发明实施例提供了一种静态伪线状态检测方法,包括:
第一边缘设备与第二边缘设备分别启动保活定时器,并向对端发送伪线状态检测报文;
第一边缘设备或第二边缘设备根据接收到伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效;
其中,第一边缘设备和第二边缘设备为处于静态伪线两端的边缘设备。
可选地,该方法之前还包括:在所述第一边缘设备和所述第二边缘设备上分别使能伪线状态检测功能。
可选地,该方法之前还包括:配置用于向所述对端发送伪线状态检测报文的伪线状态检测报文发送周期,以及所述保活定时器的时长;
其中,所述保活定时器的时长为伪线状态检测报文发送周期的预设值N倍,或配置的值,N为大于1的自然数。
可选地,所述启动保护定时器包括:
所述使能伪线状态检测功能时开启所述保活定时器;或者,
在收到来自对端的第一个伪线状态检测报文时开启所述保活定时器。
可选地,所述伪线状态检测报文中需要携带用于区分不同报文类型的控制字;
其中,控制字至少包括用于表示报文类型的标识字段。
可选地,所述控制字还包括用于后续扩展的预留Reserved字段。
可选地,所述控制字还包括:用于携带所述第一边缘设备或所述第二边缘设备自身设置的检测报文发送周期的伪线状态检测报文发送周期字段,以及用于携带所述第一边缘设备或所述第二边缘设备自身设置的保活定时器的时长的保活定时器时长字段。
可选地,该方法还包括:
如果所述第一边缘设备或所述第二边缘设备确定出收到的伪线状态检测报文中携带的对端的伪线状态检测报文发送周期和保活定时器的时长,与自身设置的伪线状态检测报文发送周期和/或保活定时器的时长不相同,进行协商以确保相同。
可选地,所述确定当前静态伪线的转发状态是否有效包括:
所述第一边缘设备或所述第二边缘设备根据收到的伪线状态检测报文的控制字中的标识字段确定出该报文是伪线状态检测报文,
且所述第一边缘设备或所述第二边缘设备自身的保活定时器未超时,则确定出当前静态伪线的转发状态为有效,重置自身的保活定时器。
可选地,如果所述第一边缘设备或所述第二边缘设备在自身的保活定时器超时后,未收到所述伪线状态检测报文,该方法还包括:
确定出当前静态伪线的转发状态为失效,并关闭自身的保活定时器。
可选地,该方法还包括:所述第一边缘设备或所述第二边缘设备收到来自对端伪线状态检测报文,重启自身的保活定时器。
可选地,所述第一边缘设备或所述第二边缘设备确定出当前静态伪线的转发状态为失效时,还包括:
所述第一边缘设备或所述第二边缘设备联动用户边缘设备接入自身的接入链路,禁止该用户边缘设备转发流量。
可选地,所述第一边缘设备或所述第二边缘设备确定出当前静态伪线的转发状态为失效之前,该方法还包括:
所述第一边缘设备或所述第二边缘设备感知到与自身连接的用户边缘设备之间的接入链路或用户边缘设备本身出现故障,所述第一边缘设备或所述第二边缘设备停止发送所述伪线状态检测报文。
本发明实施例还提供了一种静态伪线状态检测装置,至少包括定时模块,第一处理模块;其中,
定时模块,其中配置有保活定时器,用于启动保活定时器;
第一处理模块,用于向对端发送伪线状态检测报文;根据接收到来自对端的伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效。
可选地,所述定时器模块还用于,在所述保活定时器超时时通知所述第一处理模块;接收到来自所述第一处理模块的重置通知,重新启动所述保活 定时器;
所述第一处理模块具体用于,根据配置的伪线状态检测报文发送周期,周期性的生成伪线状态检测报文,并发送给对端;根据收到的来自对端的伪线状态检测报文的控制字中的标识字段确定报文是伪线状态检测报文,且自身的保活定时器未超时,确定出当前静态伪线的转发状态为有效;向所述定时模块输出重置所述保活定时器的重置通知。
可选地,所述第一处理模块还用于:接收到来自所述定时模块的表示保活定时器超时的通知,且未收到伪线状态检测报文,确定出当前静态伪线的转发状态为失效;通知所述定时模块关闭保活定时器。
可选地,所述第一处理模块还用于:收到来自对端的伪线状态检测报文,重新判定当前伪线的转发状态有效,通知所述定时模块,以触发所述定时模块启动保活定时器。
可选地,所述第一处理模块还用于:当收到的来自对端的伪线状态检测报文中携带有伪线状态检测报文发送周期和保活定时器的时长时,如果自身设置的伪线状态检测报文发送周期和/或保活定时器的时长与对端的不相同,进行协商以确保相同。
可选地,还包括使能模块,用于使能伪线状态检测功能,并将使能指示输出给所述定时模块,以触发所述定时模块启动保活定时器。
可选地,所述第一处理模块还用于,接收到来自对端的第一个伪线状态检测报文,通知所述定时模块,以触发所述定时模块启动保活定时器。
可选地,该装置还包括:第二处理模块;此时,
所述第一处理模块还用于,在确定出当前静态伪线的转发状态为失效时,通知第二处理模块;
第二处理模块用于:联动用户边缘设备接入自身的接入链路,禁止该用户边缘设备转发流量。
可选地,所述第一处理模块还用于,感知到与自身连接的用户边缘设备之间的接入链路或用户边缘设备本身出现故障,停止发送所述伪线状态检测报文。
可选地,该装置为独立实体,或设置在静态伪线或静态伪线段两端的边缘设备中。
本发明还提出了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述任一项的基站注册方法。
本申请技术方案包括第一边缘设备与第二边缘设备分别启动保活定时器,并向对端发送伪线状态检测报文;第一边缘设备或第二边缘设备根据接收到伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效;其中,第一边缘设备和第二边缘设备为处于静态伪线两端的边缘设备。本发明实施例提供的技术方案,通过在用户流量转发过程中引入伪线状态检测报文,就像心跳信号一样,简单地实现了对静态伪线的转发状态的检测。
进一步地,收到伪线状态检测报文的边缘设备可以根据其中携带的伪线状态检测报文发送周期和保活定时器的时长,判断自身设置的伪线状态检测报文发送周期和保活定时器的时长是否与对端的相同,如果不同可以做进一步协商,以保证静态伪线两端的边缘设备的伪线状态检测报文发送周期和保活定时器的时长保持一致,进而更好地保证了静态伪线状态检测的可靠性。
本发明的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明而了解。本发明的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1为相关技术中一个典型的伪线的网络参考模型示意图;
图2为本发明实施例中静态伪线状态检测方法的流程图;
图3为本发明实施例中伪线状态检测报文的控制字格式示意图;
图4为本发明静态伪线状态检测方法的第一实施例的网络参考模型示意图;
图5为本发明静态伪线状态检测方法的第二实施例的网络参考模型示意图;
图6为本发明静态伪线状态检测方法的第三实施例的网络参考模型示意图;
图7为本发明静态伪线状态检测方法的第四实施例的网络参考模型示意图;
图8为本发明实施例中静态伪线状态检测装置的组成结构示意图。
本发明的较佳实施方式
为了便于本领域技术人员的理解,下面结合附图对本发明实施例作进一步的描述,并不能用来限制本发明的保护范围。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的各种方式可以相互组合。
图2为本发明实施例中静态伪线状态检测方法的流程图,如图2所示,第一边缘设备和第二边缘设备为处于静态伪线或静态伪线段两端的边缘设备,可以是PE,也可以是SPE;包括:
步骤200:第一边缘设备与第二边缘设备分别启动保活定时器,并向对端发送伪线状态检测报文。
本步骤之前还包括:在建立静态伪线的两端的边缘设备即第一边缘设备和第二边缘设备上,分别使能伪线状态检测功能。具体地,
在第一边缘设备和第二边缘设备上,可以默认不开启伪线状态检测功能,如果需要,可以通过命令行配置或者网管等方式下发使能操作,以开启伪线状态检测功能,具体实现属于本领域技术人员的惯用技术手段,这里不再赘述。当然,也可以默认一直开启伪线状态检测功能。
进一步地,在使能伪线状态检测功能时,还包括:
配置伪线状态检测报文发送周期和保活定时器。其中,伪线状态检测报文发送周期为必须配置项,伪线状态检测报文发送周期越小,表明伪线状态 检测的响应速度越快;保活定时器的时长为可选配置项,如不配置,则默认保活定时器的时长为伪线状态检测报文发送周期的预设值N倍(如N=3),如果配置,那就是配置的值。
步骤200中,启动保活定时器具体包括:
在使能伪线状态检测功能后立即开启保活定时器;或者,
在收到来自对端的第一个伪线状态检测时再开启保活定时器。这种方式有效地避免了静态伪线两端的边缘设备使能伪线状态检测功能的操作时间差过大而导致的检测状态误报的问题。
步骤200中,向对端发送伪线状态检测报文具体包括:
根据配置的伪线状态检测报文发送周期,周期性的生成伪线状态检测报文,并发送给对端。其中,
为了让静态伪线的边缘设备识别出接收到的报文是用户报文还是伪线状态检测报文,伪线状态检测报文中需要携带用于区分不同报文类型的控制字,以使静态伪线两端的边缘设备能够对接收到的伪线状态检测报文进行识别和处理。图3为本发明实施例中伪线状态检测报文的控制字格式示意图,如图3所示,控制字中至少包括:
用于表示报文类型的标识字段。相关协议中普通用户报文控制字的前4位为0000,因此,伪线状态检测报文的控制字的中如4比特可以定义为如1000,表示该报文是伪线状态检测报文,而不是用户报文。
进一步地,伪线状态检测报文的控制字还可以包括用于后续扩展的预留(Reserved)字段,比如12比特位的预留字段。
进一步地,为了更好地保证静态伪线两端的边缘设备的伪线状态检测报文发送周期和保活定时器的时长保持一致,可以在伪线状态检测报文的控制字中进一步包括:用于携带边缘设备自身设置的检测报文发送周期的伪线状态检测报文发送周期(Interval Time)字段,以及用于携带边缘设备自身设置的保活定时器的时长的保活定时器时长(KeepAlive Time)字段,比如,Interval Time字段和KeepAlive Time字段可以各占1个字节。
如图3所示,以控制字的长度设置为4个字节(32比特位)为例,前4 比特为标识字段,标识字段之后的12比特为预留(Reserved)字段,预留字段后面分别是各占1个字节的Interval Time字段和KeepAlive Time字段。
在每个伪线状态检测报文发送周期到来时,步骤200中的生成伪线状态检测报文包括:
按照图3所示的控制字结构构造一个伪线状态检测报文,并给伪线状态检测报文的报文头打上伪线标签和外层隧道标签,以保证该伪线检测报文的转发路径和实际用户报文的转发路径完全一致。
步骤201:第一边缘设备或第二边缘设备根据接收到伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效。
本步骤具体包括:
第一边缘设备或第二边缘设备根据收到的伪线状态检测报文的控制字中的标识字段确定出该报文是用户报文还是伪线状态检测报文:
如果是用户报文,按照已有用户报文的处理方式,继续向用户侧设备进行转发操作。
如果是伪线状态检测报文,且第一边缘设备或第二边缘设备自身的保活定时器未超时,则确定出当前静态伪线的转发状态为有效;同时,第一边缘设备或第二边缘设备重置自身的保活定时器,并等待接收下一个来自对端的伪线状态检测报文。
进一步地,
如果第一边缘设备或第二边缘设备在自身的保活定时器超时后,仍然没有收到伪线状态检测报文,则确定出当前静态伪线的转发状态为失效,并关闭自身的保活定时器。在伪线状态确定为失效后,进一步地,
如果第一边缘设备或第二边缘设备再收到来自对端的伪线状态检测报文,则表示当前的伪线链路是好的,可以判定静态伪线的转发状态又恢复成了有效,此时,本发明方法还包括:第一边缘设备或第二边缘设备重启保活定时器,继续检测后续的伪线状态检测报文。进一步地,这里,也可以设置一定的恢复策略,比如连续接收到预设数目个如3个伪线状态检测报文才判定静态伪线的转发状态恢复为有效,这样,可以很好地避免伪线状态误报, 并抑制伪线状态的振荡问题。
本发明实施例静态伪线状态检测方法,通过在用户流量转发过程中引入伪线状态检测报文,就像心跳信号检测一样,简单地实现了对静态伪线的转发状态的检测,而无需为伪线部署额外检测技术。
进一步地,
如果伪线状态检测报文中携带有伪线状态检测报文发送周期和保活定时器的时长,本发明实施例方法还包括:
收到伪线状态检测报文的边缘设备即第一边缘设备或第二边缘设备,可以根据其中携带的对端的伪线状态检测报文发送周期和保活定时器的时长,判断自身设置的伪线状态检测报文发送周期和/或保活定时器的时长是否与对端的相同,如果不同可以进行协商以确保相同,比如:约定取双方设备的伪线状态检测报文发送周期中较小的一个值作为协商后的伪线状态检测报文发送周期,以保证静态伪线两端的边缘设备的伪线状态检测报文发送周期和保活定时器的时长保持一致,进而更好地保证了静态伪线状态检测的可靠性。
进一步地,
当第一边缘设备或第二边缘设备确定出当前静态伪线的转发状态为失效时,本发明实施例方法包括:
第一边缘设备或第二边缘设备联动用户边缘设备接入自身的接入链路,禁止该用户边缘设备转发流量。具体实现属于本领域技术人员的公知技术,并不用于限定本发明的保护范围,这里不再赘述。
进一步地,
在第一边缘设备或第二边缘设备确定出当前静态伪线的转发状态为失效之前,该方法还包括:
第一边缘设备或第二边缘设备感知到与自身连接的用户边缘设备之间的接入链路或用户边缘设备本身出现故障,第一边缘设备或第二边缘设备主动停止发送伪线状态检测报文。
下面结合实施例对本发明实施例的静态伪线状态检测方法和流量控制方法进行详细描述。
图4为本发明静态伪线状态检测方法的第一实施例的网络参考模型示意图,第一实施例以静态伪线状态和接入侧联动的场景为例,如图4所示,假设PE1和PE2之间已建立起静态伪线PW12(如图中斜线阴影所示)。以CE1发送到CE2的流量为例,CE1用户流量发送给PE1,PE1对CE1上送的用户流量进行伪线封装,通过中间的P设备(包括P1和P2)传递到PE2;PE2剥去伪线封装,恢复CE1的用户报文,转发给CE2。
在PE1和PE2上使能伪线状态检测功能后,PE1和PE2均根据设定的伪线状态检测报文发送周期,分别定时向对端发送伪线状态检测报文。
当P设备如图4中故障点(a),或P设备之间的链路如图4中故障点(b),或PE2如图4中故障点(c)发生故障时,都会导致PE2的伪线状态检测报文无法发送到PE1。而此时,当PE1的保活定时器超时时,PE1判定当前静态伪线的转发状态失效。此时,PE1可以联动CE1接入到PE1的接入链路,禁止CE1流量继续转发。同样,PE1的伪线状态检测报文无法发送到PE2,PE2也会判定当前静态伪线的转发状态失效,并联动CE1接入到PE2的接入链路,禁止CE2流量继续转发,这里不再赘述。
再以PE2和CE2之间的链路如图4中故障点(d),或CE2设备如图4中故障点(e)发生故障为例,PE2会感知到与CE2之间的链路失效,此时可以联动伪线状态即PE2主动停止发送伪线状态检测报文,而PE1在保活定时器超时,按照本发明静态伪线状态检测方法就能确定出当前伪线转发状态失效,并联动CE1接入到PE1的接入链路,禁止CE1流量继续转发。其中,PE2如何感知到与CE2之间的链路失效的具体实现属于本领域技术人员的公知技术,并不用于限定本发明的保护范围,这里不再赘述。
图5为本发明静态伪线状态检测方法的第二实施例的网络参考模型示意图,第二实施例以静态伪线状态联动快速重路由(FRR,Fast ReRoute)保护的场景为例,如图5所示,假设PE1分别与PE2、PE3已建立主静态伪线PW12和备静态伪线PW13,以以CE1发送到CE2的流量为例,CE1发送到PE1的流量默认经由PE1和PE2之间的主PW即PW12到PE2,再由PE2转发给CE2。
在PE1和PE2上使能伪线状态检测功能后,PE1和PE2均根据设定的伪 线状态检测报文发送周期,分别定时向对端发送伪线状态检测报文。
当P1设备如图5中故障点(a),或P设备之间的链路如图5中故障点(b),或PE2(如图5中故障点(c)发生故障时,都会导致PE2的伪线状态检测报文无法发送到PE1。而此时,当PE1的保活定时器超时时,PE1判定当前静态伪线的转发状态失效。此时,PE1将CE1上送的用户流量切换到备用伪线PW13上进行发送,并最终发送到CE2设备,及时的切换保证了用户流量的不中断。
再以PE2和CE2之间的链路如图5中故障点(d)发生故障为例,PE2会感知到与CE2之间的链路失效,此时可以联动伪线状态即主动停止发送伪线状态检测报文;而PE1设备在保活定时器超时,按照本发明静态伪线状态检测方法就能判定当前静态伪线的转发状态失效,此时,PE1将CE1上送的用户流量切换到备用伪线PW13上进行发送,并最终发送到CE2设备。保证了用户流量不中断。
图6为本发明静态伪线状态检测方法的第三实施例的网络参考模型示意图,第三实施例以静态多段伪线状态传递的场景为例,其中,多段伪线是对单段伪线的扩展,多段伪线允许两个PE之间存在多条分段伪线,通过交换伪线设备(SPE,Switch-PE)将两侧的PW段(PW Segment)连接起来,并在SPE完成伪线层面的标签交换操作。如图6所示,假设PE1、SPE、PE2上已配置形成静态多段伪线段(Segment)。并假设CE1上送到PE1的流量经由静态(static)Segment PW1转发到SPE,再由SPE通过静态Segment PW2转发到PE2,并最终将用户报文转发给CE2。
在PE1和PE2上使能伪线状态检测功能后,PE1和PE2均根据设定的伪线状态检测报文发送周期,分别定时向对端发送伪线状态检测报文。这里,SPE无需区分接收到的报文是伪线状态检测报文或是用户报文,均统一按照用户报文的转发规则进行转发。需要说明的是,根据MSPW的转发原理,对于图6所示的PE1和PE2之间的端到端的伪线检测的场景,静态伪线状态检测使能配置在两端的PE上,不需要在SPE上使能本发明中的检测功能,也就是说,在SPE节点不需要对检测报文进行识别和操作。但是,对于非端到端检测,比如图7所示的第四实施例中的动静混合的MSPW场景,静态PW 在SPE上终结,此时,SPE上需要使能本发明的静态伪线状态检测功能,伪线状态检测报文在SPE上需要进行识别和处理。
当P设备如图6中故障点(a)或SPE(如图6中故障点(b)或设备间的链路如图6中故障点(c)或PE2如图6中故障点(d)发生故障时,都会导致PE2的伪线状态检测报文无法发送到PE1。而此时,当PE1的保活定时器超时时,PE1判定当前静态伪线的转发状态失效。此时,PE1可以联动CE1接入到PE1的接入链路,禁止CE1流量继续转发。
再以PE2和CE2之间的链路如图6中故障点(f)或CE2设备如图6中故障点(g)发生故障为例,PE2会感知到与CE2之间的链路失效,此时可以联动伪线状态即主动停止发送伪线状态检测报文,而PE1在保活定时器超时,按照本发明静态伪线状态检测方法就能判定当前伪线转发状态失效,并联动CE1接入到PE1的接入链路,禁止CE1流量继续转发。
图7为本发明静态伪线状态检测方法的第四实施例的网络参考模型示意图,第四实施例以动静混合多段伪线状态传递的场景为例,如图7所示,假设PE1、SPE、PE2上已建立起多段伪线,并假设PE1和SPE之间是静态伪线段,SPE和PE2之间是动态(Dynamic)伪线段。
在PE1和SPE上使能伪线状态检测功能后,PE1和SPE均根据设定的伪线状态检测报文发送周期,分别定时的向对端发送伪线状态检测报文。
当P1设备如图7中故障点(a),或PE1和SPE之间的某个链路如图7中故障点(b)发生故障时,都会导致SPE的伪线状态检测报文无法发送到PE1。而此时,当PE1的保活定时器超时时,PE1判定当前静态伪线的转发状态失效。此时,PE1可以联动CE1接入到PE1的接入链路,禁止CE1流量继续转发。
再以P2设备如图7中故障点(c),或SPE和PE2之间的某个链路如图7中故障点(d),或PE2如图7中故障点(e)发生故障为例,SPE通过动态伪线状态通告协议感知到SPE和PE2之间的伪线链路失效,此时触发联动和PE1之间的静态链路状态即SPE主动停止向PE1发送伪线状态检测报文,而此时,PE1的保活定时器超时时,按照本发明静态伪线状态检测方法PE1就能判定当前伪线转发状态失效,并联动CE1接入到PE1的接入链路,禁止CE1流 量继续转发。其中,动态伪线状态通告协议的具体实现属于本领域技术人员的公知技术,具体实现并不用于限定本发明的保护范围,这里不再赘述。
又以PE2和CE2之间的链路如图7中的故障点(f),或CE2如图7中故障点(g)发生故障为例,PE2会感知到与CE2之间的链路失效,PE2通过动态伪线状态通告协议通知给SPE本地接入侧链路失效;SPE触发联动和PE1之间的静态链路状态即SPE主动停止向PE1发送伪线状态检测报文,而此时,PE1的保活定时器超时时,按照本发明静态伪线状态检测方法PE1就能判定当前静态伪线的转发状态失效,并联动CE1接入到PE1的接入链路,禁止CE1流量继续转发。
图8为本发明静态伪线状态检测装置的组成结构示意图,如图8所示,至少包括定时模块,第一处理模块;其中,
定时模块,其中配置有保活定时器,用于启动保活定时器。
第一处理模块,用于向对端发送伪线状态检测报文;根据接收到来自对端的伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效。
定时器模块还用于,在保活定时器超时时通知第一处理模块;接收到来自第一处理模块的重置通知,重新启动保活定时器;
第一处理模块具体用于,根据配置的伪线状态检测报文发送周期,周期性的生成伪线状态检测报文,并发送给对端;根据收到的来自对端的伪线状态检测报文的控制字中的标识字段确定该报文是伪线状态检测报文,且自身的保活定时器未超时,确定出当前静态伪线的转发状态为有效;向定时模块输出重置保活定时器的重置通知。
第一处理模块还用于:接收到来自定时模块的表示保活定时器超时的通知,且没有收到伪线状态检测报文,确定出当前静态伪线的转发状态为失效;通知定时模块关闭保活定时器;此时,
第一处理模块还用于:收到来自对端的伪线状态检测报文,重新判定当前伪线的转发状态有效,通知定时模块,以触发定时模块启动保活定时器。
进一步地,
第一处理模块还用于:当收到的来自对端的伪线状态检测报文中携带有伪线状态检测报文发送周期和保活定时器的时长时,如果自身设置的伪线状态检测报文发送周期和/或保活定时器的时长与对端的不相同,进行协商以确保相同。
本发明装置还包括使能模块,用于使能伪线状态检测功能,并将使能指示输出给定时模块,以触发定时模块启动保活定时器。
或者,
第一处理模块还用于,接收到来自对端的第一个伪线状态检测报文,通知定时模块,以触发定时模块启动保活定时器。
本发明装置还包括:第二处理模块,此时,
第一处理模块还用于,在确定出当前静态伪线的转发状态为失效时,通知第二处理模块;
第二处理模块用于:联动用户边缘设备接入自身的接入链路,禁止该用户边缘设备转发流量。
进一步地,
第一处理模块还用于,感知到与自身连接的用户边缘设备之间的接入链路或用户边缘设备本身出现故障,主动停止发送伪线状态检测报文。
本发明装置可以为独立实体,也可以设置在静态伪线两端的边缘设备如PE、SPE等设备上。
以上所述,仅为本发明的较佳实例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
本发明实施例提出的静态伪线状态检测方法及装置,包括第一边缘设备与第二边缘设备分别启动保活定时器,并向对端发送伪线状态检测报文;第一边缘设备或第二边缘设备根据接收到伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效;其中,第一边缘设备和第 二边缘设备为处于静态伪线两端的边缘设备。本发明提供的技术方案,通过在用户流量转发过程中引入伪线状态检测报文,就像心跳信号一样,简单地实现了对静态伪线的转发状态的检测。

Claims (24)

  1. 一种静态伪线状态检测方法,其特征在于,包括:
    第一边缘设备与第二边缘设备分别启动保活定时器,并向对端发送伪线状态检测报文;
    第一边缘设备或第二边缘设备根据接收到伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效;
    其中,第一边缘设备和第二边缘设备为处于静态伪线两端的边缘设备。
  2. 根据权利要求1所述的静态伪线状态检测方法,其特征在于,该方法之前还包括:在所述第一边缘设备和所述第二边缘设备上分别使能伪线状态检测功能。
  3. 根据权利要求2所述的静态伪线状态检测方法,其特征在于,该方法之前还包括:配置用于向所述对端发送伪线状态检测报文的伪线状态检测报文发送周期,以及所述保活定时器的时长;
    其中,所述保活定时器的时长为伪线状态检测报文发送周期的预设值N倍,或配置的值,N为大于1的自然数。
  4. 根据权利要求2或3所述的静态伪线状态检测方法,其特征在于,所述启动保护定时器包括:
    所述使能伪线状态检测功能时开启所述保活定时器;或者,
    在收到来自对端的第一个伪线状态检测报文时开启所述保活定时器。
  5. 根据权利要求1、2或3所述的静态伪线状态检测方法,其特征在于,所述伪线状态检测报文中携带用于区分不同报文类型的控制字;
    其中,控制字至少包括用于表示报文类型的标识字段。
  6. 根据权利要求5所述的静态伪线状态检测方法,其特征在于,所述控制字还包括用于后续扩展的预留Reserved字段。
  7. 根据权利要求5所述的静态伪线状态检测方法,其特征在于,所述控制字还包括:用于携带所述第一边缘设备或所述第二边缘设备自身设置的检测报文发送周期的伪线状态检测报文发送周期字段,以及用于携带所述第一 边缘设备或所述第二边缘设备自身设置的保活定时器的时长的保活定时器时长字段。
  8. 根据权利要求7所述的静态伪线状态检测方法,其特征在于,该方法还包括:
    如果所述第一边缘设备或所述第二边缘设备确定出收到的伪线状态检测报文中携带的对端的伪线状态检测报文发送周期和保活定时器的时长,与自身设置的伪线状态检测报文发送周期和/或保活定时器的时长不相同,进行协商以确保相同。
  9. 根据权利要求5所述的静态伪线状态检测方法,其特征在于,所述确定当前静态伪线的转发状态是否有效包括:
    所述第一边缘设备或所述第二边缘设备根据收到的伪线状态检测报文的控制字中的标识字段确定出该报文是伪线状态检测报文,
    且所述第一边缘设备或所述第二边缘设备自身的保活定时器未超时,则确定出当前静态伪线的转发状态为有效,重置自身的保活定时器。
  10. 根据权利要求9所述的静态伪线状态检测方法,其特征在于,如果所述第一边缘设备或所述第二边缘设备在自身的保活定时器超时后,未收到所述伪线状态检测报文,该方法还包括:
    确定出当前静态伪线的转发状态为失效,并关闭自身的保活定时器。
  11. 根据权利要求10所述的静态伪线状态检测方法,其特征在于,该方法还包括:所述第一边缘设备或所述第二边缘设备收到来自对端伪线状态检测报文,重启自身的保活定时器。
  12. 根据权利要求1、2或3所述的静态伪线状态检测方法,其特征在于,所述第一边缘设备或所述第二边缘设备确定出当前静态伪线的转发状态为失效时,还包括:
    所述第一边缘设备或所述第二边缘设备联动用户边缘设备接入自身的接入链路,禁止该用户边缘设备转发流量。
  13. 根据权利要求12所述的静态伪线状态检测方法,其特征在于,所述第一边缘设备或所述第二边缘设备确定出当前静态伪线的转发状态为失效之 前,该方法还包括:
    所述第一边缘设备或所述第二边缘设备感知到与自身连接的用户边缘设备之间的接入链路或用户边缘设备本身出现故障,所述第一边缘设备或所述第二边缘设备停止发送所述伪线状态检测报文。
  14. 一种静态伪线状态检测装置,其特征在于,至少包括定时模块,第一处理模块;其中,
    定时模块,其中配置有保活定时器,用于启动保活定时器;
    第一处理模块,用于向对端发送伪线状态检测报文;根据接收到来自对端的伪线状态检测报文时自身的保活定时器状态,确定当前静态伪线的转发状态是否有效。
  15. 根据权利要求14所述的静态伪线状态检测装置,其特征在于,所述定时器模块还用于,在所述保活定时器超时时通知所述第一处理模块;接收到来自所述第一处理模块的重置通知,重新启动所述保活定时器;
    所述第一处理模块具体用于,根据配置的伪线状态检测报文发送周期,周期性的生成伪线状态检测报文,并发送给对端;根据收到的来自对端的伪线状态检测报文的控制字中的标识字段确定报文是伪线状态检测报文,且自身的保活定时器未超时,确定出当前静态伪线的转发状态为有效;向所述定时模块输出重置所述保活定时器的重置通知。
  16. 根据权利要求15所述的静态伪线状态检测装置,其特征在于,
    所述第一处理模块还用于:接收到来自所述定时模块的表示保活定时器超时的通知,且未收到伪线状态检测报文,确定出当前静态伪线的转发状态为失效;通知所述定时模块关闭保活定时器。
  17. 根据权利要求16所述的静态伪线状态检测装置,其特征在于,
    所述第一处理模块还用于:收到来自对端的伪线状态检测报文,重新判定当前伪线的转发状态有效,通知所述定时模块,以触发所述定时模块启动保活定时器。
  18. 根据权利要求15所述的静态伪线状态检测装置,其特征在于,
    所述第一处理模块还用于:当收到的来自对端的伪线状态检测报文中携 带有伪线状态检测报文发送周期和保活定时器的时长时,如果自身设置的伪线状态检测报文发送周期和/或保活定时器的时长与对端的不相同,进行协商以确保相同。
  19. 根据权利要求14~18任一项所述的静态伪线状态检测装置,其特征在于,还包括使能模块,用于使能伪线状态检测功能,并将使能指示输出给所述定时模块,以触发所述定时模块启动保活定时器。
  20. 根据权利要求14~18任一项所述的静态伪线状态检测装置,其特征在于,所述第一处理模块还用于,接收到来自对端的第一个伪线状态检测报文,通知所述定时模块,以触发所述定时模块启动保活定时器。
  21. 根据权利要求14所述的静态伪线状态检测装置,其特征在于,该装置还包括:第二处理模块;此时,
    所述第一处理模块还用于,在确定出当前静态伪线的转发状态为失效时,通知第二处理模块;
    第二处理模块用于:联动用户边缘设备接入自身的接入链路,禁止该用户边缘设备转发流量。
  22. 根据权利要求14或21所述的静态伪线状态检测装置,其特征在于,
    所述第一处理模块还用于,感知到与自身连接的用户边缘设备之间的接入链路或用户边缘设备本身出现故障,停止发送所述伪线状态检测报文。
  23. 根据权利要求14所述的静态伪线状态检测装置,其特征在于,该装置为独立实体,或设置在静态伪线或静态伪线段两端的边缘设备中。
  24. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1-13任一项的静态伪线状态检测方法。
PCT/CN2016/071602 2015-06-12 2016-01-21 一种静态伪线状态检测方法及装置 WO2016197613A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510323636.4A CN106301867B (zh) 2015-06-12 2015-06-12 一种静态伪线状态检测方法及装置
CN201510323636.4 2015-06-12

Publications (1)

Publication Number Publication Date
WO2016197613A1 true WO2016197613A1 (zh) 2016-12-15

Family

ID=57503130

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/071602 WO2016197613A1 (zh) 2015-06-12 2016-01-21 一种静态伪线状态检测方法及装置

Country Status (2)

Country Link
CN (1) CN106301867B (zh)
WO (1) WO2016197613A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111478803B (zh) * 2020-03-31 2022-08-30 新华三技术有限公司 一种路径故障检测方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101106486A (zh) * 2007-08-13 2008-01-16 杭州华三通信技术有限公司 虚链路故障的检测处理方法及组件
CN101110848A (zh) * 2006-07-20 2008-01-23 华为技术有限公司 一种检测通道故障的方法
CN101257441A (zh) * 2008-02-29 2008-09-03 华为技术有限公司 转发报文的方法、设备、系统和接收报文的设备
CN101808022A (zh) * 2010-04-22 2010-08-18 中兴通讯股份有限公司 双向转发检测的实现方法及装置
US20110182189A1 (en) * 2010-01-25 2011-07-28 Cisco Technology, Inc. Pseudowire status maintenance for static pseudowires

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100484097C (zh) * 2006-01-17 2009-04-29 华为技术有限公司 包交换网络中判断伪线路连接状态的方法及服务设备
CN101826990A (zh) * 2009-03-05 2010-09-08 华为技术有限公司 检测虚拟伪线连通性的方法、装置及系统
CN102739529A (zh) * 2012-06-18 2012-10-17 中兴通讯股份有限公司 一种伪线保护组的保护方法及装置
CN103248536B (zh) * 2013-04-28 2017-12-29 新华三技术有限公司 一种虚链路pw检测方法及设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110848A (zh) * 2006-07-20 2008-01-23 华为技术有限公司 一种检测通道故障的方法
CN101106486A (zh) * 2007-08-13 2008-01-16 杭州华三通信技术有限公司 虚链路故障的检测处理方法及组件
CN101257441A (zh) * 2008-02-29 2008-09-03 华为技术有限公司 转发报文的方法、设备、系统和接收报文的设备
US20110182189A1 (en) * 2010-01-25 2011-07-28 Cisco Technology, Inc. Pseudowire status maintenance for static pseudowires
CN101808022A (zh) * 2010-04-22 2010-08-18 中兴通讯股份有限公司 双向转发检测的实现方法及装置

Also Published As

Publication number Publication date
CN106301867A (zh) 2017-01-04
CN106301867B (zh) 2019-06-14

Similar Documents

Publication Publication Date Title
US10003531B2 (en) Method for establishing tunnel, method for allocating label, device and network system
EP2242215B1 (en) Method for client data transmission through a packet switched provider network
US8521896B2 (en) Method and system for negotiating the bidirectional forwarding detection session discriminator of pseudo wire
ES2705798T3 (es) Provisión de OAM basada en GMPLS
EP3255840B1 (en) Label distribution method and device
EP2498454A1 (en) Method, device and system for processing service traffic based on pseudo wires
EP2951959B1 (en) Using ethernet ring protection switching with computer networks
US9755957B2 (en) Pseudowire control channel for signaling events
JP5209116B2 (ja) パケット交換網における擬似ワイヤの確立
CN106487675A (zh) 用于evpn中具有链路故障时的bum流量的出口保护
US20130272114A1 (en) Pseudo wire switching method and device
WO2012028029A1 (zh) 一种切换方法及系统
CN109672619A (zh) 一种处理报文的方法、设备及系统
EP2852098B1 (en) Method, node and system for detecting performance of layer three virtual private network
EP3182645B1 (en) Network protection switching method, network device and storage medium
CN102055619A (zh) 一种实现双向路径段故障检测的方法及系统
WO2012142753A1 (zh) Ip承载网性能监控的方法及设备
US20120269056A1 (en) Method, device, and system for protecting semi-ring network
CN102013990A (zh) 一种多段伪线故障的端到端通告方法及系统
JP6371399B2 (ja) インターフェースパラメーター同期方法及び装置
WO2016197613A1 (zh) 一种静态伪线状态检测方法及装置
WO2017124685A1 (zh) 一种业务转发方法及装置
WO2016161781A1 (zh) 一种获取多段伪线路径信息的方法、装置、spe及tpe
CN102332987A (zh) 一种伪线oam属性配置的方法和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16806511

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16806511

Country of ref document: EP

Kind code of ref document: A1