WO2020001389A1 - 一种避免环路的通信方法、设备和系统 - Google Patents
一种避免环路的通信方法、设备和系统 Download PDFInfo
- Publication number
- WO2020001389A1 WO2020001389A1 PCT/CN2019/092444 CN2019092444W WO2020001389A1 WO 2020001389 A1 WO2020001389 A1 WO 2020001389A1 CN 2019092444 W CN2019092444 W CN 2019092444W WO 2020001389 A1 WO2020001389 A1 WO 2020001389A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- interface
- data packet
- identifier
- entry
- fault state
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/18—Loop-free operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/741—Routing in networks with a plurality of addressing schemes, e.g. with both IPv4 and IPv6
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup; Address filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
Definitions
- the present application relates to the field of communications, and in particular, to a communication method, device, and system to avoid loops.
- the Ethernet Virtual Private Network provides an all-active mode.
- the multi-active mode when a device is multi-homed to multiple provider edges , PE) device, the multiple PE devices can forward traffic to the device.
- PE provider edges
- the foregoing multi-active mode may also be referred to as a dual-active mode, and the foregoing multi-homing may also be referred to as a dual-homed.
- CE device CE1 is dual-homed to PE devices PE1 and PE2, and PE1 and PE2 are in an active-active mode.
- PE2 receives the packet (packet) from PE3 to be sent to CE1
- PE2 sends a packet to PE1
- PE1 receives the packet sent by PE2, PE1
- PE2 sends a data packet to PE2, and thus the data packet is sent back to PE2, causing a loop problem.
- the embodiments of the present application provide a communication method, device, and system, which are helpful to avoid causing loop problems.
- an embodiment of the present application provides a communication method.
- the first PE device sends a first identifier to the second PE device via the first interface, and then the first PE device receives the data packet including the first identifier sent by the second PE device via the first interface, and then the first PE device determines An identifier indicates that the associated second interface is in a fault state.
- the first PE device avoids sending a data packet to the second PE device via the first interface, where the second interface is the first PE device for Interface for connecting CE equipment.
- the first PE device based on the identification of the first identifier in the data packet, avoids returning the data packet to the second PE device when the local interface connected to the CE device is in a fault state, thereby avoiding A transmission loop problem between PE1 and PE2.
- the first PE device saves the first entry including the first identifier and the identifier of the second entry, but the first entry does not include the identifier of the first interface, and the first PE device may The identifier and the first entry determine the second interface, and further determine that the second interface is in a fault state.
- the first entry does not include the identifier of the first interface, and the interface determined by the first PE device according to the first entry and the first identifier includes only the local interface connected to the CE device, and does not include the non-local interface connected to the second PE device. Avoid sending data packets to the second PE device via the non-local interface.
- the first PE device performs an operation associated with the first identifier.
- the operation includes: finding a second entry in the media access control MAC forwarding table that matches the destination MAC address of the data packet, determining the second interface according to the identifier of the interface used to connect the CE device in the second entry, and determining the first The second interface is in a fault state.
- the identity of the local interface connected to the CE device is searched in the matching second entry, and the identity of the non-local interface connected to the PE device is not found, which avoids sending to the second PE device via the non-local interface. data pack.
- the manner in which the first PE device avoids sending a data packet to the second PE device includes dropping the data packet.
- the communication method of the first aspect is applied to an Ethernet virtual private network EVPN based on Internet Protocol version 6 segment routing SRv6, and the first identifier is carried in the SRv6-VPN SID attribute. Therefore, a new type of SRv6-VPN SID attribute is used to solve the loop problem in the SRv6EVPN dual-active mode.
- an embodiment of the present application provides a communication device, and the communication device may be a first PE device.
- the first PE device includes a first interface for connecting a second PE device, a second interface for connecting a CE device, and a processor.
- the processor is configured to send a first identifier to the second PE device via the first interface, receive a data packet sent by the second PE device via the first interface, determine that the second interface associated with the first identifier in the data packet is in a fault state, and In response to the first PE device determining that the second interface is in a fault state, avoiding sending a data packet to the second PE device via the first interface.
- the first PE device includes a memory for storing a first entry.
- the first entry includes a first identifier and an identifier of the second interface, but does not include an identifier of the first interface.
- the processor is configured to determine the second interface according to the first identifier and the first entry in the data packet.
- the processor is configured to perform an operation associated with the first identifier.
- the operation includes finding a second entry in the MAC forwarding table that matches the destination MAC address of the packet, determining the second interface according to the identifier of the interface used to connect the CE device in the second entry, and determining that the second interface is in a fault state. .
- the processor is configured to drop the data packet.
- a manner in which the processor avoids sending a data packet to the second PE device via the first interface includes dropping the data packet.
- the first PE device is applied in SRv6EVPN, and the first identifier is carried in the SRv6-VPN SID attribute.
- an embodiment of the present application provides a communication system including a first PE device and a second PE device.
- the first PE device is configured to implement the first aspect and the communication method provided by any one of the first aspect's optional solutions.
- the second PE device is configured to receive a first identifier sent by the first PE device, and send a data packet including the first identifier to the first PE device.
- the second PE device is configured to determine that the third interface is in a fault state, and in response to determining that the third interface is in a fault state, send the data packet including the first identifier to the first PE device, and the third interface is the second PE Interface used by the device to connect CE equipment.
- the communication system is applied to SRv6EVPN, and the first identifier is carried in the SRv6-VPN SID attribute.
- an embodiment of the present application provides a communication device.
- the communication device may be a first PE device.
- the first PE device includes a communication device for implementing the first aspect and any one of the first optional solutions.
- the unit of method is not limited to.
- an embodiment of the present application provides a communication device.
- the communication device may be a first PE device.
- the first PE device includes a processor and a memory storing computer program instructions.
- the processor is configured to execute the computer program instructions to cause the first PE device to execute the first aspect and the communication method provided by any one of the first aspects of the first aspect.
- an embodiment of the present application provides a computer storage medium for storing computer program instructions.
- the communication device is caused to execute the first aspect and the communication method provided by any one of the first aspect's optional solutions.
- an embodiment of the present application provides a computer program product including computer program instructions.
- the communication device is caused to execute the first aspect and the communication method provided by any one of the first aspects.
- FIG. 1 is a schematic diagram of an application scenario
- FIG. 2 is a schematic diagram of an SRv6EVPN dual-active scenario according to an embodiment of the present application
- FIG. 3 is a flowchart of a communication method according to an embodiment of the present application.
- FIG. 4 is a schematic diagram of an SRv6EVPN dual-active scenario provided by an embodiment of the present application.
- FIG. 5 is a schematic diagram of an entry in a MAC forwarding table provided by an embodiment of the present application.
- FIG. 6 is a flowchart of a communication method according to an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of a communication device 700 according to an embodiment of the present application.
- FIG. 8 is a schematic structural diagram of a communication device 800 according to an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a communication device 900 according to an embodiment of the present application.
- FIG. 10 is a schematic structural diagram of a communication device 1000 according to an embodiment of the present application.
- FIG. 11 is a schematic structural diagram of a communication system 1100 according to an embodiment of the present application.
- SRv6 Internet Protocol version 6 segment routing inserts a segment routing header (SRH) into an IPv6 packet, and includes an IPv6 address list and an index to the IPv6 address list in the SRH
- the segment end nodes on the data packet forwarding path look up IPv6 addresses one by one based on the index, and update the destination address of the data packet with the found IPv6 address to achieve forwarding.
- the destination address of the data packet is an IPv6 address.
- the IPv6 address in SRv6 can be used as a segment identifier (SID).
- SRv6EVPN refers to SRv6 based EVPN.
- a virtual private line service is a point-to-point Layer 2 virtual private network (VPN) service.
- EVPN VPWS is a VPWS implemented in EVPN.
- EVPN VPWS can provide single-active multi-homing or all-active multi-homing capabilities.
- Access link is a physical or logical link used to connect CE equipment and PE equipment.
- An Ethernet virtual private line (EVPL) is used to provide a point-to-point Ethernet connection between a pair of ACs.
- VPWS is implemented based on EVPL.
- Ethernet segment If a CE belongs to two or more PEs, this group of CEs is used to access the Ethernet link of the PE. For example, multiple ACs belong to one ES and are used for The only identifier that identifies the ES is the Ethernet segment identifier (ESI).
- ESI Ethernet segment identifier
- Ethernet tag identifier (Ethernet tag identifier) is used to identify a specific broadcast domain.
- a broadcast domain corresponds to a virtual local area network (VLAN).
- VLAN virtual local area network
- a local interface refers to an interface that a PE device connects to a CE device or AC without passing through other PE devices.
- interfaces 204 and 205 in FIG. 2 are local interfaces, and interfaces 207 and 208 are not local interfaces.
- the interface of the PE device connected to the CE device or AC refers to the interface connected to the CE device or AC without passing through other PE devices.
- an interface used by a PE device to send a data packet to another PE device or a CE device may also be referred to as an outbound interface
- a local interface on the PE device to send a data packet to the CE device or the AC may also be referred to as a local outbound interface.
- the interface in this application may be a physical port or a logical port on a physical port.
- FIG. 2 is a schematic diagram of an SRv6EVPN dual-active scenario provided by an embodiment of the present application.
- the network shown in Figure 2 can provide a virtual private line service VPWS.
- the network shown in FIG. 2 includes CE devices CE1 and CE2, and PE devices PE1, PE2, and PE3.
- PE1, PE2, and PE3 are connected to CE1, CE1, and CE2 through access links AC201, AC202, and AC203, respectively.
- PE1, PE2, and PE3 are connected to AC 201, AC 202, and AC 203 through interfaces 204, 205, and 206, respectively.
- Interfaces 204, 205, and 206 are local interfaces, and interfaces 207 and 208 are non-local interfaces.
- PE1 is connected to PE2 through interface 207
- PE2 is connected to PE1 through interface 208.
- configure PE1, PE2, and PE3 as follows:
- the ESI attribute value of interface 204 is ESI1, the local and peer Ethernet Tag IDs associated with interface 204 are 1 and 2, respectively, and the SID associated with EVPL is 1 :: 1.
- the specific configuration process is, for example, configuring the ESI attribute value of interface 204 as ESI1, configuring the EVPL processing module associated with interface 204 as EVPL1, configuring the local and peer Ethernet Tag IDs associated with EVPL1 to be 1 and 2, and configuring the EVPL1 associated
- the SID is 1 :: 1, and the SID associated with the processing module EVPL1 for processing EVPL-related data on PE1 is configured as 1 :: 1, which is equivalent to configuring the SID associated with EVPL on PE1 as 1 :: 1, that is,
- the SID associated with the EVPL service on PE1 is configured as 1 :: 1.
- the ESI attribute value of interface 205 is ESI1, the local and remote Ethernet Tag IDs associated with interface 205 are 1 and 2, respectively, and the SID associated with EVPL is 2 :: 1.
- the specific configuration process is, for example, configuring the ESI attribute value of interface 205 as ESI1, configuring the EVPL processing module associated with interface 205 as EVPL2, configuring the local and peer Ethernet Tag IDs associated with EVPL2 to be 1 and 2, and configuring the EVPL2 associated
- the SID is 2 :: 1, and the SID associated with the processing module EVPL1 for processing EVPL-related data on PE2 is configured as 2 :: 1, which is equivalent to configuring the SID associated with EVPL on PE2 as 2 :: 1, that is,
- the SID associated with the EVPL service on PE2 is configured as 2 :: 1.
- the ESI attribute value of interface 206 is ESI2, the local and peer Ethernet Tag IDs associated with interface 206 are 2 and 1, respectively, and the SID associated with EVPL is 3 :: 1.
- the specific configuration process is, for example, configuring the ESI attribute value of interface 206 as ESI2, configuring the EVPL processing module associated with interface 206 as EVPL3, configuring the local and remote Ethernet Tag IDs associated with EVPL3 as 2 and 1, and configuring the EVPL3 associated
- the SID is 3 :: 1, and the SID associated with the processing module EVPL3 for processing EVPL-related data on PE3 is configured as 3 :: 1, which is equivalent to configuring the SID associated with EVPL on PE3 as 3 :: 1, that is,
- the SID associated with the EVPL service on PE3 is configured as 3 :: 1.
- VPWS and active-active modes are provided.
- PE1, PE2, and PE3 send routing messages to each other.
- the routing message may be a Border Gateway Protocol (BGP) message, and the BGP message may include an Ethernet auto-discovery route (ethernet A-D route) and an SRv6-VPN SID attribute.
- Ethernet automatic discovery route referred to as AD route, can include ESI field and Ethernet Tag ID field.
- SRv6-VPN SID attribute is a type / length / value (type / length / value (TLV)) attribute, including type field and length field. And value field, where the type can be 1 or 2.
- TLV type / length / value
- the EVPL attribute value can be used to The end device notifies the SID associated with the EVPL configured on the end device.
- Ethernet automatic discovery route please refer to the description in the Internet Engineering Task Force (IETF) Request for Comments (RFC) 7432.
- RRC Request for Comments
- SRv6-VPN SID refer to the description in the IETF draft "BGP Signaling of IPv6-Segment-Routing-based VPN Networks, draft-dawra-idr-srv6-vpn-03".
- PE1 generates an AD route E1, where the ESI field value is the ESI attribute value ESI1 of the interface 204 configured on PE1, and the Ethernet Tag ID field value is the local Ethernet TagID associated with the interface 204 configured on PE1.
- Value 1 PE1 sends a routing message R1 carrying E1 and EVPL attribute values to PE2 and PE3.
- the EVPL attribute value is 1 :: 1. This EVPL attribute value can be used to notify PE2 and PE3 of the SID value associated with EVPL on PE1. Is 1 :: 1.
- PE2 generates an AD route E2, where the ESI field value is the ESI attribute value ESI1 of the interface 205 configured on PE2, and the Ethernet Tag ID field value is the local Ethernet TagID ID value 1 associated with the interface 205 configured on PE2.
- PE2 sends a routing message R2 carrying E2 and EVPL attribute values to PE1 and PE3, and the EVPL attribute value is 2 :: 1.
- PE3 generates an AD route E3.
- the value of the ESI field in E3 is the ESI attribute value ESI2 of the interface 206 configured on PE3.
- the value of the Ethernet TagID field is the local Ethernet TagID value 2 associated with the interface 206 configured on PE3.
- PE1 and PE2 send a routing message R3 carrying the E3 and EVPL attribute values, and the EVPL attribute value is 3 :: 1.
- PE1 After receiving the routing message R2 sent by PE2, PE1 can determine that the value of the ESI field in the routing message R2 is the same as the value of the ESI field in the AD route E1 generated by them. Both are ESI1. Both belong to the same Ethernet segment. It can be determined that PE2 is a backup device of PE1 and the repair path can be determined according to the routing message R2, that is, PE1 can determine that the repair path from PE1 to CE1 is from PE1 through PE2 to CE1. Therefore, there are two paths from PE1 to CE1, one is the main path to CE1 via local interface 204, and one is the repair path to CE1 via interfaces 207 and PE2.
- a data packet may be sent to PE2 via interface 207, so that the data packet is sent to CE1 via PE2 to implement fast reroute (FRR).
- the repair path may also be referred to as a bypass path in this application.
- PE2 can determine that PE1 is the backup device of PE2 and can determine the repair path based on the routing message R1. That is, PE2 can determine that the repair path from PE2 to CE1 is from PE2 to PE1. CE1. Therefore, there are two paths from PE2 to CE1, one is the main path to CE1 via local interface 205, and one is the repair path to CE1 via interface 208 and PE1.
- a data packet may be sent to PE1 via interface 208, so that the data packet is sent to CE1 via PE1 to implement FRR.
- PE3 After receiving the routing message R2 sent by PE2, PE3 determines that the peer Ethernet Tag ID value 1 configured by itself is the same as the Ethernet Tag ID value 1 in the routing message R2. Similarly, after receiving the routing message R3 sent by PE3, PE2 determines The self-configured peer Ethernet Tag ID value 2 is the same as the Ethernet Tag ID value 2 in the routing message R3. That is, the local and peer Ethernet Tag IDs of PE2 are the same as the peer and local Ethernet Tag IDs of PE3, respectively, and then an EVPL is established between PE2 and PE3. The two ends of the EVPL are connected to the access links AC202 and AC203, respectively, so that The data packet sent by CE2 can reach CE1 via AC203, the EVPL, and AC202.
- PE3 can obtain the EVPL attribute value 2 :: 1 from the routing message R2. After establishing the EVPL between PE2 and PE3, when there is a data packet on PE3 to be sent to CE1, PE3 can use 2 :: 1 as the data packet.
- the destination address sends a data packet to PE2 to send the data packet to PE2 via the EVPL between PE2 and PE3.
- the destination address of the data packet in this application may be the destination address in the IPv6 header of the data packet, the destination address is an IPv6 address, and the IPv6 address in SRv6 may be a segment identifier SID.
- PE2 After receiving the data packet, PE2 identifies the destination address 2 :: 1 of the data packet as the SID value associated with the EVPL, and performs the operation associated with the SID value 2 :: 1 associated with the EVPL.
- the associated operation includes determining the SID on PE2.
- the value 2 :: 1 is associated with the entry y2.
- the entry y2 includes the SID value 2 :: 1.
- the identifier of the local interface 205 and the identifier of the interface 208 determine whether the local interface 205 is in a fault state in the entry y2. In the state, a data packet is sent to CE1 via the local interface 205, and when the local interface 205 is in a fault state, a data packet is sent to PE1 via the interface 208.
- the SID value in SRv6 can be associated with a series of instructions. This series of instructions can also be called functions. In this application, functions can also be called operations.
- the operations associated with each SID value on each PE device can be pre-configured. For example, in order to implement the SID value 1 :: 1 association operation on PE1, an entry y1 is saved on PE1 in advance.
- the entry y1 includes the SID value 1 :: 1 and all interfaces on PE1 that can be used to send data packets to CE1.
- the all interfaces include a local interface 204 and an interface 207.
- the interface 207 is configured to send a data packet to PE2 to implement FRR.
- an entry y2 is pre-stored on PE2, and entry y2 includes the SID value 2 :: 1 and all interfaces on PE2 that can be used to send data packets to CE1. All the interfaces include a local interface 205 and an interface 208. The interface 208 is configured to send a data packet to PE1 to implement FRR.
- the IETF draft "SRv6Network Programming, draft-filsfils-spring-srv6-network-programming-04" defines the functions associated with the SID. For the operations associated with the SID value associated with the EVPL in this scenario, refer to section 4.4 of the draft. Describe the functions of End.DX2.
- End.DX2 include forwarding data packets through the outbound interface associated with SID.
- the aforementioned function associated with SID value 1 :: 1 on PE1 includes sending a data packet via local interface 204 or interface 207
- the aforementioned function associated with SID value 2 :: 1 on PE2 includes via local interface 205
- the interface 208 sends a data packet.
- PE3 receives the routing message R1 sent by PE1, PE1 receives the routing message R3 sent by PE3, and the local and peer Ethernet Tag IDs of PE1 are the same as the peer and local Ethernet Tag IDs of PE3, respectively.
- An EVPL is established between the two ends of the EVPL, which are respectively connected to the access links AC201 and AC203 so that the data packets sent by CE2 can reach CE1 via AC203, the EVPL, and AC201.
- PE3 can obtain the EVPL attribute value 1 :: 1 from the routing message R1. After establishing the EVPL between PE1 and PE3, when there is a data packet on PE3 to be sent to CE1, PE3 can use 1 :: 1 as the data packet.
- the destination address sends a data packet to PE1, so that the data packet is sent to PE1 via the EVPL between PE1 and PE3.
- PE1 identifies the destination address 1 :: 1 of the data packet as the SID value associated with the EVPL, and performs the operation associated with the SID value 1 :: 1 associated with the EVPL.
- the associated operation includes determining the SID on PE1.
- the value 1 :: 1 is associated with the entry y1.
- the entry y1 includes the SID value 1 :: 1.
- the identifier of the local interface 204 and the identifier of the interface 207 determine whether the local interface 204 is in a fault state in the entry y1. In the state, a data packet is sent to CE1 via the local interface 204. When the local interface 204 is in a fault state, a data packet is sent to PE2 via the interface 207.
- PE1 and PE2 determine the repair path according to the routing message sent by the other party in order to realize FRR, it is assumed that the EVPL attribute value is used, that is, the value associated with the EVPL on the other party's device.
- PE2 can use the value 1 :: 1 associated with EVPL on PE1 as the destination address of the data packet via the interface 208 sends a data packet to PE1 to CE1 in an attempt to trigger PE1 to forward the data packet to the local interface 204 to implement FRR.
- PE1 After receiving the data packet, PE1 performs the operations associated with the SID value 1 :: 1 associated with the EVPL, including determining the entry y1 associated with the SID value 1 :: 1, and determining whether the PE1 local interface 204 is in a fault state according to the entry y1. When the interface 204 is not in the fault state, the local interface 204 sends a packet to CE1 to complete the forwarding to achieve FRR.
- PE1 when the local interface 204 is also in the fault state, if PE1 also uses the value 2 :: 1 associated with EVPL on PE2, As the destination address of the data packet, send a data packet to PE2 in an attempt to trigger PE2 to forward the data packet to the local interface 205, and then PE2 will change the destination address of the data packet again to 1 :: 1 and set the destination address to 1 :: 1 The data packet is returned to PE1 again, which causes a loop of data packet transmission. After PE3 receives the route revocation notification, it stops sending new packets to PE2 to stop initiating a loop. The triggered loop can be eliminated only after PE1 or PE2 receives the route revocation notification and withdraws the route to the other party. The loop problem will waste network resources and affect the performance of PE equipment.
- an interface in a fault state may be that the interface itself is faulty, for example, the interface function is damaged, or the AC connected to the interface is faulty, for example, the link is interrupted.
- the interface if the interface is not in a fault state, it can mean that the interface is in a normal state, that is, a data packet can be sent to the AC connected to the interface through the interface.
- the PE device can save interface status information.
- the PE device detects an interface failure, for example, the physical signal received by the physical port on the interface is interrupted or the bit error rate of the data packet received by the interface is greater than the threshold, the PE device can update the PE device. Saved interface status information, such as marking an interface as faulty.
- the PE device can determine whether the local interface or the non-local interface is in a fault state according to the saved interface state information. The manner in which the PE determines whether an interface is in a fault state is merely an example.
- VPN SID attribute This embodiment of the present application defines a new type of SRv6-VPN SID attribute, which can also be called a bypass attribute.
- the type is, for example, 3, which is used to solve the aforementioned loop problem.
- the value in the bypass attribute is simply referred to as the bypass attribute value. In the active-active scenario, two devices that are active and standby can notify each other of the bypass attribute value.
- the device that receives the bypass attribute value executes the FRR to send a packet using the repair path, that is, it sends the packet to the backup device through the interface to the backup device.
- the bypass attribute value may be included in the data packet, for example, the bypass attribute value is used as the destination address of the data packet.
- FIG. 3 shows a flowchart of a communication method provided by an embodiment of the present application in the scenario of FIG. 2.
- PE1 sends a first identifier to PE2 via the interface 207.
- the first identifier is a bypass attribute value, for example, 1 :: 2.
- the aforementioned routing message R1 sent by PE1 to PE2 may carry a bypass attribute, the type in the bypass attribute is 3, and the bypass attribute value in the bypass attribute is 1 :: 2.
- PE1 before PE1 sends the first identifier, PE1 stores an entry w1.
- the entry w1 includes the SID value 1 :: 2 and the identifier of the local interface 204.
- the entry w1 does not include the identifier of the interface 207. Therefore, when PE1 subsequently performs an operation associated with the SID value 1 :: 2, the interface 204 for sending a data packet can be determined according to the entry w1.
- PE2 receives the first identifier sent by PE1 via interface 208.
- PE1 receives a data packet sent by PE2 via an interface 207, where the data packet includes a first identifier.
- the manner in which the data packet includes the first identifier is, for example, that the destination address of the data packet is the first identifier.
- the destination address of the data packet can be an IPv6 address.
- PE2 may send a data packet to PE1 via interface 208.
- PE2 when PE2 sends a packet to CE1, there are two paths that can be selected. One is the main path to CE1 via local interface 205, and the other is the repair path to CE1 via interface 208 and PE1.
- the main path sends a data packet, it sends a data packet to the local interface 205, and when it selects the repair path to send a data packet, it sends a data packet to the interface 208.
- PE2 first determines whether the local interface 205 is in a fault state. When the local interface 205 is not in a fault state, in response to determining that the local interface 205 is in a normal state or not in a fault state, PE2 may send the local interface 205 to CE1 The data packet is selected from the main path to send the data packet to be sent to CE1 to CE1. When the local interface 205 is in a fault state, in response to determining that the local interface 205 is in a fault state, PE2 may send a data packet with a destination address to the first identifier to PE1 via the interface 208 in order to select a repair path to send a data packet to be sent to CE1.
- PE2 receives the data packet sent by PE3, and the destination address of the data packet is the EVPL attribute value carried in the routing message R2 sent by PE2 to PE3, such as 2 :: 1.
- the process of PE3 sending a data packet to PE2 is as follows: Previously mentioned.
- PE2 determines the entry y2 associated with the SID value 2 :: 1 stored on PE2 according to the destination address 2 :: 1 of the data packet.
- the entry y2 includes the SID value 2 :: 1, the identifier of the local interface 205, and the interface 208. logo.
- PE2 determines whether the local interface 205 is in a fault state according to the identifier of the local interface 205 in the entry y2, and in response to determining that the local interface 205 is in a fault state, changes the destination address of the data packet 2 :: 1 to the first identifier 1 :: 2.
- the entry y2 includes a first identifier 1 :: 2.
- PE1 determines that the interface 204 associated with the first identifier in the data packet is in a fault state.
- PE1 In response to PE1 determining that interface 204 is in a fault state, PE1 avoids sending a data packet to PE2 via interface 207.
- PE1 After receiving the data packet, PE1 obtains the first identifier in the data packet, for example, the destination address of the data packet 1 :: 2. PE1 determines whether the local interface 204 associated with the first identifier 1 :: 2 is in a fault state, and in response to determining that the local interface 204 is not in a fault state, sends a data packet to CE1 via the local interface 204, and in response to determining that the local interface 204 is in a fault state, Avoid sending data packets to PE2 via interface 207. Therefore, when both the interface 204 and the interface 205 are in a fault state, it is possible to avoid sending a data packet sent from the PE2 back to the PE2 to cause a loop. One way that PE1 avoids sending data packets to PE2 via interface 207 is to discard the data packets received from PE2.
- PE1 determines the local interface 204 based on the entry w1 and the first identifier 1 :: 2 stored on PE1. Since the entry w1 includes the SID value 1 :: 2 and the identifier of the local interface 204, but does not include the identifier of the interface 207, the interface on the associated PE1 determined by PE1 according to the entry w1 and the first identifier 1 :: 2 includes only The local interface 204 does not include the non-local interface 207, which avoids sending a data packet to the PE2 via the interface 207.
- PE1 after receiving the data packet, PE1 obtains the first identifier in the data packet, for example, the destination address of the data packet 1 :: 2, and performs the operation associated with the first identifier 1 :: 2, that is, performs the operation associated with the first identifier A function identifying 1 :: 2, the operation includes: determining an entry w1 on PE1 that is associated with the SID value 1 :: 2, determining the local interface 204 in the entry w1, and thereby determining the local interface 204 associated with 1 :: 2, Then determine whether the local interface 204 is in a fault state. When the local interface 204 is not in a fault state, send a data packet to CE1 via the local interface 204.
- a new End.DX2L function can be defined in the method shown in FIG.
- the entry w1 can be saved in advance on PE1.
- the entry w1 includes the SID value 1 :: 2 and the identifier of the local interface 204.
- the entry w1 does not include the identifier of the interface 207 in order to support the implementation of this function.
- the operation associated with 1 :: 2 is performed according to entry w1.
- PE1 may also save the instructions included in the operation associated with 1 :: 2 in advance, so that after acquiring the first identifier in the data packet, the operation associated with the first identifier 1 :: 2 is performed.
- the PE1 further stores an entry y1, and the entry y1 includes an SID value 1 :: 1, an identifier of the local interface 204, and an identifier of the interface 207 for sending a data packet to PE2 to implement FRR. Therefore, when PE3 sends a packet to PE1 to CE1, the destination address of the packet is 1: 1.
- PE1 first determines the status of the local interface 204 based on the destination address 1 :: 1 and the entry y1. When 204 is in a fault state, a data packet with a destination address of 2 :: 2 is sent via the non-local interface 207. Similarly, when PE3 sends a packet to PE2 to be sent to CE1, the destination address of the packet selects 2 :: 1.
- PE2 first determines the status of the local interface 205 according to the destination address 2 :: 1 and the entry y2. When the interface 205 is in a fault state, a data packet is sent via the non-local interface 208. When PE2 sends a packet to PE1, the destination address of the packet uses the first identifier 1 :: 2. The first identifier 1 :: 2 is associated with the local interface 204 of PE1 but not associated with the non-local interface 207. PE1 is based on the destination address 1 :: 2 and the entry w1 will first determine the status of the local interface 204. When it is determined that the local interface 204 is in a failed state, it does not return a data packet to PE2 and discards the data packet.
- PE2 may also save the entry w2, and the entry w2 includes the SID value 2 :: 2 and the identifier of the local interface 205.
- PE2 may notify PE1 of the SID value 2 :: 2 by sending a second identifier 2 :: 2 to PE1.
- the destination address of the data packet can select 2 :: 2.
- the second identifier 2 :: 2 is associated with the local interface 205 of PE2 but not associated with the non-local interface 208.
- PE2 is based on the destination address 2 :: 2 and entry w2 first determine the status of the local interface 205.
- the entry y1 may include a second identifier 2 :: 2,
- the first identification received from PE1 is carried in the data packet, for example, as the destination address of the data packet, and then PE1 identifies the first identification in the data packet.
- it is determined that the local interface 204 is in a fault state avoid returning a data packet to PE2, thereby avoiding causing a loop. It can be seen that based on the transmission and identification of the first identifier in the method shown in FIG.
- PE1 after receiving the data packet including the first identifier, PE1 can avoid sending the data packet back to PE2 again, so that in the dual-active mode, PE1 and PE1 When the local interfaces of PE2 are in a fault state, the transmission loop of data packets between PE1 and PE2 can be avoided.
- PE2 uses a repair path to send a data packet carrying the first identification to PE1.
- PE1 recognizes the first identification in the received data packet, it can be determined that the data packet is repaired through PE2 to PE1.
- the path is received, which is equivalent to the first identifier indicating the repair path from PE2 to PE1, that is, the first identifier in the data packet indicates that the data packet comes from the repair path from PE2 to PE1. Therefore, PE1 avoids returning the data packet to PE2 to Avoid loops.
- FIG. 4 is a schematic diagram of an SRv6EVPN dual-active scenario provided by an embodiment of the present application.
- the network shown in FIG. 4 can provide a unicast service in a multipoint to multipoint (MP2MP) service.
- the network shown in FIG. 4 includes hosts HOST1, HOST2, HOST3, HOST4, HOST5, and HOST6, CE devices CE1 and CE2, and PE devices PE1, PE2, and PE3.
- HOST1, HOST2, and HOST3 are connected to CE1, HOST4, HOST5, and HOST6 are connected to CE2, PE1, PE2, and PE3 are connected to CE1, CE1, and CE3 through access links AC401, AC402, and AC403, and PE1, PE2, and PE3 are connected through interfaces 404 and 405 Connects to AC401, AC402 and AC403 with 406.
- the interfaces 404, 405, and 406 are all local interfaces, and the interfaces 407 and 408 are non-local interfaces.
- PE1 is connected to PE2 through interface 407
- PE2 is connected to PE1 through interface 408,
- PE3 is connected to PE1 through interface 409, and PE3 is connected to PE2 through interface 410.
- configure PE1, PE2, and PE3 as follows:
- the ESI attribute value of interface 404 is ESI1, and the SID associated with the unicast service is 1 :: 1.
- the specific configuration process is, for example, configuring the ESI attribute value of interface 404 as ESI1, configuring the processing module associated with interface 404 as BD1, configuring the SID associated with BD1 as 1 :: 1, and using PE1 to process data related to unicast services
- the SID associated with the module BD1 is configured as 1 :: 1, which is equivalent to configuring the SID associated with the unicast service on PE1 as 1 :: 1.
- the ESI attribute value of interface 405 is ESI1, and interface 405 is associated with the processing module BD2.
- the packet processing function on PE2 can be performed by BD2.
- the specific configuration process is, for example, configuring the ESI attribute value of interface 405 as ESI1, configuring the processing module associated with interface 405 as BD2, configuring the SID associated with BD2 as 2 :: 1, and using PE2 for processing data related to unicast services
- the SID associated with the module BD2 is configured as 2 :: 1, which is equivalent to configuring the SID associated with the unicast service on PE2 as 2 :: 1.
- the ESI attribute value of the interface 406 is ESI2, and the interface 406 is associated with the processing module BD3.
- the packet processing function on the PE3 can be completed by the BD3.
- the specific configuration process is, for example, configuring the ESI attribute value of interface 406 as ESI2, configuring the processing module associated with interface 406 as BD3, configuring the SID associated with BD3 as 3 :: 1, and using PE3 to process data related to unicast services
- the SID associated with the module BD3 is configured as 3 :: 1, which is equivalent to configuring the SID associated with the unicast service on PE3 as 3 :: 1.
- PE1, PE2, and PE3 send routing messages to each other.
- the routing messages can be BGP messages.
- IETF draft "EVPN All Active Usage Enhancement, draft-eastlake-bess-enhance-evpn-all-active-00.txt", which describes how EVPN supports one CE device to multiple PE devices and multiple PEs.
- the device is in multi-active mode.
- Multi-active mode can also be called multi-active redundant mode.
- FIG. 5 is a schematic diagram of an entry in a MAC forwarding table provided by an embodiment of the present application.
- PE1, PE2, and PE3 can store MAC forwarding tables.
- PE1 can learn the MAC address of HOST1 MAC1 from CE1 via local interface 404, and generate entry 501 in the MAC forwarding table on PE1.
- Entry 501 includes MAC1, the identity of local interface 404, and the ESI attribute of local interface 404.
- the value ESI1, PE1 sends a routing message Rm1 to PE2 and PE3.
- the routing message Rm1 includes the entry 501 and the aforementioned draft "EVPN All Active Usage Enhancement, draft-eastlake-bess-enhance-evpn-all-active-00.txt"
- PE2 after receiving the routing message Rm1, PE2 can find the local interface of PE2, which is the interface 405 of PE2 connected to CE1, according to ESI1 in entry 501, and generate a fast reroute (FRR) entry 502, which is PE2.
- the main path on PE2 reaches CE1 via local interface 405, and the repair path reaches CE1 via interfaces 408 and PE1.
- the repair path is the path from PE2 to PE1 via PE1 to CE1.
- the repair path may also be referred to as a standby path in this application.
- PE2 can send a routing message Ra2 to PE1 and PE3.
- the routing message Ra2 includes the AD route A2 and the SRv6-VPN SID attribute whose type is 2.
- AD route A2 includes an ESI field.
- the value of the ESI field in AD route A2 is the ESI attribute value ESI1 of interface 405 configured on PE2.
- the value of the SRv6-VPN SID attribute whose type is 2 is referred to as the unicast attribute value.
- the unicast attribute value can be used to notify the peer device of the configuration associated with the unicast service on the local device.
- SID The unicast attribute value in the routing message Ra2 is the SID value 2 :: 1 associated with the unicast service configured on PE2.
- PE1 receives the routing message Ra2 sent by PE2 via interface 407, and determines that ESI1 in routing message Ra2 is the same as ESI1 in entry 501 generated by PE1. PE1 determines that PE2 is a backup device for PE1. See Figure 5. According to entry 501, PE1 An entry 503 is generated to the interface 407 of the routing message Ra2 and the unicast attribute value 2 :: 1 in the routing message Ra2. Entry 503 includes MAC1, the identity of the local interface 404, ESI1, the identity of the interface 407, and 2 :: 1.
- PE1 can send a routing message Ra1 to PE2 and PE3.
- the routing message Ra1 includes AD route A1 and unicast attributes.
- AD route A1 includes the ESI field.
- the value of the ESI field in AD route A1 is the ESI of interface 404 configured on PE1.
- the attribute value is ESI1.
- the unicast attribute value in the routing message Ra1 is the SID value 1 :: 1 associated with the unicast service configured on PE1.
- PE2 receives the routing message Ra1 sent by PE1 via interface 408, and determines that ESI1 in the routing message Ra1 is the same as ESI1 in entry 502 generated by PE2.
- PE2 determines that PE1 is a backup device for PE2. See Figure 5.
- PE2 Unicast attribute value 1 :: 1 in message Ra1 generates entry 504.
- Entry 504 includes MAC1, the identity of the local interface 405, ESI1, the identity of the interface 408, and 1 :: 1.
- PE3 After receiving the routing message Rm1 sent by PE1 via interface 409, PE3 can generate an entry 505 in the MAC forwarding table on PE3. Entry 505 includes the identifiers of MAC1, ESI1, and interface 409.
- PE3 After receiving the routing message Ra1 sent by PE1 via interface 409, PE3 can determine that the ESI in routing message Ra1 is the same as the ESI in entry 505 generated by PE3, and according to entry 505 and the unicast attribute value in routing message Ra1 1 :: 1 Generates entry 506. Entry 506 includes MAC1, ESI1, the identification of interface 409, and 1 :: 1. After receiving the routing message Ra2 sent by PE2 via interface 410, PE3 can determine that the ESI in routing message Ra2 is the same as the ESI in entry 506, that is, the ESI in routing message Ra1 received from PE1, so that PE3 can determine the local interface of PE2.
- PE3 may generate an entry 509 according to the unicast attribute value 2 :: 1 in the entry 506 and the routing message Ra2. Entry 509 includes MAC1, ESI1, the identity of interface 409, 1 :: 1, the identity of interface 410, and 2 :: 1.
- PE3 receives the data packet forwarded by CE2 with the destination MAC address of MAC1, it can look up the MAC forwarding table according to MAC1 and choose to send data packet to PE1 or PE2 according to entry 509.
- PE3 can set the destination address of the data packet to 1 :: 1, and send a destination packet with a destination address of 1 :: 1 to PE1 via the interface 409, so as to trigger PE1 to provide a unicast service, that is, trigger PE1 to forward the data packet to CE1.
- PE3 can also set the destination address of the data packet to 2 :: 1, and send a destination packet with a destination address of 2 :: 1 to PE2 via the interface 410, so as to trigger the unicast service provided by PE2, that is, trigger the PE2 to forward the data packet to CE1.
- PE2 When PE2 receives the data packet forwarded by PE3 with a destination address of 2 :: 1 and a destination MAC address of MAC1, it performs the operation of SID value 2 :: 1 association.
- the operations associated with the SID value in this scenario can refer to the functions of End.DT2U described in section 4.6 of the IETF draft "SRv6Network Programming, draft-filsfils-spring-srv6-network-programming-04".
- the functions of End.DT2U include The interface in the entry with the destination MAC address matches the packet.
- the operations associated with SID value 2 :: 1 on PE2 include sending data packets via local interface 405 and interface 408 in entry 504 matching MAC1.
- the operations associated with the SID value 1 :: 1 on PE1 include sending a data packet via local interface 404 and interface 407 in entry 503 that matches MAC1.
- the entry 504 includes the identification of the local interface 405, the identification of the interface 408, and 1 :: 1.
- PE2 first determines whether the local interface 405 is in the fault state. When the local interface 405 is not in the fault state, the local interface 405 sends CE1 sends a data packet. When the local interface 405 is in a fault state, it sends a data packet with a destination address of 1 :: 1 to PE1 via the interface 408 to trigger PE1 to forward the data packet to CE1.
- PE1 After PE1 receives a packet with a destination address of 1 :: 1 and a destination MAC address of MAC1 sent by PE2, PE1 performs an operation with an SID value of 1 :: 1, and the associated operation includes the local entry in entry 503 that matches MAC1.
- the interface 404 and the interface 407 send data packets. Referring to FIG. 5, the entry 503 includes an identifier of the local interface 405, an identifier of the interface 408, and 2 :: 1.
- PE1 first determines whether the local interface 404 is in a fault state. When the local interface 404 is not in a fault state, it sends a packet to CE1 via the local interface 404.
- the local interface 404 When the local interface 404 is in a fault state, it sends a destination address of 2 to PE2 via the interface 407.
- the :: 1 data packet triggers PE2 to forward the data packet to CE1. From this, PE1 sends the data packet sent from PE2 back to PE2, causing a loop of data packet transmission.
- PE3 After PE3 receives the route revocation notification, it stops sending new packets to PE2 to stop initiating a loop.
- the triggered loop can be eliminated only after PE1 or PE2 receives the route revocation notification and withdraws the route to the other party.
- FIG. 6 shows a flowchart of a communication method provided by an embodiment of the present application in the scenario of FIG. 4.
- an operation associated with the first identifier including searching a second entry matching a destination MAC address of the data packet in a media access control MAC forwarding table, and according to the first
- the identification of the interface for connecting the CE device in the two entries determines the second interface
- PE1 sends a first identifier to PE2 via the interface 407.
- the first identifier is a bypass attribute value, for example, 1 :: 2.
- the aforementioned routing message Ra1 sent by PE1 to PE2 may carry a bypass attribute, the type in the bypass attribute is 3, and the bypass attribute value in the bypass attribute is 1 :: 2.
- PE2 receives the first identifier sent by PE1 via interface 408.
- PE2 may receive a routing message Ra1 sent by PE1 via interface 408, and the routing message Ra1 includes an AD route A1 and a first identifier.
- the value of the ESI field in the AD route A1 is the ESI attribute value ESI1 of the interface 404 configured on PE1, and the first identifier is 1 :: 2.
- PE2 determines that ESI1 in the routing message Ra1 is the same as ESI1 in the entry 502 generated by PE2, and PE2 can determine that PE1 is a backup device of PE2. Referring to FIG. 5, PE2 generates an entry 508 based on the entry 502 and the routing message Ra1.
- Entry 508 includes MAC1, the identity of the local interface 405, ESI1, the identity of the interface 408, and 1 :: 2, where 1 :: 2 is the first identity in the routing message Ra1.
- PE2 can send a data packet to the local interface 405 to send a data packet to CE1 via the main path, and the main path on PE2 reaches CE1 via the local interface 405.
- PE2 can send a packet to interface 408 to send a packet to CE1 via the repair path.
- the repair path is the path from PE2 to PE1 via PE1, and the repair path on PE2 reaches CE1 via interfaces 408 and PE1.
- PE2 sends to interface 408.
- the first identifier 1 :: 2 can be carried in the data packet.
- PE1 may receive a routing message Ra2 sent by PE2 via interface 407.
- the routing message Ra2 includes an AD route A2 and a second identifier, and the second identifier is, for example, 2 :: 2.
- PE1 determines that ESI1 in the routing message Ra2 is the same as ESI1 in entry 501 generated by PE1.
- PE1 can determine that PE2 is a backup device of PE1.
- Entry 507 includes MAC1, the identity of the local interface 404, ESI1, the identity of the interface 407, and 2 :: 2, where 2 :: 2 is the second identity in the routing message Ra2.
- the identifier of the local interface can be marked to identify the identifier of the local interface in the entry when the entry is found, for example Add a flag to the entry to indicate that the identity of an interface is the identity of the local interface.
- PE1 receives a data packet sent by PE2 via an interface 407, where the data packet includes a first identifier.
- the manner in which the data packet includes the first identifier is, for example, that the destination address of the data packet is the first identifier.
- the destination address of the data packet can be an IPv6 address.
- the data packet also has a destination MAC address, such as MAC1.
- PE2 may send a data packet to PE1 via interface 408.
- interface 408 As mentioned before, when PE2 sends a packet to CE1, there are two paths that can be selected, one is the main path to CE1 via local interface 405, and the other is the repair path to CE1 via interface 408 and PE1.
- PE2 first determines whether the local interface 405 is in a fault state. When the local interface 405 is not in a fault state, in response to determining that the local interface 405 is in a normal state or not in a fault state, PE2 may send the local interface 405 to CE1 via CE1. data pack. When the local interface 405 is in a fault state, in response to determining that the local interface 405 is in a fault state, PE2 may send a data packet including the first identity to PE1 via the interface 408.
- PE2 receives the data packet sent by PE3, and the destination address of the data packet is the unicast attribute value carried in the routing message R2 sent by PE2 to PE3. For example, 2 :: 1, and the destination MAC address of the data packet is MAC1.
- the process in which PE3 sends a data packet to PE2 is as described above.
- PE2 performs an SID value 2 :: 1 association operation according to the destination address 2 :: 1 of the data packet.
- the associated operation can refer to the functions of the aforementioned End.DT2U, including via the local interface in entry 508 matching MAC1. 405 and interface 408 send data packets.
- the associated operation includes, for example, finding an entry 508 matching MAC1 in the MAC forwarding table of PE2, determining the local interface 405 according to the identification of the local interface 405 in the entry 508, determining whether the local interface 405 is in a fault state, and responding to determining the local interface 405 is in a fault state.
- the interface 408 is determined according to the identifier of the interface 408 in the entry 508.
- the interface 408 sends a data packet to the PE1 through the interface 408 so that the data packet is sent through the repair path.
- the destination address of the data packet is set to the SID value in the entry 508 1 :: 2. .
- PE1 determines that the interface 404 associated with the first identifier in the data packet is in a fault state.
- PE1 In response to PE1 determining that interface 404 is in a fault state, PE1 avoids sending a data packet to PE2 via interface 407.
- PE1 After receiving the data packet, PE1 obtains the first identifier in the data packet.
- the first identifier is, for example, the destination address of the data packet 1 :: 2.
- the data packet may also include the destination MAC address MAC1.
- PE1 determines whether the local interface 404 associated with the first identity 1 :: 2 is in a fault state. For example, PE1 performs an operation associated with the SID value 1 :: 2, and the associated operation includes looking up the PE1's MAC forwarding table and The entry 507 matched by MAC1 determines the local interface 404 according to the identifier of the local interface 404 in the entry 507, thereby determining the local interface 404 associated with 1 :: 2.
- a data packet is sent to CE1 via the local interface 404.
- PE1 avoids sending data packets to PE2 via interface 407. Therefore, when both the interface 404 and the interface 405 are in a fault state, PE1 can avoid sending a data packet sent from PE2 back to PE2 to cause a loop.
- One way that PE1 avoids sending data packets to PE2 via interface 407 is to discard the data packets received from PE2.
- a new End.DT2UL function can be defined in the method shown in FIG. 6.
- End.DT2UL“ forwards a data packet through an entry matching the destination MAC address ”is changed to“ through an entry matching the destination MAC address. Local interface to forward packets ”.
- the operation associated with the first identifier 1 :: 2 on PE1 can be implemented by referring to the function of End.DT2UL.
- the entry 507 stored by PE1 includes the identifier of the MAC1, the local interface 404, the ESI1, and the interface 407 used to send a packet to PE2 to implement the FRR, and the SID value 2 :: 2. Therefore, PE3 can send a data packet to PE1 to PE1, and the destination address of the data packet is 1 :: 1.
- PE1 receives a data packet sent by PE3 with a destination address of 1 :: 1 and a destination MAC address of MAC1, it performs an SID value 1 :: 1 association operation. This association operation is similar to the aforementioned PE2 after receiving the data packet sent by PE3 The SID value 2 :: 1 correlation operation performed.
- PE1 first determines the status of the local interface 404. When the local interface 404 is not in a fault state, it sends a packet to the local interface 404. When the local interface 404 is in the In the fault state, a data packet is sent to PE2 via the non-local interface 407. That is, PE3 can send a packet to PE1 with the destination address 1 :: 1, and the destination address 1 :: 1 is associated with the local interface 404 on PE1 and the non-local interface 407 for FRR. PE3 can also use destination address 2: : 1 sends a data packet to PE2, and the destination address 1 :: 2 is associated with the local interface 405 on PE2 and the non-local interface 408 for FRR.
- PE1 After PE1 receives the data packet of PE3 and sends the data packet to PE2 using the repair path, it uses the second identifier 2 :: 2 received from PE2, and PE2 identifies the second identifier after receiving the data packet of PE1, When determining the interface associated with the second identity 2 :: 2, the identity of the local interface 405 is obtained, but the non-local interface 408 not associated with 2 :: 2 is not obtained, and no further data packet is returned to PE1. Similarly, after PE2 receives the data packet from PE3 and sends the data packet to PE1 using the repair path, it uses the first identifier 1 :: 2 received from PE1. PE1 recognizes the first identifier after receiving the data packet from PE2.
- the bypass attribute value is sent to each other, such as the first identifier and the second identifier, and the bypass attribute value is used as the destination of the data packet when sending the data packet. Address to avoid loop problems.
- PE1 can avoid sending the data packet back to PE2 again, thereby When the local interfaces of PE1 and PE2 are in the fault state in the live mode, the transmission loop of data packets between PE1 and PE2 is avoided.
- FIG. 7 is a schematic structural diagram of a communication device 700 according to an embodiment of the present application.
- the communication device 700 includes a processor 701, an interface 702, and an interface 703.
- the interface 702 is a local interface and the interface 703 is a non-local interface.
- the communication device 700 may be PE1 in FIG. 2 or FIG. 4, which is connected to CE1 through an interface 702, and is connected to PE2 through an interface 703.
- the communication device 700 may further include an interface for connecting the PE3.
- the communication device 700 shown in FIG. 7 may execute the method performed by PE1 shown in FIG. 3, and the interfaces 702 and 703 may be the interfaces 204 and 207 shown in FIG. 2, respectively.
- the communication device 700 shown in FIG. 7 may execute the method performed by PE1 shown in FIG. 6, and the interfaces 702 and 703 may be the interfaces 404 and 407 shown in FIG. 4, respectively.
- the processor 701 may send the first identifier to PE2 via the interface 703.
- the interface 703. For details, refer to the description of sending the first identifier to the PE2 via the interface 207 in S301 and the description of sending the first identifier to the PE2 via interface 407 in S601.
- the processor 701 may also receive the data packet including the first identifier sent by PE2 via the interface 703. For details, refer to the description of the data packet sent by PE1 via the interface 207 and received by PE1 in S302, and the packet sent by PE1 via the interface 407 and received by PE1 in S602. description of.
- the processor 701 may determine whether the interface 702 associated with the first identifier in the data packet is in a fault state, and in response to determining that the interface 702 is in a fault state, avoid sending data to the PE2 via the interface 703 package. For details, refer to the description of PE1 in S303 and S304 that the interface 204 associated with the first identifier in the data packet is in a fault state.
- PE1 determines that the interface 404 associated with the first identifier in the data packet is in a fault state, and in response to determining that the interface 404 is in a fault state, avoids sending a description of the data packet to PE2 via the interface 407.
- the communication device 700 may further include a memory 704 for storing the first entry.
- the first entry includes the first identifier and the identifier of the interface 702, but does not include the identifier of the interface 703.
- the processor 701 may determine the interface 702 according to the first identifier in the data packet and the first entry. For details, refer to PE1 in S303 and S304 to determine the local interface 204 according to the first identifier 1 :: 2 in the data packet and the entry w1.
- the processor 701 may perform an operation associated with the first identifier. This operation includes looking up a second entry in the MAC forwarding table that matches the destination MAC address MAC1 of the data packet, determining the interface 702 according to the identifier of the interface used to connect the CE device in the second entry, and determining that the interface 702 is in a fault state. For details, refer to the operations performed by PE1 associated with the first identifier 1 :: 2 in S603 and S604, and the second entry is entry 507.
- the MAC forwarding table may be stored in the memory 704 or in a memory other than the memory 704.
- the manner in which the processor 701 avoids sending data packets to PE2 includes discarding data packets. For details, refer to S1 and S304 to avoid sending data packets to PE2 via interface 207, and refer to S1 and S604 to avoid sending data to PE2 via interface 407. package.
- FIG. 8 is a schematic structural diagram of a communication device 800 according to an embodiment of the present application.
- the communication device 800 includes a processor 801, an interface 802, and an interface 803.
- the interface 802 is a local interface and the interface 803 is a non-local interface.
- the communication device 800 may be PE2 in FIG. 2 or FIG. 4, which is connected to CE1 through an interface 802, and is connected to PE1 through an interface 803.
- the communication device 800 may further include an interface 804 for connecting to the PE3.
- the communication device 800 shown in FIG. 8 may execute the method performed by PE2 shown in FIG. 3, and the interface 802 and the interface 803 may be the interface 205 and the interface 208 shown in FIG. 2, respectively.
- the communication device 800 shown in FIG. 8 may execute the method performed by PE2 shown in FIG. 6, and the interface 802 and the interface 803 may be the interface 405 and the interface 408 shown in FIG. 8, respectively.
- the processor 801 may receive the first identifier sent by PE1, and send a data packet including the first identifier to PE1.
- the processor 801 may receive a data packet sent by PE3, determine whether the interface 802 is in a fault state, and in response to determining that the interface 802 is in a fault state, send a data packet including a first identifier to PE1.
- processor 801 For operations performed by the processor 801, refer to operations performed by PE2 in S301, S302, S303, and S304, and operations performed by PE2 in S601, S602, S603, and S604.
- the processor 701 and the processor 801 may be a central processing unit (CPU), a network processor (NP), or a combination of a CPU and an NP.
- CPU central processing unit
- NP network processor
- the communication device 700 and the communication device 800 may include memory for storing computer program instructions.
- the communication device 700 and the communication device 800 respectively execute the instructions shown in FIG. 3.
- the memory storing the computer program instructions in the communication device 700 may be the memory 704, or may be a memory different from the memory 704.
- the memory 704 on the communication device 700, the memory for storing computer program instructions on the communication device 700, and the communication device 800 may include volatile memory (volatile memory), such as random-access memory (RAM).
- volatile memory such as random-access memory (RAM).
- non-volatile memory non-volatile memory
- ROM read-only memory
- flash memory flash memory
- HDD hard disk drive
- solid-state hard disk solid-state drive, SSD.
- the memory 704 on the communication device 700 may be integrated into the processor 701
- the memory for storing computer program instructions may also be integrated into the processor 701
- the interfaces 702, 703, 802, 803, and 804 may be Ethernet interfaces.
- FIG. 9 is a schematic structural diagram of a communication device 900 according to an embodiment of the present application.
- the communication device 900 includes a transmitting unit 901, a receiving unit 902, a determining unit 903, and an avoiding unit 904.
- the communication device 900 connects the PE device PE2 and the CE device CE1, which may be PE1 in FIG. 2, and executes the method performed by PE1 shown in FIG.
- the communication device 900 may be PE1 in FIG. 4, and executes the method performed by PE1 shown in FIG. 6.
- the sending unit 901 may send the first identifier to the PE2 via an interface connected to the PE2, for example, the interface 204 or the interface 404.
- an interface connected to the PE2 for example, the interface 204 or the interface 404.
- the sending unit 901 may send the first identifier to the PE2 via an interface connected to the PE2, for example, the interface 204 or the interface 404.
- the receiving unit 902 may receive a data packet including the first identifier sent by PE2 via an interface connected to PE2. For details, refer to the description in S302 that PE1 receives a data packet sent by PE2 via interface 207 and the description in S602 that PE1 receives a data packet sent by PE2 through interface 407.
- the determining unit 903 may determine that the interface connected to CE1 that is associated with the first identifier in the data packet is in a fault state.
- the avoidance unit 904 may avoid sending a data packet to PE2 via the interface connected to CE1. For details, refer to the description of PE1 in S303 and S304 that the interface 204 associated with the first identifier in the data packet is in a fault state.
- PE1 determines that the interface 404 associated with the first identifier in the data packet is in a fault state, and in response to determining that the interface 404 is in a fault state, avoids sending a description of the data packet to PE2 via the interface 407.
- the communication device 900 may further include a storage unit 905, and the storage unit 905 may save the first entry.
- the first entry includes the first identifier and the identifier of the interface connected to CE1, but does not include the identifier of the interface connected to PE2.
- For the storage unit 905 to store the first entry reference may be made to the PE1 storage entry w1 described in S303 and S304.
- the determining unit 903 may determine an interface connected to CE1 according to the first identifier and the first entry in the data packet. For details, reference may be made to PE1 in S303 and S304 to determine the local interface 204 according to the first identifier 1 :: 2 in the data packet and the entry w1.
- the determining unit 903 may be configured to perform an operation associated with the first identifier.
- the operation includes searching a second entry in the MAC forwarding table that matches the destination MAC address MAC1 of the data packet, and connecting the CE device according to the second entry.
- the identification of the interface determines the interface connected to CE1, and determines that the interface is in a fault state. For details, refer to the operations performed by PE1 associated with the first identifier 1 :: 2 in S603 and S604, and the second entry is entry 507.
- the way for the avoidance unit 904 to avoid sending data packets to PE2 may include discarding data packets. For details, refer to S303 and S304. PE1 avoids sending data packets to PE2 via interface 207, and refer to S603 and S604. data pack.
- FIG. 10 is a schematic structural diagram of a communication device 1000 according to an embodiment of the present application.
- the communication device 1000 includes a transmitting unit receiving unit 1001 and a transmitting unit 1002.
- the communication device 1000 connects the PE device PE1 and the CE device CE1, which may be PE2 in FIG. 2, and executes the method performed by PE2 in FIG. 3.
- the communication device 1000 may be PE2 in FIG. 4, and executes the method performed by PE2 in FIG. 6.
- the receiving unit 1001 may receive the first identifier sent by the PE1.
- the sending unit 1002 may send a data packet including the first identifier to PE1.
- the communication device 1000 may further include a determination unit 1003.
- the receiving unit 1001 receives the data packet sent by PE3, and in response to receiving the data packet sent by PE3, the determining unit 1003 determines whether the interface connected to CE1 is in a fault state, and in response to determining that the interface connected to CE1 is in a fault state, sends to PE1 a first identifier including Packet.
- the sending unit 1002, and the determining unit 1003 refer to operations performed by PE2 in S301, S302, S303, and S304, and operations performed by PE2 in S601, S602, S603, and S604.
- FIG. 11 is a schematic structural diagram of a communication system 1100 according to an embodiment of the present application.
- the communication system 1100 includes a PE device 1101 and a PE device 1102, and the PE device 1101 is connected to the PE device 1102.
- the PE device 1101 may be the communication device 700 shown in FIG. 7 or the communication device 900 shown in FIG. 9.
- the PE device 1101 may be connected to the CE device CE1 or the PE device PE3.
- the PE device 1102 may be the communication device 800 shown in FIG. 8 or the communication device 1000 shown in FIG. 10.
- the PE device 1102 may be connected to CE1 or PE3.
- the embodiments of the present application can be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
- software When implemented in software, it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer program instructions.
- the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions according to the embodiments of the present application are wholly or partially generated.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program instructions may be from a website site, a computer, a server, or data
- the center transmits by wire or wireless to another website site, computer, server or data center.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that includes one or more available medium integration.
- the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a digital video disc (DVD), or a semiconductor medium (for example, a solid state disk), and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (23)
- 一种通信方法,其特征在于,所述方法包括:第一服务商边缘PE设备经由第一接口向第二PE设备发送第一标识;所述第一PE设备经由所述第一接口接收所述第二PE设备发送的数据包,所述数据包包括所述第一标识;所述第一PE设备确定与所述数据包中的所述第一标识关联的第二接口处于故障状态,所述第二接口是所述第一PE设备用于连接用户边缘CE设备的接口;响应于所述第一PE设备确定所述第二接口处于故障状态,所述第一PE设备避免经由所述第一接口向所述第二PE设备发送所述数据包。
- 如权利要求1所述的通信方法,其特征在于,所述方法还包括:所述第一PE设备保存第一条目,所述第一条目包括所述第一标识以及所述第二接口的标识,所述第一条目不包括所述第一接口的标识;所述第一PE设备确定与所述数据包中的所述第一标识关联的所述第二接口处于故障状态,包括:所述第一PE设备根据所述数据包中的所述第一标识以及所述第一条目,确定所述第二接口;所述第一PE设备确定所述第二接口处于故障状态。
- 如权利要求1所述的通信方法,其特征在于,所述第一PE设备确定与所述数据包中的所述第一标识关联的所述第二接口处于故障状态,包括:所述第一PE设备执行所述第一标识关联的操作,所述操作包括:在媒体接入控制MAC转发表中查找与所述数据包的目的MAC地址匹配的第二条目,根据所述第二条目中用于连接CE设备的接口的标识确定所述第二接口;所述第一PE设备确定所述第二接口处于故障状态。
- 如权利要求1至3任一所述的通信方法,其特征在于,所述第一PE设备避免经由所述第一接口向所述第二PE设备发送所述数据包包括:所述第一PE设备丢弃所述数据包。
- 如权利要求1至4任一所述的通信方法,其特征在于,所述方法应用于基于网际协议第6版段路由SRv6的以太网虚拟专用网EVPN中,所述第一标识携带在SRv6-VPN SID属性中。
- 一种通信设备,所述通信设备是第一服务商边缘PE设备,其特征在于,所述第一PE设备包括:第一接口,用于连接第二PE设备;第二接口,用于连接用户边缘CE设备;处理器,用于:经由所述第一接口向所述第二PE设备发送第一标识;经由所述第一接口接收所述第二PE设备发送的数据包,所述数据包包括所述第一标识;确定与所述数据包中的所述第一标识关联的所述第二接口处于故障状态;响应于所述第一PE设备确定所述第二接口处于故障状态,避免经由所述第一接口向所述第二PE设备发送所述数据包。
- 如权利要求6所述的通信设备,其特征在于,所述第一PE设备还包括存储器,所述存储器用于保存第一条目,所述第一条目包括所述第一标识以及所述第二接口的标识,所述第一条目不包括所述第一接口的标识;所述处理器,用于根据所述数据包中的所述第一标识以及所述第一条目,确定所述第二接口。
- 如权利要求6所述的通信设备,其特征在于,所述处理器,用于执行所述第一标识关联的操作,所述操作包括:在媒体接入控制MAC转发表中查找与所述数据包的目的MAC地址匹配的第二条目,根据所述第二条目中用于连接CE设备的接口的标识确定所述第二接口;确定所述第二接口处于故障状态。
- 如权利要求6至8任一所述的通信设备,其特征在于,所述处理器,用于丢弃所述数据包。
- 如权利要求6至9任一所述的通信设备,所述第一PE设备应用于基于网际协议第6版段路由SRv6的以太网虚拟专用网EVPN中,所述第一标识携带在SRv6-VPN SID属性中。
- 一种通信系统,其特征在于,所述通信系统包括第一服务商边缘PE设备和第二PE设备;所述第一PE设备用于:经由第一接口向所述第二PE设备发送第一标识;经由所述第一接口接收所述第二PE设备发送的数据包,所述数据包包括所述第一标识;确定与所述数据包中的所述第一标识关联的第二接口处于故障状态,所述第二接口是所述第一PE设备用于连接用户边缘CE设备的接口;响应于确定所述第二接口处于故障状态,避免经由所述第一接口向所述第二PE设备发送所述数据包;所述第二PE设备,用于:接收所述第一PE设备发送的所述第一标识;向所述第一PE设备发送所述数据包。
- 如权利要求11所述的通信系统,其特征在于,所述第一PE设备用于:保存第一条目,所述第一条目包括所述第一标识以及所述第二接口的标识,所述第一条目不包括所述第一接口的标识;根据所述数据包中的所述第一标识以及所述第一条目,确定所述第二接口。
- 如权利要求11所述的通信系统,其特征在于,所述第一PE设备,用于执行所述第一标识关联的操作,所述操作包括:在媒体接入控制MAC转发表中查找与所述数据包的目的MAC地址匹配的第二条目,根据所述第二条目中用于连接CE设备的接口的标识确定所述第二接口;确定所述第二接口处于故障状态。
- 如权利要求11至13任一所述的通信系统,其特征在于,所述第二PE设备,用于:确定第三接口处于故障状态,所述第三接口是所述第二PE设备用于连接所述CE设备的接口;响应于确定所述第三接口处于故障状态,向所述第一PE设备发送所述数据包。
- 如权利要求11至14任一所述的通信系统,其特征在于,所述第一PE设备,用于丢弃所述数据包。
- 如权利要求11至15任一所述的通信系统,其特征在于,所述通信系统应用于基于网际协议第6版段路由SRv6的以太网虚拟专用网EVPN中,所述第一标识携带在SRv6-VPN SID属性中。
- 一种通信设备,所述通信设备是第一服务商边缘PE设备,其特征在于,所述第一PE设备包括:发送单元,用于经由第一接口向第二PE设备发送第一标识;接收单元,用于经由所述第一接口接收所述第二PE设备发送的数据包,所述数据包包括所述第一标识;确定单元,用于确定与所述数据包中的所述第一标识关联的第二接口处于故障状态,所述第二接口是所述第一PE设备用于连接用户边缘CE设备的接口;避免单元,用于响应于所述确定单元确定所述第二接口处于故障状态,避免经由所述第一接口向所述第二PE设备发送所述数据包。
- 如权利要求17所述的通信设备,其特征在于,所述第一PE设备还包括存储单元,所述存储单元用于保存第一条目,所述第一条目包括所述第一标识以及所述第二接口的标识,所述第一条目不包括所述第一接口的标识;所述确定单元,用于根据所述数据包中的所述第一标识以及所述第一条目,确定所述第二接口。
- 如权利要求17所述的通信设备,其特征在于,所述确定单元,用于执行所述第一标识关联的操作,所述操作包括:在媒体接入控制MAC转发表中查找与所述数据包的目的MAC地址匹配的第二条目,根据所述第二条目中用于连接CE设备的接口的标识确定所述第二接口;确定所述第二接口处于故障状态。
- 如权利要求17至19任一所述的通信设备,其特征在于,所述避免单元,用于丢弃所述数据包。
- 如权利要求17至20任一所述的通信设备,所述第一PE设备应用于基于网际协议第6版段路由SRv6的以太网虚拟专用网EVPN中,所述第一标识携带在SRv6-VPN SID属性中。
- 一种通信设备,所述通信设备是第一服务商边缘PE设备,其特征在于,所述第一PE设备包括处理器和存储器,所述存储器中存储有计算机程序指令,所述处理器用于执行所述计算机程序指令以使所述第一PE设备执行如权利要求1至5中任一项所述的通信方法。
- 一种计算机存储介质,用于储存计算机程序指令,所述计算机程序指令被通信设备执行时,使得所述通信设备执行如权利要求1至5中任一项所述的通信方法。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2020571430A JP7053901B2 (ja) | 2018-06-30 | 2019-06-23 | ループ回避通信方法、ループ回避通信デバイスおよびループ回避通信システム |
EP19827141.3A EP3806404A4 (en) | 2018-06-30 | 2019-06-23 | COMMUNICATION PROCESS, DEVICE AND SYSTEM TO AVOID A LOOP |
CA3104756A CA3104756C (en) | 2018-06-30 | 2019-06-23 | Loop avoidance communications method, device, and system |
US17/136,939 US12034631B2 (en) | 2018-06-30 | 2020-12-29 | Loop avoidance communications method, device, and system |
JP2022059657A JP7306642B2 (ja) | 2018-06-30 | 2022-03-31 | ループ回避通信方法、ループ回避通信デバイスおよびループ回避通信システム |
US18/731,632 US20240323115A1 (en) | 2018-06-30 | 2024-06-03 | Loop Avoidance Communications Method, Device, and System |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810703111.7A CN110661701B (zh) | 2018-06-30 | 2018-06-30 | 一种避免环路的通信方法、设备和系统 |
CN201810703111.7 | 2018-06-30 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/136,939 Continuation US12034631B2 (en) | 2018-06-30 | 2020-12-29 | Loop avoidance communications method, device, and system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020001389A1 true WO2020001389A1 (zh) | 2020-01-02 |
Family
ID=68986300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/092444 WO2020001389A1 (zh) | 2018-06-30 | 2019-06-23 | 一种避免环路的通信方法、设备和系统 |
Country Status (6)
Country | Link |
---|---|
US (2) | US12034631B2 (zh) |
EP (1) | EP3806404A4 (zh) |
JP (2) | JP7053901B2 (zh) |
CN (2) | CN114745319A (zh) |
CA (1) | CA3104756C (zh) |
WO (1) | WO2020001389A1 (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111277482B (zh) * | 2020-01-13 | 2022-01-18 | 新华三大数据技术有限公司 | 一种报文处理方法及装置 |
CN112511418A (zh) * | 2020-06-22 | 2021-03-16 | 中兴通讯股份有限公司 | 报文指示方法、装置、设备和存储介质 |
CN112104547B (zh) * | 2020-08-05 | 2022-07-12 | 新华三技术有限公司 | Evpn多归属组网避免环路的方法及装置 |
CN113347084B (zh) * | 2021-06-23 | 2022-04-22 | 新华三信息安全技术有限公司 | 一种报文转发方法及装置 |
CN115883446A (zh) * | 2021-09-26 | 2023-03-31 | 华为技术有限公司 | 一种环路的检测方法和装置 |
CN113992567B (zh) * | 2021-10-26 | 2023-03-21 | 新华三信息安全技术有限公司 | 一种报文转发方法及装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140126422A1 (en) * | 2012-11-02 | 2014-05-08 | Ciena Corporation | Resilient interworking of shortest path bridging and ethernet virtual private networks |
CN104601381A (zh) * | 2015-01-30 | 2015-05-06 | 杭州华三通信技术有限公司 | 防止流量中断的方法和设备 |
CN104753754A (zh) * | 2015-03-12 | 2015-07-01 | 杭州华三通信技术有限公司 | 一种报文的传输方法和设备 |
CN105591800A (zh) * | 2015-07-29 | 2016-05-18 | 杭州华三通信技术有限公司 | 流量保护方法及装置 |
US20170099180A1 (en) * | 2015-10-01 | 2017-04-06 | Juniper Networks, Inc. | Fast convergence of evpn networks for multi homing topologies |
CN107040462A (zh) * | 2015-09-29 | 2017-08-11 | 丛林网络公司 | 路由方法和中间路由器 |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DK2074752T3 (da) | 2006-10-09 | 2012-08-13 | Ericsson Telefon Ab L M | Elasticitetsproces i forbindelsesorienterede kommunikationsnetværk |
JP4899959B2 (ja) | 2007-03-19 | 2012-03-21 | 富士通株式会社 | Vpn装置 |
US7920487B2 (en) * | 2008-07-18 | 2011-04-05 | Avaya Inc. | Method and apparatus for loop prevention in communication networks |
CN101562552B (zh) * | 2009-05-27 | 2011-09-14 | 华为技术有限公司 | 一种虚拟专用局域网环路检测的方法、系统和设备 |
US8705526B1 (en) * | 2010-12-03 | 2014-04-22 | Juniper Networks, Inc. | Extending VPLS support for CE lag multi-homing |
CN102340434B (zh) | 2011-07-07 | 2014-03-26 | 杭州华三通信技术有限公司 | 基于多归属接入的环路避免方法和边缘设备 |
US8908537B2 (en) * | 2012-01-27 | 2014-12-09 | Alcatel Lucent | Redundant network connections |
US9270426B1 (en) * | 2012-09-11 | 2016-02-23 | Juniper Networks, Inc. | Constrained maximally redundant trees for point-to-multipoint LSPs |
CN104219147B (zh) | 2013-06-05 | 2018-10-16 | 中兴通讯股份有限公司 | 边缘设备的vpn实现处理方法及装置 |
US20150003458A1 (en) * | 2013-06-27 | 2015-01-01 | Futurewei Technologies, Inc. | Boarder Gateway Protocol Signaling to Support a Very Large Number of Virtual Private Networks |
CN104734874B (zh) * | 2013-12-20 | 2018-04-27 | 华为技术有限公司 | 一种确定网络故障的方法及装置 |
US9755957B2 (en) * | 2014-06-20 | 2017-09-05 | Verizon Patent And Licensing Inc. | Pseudowire control channel for signaling events |
CA2912643A1 (en) * | 2015-03-04 | 2016-09-04 | Teloip Inc. | System, apparatus and method for providing a virtual network edge and overlay with virtual control plane |
US9680694B1 (en) * | 2015-03-05 | 2017-06-13 | Juniper Networks, Inc. | Overload functionality in overlay networks using fault detection protocols |
CN105119824B (zh) * | 2015-06-30 | 2018-11-16 | 华为技术有限公司 | 一种报文转发方法和装置 |
CN106713130B (zh) * | 2015-11-13 | 2019-11-22 | 华为技术有限公司 | 一种路由表更新方法、evpn控制设备及evpn系统 |
WO2017158401A1 (en) * | 2016-03-15 | 2017-09-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for supporting bidirectional forwarding (bfd) over multi-chassis link aggregation group (mc-lag) in internet protocol (ip) multiprotocol label switching (mpls) networks |
CN105933222B (zh) * | 2016-04-12 | 2019-01-15 | 烽火通信科技股份有限公司 | 一种ce双归接入pe组网中基于mstp的防环方法 |
JP6635885B2 (ja) | 2016-07-05 | 2020-01-29 | 株式会社ワンブリッジ | 中継装置の冗長化構成における物理的非対称ルーティング防止メカニズム |
CN111726286A (zh) | 2017-03-14 | 2020-09-29 | 华为技术有限公司 | Evpn报文处理方法、设备及系统 |
US10506083B2 (en) * | 2017-06-27 | 2019-12-10 | Cisco Technology, Inc. | Segment routing gateway storing segment routing encapsulating header used in encapsulating and forwarding of returned native packet |
-
2018
- 2018-06-30 CN CN202210372408.6A patent/CN114745319A/zh active Pending
- 2018-06-30 CN CN201810703111.7A patent/CN110661701B/zh active Active
-
2019
- 2019-06-23 JP JP2020571430A patent/JP7053901B2/ja active Active
- 2019-06-23 CA CA3104756A patent/CA3104756C/en active Active
- 2019-06-23 WO PCT/CN2019/092444 patent/WO2020001389A1/zh unknown
- 2019-06-23 EP EP19827141.3A patent/EP3806404A4/en active Pending
-
2020
- 2020-12-29 US US17/136,939 patent/US12034631B2/en active Active
-
2022
- 2022-03-31 JP JP2022059657A patent/JP7306642B2/ja active Active
-
2024
- 2024-06-03 US US18/731,632 patent/US20240323115A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140126422A1 (en) * | 2012-11-02 | 2014-05-08 | Ciena Corporation | Resilient interworking of shortest path bridging and ethernet virtual private networks |
CN104601381A (zh) * | 2015-01-30 | 2015-05-06 | 杭州华三通信技术有限公司 | 防止流量中断的方法和设备 |
CN104753754A (zh) * | 2015-03-12 | 2015-07-01 | 杭州华三通信技术有限公司 | 一种报文的传输方法和设备 |
CN105591800A (zh) * | 2015-07-29 | 2016-05-18 | 杭州华三通信技术有限公司 | 流量保护方法及装置 |
CN107040462A (zh) * | 2015-09-29 | 2017-08-11 | 丛林网络公司 | 路由方法和中间路由器 |
US20170099180A1 (en) * | 2015-10-01 | 2017-04-06 | Juniper Networks, Inc. | Fast convergence of evpn networks for multi homing topologies |
Non-Patent Citations (1)
Title |
---|
EASTLAKE, D. ET AL.: "EVPN All Active Usage Enhancements", TRILL WORKING GROUP, 5 March 2018 (2018-03-05), pages 1 - 15, XP055672626, Retrieved from the Internet <URL:<draft-eastlake-bess-evpn-vxlan-bypass-vtep-OO.txt>> * |
Also Published As
Publication number | Publication date |
---|---|
JP7053901B2 (ja) | 2022-04-12 |
JP7306642B2 (ja) | 2023-07-11 |
JP2021529454A (ja) | 2021-10-28 |
US20210119906A1 (en) | 2021-04-22 |
JP2022095786A (ja) | 2022-06-28 |
CN110661701A (zh) | 2020-01-07 |
US20240323115A1 (en) | 2024-09-26 |
CN114745319A (zh) | 2022-07-12 |
EP3806404A1 (en) | 2021-04-14 |
CA3104756C (en) | 2024-01-09 |
EP3806404A4 (en) | 2021-08-04 |
CA3104756A1 (en) | 2020-01-02 |
US12034631B2 (en) | 2024-07-09 |
CN110661701B (zh) | 2022-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11611509B2 (en) | Communication method, communications device, and communications system | |
WO2020001389A1 (zh) | 一种避免环路的通信方法、设备和系统 | |
US9860150B2 (en) | Fast convergence of EVPN networks for multi homing topologies | |
WO2021258754A1 (zh) | 报文指示方法、装置、设备和存储介质 | |
US9019814B1 (en) | Fast failover in multi-homed ethernet virtual private networks | |
WO2016101646A1 (zh) | 以太虚拟网络的接入方法及装置 | |
WO2021031648A1 (zh) | Evpn和vpls共存双活的方法、设备及系统 | |
CN111064596B (zh) | 对于用于多宿主节点故障的bum流量的节点保护 | |
WO2020119644A1 (zh) | 一种转发表项生成方法、装置及设备 | |
WO2012130034A1 (zh) | 一种vpls快速重路由方法和设备 | |
US11522792B2 (en) | Method for discovering forwarding path and related device thereof | |
US20220124024A1 (en) | Establishment of method and apparatus for implementing entry backup | |
WO2022083563A1 (zh) | 链路检测方法、链路检测装置、终端设备和存储介质 | |
WO2020173424A1 (zh) | 报文处理的方法和网关设备 | |
WO2021093463A1 (zh) | 报文转发的方法、第一网络设备以及第一设备组 | |
US20240214243A1 (en) | Designated forwarder df election method and device | |
WO2010045838A1 (zh) | 报文处理的方法和装置 | |
WO2022257773A1 (zh) | 路由检测方法、设备、系统及存储介质 | |
WO2022017225A1 (zh) | 报文发送方法、设备及系统 | |
WO2022001274A1 (zh) | 一种路由生成方法、路由处理方法及装置 | |
WO2021135472A1 (zh) | 一种路由信息的处理方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19827141 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2020571430 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 3104756 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019827141 Country of ref document: EP Effective date: 20210107 |