WO2018014767A1 - 一种信息确定方法、装置及存储介质 - Google Patents
一种信息确定方法、装置及存储介质 Download PDFInfo
- Publication number
- WO2018014767A1 WO2018014767A1 PCT/CN2017/092676 CN2017092676W WO2018014767A1 WO 2018014767 A1 WO2018014767 A1 WO 2018014767A1 CN 2017092676 W CN2017092676 W CN 2017092676W WO 2018014767 A1 WO2018014767 A1 WO 2018014767A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- information
- bier
- protocol
- determining
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
Definitions
- the present disclosure relates to the field of communications, and in particular, to an information determining method, apparatus, and storage medium.
- IS-IS intermediate system to intermediate system
- CLNS Connection Less Network Service
- IP Internet Protocol
- the IS-IS protocol is called integrated IS-IS.
- Multicast technology plays an increasingly important role, for example, interactive network television (IPT V, Interactive Personality TV), Multicast technologies are used in network conferences (Net-Meeting) and live broadcasts. Multicast technologies include: Protocol Independent Multicast (PIM), Internet Group Message Protocol (IGMP), and multicast. The Listener Discovery Protocol (MLD), etc.; however, in the Layer 2 network, there are two methods for supporting the multicast technology. The first method adopts the method of replicating the head node, and the multicast is changed to the actual one.
- IPT V Interactive Personality TV
- PIM Protocol Independent Multicast
- IGMP Internet Group Message Protocol
- MLD Listener Discovery Protocol
- the second method is the intermediate node replication method, which establishes a multicast tree in the intermediate network to complete traffic forwarding; in the initial small application scenario, the existing protocols can satisfy the user's Demand, but as multicast applications become more widespread, networking forms become more complex, and multicast is directly applied to the Internet.
- the use of the head node replication method imposes considerable performance pressure on the head node and also wastes network resources.
- the intermediate node replication method generates forwarding entries for each multicast traffic, causing multicast entries on the intermediate network forwarding device and Too many states, occupying a large amount of control resources of intermediate nodes, and extremely disadvantageous to the network size and further growth of services.
- the bit index is explicitly copied (BIER, Bit) Indexed Explicit Replication,) technology is introduced into the Layer 2 network.
- BIER Bit Indexed Explicit Replication
- the BIER technology uses the BIT bit to represent the nodes at the edge of the network.
- the multicast traffic is transmitted in the intermediate network and encapsulates a specific BIER header. This header is encapsulated. All the destination nodes of the multicast stream are marked in the form of a BIT bit string.
- the intermediate network forwarding device forwards the multicast traffic according to the BIT bit to ensure that the multicast traffic can be sent to all destination nodes; however, the related BIER technology is applied to the second layer.
- the transmission of control plane information is not possible when the network is in use.
- the embodiments of the present disclosure are intended to provide an information determining method, apparatus, and storage medium, which can implement the transmission of control plane information when the BIER technology is applied to a Layer 2 network, thereby saving resource occupation on the node.
- an embodiment of the present disclosure provides an information determining method, where the method is applied to a Layer 2 network based on an IS-IS protocol, where the method includes: receiving a bit index from a node to display a copy BIER information, where The BIER information of the node carries the bit position BP information, where the BP information is used to indicate the location of the node; and the BIER forwarding table of the node is determined according to the BP information of the node and the identification information of the node. item.
- the determining, according to the bit position BP information in the BIER information of the node and the identifier information of the node, the BIER forwarding entry of the node including: according to the BP information and the node
- the system identifier System-id determines the BIER forwarding entry of the node.
- the media access control MAC address determines the BIER forwarding entry of the node.
- the method is also used in the following protocols: the shortest path bridge SPB protocol based on the IS-IS protocol or the multi-link transparent interconnect TRILL protocol based on the IS-IS protocol.
- the BIER information of the node further includes one or more of the following: BIER capability, bit string length BSL, sub-domain identification ID number, set identifier SI, security key, and routing algorithm.
- an embodiment of the present disclosure discloses an information determining apparatus, which is applied to a Layer 2 network based on an IS-IS protocol, where the apparatus includes: a receiving module configured to receive a bit index display copy BIER from a node Information, where the BIER information of the node carries bit position BP information, the BP information is used to indicate the location of the node, and the determining module is set to be based on the BP information of the node and the identification information of the node. Determining a BIER forwarding entry of the node.
- the determining module is specifically configured to: determine, according to the BP information and the system identifier System-id of the node, a BIER forwarding entry of the node.
- the determining module is specifically configured to: determine, according to the BP information and the media access control MAC address of the node, a BIER forwarding entry of the node.
- the device is also applied to a Layer 2 network of the following protocol: a Shortest Path Bridge SPB protocol based on the IS-IS protocol or a Multilink Transparent Interconnect TRILL protocol based on the IS-IS protocol.
- the BIER information of the node further includes one or more of the following: BIER capability, bit string length BSL, sub-domain identification ID number, set identifier SI, security key, and routing algorithm.
- the apparatus further includes: a sending module, configured to send BIER information of the device to the node.
- an embodiment of the present disclosure discloses a storage medium, where the storage medium may store an execution instruction, where the execution instruction is used to execute the information determination method in the foregoing embodiment.
- the information determining method, device and storage medium provided by the embodiments of the present disclosure are applied to a Layer 2 network based on the IS-IS protocol.
- the IS-IS protocol extends the BIER information, and the node has its own
- the BIER information is flooded according to the flooding mechanism in the IS-IS protocol, so that each node in the network receives the BIER information of the node, and the BIER information carries the bit position (BP, BitPosition) information, and the BP information is used to indicate the node.
- BP BitPosition
- each node forwards the packet to the next node according to the BIER forwarding entry of the destination node. Therefore, after receiving the packet, each node in the network only needs to find the packet.
- the next node corresponding to the BP information of the destination node, and forwards the message to the next node that is, in the embodiment of the present disclosure, each node receives the BIER information of the node, and determines the BIER for each node.
- the control plane information is transmitted when the BIER technology is applied to the Layer 2 network.
- the packet can be forwarded through the BIER forwarding entry on each node during the forwarding process. Forwarding saves resource usage on the node.
- FIG. 1 is a schematic flowchart of a method for determining information in an embodiment of the present disclosure
- FIG. 2 is a schematic structural diagram of a layer 2 network according to an embodiment of the present disclosure
- FIG. 3 is a schematic structural diagram of an example of a layer 2 network in an embodiment of the present disclosure
- FIG. 4 is a schematic structural diagram of an optional data format of BP information in an embodiment of the present disclosure.
- FIG. 5 is a schematic structural diagram of another optional data format of BP information according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of an optional data format of BIER information in an embodiment of the present disclosure.
- FIG. 7 is a schematic structural diagram of another optional data format of BIER information in an embodiment of the present disclosure.
- FIG. 8 is another schematic structural diagram of a Layer 2 network instance according to an embodiment of the present disclosure.
- FIG. 9 is still another schematic structural diagram of an example of a layer 2 network according to an embodiment of the present disclosure.
- FIG. 10 is a schematic structural diagram of an information determining apparatus according to an embodiment of the present disclosure.
- FIG. 1 is a schematic flowchart of a method for determining information in an embodiment of the present disclosure. include:
- S101 Receive BIER information from a node
- the BIER information of the node carries the BP information, and the BP information is used to indicate the location of the node.
- the information determining apparatus receives the BIER information from the node, where the information determining apparatus may be an edge node or an intermediate node in the network, where the disclosure is not specifically limited; then, the edge node or the intermediate node receives the sending from other nodes. Its own BIER information.
- FIG. 2 is a schematic structural diagram of a Layer 2 (L2, Layer 2) network according to an embodiment of the present disclosure.
- L2 Layer 2
- an edge node and an intermediate node are included, where the edge node includes Node1, Node6, and Node7.
- the intermediate nodes include Node2, Node3, Node4, and Node5; the solid line identification nodes are connected to each other, and the dotted line indicates that IS-IS flooding is performed between the nodes based on the IS-IS protocol;
- the edge node can directly configure its own BIER information through the extension of the IS-IS protocol, or in the Software Defined Network (SDN), the controller can configure the BIER information for the edge node and send it to the The edge node then floods the BIER information of the edge node to each node in the network through the flooding mechanism of IS-IS protocol, so that each node in the network receives BIER information from all edge nodes, passing BIER
- the BP information carried in the information can know the location of the edge node in the network;
- the edge node and the intermediate node may respectively configure their own BIER information by using the IS-IS protocol, or the edge node may be configured and delivered by the controller in the SDN. And the BIER information of the intermediate node, and then flooding the BIER information of each node to other nodes in the network through the flooding mechanism of the IS-IS protocol, so that each node in the network can know that other nodes are in the network. position.
- S102 Determine a BIER of the node according to the BP information of the node and the identifier information of the node. Forward the entry.
- the BIER forwarding entry of the node is used to forward the packet to the next node according to the BIER forwarding entry of the node corresponding to the destination node BP information when receiving the packet encapsulated with the destination node BP information.
- the BIER forwarding entry of the node includes the BP information of the node, the next node corresponding to the BP information, and the outbound interface corresponding to the next node. Then, after determining the BIER forwarding entry of the node, the information determining apparatus is in the network. If any node receives the packet encapsulating the destination node BP information and parses the BIT in the packet header, it determines the BP information of the destination node of the packet, and determines the next node of the packet according to the BP information of the destination node. The outbound interface of the next node forwards the packet.
- the information determining method provided by the embodiment of the present disclosure is applied to a Layer 2 network based on the IS-IS protocol.
- the IS-IS protocol extends the BIER information, and the node sets its own BIER information according to the IS-
- the flooding mechanism in the IS protocol floods, so that each node in the network receives the BIER information of the node, and the BIER information carries the BP information.
- the BP information is used to indicate the location of the node, and then according to the BP information of the node.
- the identification information of the node determines the forwarding entry of the node.
- each node receives the packet encapsulating the BP information of the destination node, the packet forwards the packet to the next node according to the BIER forwarding entry of the destination node, so that when the network After receiving the message, each node only needs to find the next node corresponding to the BP information of the destination node of the message, and forwards the message to the next node, that is, the embodiment of the present disclosure,
- Each node receives the BIER information of the node, and determines a BIER forwarding entry for each node, so that the control plane information is transmitted when the BIER technology is applied to the Layer 2 network, optionally, In the packet forwarding process, you can forward packets through BIER on each node forwarding entry, save the resource consumption on the node.
- the identifier information of the node may be a system identifier (System-id) of the node, or a node media access control (MAC) address; and the BP information may occupy the BIER information of the node.
- System-id system identifier
- MAC node media access control
- the BP information may occupy a single bit in the BIER information of the node, and the single bit is represented by a triplet in the field of data communication based on the IS-IS protocol, and the triplet is a Type-length-value (TLV). ), where value is the BP information of the node.
- TLV Type-length-value
- S102 can be implemented in the following manner:
- S102 can include:
- the BIER forwarding entry of the node is determined according to the BP information and the system identifier System-id of the node.
- the information determining device acquires the System-id of the node, and the information determining device can receive the System-id from the node by using the flooding mechanism in the IS-IS protocol, and the information determining device is called according to the BP information and the System-id.
- the routing algorithm in the IS-IS protocol calculates the shortest path to the node represented by each system-id, and then replaces the system-id of the node with the BP information of the node, and forms the BIER forwarding table together with the outbound interface and the next node information. item.
- S102 can include:
- the BIER forwarding entry of the node is determined according to the BP information and the MAC address of the node.
- the information determining device acquires the MAC address of the node.
- the information determining device can receive the MAC address advertisement encapsulated into the BP information, and invoke the routing algorithm in the IS-IS protocol according to the BP information and the MAC address to calculate the The shortest path of the node represented by each MAC address, and then replaces the MAC address of the node with the BP information of the node, and together with the outbound interface and the next node information constitute a BIER forwarding entry;
- the information determining apparatus may search the BIER forwarding table corresponding to the BP information according to the BP information of the destination node of the packet. The next node and the outbound interface in the entry forward the packet.
- routing algorithm may include: shortest path first (SPF, Shortest)
- SPF shortest path first
- constraint path algorithm are not specifically limited herein.
- SPB Shortest Path Bridging
- TRILL Transparent Interconnection of Lots of Links
- SPB provides flexible Layer 2 interconnection for distributed physical sites based on relevant service provider networks and enterprise networks.
- the SPB based MAC-in-MAC technology is called Shortest Path Bridge MAC Mode (SPBM, Shortest Path Bridging MAC). ), which is used to implement Layer 2 Virtual Private Network (L2 VPN) technology based on the Ethernet core network.
- SPBM Shortest Path Bridge MAC Mode
- L2 VPN Layer 2 Virtual Private Network
- the SPB is composed of a core network and a user network.
- the user network is through one or more core edge devices.
- a Layer 2 network with independent service functions connected to the core network usually controlled by a single organization, mainly composed of hosts and switching devices, and advertises its own MAC address to the core edge device; the core network is supported by the SPB IS-IS protocol.
- the device is composed of two layers of interconnection between user networks.
- TRILL is a new technological innovation that changes the traditional data center network construction method. It introduces the advantages of stable, scalable and high performance of the three-layer routing into the adaptability but limited performance and limited network scope.
- a layer-switched network has established a flexible, scalable, and scalable high-performance new Layer 2 architecture. Users can use Layer 2 switching equipment using TRILL technology to build large-scale, high-performance, scalable and flexible support for dynamic migration.
- the control protocol used by TRILL is based on a powerful IS-IS routing protocol. TRILL also inherits the characteristics of IS-IS's fast convergence and can be used in large-scale business environments. TRILL The protocol fully uses the standard IS-IS protocol specification.
- the BIER information of the foregoing node may further include one or more of the following: BIER capability, bit string length (BSL, BitStringLength), sub-domain identification (ID, identification) number, set identifier (SI, Set-Identifier) Security key (Security-Key) and routing algorithm (Algorithm).
- FIG. 3 is a schematic structural diagram of a Layer 2 network instance according to an embodiment of the present disclosure.
- the nodes in the Layer 2 network include: Node1 to Node8, which can support forwarding of BIER information, assuming a certain group.
- Node1 can serve as an ingress device
- Node6, Node7, and Node8 serve as egress devices.
- the ingress and egress here refer to the forwarding direction of traffic entering the L2 network.
- Node1, Node6, Node7, and Node8 need to connect to the multicast source and The receiver only needs to allocate corresponding BIER information for Node1, Node6, Node7 and Node8, wherein the BIER information carries BP information, that is, if a node is at the edge of the L2 network, BP information can be allocated for the node.
- BIER information carries BP information, that is, if a node is at the edge of the L2 network, BP information can be allocated for the node.
- BP information can also be allocated as needed.
- the multicast source here is a generic reference.
- the ingress device can directly connect to the multicast source or connect to the upstream router device to the source.
- the receiver here is also generic, and the egress device can directly connect to the multicast stream.
- the host device can also connect to other forwarding devices such as routers that lead to the receiver device.
- the nodes in the L2 network flood the BIER information through the IS-IS protocol.
- Each node sends the BP information containing its own BIER information, and also floods the BP information of the BIER information of other nodes according to the IS-IS protocol.
- the allocated BP information is 1, 2, 3, and 4, respectively, and the BIER information is advertised to each node of the L2 network through the flooding mechanism of the IS-IS protocol itself, and each node
- the calculation is performed according to the SPF algorithm of the IS-IS, and the unicast forwarding table to each egress node is calculated, and the BIER forwarding entry whose destination node is the BP information is also generated.
- the advertisement edge can be extended by the IS-IS protocol.
- each node After the node BP information and the system-id information of the edge node are flooded in the network, each node performs the generation of the System-id shortest path tree for each edge node according to the SPF algorithm of the IS-IS protocol. At the same time that the tree is generated, the system-id of the edge node is replaced with the BP information of the edge node, that is, the arrival of each BP letter is generated.
- the shortest path tree of the information determines the interface and the next node, and the BIER forwarding entry is generated.
- the node is extended by the IS-IS protocol to advertise a special MAC information (corresponding to the foregoing MAC address).
- the specific information in the MAC information includes the BP information of the edge node, and the IS- After the IS protocol floods, each node calculates the forwarding entry of each special MAC information according to the IS-IS SPF algorithm, and then replaces the MAC address of the edge node with the BP information of the edge node, and also generates the BP information. BIER forwarding entry for information.
- the method for determining information is continued by taking the Layer 2 network in FIG. 3 as an example.
- the method is also applicable to the control protocol SPB or TRILL. Both of these protocols can perform related calculations based on the IS-IS protocol, and obtain the required forwarding table. Therefore, the two protocols can use the IS-IS protocol to extend the traditional multicast-related information and generate related multicast entries for forwarding.
- multicast forwarding is performed through traditional multicast entries. A large number of intermediate node multicast states have a great impact on performance and increase the difficulty and complexity of operation and maintenance.
- SPB and TRILL can also extend the BIER information transmitted by the IS-IS protocol to provide management functions. After the calculation of the BIER forwarding entry, the BIER transition is obtained. The BIER packet header is encapsulated in the Layer 2 network, and the BIER packet header is encapsulated in the Layer 2 network. .
- FIG. 4 is a kind of BP information in the embodiment of the present disclosure.
- a schematic diagram of the structure of the optional data format, as shown in FIG. 4, uses the format of TLV (Type, Length, Value) to advertise related information (equivalent to a single bit in the BIER information of the BP information occupying node), type It shows that the TLV is used to carry BP information.
- TLV Type, Length, Value
- the BP information is advertised along with the System-id information of the IS-IS protocol. After the nodes in the network receive the BP information and System-id flooded by other nodes, the shortest path to each System-id is calculated. At the same time, a BIER forwarding entry corresponding to each BP information is formed.
- FIG. 5 is a schematic structural diagram of another optional data format of BP information according to an embodiment of the present disclosure. As shown in FIG. 5, it is another notification manner of BP information, which is embedded in a special MAC address (equivalent to the above).
- the BP information is encapsulated in the MAC address of the node, and the special MAC address is embedded with the BP information of the node, and the special MAC is unique to each node in the network.
- each node in the network After receiving the flooded special MAC address, each node in the network calculates the shortest path to each special MAC address and forms a BIER forwarding entry that reaches each BP information.
- the BIER information may also include other related information, such as BIER capability, BSL, sub-domain ID number, Multi Topology-id, SI, Security-Key, Algorithm, etc., all of which may be extended by appropriate TLVs.
- BIER capability BSL
- sub-domain ID number Multi Topology-id
- SI Security-Key
- Algorithm Algorithm
- FIG. 6 is a schematic structural diagram of an optional data format of BIER information according to an embodiment of the present disclosure. As shown in FIG. 6, a separate TLV notification mode of sub-domain-id, BSL, and SI is demonstrated; FIG. 7 is a disclosure A schematic structural diagram of another optional data format of the BIER information in the embodiment, as shown in FIG. 7, is a sub-domain-id, and the example in which the BSL and the SI are combined in the same TLV, achieves the purpose of flexible control of the network. .
- FIG. 8 is a schematic diagram of another structure of a Layer 2 network in the embodiment of the present disclosure.
- an ECMP Equal Cost MultiPath
- the load sharing of traffic assumes that the source connected to Node1 has two multicast streams, and all need to reach the Node7 node, because the receivers need to receive the two multicast streams under the Node7 node.
- the Node1 node After the IS-IS extension announces the BIER information, it can be calculated that the Node1 node has two equal-cost links to the Node7, one through the Node2 and the Node4 node, and one through the Node3 and Node5 nodes, so the two multicast streams need to be sent to Node7 node
- the node In the process of packet forwarding, the node can forward the multicast stream by combining the BIER forwarding entry and the different entropy value fields encapsulated in the BIER header of the packet, so that the node can select a path for each multicast stream. Load sharing of different flows is implemented by ECMP link forwarding similar to unicast.
- the load sharing function is implemented not only on the illustrated Node1 ingress node, but also in the load sharing function on any node supporting the BIER forwarding in the Layer 2 network.
- ECMP mode specifically for the ingress node, which is implemented by the algorithm field carried in the present disclosure.
- the IS-IS protocol first calculates the shortest path tree of multiple algorithm modes. The method of calculating the path can be prompted, and the head node combines the algorithm field to implement different load distribution through different shortest path trees, thereby implementing load sharing.
- FIG. 9 is still another schematic structural diagram of a Layer 2 network instance according to an embodiment of the present disclosure.
- a BIER technology when a BIER technology is deployed on a Layer 2 network, nodes that support BIER forwarding and BIER forwarding technologies are not coexisting.
- the BIER capability in the Layer 2 network, when the BIER information includes the BIER capability, the BIER capability can be used to know whether the node has the forwarding capability. For example, the Node 11 cannot support the BIER forwarding technology, so the IS-IS protocol is widely used. In the case of flooding, the node BIER capability extends the notification of the TLV, and other nodes in the network can know the capability of the node.
- the Node11 node and the Node4 node are sent to the egress node, the Node2 node
- the MAC address of the Node4 node is encapsulated before the BIER header.
- the Node11 node performs normal Layer 2 forwarding and sends the packet to the next node Node4.
- the Node4 node finds that the node is the destination.
- Node4 restores the packet to the BIER packet and forwards the packet according to the BIER forwarding entry.
- the Node2 node When the Node2 node receives the BIER packet and finds that the next node Node11 does not support BIER forwarding, it can also encapsulate a special multicast MAC address.
- the Node11 node receives the broadcast to other interfaces until the node Node4 that supports the BIER forwarding receives. After performing further Forward operation.
- an embodiment of the present disclosure provides an information determining apparatus, which is applied to a Layer 2 network based on an IS-IS protocol
- FIG. 10 is a schematic structural diagram of an information determining apparatus according to an embodiment of the present disclosure.
- the information determining apparatus includes: a receiving module 101 and a determining module 102;
- the receiving module 101 is configured to receive the bit index display copy BIER information from the node, where the BIER information of the node carries the bit position BP information, the BP information is used to indicate the location of the node, and the determining module 102 is set to be based on the node.
- the BP information and the identification information of the node determine the BIER forwarding entry of the node; wherein the BIER forwarding entry of the node is used to receive the encapsulated destination node BP information message, according to the BIER of the node corresponding to the destination node BP information.
- the forwarding entry forwards the packet to the next node.
- the determining module 102 is specifically configured to: determine a BIER forwarding entry of the node according to the BP information and the System-id of the node.
- the determining module 102 is specifically configured to: determine a BIER forwarding entry of the node according to the BP information and the MAC address of the node.
- the above device is also applied to a Layer 2 network of the following protocol: an SPB protocol based on the IS-IS protocol or a TRILL protocol based on the IS-IS protocol.
- the BIER information of the foregoing apparatus may further include one or more of the following: BIER capability, bit string length BSL, sub-domain identification ID number, set identifier SI, security key, and routing algorithm.
- the foregoing apparatus further includes: a sending module, configured to send the BIER information of the device to the node.
- the sending module sends the BIER information of the device to other nodes in the network.
- the receiving module 101, the determining module 102, and the sending module may all be located by a central processing unit (CPU) of the node, a microprocessor (MPU, Microprocessor Unit), Application Specific Integrated Circuit (ASIC) or Field-Programmable Gate Array (FPGA).
- CPU central processing unit
- MPU Microprocessor
- ASIC Application Specific Integrated Circuit
- FPGA Field-Programmable Gate Array
- This embodiment describes a computer readable medium, which may be a ROM (eg, a read only memory, a FLASH memory, a transfer device, etc.), a magnetic storage medium (eg, a magnetic tape, a disk drive, etc.), an optical storage medium (eg, a CD- ROM, DVD-ROM, paper card, paper tape, etc.) and other well-known types of program memory; computer-readable medium storing computer-executable instructions that, when executed, cause at least one processor to perform operations including:
- the BIER information is received from the node, where the BIER information of the node carries the BP information, and the BP information is used to indicate the location of the node; and the BIER forwarding entry of the node is determined according to the BP information of the node and the identification information of the node.
- the information determining method provided by the embodiment of the present disclosure is applied to a Layer 2 network based on the IS-IS protocol.
- the IS-IS protocol extends the BIER information, and the node sets its own BIER information according to the IS-
- the flooding mechanism in the IS protocol floods, so that each node in the network receives the BIER information of the node, and the BIER information carries the BP information.
- the BP information is used to indicate the location of the node, and then according to the BP information of the node.
- the identification information of the node determines the forwarding entry of the node.
- each node receives the packet encapsulating the BP information of the destination node, the packet forwards the packet to the next node according to the BIER forwarding entry of the destination node, so that when the network After receiving the message, each node only needs to find the next node corresponding to the BP information of the destination node of the message, and forwards the message to the next node, that is, the embodiment of the present disclosure,
- Each node receives the BIER information of the node, and determines a BIER forwarding entry for each node, so that the control plane information is transmitted when the BIER technology is applied to the Layer 2 network, optionally, In the packet forwarding process, you can forward packets through BIER on each node forwarding entry, save the resource consumption on the node.
- the disclosed apparatus and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
- the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
- the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units; they may be located in one place or distributed on multiple network units; You can choose some of them according to your actual needs. Or all of the units to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present disclosure may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the above integration
- the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
- the foregoing program may be stored in a computer readable storage medium, and when executed, the program includes The foregoing steps of the method embodiment; and the foregoing storage medium includes: a removable storage device, a read only memory (ROM), a magnetic disk, or an optical disk, and the like, which can store program codes.
- ROM read only memory
- the above-described integrated unit of the present disclosure may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
- the technical solution of the embodiments of the present disclosure may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions for making
- a computer device which may be a personal computer, server, or network device, etc.
- the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a magnetic disk, or an optical disk.
- the information determining method provided by the embodiment of the present disclosure is applied to a Layer 2 network based on the IS-IS protocol.
- the IS-IS protocol extends the BIER information, and the node sets its own BIER information according to the IS- The flooding mechanism in the IS protocol floods, so that each node in the network receives the BIER information of the node, and the BP information carries the BP information in the BIER information.
- each node receives the BIER information of the node, and determines the BIER forwarding entry for each node, then implements the control plane information when the BIER technology is applied to the Layer 2 network.
- the delivery optionally, enables the packet to be forwarded through the BIER forwarding entry on each node during the forwarding process, which saves resource usage on the node.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本公开实施例公开了一种信息确定方法,该方法应用于基于IS-IS协议的二层网络中,该方法包括:接收来自节点的位索引显示复制BIER信息,其中,节点的BIER信息中携带有位位置BP信息,BP信息用于指示节点的位置;根据节点的BP信息和节点的标识信息,确定出节点的BIER转发表项。本公开实施例还同时公开了一种信息确定装置及存储介质。
Description
本公开涉及通信领域,尤其涉及一种信息确定方法、装置及存储介质。
中间系统到中间系统(IS-IS,Intermediate system to intermediate system)作为一种网关路由协议,是电信运营商普遍采用的内部网关路由协议之一,国际标准化组织制定的标准的IS-IS协议是为无连接网络服务(CLNS,Connection Less Network Service)设计的,并不直接适合于网络之间互连的协议(IP,Internet Protocol)网络,因此,互联网工程任务组制定了可以适用于IP网络的集成化的IS-IS协议,称为集成IS-IS。
现有基于集成IS-IS协议可以实现网络中的数据传输,在数据传输中,目前,组播技术发挥着越来越重要的作用,例如,交互式网络电视(IPT V,Interactive Personality TV)、网络会议(Net-Meeting)和赛况直播等都使用到了组播技术,组播技术包括:协议无关组播(PIM,Protocol Independent Multicast)、互联网组管理协议(IGMP,Internet Group Message Protocol)、组播侦听者发现协议(MLD,Multicast Listener Discovery Protocol)等;然而,在二层网络中,为了支持组播技术有两种方法,第一种方法采取头节点复制的方法,变组播为实际的单播来实现组播流量转发;第二种方法则是中间节点复制方法,在中间网络建立起组播树来完成流量转发;在最初的小型应用场景下,已有的这些协议可以满足用户的需求,但随着组播应用越来越广泛,组网形式越来越复杂,组播直接应用在互联网络中,采用头节点复制方法会对头节点造成相当大的性能压力,同时也浪费了网络资源;采用中间节点复制方法针对每个组播流量都生成转发表项,造成中间网络转发设备上的组播条目及状态过多,占用中间节点的大量控制资源,并且极不利于网络规模和业务的进一步增长。
为了降低节点上的资源浪费问题,将位索引显式复制(BIER,Bit
Indexed Explicit Replication,)技术引入到二层网络中,BIER技术是将网络边缘的节点都只用一个BIT位来表示,组播流量在中间网络传输,额外封装一个特定的BIER头,这个报文头以BIT位串的形式标注了该组播流的所有目的节点,中间网络转发设备根据BIT位转发组播流量,保障组播流量能够发送到所有目的节点;然而,相关的BIER技术应用到二层网络时不能够实现控制面信息的传递。
发明内容
有鉴于此,本公开实施例期望提供一种信息确定方法、装置及存储介质,能够实现BIER技术应用到二层网络时控制面信息的传递,进而节省了节点上的资源占用。
为达到上述目的,本公开的技术方案是这样实现的:
第一方面,本公开实施例提供了一种信息确定方法,该方法应用于基于IS-IS协议的二层网络中,所述方法包括:接收来自节点的位索引显示复制BIER信息,其中,所述节点的BIER信息中携带有位位置BP信息,所述BP信息用于指示所述节点的位置;根据所述节点的BP信息和所述节点的标识信息,确定出所述节点的BIER转发表项。
在上述方案中,所述根据所述节点的BIER信息中的位位置BP信息和所述节点的标识信息,确定出所述节点的BIER转发表项,包括:根据所述BP信息和所述节点的系统标识System-id,确定出所述节点的BIER转发表项。
在上述方案中,所述根据所述节点的BIER信息中的位位置BP信息和所述节点的标识信息,确定出所述节点的BIER转发表项,包括:根据所述BP信息和所述节点的媒体访问控制MAC地址,确定出所述节点的BIER转发表项。
在上述方案中,所述方法还用于以下协议中:基于IS-IS协议的最短路径桥SPB协议或者基于IS-IS协议的多链路透明互联TRILL协议。
在上述方案中,所述节点的BIER信息还包括以下一项或多项:BIER能力、位串长度BSL、子域识别ID号、集标识SI、安全密钥和路由算法。
第二方面,本公开实施例公开了一种信息确定装置,该装置应用于基于IS-IS协议的二层网络中,所述装置包括:接收模块,设置为接收来自节点的位索引显示复制BIER信息,其中,所述节点的BIER信息中携带有位位置BP信息,所述BP信息用于指示所述节点的位置;确定模块,设置为根据所述节点的BP信息和所述节点的标识信息,确定出所述节点的BIER转发表项。
在上述方案中,所述确定模块具体设置为:根据所述BP信息和所述节点的系统标识System-id,确定出所述节点的BIER转发表项。
在上述方案中,所述确定模块具体设置为:根据所述BP信息和所述节点的媒体访问控制MAC地址,确定出所述节点的BIER转发表项。
在上述方案中,所述装置还应用于以下协议的二层网络中:基于IS-IS协议的最短路径桥SPB协议或者基于IS-IS协议的多链路透明互联TRILL协议。
在上述方案中,所述节点的BIER信息还包括以下一项或多项:BIER能力、位串长度BSL、子域识别ID号、集标识SI、安全密钥和路由算法。
在上述方案中,所述装置还包括:发送模块,设置为发送所述装置的BIER信息至所述节点。
第三方面,本公开实施例公开了一种存储介质,该存储介质可以存储有执行指令,该执行指令用于执行上述实施例中的信息确定方法。
本公开实施例所提供的信息确定方法、装置及存储介质,该方法应用于基于IS-IS协议的二层网络中,在二层网络在中,IS-IS协议扩展BIER信息,节点将自身的BIER信息根据IS-IS协议中的泛洪机制进行泛洪,使得网络中的每个节点接收节点的BIER信息,在BIER信息中携带有位位置(BP,BitPosition)信息,BP信息用于指示节点的位置,然后根据该节点的BP信息和节点的标识信息确定出节点的转发表项,那么,当每个
节点接收到封装目的节点BP信息的报文时,根据目的节点的BIER转发表项转发报文至下一节点,这样,当网络中的每个节点在接收到报文之后,只需要查找报文的目的节点的BP信息所对应的下一节点,并将该报文转发至下一节点,也就是说,本公开实施例,每个节点接收节点的BIER信息,并且针对每个节点确定出BIER转发表项,那么,实现了BIER技术应用到二层网络时控制面信息的传递,可选的,使得报文在转发过程中,通过每个节点上的BIER转发表项就可以对报文进行转发,节省了节点上的资源占用。
图1为本公开实施例中信息确定方法的流程示意图;
图2为本公开实施例中二层网络的结构示意图;
图3为本公开实施例中二层网络实例的一种结构示意图;
图4为本公开实施例中BP信息的一种可选的数据格式的结构示意图;
图5为本公开实施例中BP信息的另一种可选的数据格式的结构示意图;
图6为本公开实施例中BIER信息的一种可选的数据格式的结构示意图;
图7为本公开实施例中BIER信息的另一种可选的数据格式的结构示意图;
图8为本公开实施例中二层网络实例的另一种结构示意图;
图9为本公开实施例中二层网络实例的又一种结构示意图;
图10为本公开实施例中信息确定装置的结构示意图。
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述。
实施例一
本公开实施例提供一种信息确定方法,该方法应用于基于IS-IS协议的二层网络中,图1为本公开实施例中的信息确定方法的流程示意图,如图1所示,该方法包括:
S101:接收来自节点的BIER信息;
其中,节点的BIER信息中携带有BP信息,BP信息用于指示节点的位置。
这里,信息确定装置接收来自节点的BIER信息,其中,信息确定装置可以为网络中的边缘节点或者中间节点,这里,本公开不做具体限定;那么,边缘节点或者中间节点接收来自其他节点发送的自身的BIER信息。
图2为本公开实施例中二层(L2,Layer2)网络的一种结构示意图,如图2所示,在二层网络中,包括边缘节点和中间节点,其中边缘节点包括Node1、Node6、Node7和Node8,中间节点包括Node2、Node3、Node4和Node5;实线标识节点之间相互连接,虚线表示基于IS-IS协议在各个节点之间进行泛洪(IS-IS flooding);
在上述图2中,通过IS-IS协议扩展,边缘节点可以直接配置自身的BIER信息,或者在软件定义网络(SDN,Software Defined Network)中,可由控制器为边缘节点配置BIER信息并下发至边缘节点,然后通过IS-IS协议的泛洪机制将边缘节点的BIER信息泛洪至网络中的每个节点,这样,网络中的每个节点都接收到了来自所有边缘节点的BIER信息,通过BIER信息中携带的BP信息可以得知边缘节点在网络中的位置;
需要说明的是,在一种可选的实施例中,还可以通过IS-IS协议扩展,边缘节点和中间节点分别配置自身的BIER信息,或者,在SDN中可由控制器配置并下发边缘节点和中间节点的BIER信息,然后,通过IS-IS协议的泛洪机制将每个节点的BIER信息泛洪至网络中的其他节点,使得网络中的每个节点可以得知其他节点在网络中的位置。
S102:根据节点的BP信息和节点的标识信息,确定出节点的BIER
转发表项。
其中,节点的BIER转发表项用于当接收到封装目的节点BP信息的报文时,根据目的节点BP信息对应节点的BIER转发表项转发报文至下一节点。
上述节点的BIER转发表项中包括节点的BP信息、BP信息对应的下一节点以及下一节点对应的出接口,那么,信息确定装置在确定出节点的BIER转发表项之后,当网络中的任意一个节点接收到封装目的节点BP信息的报文,解析报文头中的BIT,那么就确定出报文的目的节点的BP信息,根据目的节点的BP信息确定出报文的下一节点和下一节点的出接口,进而转发报文。
本公开实施例所提供的信息确定方法,该方法应用于基于IS-IS协议的二层网络中,在二层网络在中,IS-IS协议扩展BIER信息,节点将自身的BIER信息根据IS-IS协议中的泛洪机制进行泛洪,使得网络中的每个节点接收节点的BIER信息,在BIER信息中携带有BP信息,BP信息用于指示节点的位置,然后根据该节点的BP信息和节点的标识信息确定出节点的转发表项,那么,当每个节点接收到封装目的节点BP信息的报文时,根据目的节点的BIER转发表项转发报文至下一节点,这样,当网络中的每个节点在接收到报文之后,只需要查找报文的目的节点的BP信息所对应的下一节点,并将该报文转发至下一节点,也就是说,本公开实施例,每个节点接收节点的BIER信息,并且针对每个节点确定出BIER转发表项,那么,实现了BIER技术应用到二层网络时控制面信息的传递,可选的,使得报文在转发过程中,通过每个节点上的BIER转发表项就可以对报文进行转发,节省了节点上的资源占用。
实施例二
基于上述实施例一,上述节点的标识信息可以为节点的系统标识(System-id),或者节点媒体访问控制(MAC,Media Access Control)地址;并且,上述BP信息可以占用节点的BIER信息中的单个比特,也可
以封装在节点的MAC地址中;
其中,上述BP信息可以占用节点的BIER信息中的单个比特,该单个比特通过基于IS-IS协议下数据通信领域中的三元组来表示,该三元组分别为Type-length-value(TLV),其中,value为节点的BP信息。
为了完成控制面信息的传递,也就是说确定出BIER转发表项;S102可以通过以下方式实现:
在一种可选的实施例中,S102可以包括:
根据BP信息和节点的系统标识System-id,确定出节点的BIER转发表项。
上述信息确定装置获取节点的System-id中,可以通过IS-IS协议中的泛洪机制,使得信息确定装置可以接收到来自节点的System-id,信息确定装置根据BP信息和System-id,调用IS-IS协议中的路由算法,计算出到各个system-id所代表节点的最短路径,再将节点的system-id替换为节点的BP信息,与出接口和下一节点信息共同组成BIER转发表项。
在另一种可选的实施例中,S102可以包括:
根据BP信息和节点的MAC地址,确定出节点的BIER转发表项。
信息确定装置获取节点的MAC地址中,在实际应用中,信息确定装置可以接收到封装入BP信息的MAC地址通告,根据BP信息和MAC地址,调用IS-IS协议中的路由算法,计算出到各个MAC地址所代表的节点的最短路径,再将节点的MAC地址替换为节点的BP信息,与出接口和下一节点信息共同组成BIER转发表项;
那么,通过以上方式获取到节点的BIER转发表项之后,在数据面报文转发的过程中,信息确定装置可以根据报文的目的节点的BP信息,查找该与该BP信息对应的BIER转发表项中的下一节点和出接口来转发报文。
需要说明的是,上述路由算法可以包括:最短路径优先(SPF,Shortest
Path First)算法和约束路径算法,这里,本公开不做具体限定。
这里,上述方法还用于以下协议中:基于IS-IS协议的最短路径桥(SPB,Shortest Path Bridging)SPB协议或者基于IS-IS协议的多链路透明互联(TRILL,Transparent Interconnection of Lots of Links)TRILL协议。
SPB基于相关的服务提供商网络和企业网络,给分散的物理站点提供灵活的二层互联功能,SPB基于“MAC-in-MAC”的技术称为最短路径桥MAC模式(SPBM,Shortest Path Bridging MAC),用于实现基于以太网核心网络的二层网络虚拟专用网络(L2 VPN,Layer2 Virtual Private Network)技术,SPB整体由核心网络和用户网络组成,用户网络是通过一台或者多台核心边缘设备连接到核心网络的具有独立业务功能的二层网络,通常由单个组织管理控制,主要由主机和交换设备组成,向核心边缘设备通告自身的MAC地址;核心网络由支持SPB IS-IS协议的交换设备组成,提供用户网络之间的二层互联。
TRILL是一种改变传统数据中心网络构建方式的新的技术创新,它把三层路由的稳定、可扩展、高性能的优点,引入了适应性强但性能受限、组网范围受限的二层交换网络,建立了一个灵活、可扩展、可升级的高性能的新二层架构,用户可使用采用TRILL技术的二层交换设备,构建大型的具有高性能、可扩展的灵活支持动态迁移的现代数据中心网络,TRILL使用的控制协议建立在功能强大的IS-IS路由协议基础之上,TRILL也天然继承了IS-IS的快速收敛的特点和能用于大规模的业务环境的特点,TRILL协议完全使用了标准的IS-IS协议规范。
需要说明的是,上述节点的BIER信息还可以包括以下一项或多项:BIER能力、位串长度(BSL,BitStringLength)、子域识别(ID,Identification)号、集标识(SI,Set-Identifier)安全密钥(Security-Key)和路由算法(Algorithm)。
为了更清楚的对上述信息确定方法进行说明,下面举实例对上述一个或多个实施例进行说明。
实施例三
图3为本公开实施例中二层网络实例的一种结构示意图,如图3所示,这个二层网络中的节点包括:Node1到Node8,都可以支持BIER信息的转发,假设对于某条组播流,Node1可以作为入口设备,Node6、Node7和Node8作为出口设备,其中,这里的入口和出口指的是流量进入该L2网络的转发方向,Node1、Node6、Node7和Node8需要连接组播源和接收者,只需要为Node1、Node6、Node7和Node8分配相应的BIER信息,其中BIER信息中携带有BP信息,也就是说,如果某节点处于该L2网络的边缘,则可为该节点分配BP信息,对于中间节点Node2、Node3、Node4和Node5,也可以根据需要进行分配BP信息。
其中,这里的组播源是泛指,入口设备可以直接连接组播源,也可以连接通往源的上游路由器设备,同样,这里的接收者也是泛指,出口设备可以直接连接需要组播流的主机设备,也可以连接通向接收者设备的路由器等其他转发设备。
该L2网络中的节点通过IS-IS协议进行BIER信息的泛洪,每个节点除了发送包含自身BIER信息的BP信息,也会根据IS-IS协议泛洪其他节点的BIER信息的BP信息,假设对于边缘节点Node1、Node6、Node7和Node8,分配的BP信息分别为1、2、3、4,通过IS-IS协议本身的泛洪机制,将BIER信息通告到了该L2网络的各个节点,各个节点根据IS-IS的SPF算法进行计算,计算出到各个出口节点的单播转发表外,同时生成目的节点为BP信息的BIER转发表项。
在IS-IS协议扩展通告BIER信息时,在最简化的网络中,一种可选的方式为,可能只需要通告最简洁的BIER信息,因此根据本公开,可以通过IS-IS协议扩展通告边缘节点BP信息和边缘节点的System-id信息,在网路中进行泛洪之后,各个节点根据IS-IS协议的SPF算法,进行对每个边缘节点的System-id最短路径树的生成,在该树生成的同时,再将边缘节点的system-id替换为边缘节点的BP信息,即生成了到达各个BP信
息的最短路径树,确定出接口及下一节点,也就生成了BIER转发表项。
另外一种可选的方式为,节点通过IS-IS协议扩展,通告特殊的MAC信息(相当于上述MAC地址),该MAC信息中有特定的字段包括了边缘节点的BP信息,同样通过IS-IS协议泛洪之后,各个节点根据IS-IS协议SPF算法,算出到各特殊MAC信息的转发表项,再将边缘节点的MAC地址替换为边缘节点的BP信息,同时也就生成了到各个BP信息的BIER转发表项。
实施例四
继续以图3中的二层网络为例对信息确定方法进行说明,该方法还适用于控制协议SPB或者TRILL,这两种协议都能够基于IS-IS协议进行相关计算,得出所需要的转发表项,因此这两个协议都可以通过IS-IS协议扩展传递传统组播相关信息,生成相关的组播表项进行转发,但实际应用中,通过传统组播表项进行组播转发,会消耗大量的中间节点组播状态,对性能有极大的影响,并且增加运维的难度和复杂度。
因为BIER的转发方式可以让中间节点没有组播状态,因此同样,SPB和TRILL也可以结合IS-IS协议扩展传递的BIER信息,提供管理功能,在BIER转发表项的计算后,得出BIER转发表项,在转发组播报文时,或者根据需要直接封装BIER报文头,或者进行SPB和TRILL相关封装后,再封装BIER报文头,以便报文在该二层网络中得到BIER转发处理。
实施例五
上述所通告的BIER信息,包括BP信息,BP信息可以是单独的值,也可以是嵌入在节点特定MAC中的值;为了提高可扩展性,图4为本公开实施例中BP信息的一种可选的数据格式的结构示意图,如图4所示,使用TLV(Type,Length,Value)的格式来进行相关信息的通告(相当于上述BP信息占用节点的BIER信息中的单个比特),类型表明了该TLV是用来携带BP信息。
BP信息随着IS-IS协议的System-id等信息一并通告,在网络中的节点都收到其他节点洪泛来的BP信息和System-id后,算出到达各System-id的最短路径,同时形成到达各个BP信息对应的BIER转发表项。
图5为本公开实施例中BP信息的另一种可选的数据格式的结构示意图,如图5所示,是BP信息的另外一种通告方式,通过内嵌在特殊MAC地址(相当于上述BP信息封装在节点的MAC地址中)进行通告,该特殊MAC地址中内嵌了节点的BP信息,该特殊MAC对于网络中的每个节点是唯一的。
网络中的各个节点收到洪泛而来的特殊MAC地址后,算出到达各个特殊MAC地址的最短路径,同时形成到达各个BP信息的BIER转发表项。
另外,BIER信息还可以包括其他的相关信息,比如BIER能力,BSL,子域ID号,多拓扑ID(Multi Topology-id),SI,Security-Key,Algorithm等,都可以通过适当的TLV扩展,通过IS-IS协议实现在二层网络中的泛洪,这些信息可以自由组合泛洪,达到网络的灵活控制目的。
图6为本公开实施例中BIER信息的一种可选的数据格式的结构示意图,如图6所示,示范了sub-domain-id,BSL和SI的分离TLV通告方式;图7为本公开实施例中BIER信息的另一种可选的数据格式的结构示意图,如图7所示,是sub-domain-id,BSL和SI合并在同一个TLV中的示例,达到对网络灵活控制的目的。
实施例六
图8为本公开实施例中二层网络实例的另一种结构示意图,如图8所示,根据IS-IS协议的算路特性,可以支持等价链路(ECMP,Equal Cost MultiPath)来进行流量的负荷分担,如图8所示,假设Node1所连接的源有2条组播流,都需要到达Node7节点,因为Node7节点下有接收者需要接收这2条组播流。在IS-IS扩展通告BIER信息后,可以算出Node1节点到达Node7有2条等价链路,一条是经过Node2和Node4节点,一条是经过Node3和Node5节点,因此在2条组播流需要发往Node7节点
时,在报文转发的过程中,节点可以结合BIER转发表项和报文的BIER头里封装的不同熵值字段,对组播流进行转发,使得节点可以针对每个组播流选择路径,通过与单播类似的ECMP链路转发来实现不同流的负荷分担。
其中,该负荷分担的功能实现不仅仅在图示的Node1入口节点上,负荷分担功能可以实现在二层网络中支持BIER转发的任意节点上。
除了以上的ECMP实现方式外,还有一种专门针对入口节点的ECMP方式,通过本公开中所携带传递的算法字段来实现,IS-IS协议先计算出多种算法方式的最短路径树,该算法可以提示出使用的算路方式,头节点结合该算法字段,对不同的流实现通过不同的最短路径树进行传递,从而实现负荷分担。
实施例七
图9为本公开实施例中二层网络实例的又一种结构示意图,如图9所示,在二层网络部署BIER技术时,会遇到支持BIER转发和不支持BIER转发技术的节点共存的情况,如图9所示,该二层网络中,BIER信息中包括BIER能力时,通过BIER能力可以获知节点是否具有转发能力,例如,Node11并不能支持BIER转发技术,因此在IS-IS协议泛洪时,通过节点BIER能力扩展TLV的通告,该网络中的其他节点均可获知该节点的能力情况,在有BIER报文需要通过Node2节点,Node11节点和Node4节点发送到出口节点时,Node2节点封装Node4节点的MAC信息在BIER报文头之前,这样当报文到达Node11节点时,Node11节点将执行正常的二层转发,将该报文发送给下一个节点Node4,Node4节点发现本节点是目的节点,进一步解析该报文时,发现是BIER报文,则Node4还原该报文到BIER报文,并根据BIER转发表项进行转发。
其中,Node2节点在收到BIER报文,发现下一节点Node11不支持BIER转发时,也可以封装特殊的组播MAC地址,Node11节点通过往其他接口的广播,直到支持BIER转发的节点Node4收到后,执行进一步的
转发操作。
基于同一公开构思,本公开实施例提供一种信息确定装置,该信息确定装置应用于基于IS-IS协议的二层网络中,图10为本公开实施例中信息确定装置的结构示意图,如图10所示,该信息确定装置包括:接收模块101和确定模块102;
其中,接收模块101,设置为接收来自节点的位索引显示复制BIER信息,其中,节点的BIER信息中携带有位位置BP信息,BP信息用于指示节点的位置;确定模块102,设置为根据节点的BP信息和节点的标识信息,确定出节点的BIER转发表项;其中,节点的BIER转发表项用于当接收到的封装目的节点BP信息报文时,根据目的节点BP信息对应节点的BIER转发表项转发报文至下一节点。
在一种可选的实施例中,上述确定模块102具体设置为:根据BP信息和节点的System-id,确定出节点的BIER转发表项。
在另一种可选的实施例中,上述确定模块102具体设置为:根据BP信息和节点的MAC地址,确定出节点的BIER转发表项。
这里,上述装置还应用于以下协议的二层网络中:基于IS-IS协议的SPB协议或者基于IS-IS协议的TRILL协议。
需要说明的是,上述装置的BIER信息还可以包括以下一项或多项:BIER能力、位串长度BSL、子域识别ID号、集标识SI、安全密钥和路由算法。
在一种可选的实施例中,上述装置还包括:发送模块,设置为发送装置的BIER信息至节点。
这里,在配置出装置的BIER信息之后,或者接收到控制器下发的装置的BIER信息之后,发送模块将装置的BIER信息发送至网络中的其他节点。
在实际应用中,接收模块101、确定模块102和发送模块均可由位于节点的中央处理器(CPU,Central Processing Unit)、微处理器(MPU,
Microprocessor Unit)、专用集成电路(ASIC,Application Specific Integrated Circuit)或现场可编程门阵列(FPGA,Field-Programmable Gate Array)等实现。
本实施例记载一种计算机可读介质,可以为ROM(例如,只读存储器、FLASH存储器、转移装置等)、磁存储介质(例如,磁带、磁盘驱动器等)、光学存储介质(例如,CD-ROM、DVD-ROM、纸卡、纸带等)以及其他熟知类型的程序存储器;计算机可读介质中存储有计算机可执行指令,当执行指令时,引起至少一个处理器执行包括以下的操作:
接收来自节点的BIER信息,其中,节点的BIER信息中携带有BP信息,BP信息用于指示节点的位置;根据节点的BP信息和节点的标识信息,确定出节点的BIER转发表项。
本公开实施例所提供的信息确定方法,该方法应用于基于IS-IS协议的二层网络中,在二层网络在中,IS-IS协议扩展BIER信息,节点将自身的BIER信息根据IS-IS协议中的泛洪机制进行泛洪,使得网络中的每个节点接收节点的BIER信息,在BIER信息中携带有BP信息,BP信息用于指示节点的位置,然后根据该节点的BP信息和节点的标识信息确定出节点的转发表项,那么,当每个节点接收到封装目的节点BP信息的报文时,根据目的节点的BIER转发表项转发报文至下一节点,这样,当网络中的每个节点在接收到报文之后,只需要查找报文的目的节点的BP信息所对应的下一节点,并将该报文转发至下一节点,也就是说,本公开实施例,每个节点接收节点的BIER信息,并且针对每个节点确定出BIER转发表项,那么,实现了BIER技术应用到二层网络时控制面信息的传递,可选的,使得报文在转发过程中,通过每个节点上的BIER转发表项就可以对报文进行转发,节省了节点上的资源占用。
这里需要指出的是:以上装置实施例项的描述,与上述方法描述是类似的,具有同方法实施例相同的有益效果,因此不做赘述。对于本公开设
备实施例中未披露的技术细节,本领域的技术人员请参照本公开方法实施例的描述而理解,为节约篇幅,这里不再赘述。
这里需要指出的是:
应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结构或特性包括在本公开的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在一实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。应理解,在本公开的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本公开实施例的实施过程构成任何限定。上述本公开实施例序号仅仅为了描述,不代表实施例的优劣。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个......”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元;既可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分
或全部单元来实现本实施例方案的目的。
另外,在本公开各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(Read Only Memory,ROM)、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本公开上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本公开各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本公开的可选实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以所述权利要求的保护范围为准。
本公开实施例所提供的信息确定方法,该方法应用于基于IS-IS协议的二层网络中,在二层网络在中,IS-IS协议扩展BIER信息,节点将自身的BIER信息根据IS-IS协议中的泛洪机制进行泛洪,使得网络中的每个节点接收节点的BIER信息,在BIER信息中携带有BP信息,BP信息用
于指示节点的位置,然后根据该节点的BP信息和节点的标识信息确定出节点的转发表项,那么,当每个节点接收到封装目的节点BP信息的报文时,根据目的节点的BIER转发表项转发报文至下一节点,这样,当网络中的每个节点在接收到报文之后,只需要查找报文的目的节点的BP信息所对应的下一节点,并将该报文转发至下一节点,也就是说,本公开实施例,每个节点接收节点的BIER信息,并且针对每个节点确定出BIER转发表项,那么,实现了BIER技术应用到二层网络时控制面信息的传递,可选的,使得报文在转发过程中,通过每个节点上的BIER转发表项就可以对报文进行转发,节省了节点上的资源占用。
Claims (12)
- 一种信息确定方法,该方法应用于基于IS-IS协议的二层网络中,所述方法包括:接收来自节点的位索引显示复制BIER信息,其中,所述节点的BIER信息中携带有位位置BP信息,所述BP信息用于指示所述节点的位置;根据所述节点的BP信息和所述节点的标识信息,确定出所述节点的BIER转发表项。
- 根据权利要求1所述的方法,其中,所述根据所述节点的BIER信息中的位位置BP信息和所述节点的标识信息,确定出所述节点的BIER转发表项,包括:根据所述BP信息和所述节点的系统标识System-id,确定出所述节点的BIER转发表项。
- 根据权利要求1所述的方法,其中,所述根据所述节点的BIER信息中的位位置BP信息和所述节点的标识信息,确定出所述节点的BIER转发表项,包括:根据所述BP信息和所述节点的媒体访问控制MAC地址,确定出所述节点的BIER转发表项。
- 根据权利要求1至3中任一项所述的方法,其中,所述方法还用于以下协议中:基于IS-IS协议的最短路径桥SPB协议或者基于IS-IS协议的多链路透明互联TRILL协议。
- 根据权利要求1至3中任一项所述的方法,其中,所述节点的BIER信息还包括以下一项或多项:BIER能力、位串长度BSL、子域识别ID号、集标识SI、安全密钥和路由算法。
- 一种信息确定装置,该装置应用于基于IS-IS协议的二层网络中,所述装置包括:接收模块,设置为接收来自节点的位索引显示复制BIER信息,其中, 所述节点的BIER信息中携带有位位置BP信息,所述BP信息用于指示所述节点的位置;确定模块,设置为根据所述节点的BP信息和所述节点的标识信息,确定出所述节点的BIER转发表项。
- 根据权利要求6所述的装置,其中,所述确定模块具体设置为:根据所述BP信息和所述节点的系统标识System-id,确定出所述节点的BIER转发表项。
- 根据权利要求6所述的装置,其中,所述确定模块具体设置为:根据所述BP信息和所述节点的媒体访问控制MAC地址,确定出所述节点的BIER转发表项。
- 根据权利要求6至8中任一项所述的装置,其中,所述装置还应用于以下协议的二层网络中:基于IS-IS协议的最短路径桥SPB协议或者基于IS-IS协议的多链路透明互联TRILL协议。
- 根据权利要求6至8中任一项所述的装置,其中,所述节点的BIER信息还包括以下一项或多项:BIER能力、位串长度BSL、子域识别ID号、集标识SI、安全密钥和路由算法。
- 根据权利要求6所述的装置,其中,所述装置还包括:发送模块,设置为发送所述装置的BIER信息至所述节点。
- 一种存储介质,所述存储介质包括存储的程序,其中,所述程序运行时执行上述权利要求1至5任一项中所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610580575.4A CN107645446A (zh) | 2016-07-21 | 2016-07-21 | 一种信息确定方法和装置 |
CN201610580575.4 | 2016-07-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018014767A1 true WO2018014767A1 (zh) | 2018-01-25 |
Family
ID=60991910
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/092676 WO2018014767A1 (zh) | 2016-07-21 | 2017-07-12 | 一种信息确定方法、装置及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107645446A (zh) |
WO (1) | WO2018014767A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11150534B2 (en) | 2017-02-09 | 2021-10-19 | Lg Innotek Co., Ltd. | Camera module including liquid lens, and optical device |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726666B (zh) * | 2018-06-27 | 2022-11-18 | 华为技术有限公司 | 一种发送报文的方法和装置 |
CN113595913B (zh) * | 2018-11-02 | 2023-02-14 | 华为技术有限公司 | 报文转发的方法、发送报文的装置和接收报文的装置 |
CN110784411B (zh) | 2019-09-30 | 2021-10-01 | 华为技术有限公司 | 建立bier转发表项的方法、装置和系统 |
CN115314150A (zh) * | 2021-04-21 | 2022-11-08 | 中兴通讯股份有限公司 | 一种报文处理方法、装置、存储介质及电子装置 |
CN115022241B (zh) * | 2022-05-31 | 2023-06-09 | 烽火通信科技股份有限公司 | 一种bier自动配置及管理bsl的方法和装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150085635A1 (en) * | 2013-09-17 | 2015-03-26 | Cisco Technology, Inc. | Migration support for bit indexed explicit replication |
WO2015042156A1 (en) * | 2013-09-17 | 2015-03-26 | Cisco Technology, Inc. | Bit indexed explicit replication |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10218524B2 (en) * | 2013-09-17 | 2019-02-26 | Cisco Technology, Inc. | Bit indexed explicit replication for layer 2 networking |
-
2016
- 2016-07-21 CN CN201610580575.4A patent/CN107645446A/zh active Pending
-
2017
- 2017-07-12 WO PCT/CN2017/092676 patent/WO2018014767A1/zh active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150085635A1 (en) * | 2013-09-17 | 2015-03-26 | Cisco Technology, Inc. | Migration support for bit indexed explicit replication |
WO2015042156A1 (en) * | 2013-09-17 | 2015-03-26 | Cisco Technology, Inc. | Bit indexed explicit replication |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11150534B2 (en) | 2017-02-09 | 2021-10-19 | Lg Innotek Co., Ltd. | Camera module including liquid lens, and optical device |
Also Published As
Publication number | Publication date |
---|---|
CN107645446A (zh) | 2018-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10305696B2 (en) | Group bundling priority dissemination through link-state routing protocol in a network environment | |
US10284469B2 (en) | Progressive MAC address learning | |
WO2018014767A1 (zh) | 一种信息确定方法、装置及存储介质 | |
EP3070877B1 (en) | Evpn inter-subnet multicast forwarding | |
US10003552B2 (en) | Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches | |
US8953590B1 (en) | Layer two virtual private network having control plane address learning supporting multi-homed customer networks | |
US8537816B2 (en) | Multicast VPN support for IP-VPN lite | |
US8446914B2 (en) | Method and system for link aggregation across multiple switches | |
US9100203B2 (en) | IP multicast over multi-chassis trunk | |
US9742693B2 (en) | Dynamic service insertion in a fabric switch | |
US9712334B2 (en) | Efficient multicast topology construction in a routed network | |
US11381883B2 (en) | Dynamic designated forwarder election per multicast stream for EVPN all-active homing | |
US20130003738A1 (en) | Trill based router redundancy | |
US20130003733A1 (en) | Multicast in a trill network | |
CN102137000B (zh) | 一种建立切换组播分发树的方法、装置及系统 | |
US8902794B2 (en) | System and method for providing N-way link-state routing redundancy without peer links in a network environment | |
WO2018214809A1 (zh) | 消息发送方法及装置、存储介质 | |
WO2013139159A1 (zh) | 在网络中转发报文的方法和运营商边缘设备 | |
US9548917B2 (en) | Efficient multicast delivery to dually connected (VPC) hosts in overlay networks | |
WO2014079246A1 (zh) | 组播流转发实现方法和路由网桥(rb) | |
CN104579981B (zh) | 一种组播数据报文转发方法及设备 | |
WO2021093463A1 (zh) | 报文转发的方法、第一网络设备以及第一设备组 | |
US20140269746A1 (en) | Load balancing of logical connections over multi-chassis trunk | |
CN103138955A (zh) | 在第2层网络中使用多个igmp查询器 | |
WO2011140921A1 (zh) | 虚拟专用局域网业务vpls的数据帧的转发方法、设备和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17830401 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17830401 Country of ref document: EP Kind code of ref document: A1 |