WO2017215376A1 - Procédé de détection de pseudo-fils à segments multiples et élément de réseau - Google Patents
Procédé de détection de pseudo-fils à segments multiples et élément de réseau Download PDFInfo
- Publication number
- WO2017215376A1 WO2017215376A1 PCT/CN2017/083808 CN2017083808W WO2017215376A1 WO 2017215376 A1 WO2017215376 A1 WO 2017215376A1 CN 2017083808 W CN2017083808 W CN 2017083808W WO 2017215376 A1 WO2017215376 A1 WO 2017215376A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- detection
- packet
- identification information
- identity
- message
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
Definitions
- the present application relates to, but is not limited to, the field of communication technologies, and in particular, to a multi-segment pseudowire detection method and a network element.
- MS-PW Multi-Segment Pseudo-Wire
- source PE Provider Edge
- PW Pseudo-Wire
- S-PE Switch Provider Edge
- BFD Bidirectional forwarding detection
- the device 1 and the device 2 are connected to each other through the point-of-sale vendor device, and the device 3 is connected.
- the device 1 and the device 3 and the device 2 and the device 3 establish a pseudowire service, and both configure a BFD detection mechanism.
- BFD is used in the asynchronous mode. In this mode, the two nodes of the network periodically send BFD control packets. If the BFD control packet is not received within the detection time, the corresponding BFD control packet is considered to be corresponding. The link has failed.
- the process of detecting the link of the MS-PW by BFD is as follows: The link established by the two nodes is a link that is dynamically triggered. Before the session is established, the devices at both ends send the remote identifier to 0.
- the device 1 sends the packet A to the device 2, the remote identifier field of the packet A is 0, and the local identifier field is the local identifier assigned by the system to the device 1, if it is 12;
- the device 3 sends the packet A to the device 2, and after receiving the packet A, the device 2 checks the local identifier of the packet A, and finds that the local identifier is 12, so the identifier 12 is learned. but Yes, because the device 3 is directly connected to the device 2, and the device 1 is connected to the device 2 through the device 3, there is often a situation in which the device 2 mistakes the device 3 as being sent by the device 3 after receiving the message A. Therefore, it is erroneously considered that the identifier 12 corresponds to the device 3, thereby causing the packet to be incorrectly associated with the pseudo line segment.
- the source of the packet cannot be distinguished, and the pseudo-line segment is associated with the error of the packet, causing errors in the detection result and causing oscillations.
- the multi-segment pseudowire detection method and the network element provided by the embodiment of the present invention can accurately distinguish the source of the detection message.
- An embodiment of the present invention provides a multi-segment pseudowire detection method, including:
- the embodiment of the invention further provides a network element, including a message sending module, a message receiving module and a processing module;
- the packet sending module is configured to send a first detection packet to the receiving device, where the first detection packet includes first identity information of the sending device;
- the packet receiving module is configured to receive a second detection packet sent by the receiving device
- the processing module is configured to: extract second identity information in the second detection packet, and determine identity of the receiving device according to the second identity information.
- the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the multi-segment pseudo line detection method of any one of the foregoing.
- the transmitting end device sends the first detection packet to the receiving end device, where the first detection packet includes the first identity of the sending end device. And identifying the information, and receiving the second detection packet sent by the receiving device, the sending device extracting the second identity information from the second detection packet, and determining the identity of the receiving device according to the second identity information.
- the method in the embodiment of the present invention does not need to determine the identity of the sender of the message by means of learning, but uniquely determines the identity of the receiver according to the second identity information, thereby knowing that the second detection packet is received from the receiver.
- the end device determines the link between the receiving end device and the transmitting end device as a detecting link. To accurately distinguish the source of the detection message, the link detection of the current multi-segment pseudowire is more accurate, and the detection error is reduced.
- 1 is a schematic diagram of networking
- FIG. 2 is a flowchart of a method for detecting a multi-segment pseudowire according to Embodiment 1 of the present invention
- FIG. 3 is a schematic structural diagram of a network element according to Embodiment 2 of the present invention.
- FIG. 4 is a schematic diagram of an exemplary networking of Embodiment 2 of the present invention.
- Embodiment 1 is a diagrammatic representation of Embodiment 1:
- This embodiment provides a multi-segment pseudowire detection method. Referring to FIG. 2, the method includes:
- the sending end device sends a first detection packet to the receiving end device, where the first detection packet includes first identifier information of the sending end device.
- the sending end device receives the second detection packet sent by the receiving end device, where the second The detection message includes second identification information of the receiving device;
- S203 The sending end device extracts the second identity identification information in the second detection packet, and determines the identity of the receiving device.
- step S201 and step S202 are performed, there is no requirement of a sequence relationship between the two steps, and step S202 may be performed first or step S201 may be performed first.
- the first detection message includes first identity identification information, where the first identity identification information can uniquely identify the identity of the sender device in the network, so that the receiver device receives the first detection report. After the text, the identity of the sender device can be identified.
- the form of the first identification information may be various, as long as it can be uniquely identified in the network, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself. For example, it can be an IP address.
- the first identity identification information may be configured by the staff member on the device in advance, or the staff member may set a certain configuration rule.
- the device automatically completes the pair. The assignment of its own first identity information.
- the sending device may obtain the first identity information of the device, and then encapsulate the first identity information into the first detection packet.
- the first detection packet may be a BFD packet.
- the BFD packet is encapsulated with an IP header.
- the IP address can be encapsulated in the source IP address field in the IP header. In this way, additional fields can be added and the overhead can be increased.
- the purpose of accurately transmitting the first identification information is achieved.
- the first detection packet is then sent to the peer device.
- the receiving end device After receiving the first detection packet, the receiving end device parses the first detection packet, obtains the first identity identification information, and identifies that the first detection packet is sent according to the first identity identification information. The device, so that the link actually detected by the first detection data packet is a link between the first detection message sending device and itself.
- the receiving device also sends a second detection packet to the first detection packet sending device.
- the first detection packet sending device performs the step S202, and the second detection packet sent by the receiving device, and the second detection packet includes the second identification information.
- the system of the receiving device also assigns itself to the second identity information for unique identifier identity in the network.
- the form may be the same as the first identification information, for example, may be a number arranged according to a certain rule. It can also be an identifier that has a special meaning in itself, for example, it can be an IP address. It can be configured by the staff in advance on the peer device, or the staff can set a certain configuration rule.
- the peer device automatically completes the second identity identification information of the user. distribution.
- the peer device obtains its own second identity information, and encapsulates the second identity information into a second detection packet.
- the second detection packet may be a BFD packet.
- the BFD packet is encapsulated with an IP header.
- the IP address is used as the second identifier, the IP address can be encapsulated in the source IP address field in the IP header. Then, the second detection packet is sent to the sending device of the first detection packet.
- the sending end device After receiving the second detection packet, the sending end device performs step S203, and determines, according to the second identity identification information, which device is the device of the receiving end device, and determines which link is between the two devices. The link between the two is also the detection link.
- the transmitting device further determines whether the received second detection packet needs to be forwarded, and if it is determined that forwarding is needed, it is forwarded.
- the target detection information in the second detection packet is obtained, and the target path is determined according to the target object identification information, and the second detection and forwarding message is generated, and the second detection and forwarding message also carries the second identity identification information. Then, the second detection and forwarding packet is forwarded through the target path.
- the above-mentioned multi-segment pseudo-line detection method can be applied to a network loaded with an MS-PW service, and the multi-segment pseudo-line detection method in this embodiment is used to assign identity identification information uniquely identifying the identity of the device to each device, and the detection is performed.
- the identity information is carried in the forwarding process, that is, the identification information is carried in a detection packet from the generation to the destination end.
- the identity information is not changed, so that when the destination receives the detection packet, the destination can easily and accurately identify which device the detection packet is generated, thereby determining which links they have experienced and the links they have passed. It is the link being detected.
- the judgment of the detection link is more accurate, the implementation is simple, and the use is convenient.
- Embodiment 2 is a diagrammatic representation of Embodiment 1:
- the network element includes a message sending module 31, a message receiving module 32, and a processing module 33.
- the packet sending module 31 is configured to send the first detection packet to the peer device, where the first detection packet is sent.
- the first identity identification information may be used to identify the identity of the network element in the network.
- the receiving device may identify the identity of the network element after receiving the first detection packet.
- the form of the first identification information may be various, as long as it can be uniquely identified in the network, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself. For example, it can be an IP address.
- the first identity information may be configured by the staff member on the device in advance, or the staff may set a certain configuration rule. When the multi-segment pseudowire detection method is enabled, the network element automatically completes the first identity of the user. Distribution of information.
- the network element may further include an encapsulating module, and the encapsulating module obtains the first identity information of the first identity information, and then the first identity information is encapsulated into the first detection packet, and the packet sending module 31 sends the first identity information to the peer device.
- the first detection packet may be a BFD packet.
- the BFD packet is encapsulated with an IP header.
- the IP address can be encapsulated in the source IP address field in the IP header.
- the packet receiving module 32 is configured to receive the second detection packet sent by the receiving device, and include the second identification information in the second detection packet.
- the system of the receiving device also assigns itself to the second identity information for unique identifier identity in the network.
- the form may be the same as the first identification information, for example, may be a number arranged according to a certain rule, or may be an identifier having a special meaning in itself, for example, may be an IP address.
- the configuration may be configured by the staff on the receiving device in advance, or the staff may set a certain configuration rule. When the multi-segment pseudowire detection method is enabled, the receiving device automatically completes the second identity information of the user. distribution.
- the receiving device obtains the second identity information of the device and encapsulates the second identity information into the second detection packet.
- the second detection packet may be a BFD packet.
- the BFD packet is encapsulated with an IP header.
- the IP address can be encapsulated in the source IP address field in the IP header.
- the second detection packet is then sent to the network element.
- the processing module 33 parses the second detection packet received by the packet receiving module 31, acquires the second identity identification information, and identifies the identity of the receiving device according to the second identity identification information, thereby determining the relationship between the two. link.
- the network element further includes a judgment processing module 34 configured to determine whether it is necessary to receive the second check.
- the packet is forwarded, and if it is determined that forwarding is required, it is forwarded.
- the determination processing module 34 acquires the target object identification information in the second detection message, determines the target path according to the target object identification information, and generates a second detection and forwarding message, where the second detection and forwarding message also carries the second identity identifier. information. Then, the second detection and forwarding packet is forwarded through the target path.
- the target identifier information may be a target label value carried by the BFD detection packet, where the target label value is used to point to the label value of the target device, and the sending end is used.
- the device itself saves the label table.
- the sender device can query the content of the next step corresponding to the entry of the target tag value from its own tag table. If the content of the next step needs to be forwarded, the judgment process is performed.
- Module 34 forwards the message.
- the second detection packet is parsed and re-encapsulated, but the content of the packet is not changed, and the second detection and forwarding packet is generated, and the second identity is still carried in the second detection and forwarding packet. Identification information.
- the network element in this embodiment may be a common PE or an S-PE.
- the network element does not have the function of forwarding the detection packet, and can only send the detection packet and receive the detection packet. And determining the detection link according to the identity identification information in the received detection packet, and completing the link switching when the link is found to be faulty;
- the network element is the S-PE, the not only can send the detection packet and The detection packet is received, and the detection link is determined according to the identity identification information in the received detection packet, and the detection packet can be forwarded when needed.
- the functions of the modules of the network element, the packet sending module 31, the message receiving module 32, the processing module 33, the encapsulating module and the judging processing module 34 in this embodiment can be implemented by the processor of the network element.
- FIG. 4 is a schematic diagram of a PW network composed of network elements in this embodiment.
- the network element 1, the network element 2, the network element 3, and the network element 4 are sequentially connected.
- a PW service is configured on each link.
- the MS-PW is configured on each device.
- the BFD detection mechanism is enabled on all NEs.
- the IP address is used as the identity information of each device, where the IP address of the network element 1 is 1.1.1.1; the IP address of the network element 2 is 2.2.2.2; the IP address of the network element 3 is 3.3.3.3; The IP address is 4.4.4.4.
- the IP address of each NE is not mandatory according to the above configuration.
- the configuration staff will be flexible.
- the BFD detection link between the network element 1 and the network element 2 is the link 1; the BFD detection link between the network element 2 and the network element 3 is the link 2; and the BFD detection between the network element 3 and the network element 4
- the link is link 3; the BFD detection link between network element 1 and network element 4 is link 4.
- the network element 1 generates a detection packet, and the detection packet carries its own IP address 1.1.1.1; it is sent to the network element 2; the detection packet sent to the network element 2 is directly reached through the link 1.
- the network element 2, the network element 2 parses the detection packet, and obtains the IP address thereof as 1.1.1.1; then it is identified that the detection packet is the network element 1, and then it is determined that the transmission is completed through the link 1, thereby determining The interaction between the two is for the detection of link 1.
- the network element 2 generates a detection packet, and the detection packet carries its own IP address 2.2.2.2; it is sent to the network element 3; the detection packet sent to the network element 3 is directly reached through the link 2
- the network element 3, the network element 3 parses the detection packet, and obtains the IP address thereof as 2.2.2.2; then it is identified that the detection packet is the network element 2, and then it is determined that the transmission is completed through the link 2, thereby determining The interaction between the two is for the detection of link 2.
- the network element 3 generates a detection packet, and the detection packet carries its own IP address 3.3.3.3; it is sent to the network element 4; the detection packet sent to the network element 4 is directly reached through the link 3.
- the network element 4, the network element 4 parses the detection packet, and obtains the IP address thereof as 3.3.3.3; then it is identified that the network element 3 is sent by the detection packet, and then it is determined that the transmission is completed through the link 3, thereby determining The interaction between the two is for the detection of link 3.
- the network element 1 generates a detection packet, and the detection packet carries its own IP address 1.1.1.1; it is sent to the network element 4; the detection packet sent to the network element 4 passes through the network through the link 4.
- the element 2 and the network element 3 arrive at the network element 4, and the network element 4 parses the detection packet, and obtains the IP address thereof as 1.1.1.1; then it identifies that the detection packet is the network element 4, and then determines that it is through the link. 4 The transmission is completed, thereby determining that the interaction between the two is for the detection of the link 4.
- the detected link when detecting the multi-segment pseudowire, the detected link can be quickly and accurately located, the detection efficiency is improved, and the erroneous connection is detected to avoid false handover.
- the modules or steps of the above embodiments of the present invention can be implemented by a general-purpose computing device. They can be centralized on a single computing device or distributed over a network of multiple computing devices, which can be implemented in program code executable by the computing device so that they can be stored in a computer storage medium (ROM/RAM) , in a magnetic disk, in an optical disk, are performed by a computing device, and in some cases, the steps shown or described may be performed in an order different from that herein, or they may be separately fabricated into individual integrated circuit modules, or Multiple of these modules or steps are fabricated as a single integrated circuit module. Therefore, embodiments of the invention are not limited to any particular combination of hardware and software.
- the method in the embodiment of the present invention does not need to determine the identity of the sender of the message by means of learning, but uniquely determines the identity of the receiver according to the second identity information, thereby knowing that the second detection packet is received from the receiver.
- the end device determines that the link between the receiving end device and the transmitting end device is a detecting link, so as to accurately distinguish the source of the detecting message, and the link detection of the current multi-segment pseudowire is more accurate, and the detection error is reduced.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
L'invention concerne un procédé de détection de pseudo-fils à segments multiples et un élément de réseau. Le procédé comprend les étapes suivantes : un dispositif d'extrémité d'envoi envoie un premier paquet de détection à un dispositif d'extrémité de réception, le premier paquet de détection contenant des premières informations d'identification d'identité concernant le dispositif d'extrémité d'envoi, et reçoit un deuxième paquet de détection envoyé par le dispositif d'extrémité de réception ; et le dispositif d'extrémité d'envoi extrait des deuxièmes informations d'identification d'identité dans le deuxième paquet de détection et détermine l'identité du dispositif d'extrémité de réception d'après les deuxièmes informations d'identification d'identité.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610430956.4 | 2016-06-16 | ||
CN201610430956.4A CN107517116B (zh) | 2016-06-16 | 2016-06-16 | 一种多段伪线检测方法和网元 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017215376A1 true WO2017215376A1 (fr) | 2017-12-21 |
Family
ID=60663953
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/083808 WO2017215376A1 (fr) | 2016-06-16 | 2017-05-10 | Procédé de détection de pseudo-fils à segments multiples et élément de réseau |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107517116B (fr) |
WO (1) | WO2017215376A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114389967A (zh) * | 2020-10-19 | 2022-04-22 | 南京中兴新软件有限责任公司 | 链路检测方法、装置、设备和存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080279110A1 (en) * | 2007-05-10 | 2008-11-13 | Alcatel Lucent | Method and system for verifying connectivity of multi-segment pseudo-wires |
CN103491103A (zh) * | 2013-09-30 | 2014-01-01 | 福建星网锐捷网络有限公司 | 多段伪线的建立方法和系统及装置 |
CN104333872A (zh) * | 2014-10-29 | 2015-02-04 | 中国联合网络通信集团有限公司 | 一种基于双向转发检测技术的建立会话的方法及系统 |
CN105141434A (zh) * | 2014-05-26 | 2015-12-09 | 华为技术有限公司 | 业务链的故障检测方法及装置 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100396023C (zh) * | 2005-09-30 | 2008-06-18 | 华为技术有限公司 | 维护多跳伪线的协商控制方法 |
CN104468286A (zh) * | 2014-12-31 | 2015-03-25 | 迈普通信技术股份有限公司 | 实现多跳链路检测的方法及系统 |
-
2016
- 2016-06-16 CN CN201610430956.4A patent/CN107517116B/zh active Active
-
2017
- 2017-05-10 WO PCT/CN2017/083808 patent/WO2017215376A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080279110A1 (en) * | 2007-05-10 | 2008-11-13 | Alcatel Lucent | Method and system for verifying connectivity of multi-segment pseudo-wires |
CN103491103A (zh) * | 2013-09-30 | 2014-01-01 | 福建星网锐捷网络有限公司 | 多段伪线的建立方法和系统及装置 |
CN105141434A (zh) * | 2014-05-26 | 2015-12-09 | 华为技术有限公司 | 业务链的故障检测方法及装置 |
CN104333872A (zh) * | 2014-10-29 | 2015-02-04 | 中国联合网络通信集团有限公司 | 一种基于双向转发检测技术的建立会话的方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN107517116A (zh) | 2017-12-26 |
CN107517116B (zh) | 2022-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10965568B2 (en) | Bit-forwarding ingress router, bit-forwarding router, and operation, administration and maintenance test method | |
EP3346661B1 (fr) | Procédé et dispositif de détection de trajet | |
US10237173B2 (en) | Target FEC (forwarding equivalence class) stack based FEC query in segment routing environments | |
CN105337785B (zh) | 一种路径连通性检测方法及装置 | |
WO2016058245A1 (fr) | Procédé et appareil de traitement pour un message d'exploitation, d'administration et d'entretien (oam) | |
WO2015180559A1 (fr) | Procédé et appareil de détection de défaillance pour une chaîne de services | |
US20080101241A1 (en) | Ethernet OAM at intermediate nodes in a PBT network | |
CN102571601B (zh) | 一种保证双向转发检测可靠性的方法及标记交换路径设备 | |
WO2018210213A1 (fr) | Procédé et dispositif de mise en œuvre d'un conditionnement ioam et support de stockage | |
WO2016106743A1 (fr) | Procédé, dispositif et système permettant d'effectuer une détection de transfert bidirectionnel sur liaison agrégée | |
CN103580894B (zh) | 操作、管理和维护oam配置的方法、设备及系统 | |
WO2017128901A1 (fr) | Procédé et dispositif de commande de transfert | |
US8724451B2 (en) | Method for protecting a pseudo-wire | |
CN113950811B (zh) | 扩展bgp保护以用于sr路径入口保护 | |
Geib et al. | A scalable and topology-aware MPLS data-plane monitoring system | |
CN113261246B (zh) | 一种减少路由环路的方法、装置及系统 | |
WO2017215376A1 (fr) | Procédé de détection de pseudo-fils à segments multiples et élément de réseau | |
CN112737949B (zh) | 故障检测方法及装置、电子设备、计算机可读介质 | |
CN112511437B (zh) | 验证业务链的方法、发送节点、转发节点、业务功能节点 | |
CN109412851B (zh) | 链路层路径检测方法、装置及系统 | |
CN103036984B (zh) | 一种单向流量的检测方法及网络设备 | |
WO2023236544A1 (fr) | Procédé et appareil de vérification d'informations de tranche | |
CN108111327A (zh) | 网络操作管理维护方法和装置 | |
Kumar | Internet Engineering Task Force (IETF) R. Geib, Ed. Request for Comments: 8403 Deutsche Telekom Category: Informational C. Filsfils |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17812487 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17812487 Country of ref document: EP Kind code of ref document: A1 |