WO2018233538A1 - Mpls网络中的报文转发 - Google Patents

Mpls网络中的报文转发 Download PDF

Info

Publication number
WO2018233538A1
WO2018233538A1 PCT/CN2018/091233 CN2018091233W WO2018233538A1 WO 2018233538 A1 WO2018233538 A1 WO 2018233538A1 CN 2018091233 W CN2018091233 W CN 2018091233W WO 2018233538 A1 WO2018233538 A1 WO 2018233538A1
Authority
WO
WIPO (PCT)
Prior art keywords
label
private network
network application
packet
sub
Prior art date
Application number
PCT/CN2018/091233
Other languages
English (en)
French (fr)
Inventor
代莉
Original Assignee
新华三技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新华三技术有限公司 filed Critical 新华三技术有限公司
Priority to EP18821589.1A priority Critical patent/EP3624406B1/en
Priority to JP2019569916A priority patent/JP6999710B2/ja
Priority to US16/624,894 priority patent/US11368392B2/en
Publication of WO2018233538A1 publication Critical patent/WO2018233538A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • H04L45/306Route determination based on the nature of the carried application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4645Details on frame tagging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2475Traffic characterised by specific attributes, e.g. priority or QoS for supporting traffic characterised by the type of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L2012/4629LAN interconnection over a backbone network, e.g. Internet, Frame Relay using multilayer switching, e.g. layer 3 switching

Definitions

  • MPLS Multi-Protocol Label Switching
  • MPLS-based VPN Virtual Private Network
  • CE Customer Edge
  • PE Provider Edge, Service Provider Edge Device
  • P Provider, Service Provider Core Device
  • the P device can perform MPLS label-based packet forwarding without concern for specific applications in the packet.
  • FIG. 1 is a flowchart of a packet forwarding method according to an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of a format of an MPLS packet encapsulated with an MPLS label according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a label according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of another packet forwarding method according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of an MPLS network according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of an MPLS packet device according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of another MPLS packet device according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a PE device/P device according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a message forwarding apparatus according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of another packet forwarding apparatus according to an embodiment of the present invention.
  • first, second, third, etc. may be used to describe various information in the present invention, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as the second information without departing from the scope of the invention.
  • second information may also be referred to as the first information.
  • word "if” as used herein may be interpreted as "when” or "when” or "in response to determination.”
  • a P device in an MPLS-based VPN can perform MPLS label-based packet forwarding, but does not have the capability of identifying a private network application.
  • users expect to visualize private network traffic in the MPLS network. For example, you can use the DSCP (Differentiated Services Code Point) field in the IP (Internet Protocol) message or the EXP field in the MPLS label (public network label and private network label) to identify the private network application. .
  • the P device can identify the private network application by parsing the value of the DSCP field or the EXP field in the IP packet, so that the private network traffic in the MPLS network can be visualized.
  • DSCP Differentiated Services Code Point
  • the DSCP field and the EXP field are usually used to define service priorities to provide differentiated QoS (Quality of Service) services based on different service priorities. This makes it necessary to change the original meaning of the DSCP field and the EXP field, which will affect the QoS service of the network.
  • QoS Quality of Service
  • the embodiment of the present invention provides a packet forwarding method.
  • the method uses the extended label in the MPLS packet to carry the private network application identifier, so that the P device can identify the private network application by parsing the extended label.
  • This method does not affect priority-based QoS processing because it does not occupy the priority field of IP packets or MPLS labels (public network labels and private network labels).
  • FIG. 1 is a flowchart of an embodiment of a packet forwarding method according to the present invention. This embodiment describes a packet forwarding process on an ingress PE device side of an MPLS network.
  • step 101 the ingress PE device allocates a private network application identifier to the received IP packet.
  • the ACL (Access Control List) entry of the private network application may be configured on the PE device in advance.
  • the packet characteristics for example, quintuple information, VPN, and the like
  • the IP packet is a packet of the private network application that the P device needs to visually process.
  • the PE device can allocate a corresponding private network application identifier for the IP packet. See Table 1 for the mapping between ACL entries and private network application identifiers.
  • Each ACL entry represents a private network application, and the corresponding private network application identifier can be determined according to the ACL entry matched by the IP packet.
  • multiple private network applications can be grouped, and one private network application group corresponds to one private network application identifier.
  • all private network applications in a private network application group share a private network application identifier and correspond to the same ACL entry.
  • Step 102 The ingress PE device sends an MPLS packet that carries the private network application identifier in the extended label, which is generated based on the IP packet.
  • the invention carries the private network application identifier in the extended label of the MPLS packet.
  • the extended tag includes three subtags: a first subtag, a second subtag, and a third subtag.
  • the first sub-label is used to indicate that the second sub-label is an extended-use label.
  • the first sub-label can directly adopt an XL (Extension Label) label in the MPLS protocol, and the label value selects a standard extended label value 15 defined in RFC7274 to indicate that the subsequent sub-label is an extended-use label.
  • the second sub-tag is used to indicate that the third sub-tag carries the private network application identifier.
  • the second sub-tag can directly adopt the ESPL (Extended Special-Purpose MPLS Label) tag in the MPLS protocol, and the tag value is selected from the IANA (The Internet Assigned Numbers Authority).
  • the tag value for example, 100, indicates that the third subtag carries the private network application identifier.
  • the third sub-tag is used to carry the private network application identifier allocated in step 101.
  • FIG. 2 is a schematic diagram of a format of an MPLS packet encapsulated by an MPLS label according to an embodiment of the present invention.
  • the IP packet 210 is encapsulated with an extension label 220
  • the private network label 230 and the public network label 240 are encapsulated.
  • the present invention does not limit the package location of the extension tag.
  • the private network label 230 may be encapsulated in the IP packet 210
  • the extended label 220 and the public network label 240 may be encapsulated. That is, the extension tag 220 can be packaged between the private network tag 230 and the public network tag 240.
  • the first sub-label 221, the second sub-label 222, and the third sub-label 223 in the extension label 220 follow the same label structure as the private network label 230 and the public network label 240.
  • FIG. 3 it is a schematic diagram of the label structure.
  • the Label field indicates the tag value and the length is 20 bits.
  • the label value "15" of the first sub-label 221, the label value "100" of the second sub-label 222, and the label value "private network application identifier" in the third sub-label 223 can be stored in respective Label fields.
  • the number of private network applications that can be represented by the Label field of 20 bits in the third sub-label 223 far exceeds the number of private network applications that can be represented by using the priority field (for example, DSCP field or EXP field), thereby making it even more Refine private network applications and provide more traffic statistics for private web applications.
  • the priority field for example, DSCP field or EXP field
  • the extended label of the present invention may further include information of a VPN to which the IP packet belongs.
  • the first five digits of the Label field of the third sub-label may be used to represent the VPN information to which the IP packet belongs, and the last 15 digits of the Label field of the third sub-label may be used to represent the specific private network application information.
  • the P device can determine the VPN to which the private network application belongs based on the VPN information, and can also calculate the private network traffic based on the VPN.
  • FIG. 4 is a flowchart of another embodiment of a packet forwarding method according to the present invention. This embodiment describes a packet forwarding process on the P device side.
  • Step 401 The P device receives the MPLS packet carrying the private network application identifier in the extended label sent by the PE device.
  • Step 402 The P device identifies the private network application based on the private network application identifier in the extended label.
  • the P device forwards MPLS packets based on the public network label in the MPLS packet. Moreover, the P device obtains the label value of the first sub-tag by parsing the extended label in the MPLS packet.
  • the second sub-tag is determined to be an extended-use tag based on the tag value of the first sub-tag
  • the P device continues to acquire the tag value of the second sub-tag.
  • the third sub-tag carries the private network application identifier based on the label value of the second sub-tag
  • the P device continues to obtain the label value of the third sub-tag, and identifies the private network application based on the label value of the third sub-tag.
  • the label value of the first sub-label when the label value of the first sub-label is 15, it indicates that the second sub-label is an extended-use label.
  • the label value of the second sub-tag When the label value of the second sub-tag is 100, it indicates that the third sub-tag carries the private network application identifier.
  • the private network application identifier of the private network application to which the currently received IP packet belongs is 1 and the traffic of the private network application can be counted, that is, the traffic is implemented. Private network traffic is visualized on the P device.
  • the egress PE device strips all the labels of the MPLS packets and forwards the IP packets according to the existing processing mode.
  • the present invention uses the extended label in the MPLS packet to carry the private network application identifier, which no longer occupies the priority field in the IP packet or the MPLS packet, and therefore does not affect the priority-based QoS processing. And scalability and compatibility is better.
  • the MPLS network shown in Figure 5 is used as an example to describe the packet forwarding process.
  • the MPLS network includes CE devices 531-534, PE devices 521 and 522, and P device 510, and carries traffic of VPN 541 and VPN 542.
  • the traffic of the first private network application is the first host in the site 551 whose IP address is IP11, for example, a PC (Personal Computer) (not shown) is sent to the site 554 and the IP address is IP41.
  • the traffic of the second host such as a PC (not shown);
  • the traffic of the second private network application is a third host in the site 551 with an IP address of IP12, such as a PC (not shown), sent to the site 554.
  • the internal IP address is the traffic of the fourth host of IP42, such as a PC (not shown).
  • ACL entries On the PE device 521, two ACL entries (ACL1 and ACL2) are preset.
  • the ACL entry ACL1 adds the quintuple information of the traffic sent from the first host to the second host.
  • the extension label 630 includes three sub-labels, which are a first sub-label, a second sub-label, and a third sub-label from top to bottom. Moreover, the label value of the first sub-label is 15, indicating that the second sub-label is an extended-use label.
  • the second sub-tag has a tag value of 100, indicating that the third sub-tag carries a private network application identifier.
  • the tag value of the third sub-tag is 1, indicating that the PE device 521 assigns the private network application identifier to the packet Packet 1.
  • the PE device 521 forwards the encapsulated MPLS packet (hereinafter referred to as packet MPLS1) to the P device 510.
  • the P device 510 can parse the MPLS label of the packet to obtain the label value 15 from the first sub-label of the extended label 630, so as to determine that the second sub-tag is an extended-use label. Then, the P device 510 continues to determine that the third sub-label carries the private network application identifier according to the label value 100 of the second sub-label, determines the private network application identifier 1 according to the label value 1 of the third sub-label, and collects the private network application identifier according to the The traffic applied to the private network of 1 is hereinafter referred to as traffic Flow1. Then, the P device 510 can remove the public network label 640 of the packet MPLS1 to obtain the packet MPLS1-1, and forward the packet MPLS1-1 to the PE device 522.
  • the PE device 522 can remove the extended label 630 from the received packet MPLS 1-1 to obtain the packet MPLS 1-2, and forward the packet MPLS 1-2 to the CE device 534 based on the private network label 620. Then, the CE device 534 can remove the private network label 620 from the received packet MPLS 1-2 to recover the packet Packet1, and forward the packet Packet1 to the second host.
  • the PE device 521 when the PE device 521 receives the IP packet matching the ACL entry ACL2 (hereinafter referred to as the packet Packet2), the private network application identifier 2 can be allocated to the packet Packet2 by referring to Table 1 above. Then, the PE device 521 can perform MPLS label encapsulation on the packet Packet2 to obtain an MPLS packet (hereinafter referred to as packet MPLS2) as shown in FIG.
  • packet MPLS2 MPLS label encapsulation on the packet Packet2 to obtain an MPLS packet (hereinafter referred to as packet MPLS2) as shown in FIG.
  • the extension tag 730 shown in FIG. 7 has the same structure as the extension tag 630 shown in FIG. 6, except that the tag value of the third subtag of the extension tag 730 in FIG. 7 is 2.
  • the PE device 521 forwards the packet MPLS2 to the P device 510.
  • the P device 510 After receiving the packet MPLS2, the P device 510 determines the private network application corresponding to the private network application identifier 2 according to the label value 2 of the third sub-label, by analyzing the label of the packet MPLS2 (the same as the parsing manner of the packet MPLS1). The traffic of the private network application corresponding to the private network application identifier 2 is counted and recorded as traffic Flow2. Then, the P device 510 can remove the public network label 740 of the message MPLS2 to obtain the message MPLS2-1, and forward the message MPLS2-1 to the PE device 522.
  • the PE device 522 removes the extended label 730 from the received message MPLS 2-1 to obtain the message MPLS 2-2, and forwards the message MPLS 2-2 to the CE device 534 based on the private network label 720. Then, the CE device 534 removes the private network label 720 from the received packet MPLS 2-2 to recover the packet Packet2, and forwards the packet Packet2 to the fourth host.
  • the PE device 521 can also configure VPN information when assigning the private network application identifier. For example, if the extension tag uses the 20-bit field of the Label field of the third sub-label to indicate the VPN and private network application to which the message belongs, the upper 4 bits of the Label field may be used to indicate the VPN to which the private network application belongs, and the lower 16 bits indicate the belonging.
  • Specific private network applications within the VPN As shown in Table 2, the ACL entries ACL1 and ACL2 are configured for the private network application in VPN1 with the ID being "1". The ACL entries ACL3 and ACL4 are for private network applications in VPN2 with the ID "2". Configuration made.
  • the P device 510 can identify the VPN to which the current private network application belongs according to the value of the upper 4 bits of the application identifier, and report the VPN information of the private network application together with the VPN information of the private network application when the management device reports the traffic of the private network application, so that the administrator can obtain the VPN information. More detailed information.
  • the present invention also provides an embodiment of a message forwarding device.
  • the embodiment of the message forwarding device of the present invention can be applied to a PE device/P device.
  • the device embodiment may be implemented by software, or may be implemented by hardware or a combination of hardware and software. Taking the software implementation as an example, as a logical means, the processor of the device is executed by executing a corresponding machine executable instruction in the machine readable storage medium. From the hardware level, as shown in FIG. 8 , which is a hardware structure diagram of the device where the message forwarding device is located, except for the processor 810 and the machine readable storage medium 830 shown in FIG. 8 , where the device is located The device may also include other hardware according to the actual function of the device, and details are not described herein again. Moreover, processor 810 and machine readable storage medium 830 can be interconnected by internal bus 820.
  • the processor 810 when the message forwarding device is applied to a PE device, the processor 810 reads and executes machine executable instructions in the machine readable storage medium 830 to:
  • the processor 810 is further prompted by machine executable instructions:
  • the ACL entry contains the private network application identifier of the private network application and the packet characteristics of the IP packets that belong to the private network application.
  • the private network application identifier included in the ACL entry is allocated to the IP packet.
  • the extension tag includes:
  • the third sub-label is used to carry the private network application identifier.
  • a second sub-label configured to indicate that the third sub-label carries a private network application identifier
  • the first sub-label is used to indicate that the second sub-label is an extended-use label.
  • the extended label further carries information indicating the VPN to which the IP packet belongs.
  • the processor 810 when the message forwarding device is applied to a P device, the processor 810 reads and executes machine executable instructions in the machine readable storage medium 830 to:
  • the private network application to which the MPLS packet belongs is identified based on the private network application identifier in the extended label.
  • the extension tag includes:
  • a third sub-label configured to carry the private network application identifier
  • a second sub-label configured to indicate that the third sub-label carries a private network application identifier
  • a first sub-label configured to indicate that the second sub-label is an extended-use label
  • the processor 810 is also prompted by the machine executable instructions:
  • the private network application to which the MPLS packet belongs is identified based on the label value of the third sub-tag.
  • FIG. 9 is a schematic structural diagram of a message forwarding apparatus according to an embodiment of the present invention.
  • the packet forwarding device is applicable to the PE device of the MPLS network, and includes an allocating unit 901 and a sending unit 902, where: the allocating unit 901 is configured to allocate a private network application identifier to the received IP packet; and the sending unit 902 is configured to send the packet based on The multi-protocol label switching MPLS packet of the private network application identifier is generated by the IP packet, so that the service provider core device P device identifies the private network based on the private network application identifier in the extended label. application.
  • the allocation unit 901 can be configured with an ACL entry for the private network application, where the ACL entry includes the private network application identifier of the private network application and the packet characteristics of the IP packet belonging to the private network application. When the packet feature of the received IP packet matches the ACL entry, the private network application identifier in the ACL entry is allocated to the IP packet.
  • the extended tag includes a first subtag, a second subtag, and a third subtag.
  • the first sub-label is used to indicate that the second sub-label is an extended-use label
  • the second sub-label is used to indicate that the third sub-label carries a private network application identifier
  • the third sub-label is used by the third sub-label. Carrying the private network application identifier.
  • the extended label further carries the VPN information to which the IP packet belongs, so that the P device determines that the private network application belongs to the VPN.
  • FIG. 10 is a schematic structural diagram of a message forwarding apparatus according to another embodiment of the present invention.
  • the packet forwarding device includes a receiving unit 1001 and an identifying unit 1002, wherein: the receiving unit 1001 is configured to receive a multi-protocol label switching MPLS packet carrying a private network application identifier in an extended label sent by a service provider network edge PE device; 1002 is configured to identify a private network application based on a private network application identifier in the extended label.
  • the extended tag includes a first subtag, a second subtag, and a third subtag.
  • the first sub-label is used to indicate that the second sub-label is an extended-use label
  • the second sub-label is used to indicate that the third sub-label carries a private network application identifier; Carrying the private network application identifier.
  • the identifying unit 1002 is specifically configured to acquire a label value of the first sub-label, and when the second sub-tag is determined to be an extended-use label based on a label value of the first sub-label, obtain the second a tag value of the sub tag; when it is determined that the third sub tag carries the private network application identifier based on the tag value of the second sub tag, the private network application is identified based on the tag value of the third sub tag.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the solution of the present invention. Those of ordinary skill in the art can understand and implement without any creative effort.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本公开提供一种 MPLS 网络中的报文转发方法及装置。根据该方法的一个示例,PE 设备为接收到的 IP 报文分配私网应用标识;并发送基于所述IP报文生成的、扩展标签中携带所述私网应用标识的 MPLS 报文。这样,P 设备接收到该 MPLS 报文时,可基于所述扩展标签中的私网应用标识,识别所述MPLS 报文所属的私网应用。

Description

MPLS网络中的报文转发
相关申请的交叉引用
本专利申请要求于2017年6月20日提交的、申请号为201710469318.8、发明名称为“一种私网应用识别方法及装置”的中国专利申请的优先权,该申请的全文以引用的方式并入本文中。
背景技术
MPLS(Multi-Protocol Label Switching,多协议标签交换)是一种骨干网技术。基于MPLS的VPN(Virtual Private Network,虚拟专用网)架构包括CE(Customer Edge,用户网络边缘设备)设备、PE(Provider Edge,服务提供商边缘设备)设备以及P(Provider,服务提供商核心设备)设备。其中,P设备可进行基于MPLS标签的报文转发,而不关心报文中的具体应用。
附图说明
图1是本发明实施例示出的一种报文转发方法流程图。
图2是本发明实施例示出的一种封装MPLS标签后的MPLS报文格式示意图。
图3是本发明实施例示出的一种标签结构示意图。
图4是本发明实施例示出的另一种报文转发方法流程图。
图5是本发明实施例示出的一种MPLS网络示意图。
图6是本发明实施例示出的一种MPLS报文装置示意图。
图7是本发明实施例示出的另一种MPLS报文装置示意图。
图8是本发明实施例示出的PE设备/P设备的结构示意图。
图9是本发明实施例示出的一种报文转发装置的结构示意图。
图10是本发明实施例示出的另一种报文转发装置的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。
应当理解,尽管在本发明可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本发明范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
如背景技术部分所述,基于MPLS的VPN中的P设备可进行基于MPLS标签的报文转发,但不具备识别私网应用的能力。并且,随着用户需求的不断提升,用户期望可视化MPLS网络中的私网流量。例如,可利用IP(Internet Protocol,网际协议)报文中的DSCP(Differentiated Services Code Point,差分服务代码点)字段或MPLS标签(公网标签和私网标签)中的EXP字段来标识私网应用。这样,P设备可通过解析IP报文中的DSCP字段或EXP字段的值来识别私网应用,从而可以实现MPLS网络中私网流量的可视化。
但是,DSCP字段和EXP字段通常用于定义业务优先级,以便基于不同业务优先级提供有差别的QoS(Quality of Service,服务质量)服务。这使得,若改变DSCP字段和EXP字段的原有含义,将影响网络的QoS服务。
本发明实施例提出一种报文转发方法,该方法通过利用MPLS报文中的扩展标签携带私网应用标识,使得P设备可通过解析该扩展标签来识别私网应用。由于不占用IP报文或MPLS标签(公网标签和私网标签)的优先级字段,该方法不影响基于优先级的QoS处理。
参见图1,为本发明报文转发方法的一个实施例流程图,该实施例对MPLS网络的入口PE设备侧的报文转发过程进行描述。
在步骤101,入口PE设备对接收到的IP报文分配私网应用标识。
当用户希望在MPLS网络的P设备上可视化私网应用以能够例如统计私网应用的流量时,可预先在PE设备上配置该私网应用的ACL(Access Control List,访问控制列表)表项。例如,可将该私网应用的IP报文的报文特征(例如,五元组信息、VPN等)添加到针对该私网应用的ACL表项中。这样,当PE设备接收到的IP报文的报文特征匹 配预先配置的ACL表项时,可表示该IP报文是P设备需要可视化处理的私网应用的报文。这时,PE设备可为该IP报文分配对应的私网应用标识。参见表1,为ACL表项与私网应用标识的对应关系。
ACL表项 私网应用标识
ACL 1 1
ACL 2 2
ACL 3 3
表1
其中,每一个ACL表项代表一个私网应用,根据IP报文匹配的ACL表项可确定对应的私网应用标识。当然,也可以对多个私网应用进行分组,并且一个私网应用组对应一个私网应用标识。换言之,一个私网应用组内的所有私网应用共享一个私网应用标识,并对应同一个ACL表项。
步骤102,入口PE设备发送基于所述IP报文生成的、扩展标签中携带所述私网应用标识的MPLS报文。
本发明将私网应用标识携带在MPLS报文的扩展标签中。该扩展标签包括三个子标签:第一子标签、第二子标签、第三子标签。其中,第一子标签用于指示第二子标签为扩展用途标签。例如,该第一子标签可直接采用MPLS协议中的XL(Extension Label,扩展标签)标签,并且标签值选取RFC7274中定义的标准扩展标签值15,来表示后续子标签为扩展用途标签。第二子标签用于指示第三子标签携带私网应用标识。例如,该第二子标签可直接采用MPLS协议中的ESPL(Extended Special-Purpose MPLS Label,扩展特殊用途标签)标签,并且标签值选取IANA(The Internet Assigned Numbers Authority,互联网数字分配机构)中未分配的标签值、例如100,来表示第三子标签携带的是私网应用标识。第三子标签用于携带步骤101中分配的私网应用标识。
参见图2,为本发明实施例示出的一种封装MPLS标签后的MPLS报文格式示意图。该示意图中,对IP报文210封装扩展标签220,并封装私网标签230和公网标签240。这里说明一下,本发明并不限定扩展标签的封装位置。例如,可先对IP报文210封装私网标签230,再封装扩展标签220和公网标签240。也就是说,扩展标签220可封装在私网标签230和公网标签240之间。
本发明中扩展标签220中的第一子标签221、第二子标签222、第三子标签223遵循 与私网标签230、公网标签240相同的标签结构。参见图3,为标签结构示意图。其中,Label字段表示标签值,长度为20比特位。前述第一子标签221的标签值“15”、第二子标签222的标签值“100”、第三子标签223中的标签值“私网应用标识”均可存放在各自的Label字段中。可见,第三子标签223中20比特位的Label字段所能表示的私网应用数量,远远超过利用优先级字段(例如DSCP字段或EXP字段)所能表示的私网应用数量,从而可更加细化私网应用并提供更多私网应用的流量统计。
此外,本发明的扩展标签中还可以包括IP报文所属VPN的信息。例如,可利用第三子标签的Label字段的前5位表示IP报文所属VPN信息,利用第三子标签的Label字段的后15位表示具体的私网应用信息。这样,可以使得P设备可基于VPN信息确定私网应用所属VPN,进而也可以基于VPN统计私网流量。
参见图4,为本发明报文转发方法的另一个实施例流程图,该实施例对P设备侧的报文转发过程进行描述。
步骤401,P设备接收PE设备发送的扩展标签中携带私网应用标识的MPLS报文。
步骤402,P设备基于所述扩展标签中的私网应用标识识别私网应用。
P设备基于MPLS报文中的公网标签转发MPLS报文。并且,P设备通过解析MPLS报文内的扩展标签来获取第一子标签的标签值。当基于第一子标签的标签值确定第二子标签为扩展用途标签时,P设备继续获取第二子标签的标签值。当基于第二子标签的标签值确定第三子标签携带私网应用标识时,P设备继续获取第三子标签的标签值,并基于第三子标签的标签值识别私网应用。
例如,当第一子标签的标签值为15时,表示第二子标签为扩展用途标签。当第二子标签的标签值为100时,表示第三子标签携带私网应用标识。当获取到该第三子标签的标签值为例如1时,确定当前接收到的IP报文所属私网应用的私网应用标识为1,进而可统计该私网应用的流量,也即实现了私网流量在P设备上的可视化。
当MPLS报文到达MPLS网络的出口PE设备时,出口PE设备剥离该MPLS报文的所有标签,并按照现有处理方式对IP报文进行转发,在此不再赘述。
从上述描述可以看出,本发明利用MPLS报文中的扩展标签携带私网应用标识,不再占用IP报文或MPLS报文中的优先级字段,因此,不会影响基于优先级的QoS处理,并且扩展性和兼容性更好。
现以图5所示MPLS网络为例,介绍报文转发过程。
该MPLS网络包括CE设备531~534、PE设备521和522以及P设备510,并承载了VPN 541和VPN 542的流量。
假设,需要在P设备510上实现对VPN 541内的第一私网应用和第二私网应用的流量统计。其中,第一私网应用的流量为站点(Site)551内IP地址为IP11的第一主机、例如PC(Personal Computer,个人电脑)(图中未示出)发往站点554内IP地址为IP41的第二主机、例如PC(图中未示出)的流量;第二私网应用的流量为站点551内IP地址为IP12的第三主机、例如PC(图中未示出)发往站点554内IP地址为IP42的第四主机、例如PC(图中未示出)的流量。
在PE设备521上预设两条ACL表项(ACL1和ACL2),其中,ACL表项ACL1中添加从第一主机发往第二主机的流量的五元组信息,ACL表项ACL2中添加第三主机发往第四主机的流量的五元组信息。
当PE设备521接收到匹配ACL表项ACL1的IP报文(以下记为报文Packet1)时,参考前述表1为Packet1分配私网应用标识1。然后,PE设备521对报文Packet1进行MPLS标签封装,参见图6。其中,扩展标签630包括三个子标签,从上到下依次是第一子标签、第二子标签、第三子标签。并且,第一子标签的标签值为15,表示第二子标签为扩展用途标签。第二子标签的标签值为100,表示第三子标签携带私网应用标识。第三子标签的标签值为1,表示PE设备521为报文Packet 1分配的私网应用标识。PE设备521将封装后的MPLS报文(以下记为报文MPLS1)转发给P设备510。
P设备510接收到报文MPLS1后,可解析该报文的MPLS标签,以从扩展标签630的第一子标签中获取标签值15,从而确定第二子标签为扩展用途标签。接着,P设备510继续根据第二子标签的标签值100确定第三子标签携带私网应用标识,根据第三子标签的标签值1确定私网应用标识1,并据此统计私网应用标识为1的私网应用的流量,以下记为流量Flow1。然后,P设备510可去除报文MPLS1的公网标签640获得报文MPLS1-1,并将报文MPLS1-1转发给PE设备522。
PE设备522可对接收到的报文MPLS1-1去除扩展标签630以得到报文MPLS1-2,并基于私网标签620将报文MPLS1-2转发给CE设备534。然后,CE设备534可对接收到的报文MPLS1-2去除私网标签620以恢复报文Packet1,并将报文Packet1转发给第二主机。
同理,当PE设备521接收到匹配ACL表项ACL2的IP报文(以下记为报文Packet2) 时,可参考前述表1为报文Packet2分配私网应用标识2。然后,PE设备521可对报文Packet2进行MPLS标签封装以得到如图7所示的MPLS报文(以下记为报文MPLS2)。图7所示的扩展标签730与图6所示的扩展标签630的结构相同,只是图7中扩展标签730的第三子标签的标签值为2。PE设备521将报文MPLS2转发给P设备510。
P设备510接收到报文MPLS2后,通过解析报文MPLS2的标签(与前述报文MPLS1的解析方式相同),根据第三子标签的标签值2确定私网应用标识2对应的私网应用,并统计私网应用标识2对应的私网应用的流量,记为流量Flow2。然后,P设备510可去除报文MPLS2的公网标签740以得到报文MPLS2-1,并将报文MPLS2-1转发给PE设备522。
PE设备522对接收到的报文MPLS2-1去除扩展标签730以得到报文MPLS2-2,并基于私网标签720将报文MPLS2-2转发给CE设备534。然后,由CE设备534对接收到的报文MPLS2-2去除私网标签720以恢复报文Packet2,并将报文Packet2转发给第四主机。
进一步地,若希望在P设备510上实现VPN的可视化,PE设备521可在分配私网应用标识时还配置VPN信息。例如,在扩展标签利用第三子标签的Label字段的20比特位表示报文所属VPN和私网应用的情况下,可利用Label字段的高4位表示私网应用所属VPN,低16位表示所属VPN内的具体私网应用。如表2所示,ACL表项ACL1和ACL2是针对标识为“1”的VPN1内的私网应用进行的配置,ACL表项ACL3和ACL4是针对标识为“2”的VPN2内的私网应用进行的配置。
Figure PCTCN2018091233-appb-000001
表2
P设备510可根据应用标识的高4位的值识别当前私网应用所属VPN,并在向管理设备上报私网应用的流量时,将该私网应用的VPN信息一同上报,以便管理者获取到更详细的信息。同时,P设备510也可以基于VPN统计私网流量。例如,前述VPN1的流量=流量Flow1+流量Flow2,提供更加多样的统计方式。
与前述报文转发方法的实施例相对应,本发明还提供了报文转发装置的实施例。
本发明报文转发装置的实施例可以应用在PE设备/P设备上。装置实施例可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。以软件实现为例,作为一个逻辑意义上的装置,是通过所在设备的处理器运行机器可读存储介质中对应的机器可执行指令形成的。从硬件层面而言,如图8所示,为本发明报文转发装置所在设备的一种硬件结构图,除了图8所示的处理器810以及机器可读存储介质830之外,该装置所在的设备通常根据该设备的实际功能还可以包括其他硬件,对此不再赘述。此外,处理器810与机器可读存储介质830可通过内部总线820相互连接。
在一个示例中,当该报文转发装置应用于PE设备上时,处理器810通过读取并执行机器可读存储介质830中的机器可执行指令以:
对接收到的IP报文分配私网应用标识;
发送基于该IP报文生成的、扩展标签中携带所述私网应用标识的MPLS报文。
在一个示例中,当对接收到的所述IP报文分配所述私网应用标识时,处理器810还被机器可执行指令促使:
配置针对私网应用的ACL表项,其中,该ACL表项包含表示该私网应用的私网应用标识以及属于该私网应用的IP报文的报文特征;
当接收到的IP报文的报文特征匹配该ACL表项时,为该IP报文分配该ACL表项中包含的私网应用标识。
在一个示例中,该扩展标签包括:
第三子标签,用于携带私网应用标识,
第二子标签,用于指示第三子标签携带有私网应用标识,
第一子标签,用于指示第二子标签为扩展用途标签。
在一个示例中,扩展标签中还携带表示该IP报文所属VPN的信息。
在一个示例中,当该报文转发装置应用于P设备上时,处理器810通过读取并执行机器可读存储介质830中的机器可执行指令以:
接收PE设备发送的扩展标签中携带私网应用标识的多协议标签交换MPLS报文;
基于扩展标签中的私网应用标识识别MPLS报文所属的私网应用。
在一个示例中,该扩展标签包括:
第三子标签,用于携带所述私网应用标识,
第二子标签,用于指示所述第三子标签携带有私网应用标识;
第一子标签,用于指示所述第二子标签为扩展用途标签,
在基于扩展标签中的私网应用标识识别私网应用时,处理器810还被机器可执行指令促使:
获取第一子标签的标签值;
当基于第一子标签的标签值确定第二子标签为扩展用途标签时,获取第二子标签的标签值;
当基于第二子标签的标签值确定第三子标签携带私网应用标识时,基于第三子标签的标签值识别MPLS报文所属的私网应用。
请参考图9,为本发明一个实施例中的报文转发装置的结构示意图。该报文转发装置可应用于MPLS网络的PE设备,包括分配单元901和发送单元902,其中:分配单元901用于对接收到的IP报文分配私网应用标识;发送单元902用于发送基于所述IP报文生成的、扩展标签中携带所述私网应用标识的多协议标签交换MPLS报文,以使服务提供商核心设备P设备基于所述扩展标签中的私网应用标识识别私网应用。
其中,所述分配单元901可配置针对私网应用的访问控制列表ACL表项,该ACL表项包括表示该私网应用的私网应用标识和属于该私网应用的IP报文的报文特征;当所述接收到的IP报文的报文特征匹配所述ACL表项时,为所述IP报文分配该ACL表项中的私网应用标识。
根据一个示例,所述扩展标签包括第一子标签、第二子标签和第三子标签。其中,所述第一子标签用于指示所述第二子标签为扩展用途标签,所述第二子标签用于指示所述第三子标签携带私网应用标识,所述第三子标签用于携带所述私网应用标识。
根据另一个示例,所述扩展标签还携带所述IP报文所属VPN信息,以使所述P设备确定所述私网应用所属VPN。
请参考图10,为本发明另一个实施例中的报文转发装置的结构示意图。该报文转发装置包括接收单元1001和识别单元1002,其中:接收单元1001用于接收服务提供商网络边缘PE设备发送的扩展标签中携带私网应用标识的多协议标签交换MPLS报文;识别单元1002用于基于所述扩展标签中的私网应用标识识别私网应用。
根据一个示例,所述扩展标签包括第一子标签、第二子标签和第三子标签。其中,所述第一子标签用于指示所述第二子标签为扩展用途标签,所述第二子标签用于指示所述第三子标签携带私网应用标识;所述第三子标签用于携带所述私网应用标识。
其中,所述识别单元1002具体用于获取所述第一子标签的标签值;当基于所述第一子标签的标签值确定所述第二子标签为扩展用途标签时,获取所述第二子标签的标签值;当基于所述第二子标签的标签值确定所述第三子标签携带私网应用标识时,基于所述第三子标签的标签值识别私网应用。
上述装置中各个单元的功能和作用的实现过程具体详见上述方法中对应步骤的实现过程,在此不再赘述。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本发明方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明保护的范围之内。

Claims (15)

  1. 一种报文转发方法,包括:
    服务提供商网络边缘PE设备对接收到的互联网协议IP报文分配私网应用标识;
    所述PE设备发送基于所述IP报文生成的、扩展标签中携带所述私网应用标识的多协议标签交换MPLS报文。
  2. 如权利要求1所述的方法,其特征在于,对接收到的所述IP报文分配所述私网应用标识,包括:
    所述PE设备配置针对私网应用的访问控制列表ACL表项,其中,所述ACL表项包含表示该私网应用的私网应用标识以及属于该私网应用的IP报文的报文特征;
    当所述接收到的IP报文的报文特征匹配所述ACL表项时,所述PE设备为所述IP报文分配所述ACL表项中包含的所述私网应用标识。
  3. 如权利要求1所述的方法,其特征在于,所述扩展标签包括:
    第三子标签,用于携带所述私网应用标识,
    第二子标签,用于指示所述第三子标签携带有私网应用标识,
    第一子标签,用于指示所述第二子标签为扩展用途标签。
  4. 如权利要求1所述的方法,其特征在于,所述扩展标签中还携带表示所述IP报文所属VPN的信息。
  5. 一种报文转发方法,包括:
    服务提供商核心设备P设备接收服务提供商网络边缘PE设备发送的扩展标签中携带私网应用标识的多协议标签交换MPLS报文;
    所述P设备基于所述扩展标签中的所述私网应用标识识别所述MPLS报文所属的私网应用。
  6. 如权利要求5所述的方法,其特征在于,
    所述扩展标签包括:
    第三子标签,用于携带所述私网应用标识,
    第二子标签,用于指示所述第三子标签携带有私网应用标识;
    第一子标签,用于指示所述第二子标签为扩展用途标签,
    基于所述扩展标签中的所述私网应用标识识别所述私网应用,包括:
    所述P设备获取所述第一子标签的标签值;
    当基于所述第一子标签的标签值确定所述第二子标签为扩展用途标签时,所述P设备获取所述第二子标签的标签值;
    当基于所述第二子标签的标签值确定所述第三子标签携带私网应用标识时,所述P设备基于所述第三子标签的标签值识别所述MPLS报文所属的私网应用。
  7. 一种报文转发装置,应用于服务提供商网络边缘PE设备,包括:
    分配单元,用于对接收到的IP报文分配私网应用标识;
    发送单元,用于发送基于所述IP报文生成的、扩展标签中携带所述私网应用标识的多协议标签交换MPLS报文。
  8. 如权利要求7所述的装置,其特征在于:所述分配单元具体用于:
    配置针对私网应用的访问控制列表ACL表项,其中,所述ACL表项包含表示该私网应用的私网应用标识以及属于该私网应用的IP报文的报文特征;
    当所述接收到的IP报文的报文特征匹配所述ACL表项时,为所述IP报文分配所述ACL表项中包含的所述私网应用标识。
  9. 如权利要求7所述的装置,其特征在于,所述扩展标签包括:
    第三子标签,用于携带所述私网应用标识,
    第二子标签,用于指示所述第三子标签携带私网应用标识,
    第一子标签,用于指示所述第二子标签为扩展用途标签。
  10. 如权利要求7所述的装置,其特征在于,所述扩展标签还携带表示所述IP报文所属VPN的信息。
  11. 一种报文转发装置,应用于服务提供商核心设备P设备,包括:
    接收单元,用于接收服务提供商网络边缘PE设备发送的扩展标签中携带私网应用标识的多协议标签交换MPLS报文;
    识别单元,用于基于所述扩展标签中的所述私网应用标识识别所述MPLS报文所属的私网应用。
  12. 如权利要求11所述的装置,其特征在于,
    所述扩展标签包括:
    第三子标签,用于携带所述私网应用标识,
    第二子标签,用于指示所述第三子标签携带私网应用标识,
    第一子标签,用于指示所述第二子标签为扩展用途标签;
    所述识别单元,具体用于:
    获取所述第一子标签的标签值;
    当基于所述第一子标签的标签值确定所述第二子标签为扩展用途标签时,获取所述第二子标签的标签值;
    当基于所述第二子标签的标签值确定所述第三子标签携带私网应用标识时,基于所述第三子标签的标签值识别所述MPLS报文所属的私网应用。
  13. 一种报文转发装置,应用于服务提供商网络边缘PE设备,包括:
    非暂时性机器可读存储介质,存储有机器可执行指令;
    处理器,用于执行所述机器可执行指令,以
    对接收到的IP报文分配私网应用标识;
    发送基于所述IP报文生成的、扩展标签中携带所述私网应用标识的多协议标签交换MPLS报文。
  14. 如权利要求13所述的装置,其特征在于,在对接收到的所述IP报文分配所述私网应用标识时,所述机器可执行指令促使所述处理器:
    配置针对私网应用的访问控制列表ACL表项,其中,所述ACL表项包含表示该私网应用的私网应用标识以及属于该私网应用的IP报文的报文特征;
    当所述接收到的IP报文的报文特征匹配所述ACL表项时,为所述IP报文分配所述ACL表项中包含的所述私网应用标识。
  15. 一种报文转发装置,应用于服务提供商核心设备P设备,包括:
    非暂时性机器可读存储介质,存储有机器可执行指令;
    处理器,用于执行所述机器可执行指令,以
    接收服务提供商网络边缘PE设备发送的扩展标签中携带私网应用标识的多协议标签交换MPLS报文;
    基于所述扩展标签中的所述私网应用标识,识别所述MPLS报文所属的私网应用。
PCT/CN2018/091233 2017-06-20 2018-06-14 Mpls网络中的报文转发 WO2018233538A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP18821589.1A EP3624406B1 (en) 2017-06-20 2018-06-14 Packet forwarding in mpls network
JP2019569916A JP6999710B2 (ja) 2017-06-20 2018-06-14 Mplsネットワークにおけるパケット転送
US16/624,894 US11368392B2 (en) 2017-06-20 2018-06-14 Forwarding packet in MPLS network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710469318.8 2017-06-20
CN201710469318.8A CN108259338B (zh) 2017-06-20 2017-06-20 一种私网应用识别方法及装置

Publications (1)

Publication Number Publication Date
WO2018233538A1 true WO2018233538A1 (zh) 2018-12-27

Family

ID=62720927

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/091233 WO2018233538A1 (zh) 2017-06-20 2018-06-14 Mpls网络中的报文转发

Country Status (5)

Country Link
US (1) US11368392B2 (zh)
EP (1) EP3624406B1 (zh)
JP (1) JP6999710B2 (zh)
CN (1) CN108259338B (zh)
WO (1) WO2018233538A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112769738B (zh) * 2019-11-05 2023-09-12 中兴通讯股份有限公司 DetNet数据包处理方法及装置
CN110868352B (zh) * 2019-11-14 2022-04-15 迈普通信技术股份有限公司 一种私网应用识别系统、方法及sdn控制器、p设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101471880A (zh) * 2007-12-27 2009-07-01 华为技术有限公司 数据处理方法与系统、路由装置
CN102143030A (zh) * 2011-01-07 2011-08-03 华为数字技术有限公司 一种发送转发信息的方法及设备
CN103209124A (zh) * 2013-03-05 2013-07-17 华为技术有限公司 报文处理方法、装置及系统

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7698455B2 (en) * 2003-08-01 2010-04-13 Foundry Networks, Inc. Method for providing scalable multicast service in a virtual private LAN service
US8270413B2 (en) * 2005-11-28 2012-09-18 Cisco Technology, Inc. Method and apparatus for self-learning of VPNS from combination of unidirectional tunnels in MPLS/VPN networks
CN1866868B (zh) * 2006-01-18 2010-10-06 华为技术有限公司 一种多协议标签交换网络流量管理系统、方法及设备
JPWO2009051179A1 (ja) 2007-10-18 2011-03-03 アイピー インフュージョン インコーポレイテッド キャリアネットワーク接続装置およびキャリアネットワーク
US9245626B2 (en) * 2012-10-26 2016-01-26 Cisco Technology, Inc. System and method for packet classification and internet protocol lookup in a network environment
US9559941B2 (en) * 2013-07-01 2017-01-31 Futurewei Technologies, Inc. Locally protecting service in a label switched path network
US9942053B2 (en) * 2013-09-17 2018-04-10 Cisco Technology, Inc. Bit indexed explicit replication using internet protocol version 6
US9444677B2 (en) * 2013-10-18 2016-09-13 Cisco Technology, Inc. Scalable edge node protection using IPv6 segment routing extension header
JP6364761B2 (ja) * 2013-12-18 2018-08-01 日本電気株式会社 ネットワークシステムおよび通信方法
US9525622B2 (en) * 2014-03-17 2016-12-20 Telefonaktiebolaget Lm Ericsson (Publ) Label stack encoding and processing to enable OAM procedures for service segments in segment routed (SR) networks
US9762483B2 (en) * 2015-03-06 2017-09-12 Telefonaktiebolaget Lm Ericsson (Publ) BNG / subscriber management integrated, FIB based, per subscriber, opt-in opt-out, multi application service chaining solution via subscriber service chaining nexthop and meta IP lookup
CN106059887A (zh) * 2016-06-30 2016-10-26 杭州华三通信技术有限公司 一种vpn流量监控方法及装置
US10476817B2 (en) * 2017-05-31 2019-11-12 Juniper Networks, Inc. Transport LSP setup using selected fabric path between virtual nodes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101471880A (zh) * 2007-12-27 2009-07-01 华为技术有限公司 数据处理方法与系统、路由装置
CN102143030A (zh) * 2011-01-07 2011-08-03 华为数字技术有限公司 一种发送转发信息的方法及设备
CN103209124A (zh) * 2013-03-05 2013-07-17 华为技术有限公司 报文处理方法、装置及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3624406A4 *

Also Published As

Publication number Publication date
US20200136961A1 (en) 2020-04-30
US11368392B2 (en) 2022-06-21
JP6999710B2 (ja) 2022-01-19
EP3624406A1 (en) 2020-03-18
CN108259338B (zh) 2021-06-29
EP3624406B1 (en) 2022-12-21
CN108259338A (zh) 2018-07-06
JP2020524452A (ja) 2020-08-13
EP3624406A4 (en) 2020-04-22

Similar Documents

Publication Publication Date Title
CN111095901B (zh) 服务操作链接方法、设备、系统、以及可读存储介质
CN112422393B (zh) 可扩展虚拟局域网报文发送方法、计算机设备和可读介质
EP3624408B1 (en) Method for generating forwarding table entry, controller, and network device
CN107733799B (zh) 一种报文传输方法和装置
CN105871721B (zh) 一种段路由处理方法、处理装置及发送装置
EP2230800A1 (en) Method for obtaining virtual private network label and autonomous system boundary router device
KR20210024649A (ko) 네트워크 슬라이스 제어 방법 및 장치 그리고 컴퓨터 판독 가능한 저장 매체
CN107046506B (zh) 一种报文处理方法、流分类器和业务功能实例
US20140059178A1 (en) Cloud resource placement using placement pivot in physical topology
EP3531635B1 (en) Message processing method and network device
US11588730B2 (en) Label management method, data stream processing method, and device
CN105706044A (zh) 基于排名的工作保持调度器
WO2019165888A1 (zh) 一种利用统一sr标签栈进行报文处理的方法及装置
US10084702B2 (en) Packet processing method and system, and device
EP2928128A1 (en) Ip data package transmitting method and label switching router
WO2015101066A1 (zh) 建立服务质量预留的方法及节点
US11805049B2 (en) Communication method and communications device
WO2012088901A1 (zh) 一种虚拟局域网的分配方法以及相关装置
WO2015000384A1 (zh) 一种标签处理的方法及装置
US20120044950A1 (en) Allocation of route targets based on service
WO2018233538A1 (zh) Mpls网络中的报文转发
CN107579988B (zh) 配置安全策略的方法和装置
US9749240B2 (en) Communication system, virtual machine server, virtual network management apparatus, network control method, and program
KR101302410B1 (ko) 패킷 플러드 제어 방법 및 라우터
EP3725045A1 (en) Systems and methods for providing i-sid translation in spb networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18821589

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019569916

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2018821589

Country of ref document: EP

Effective date: 20191212

NENP Non-entry into the national phase

Ref country code: DE