WO2020249033A1 - 一种误码通告的方法及相关设备 - Google Patents

一种误码通告的方法及相关设备 Download PDF

Info

Publication number
WO2020249033A1
WO2020249033A1 PCT/CN2020/095481 CN2020095481W WO2020249033A1 WO 2020249033 A1 WO2020249033 A1 WO 2020249033A1 CN 2020095481 W CN2020095481 W CN 2020095481W WO 2020249033 A1 WO2020249033 A1 WO 2020249033A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
tunnel
node
error
bfd
Prior art date
Application number
PCT/CN2020/095481
Other languages
English (en)
French (fr)
Inventor
辛方
陈达
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to BR112021023534A priority Critical patent/BR112021023534A2/pt
Priority to JP2021568956A priority patent/JP7334392B2/ja
Priority to KR1020217040774A priority patent/KR20220007689A/ko
Priority to EP20822228.1A priority patent/EP3962000B1/en
Publication of WO2020249033A1 publication Critical patent/WO2020249033A1/zh
Priority to US17/546,404 priority patent/US20220103312A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/11Identifying congestion
    • H04L47/115Identifying congestion using a dedicated packet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/17Interaction among intermediate nodes, e.g. hop by hop
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/33Flow control; Congestion control using forward notification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/20Arrangements for detecting or preventing errors in the information received using signal quality detector
    • H04L1/203Details of error rate determination, e.g. BER, FER or WER
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L2001/0092Error control systems characterised by the topology of the transmission link
    • H04L2001/0097Relays

Definitions

  • This application relates to the field of network communication technology, and in particular to a method for error notification and related equipment.
  • Bit error means that the signal received by the communication device has a bit error compared to when the signal was sent. It is usually reflected in the communication device detecting a packet error according to the cyclic redundancy check (CRC) algorithm . Errors caused by line faults can be eliminated by troubleshooting, but probabilistic errors caused by optical path jitter, line aging, etc., are difficult to eliminate. The probabilistic packet loss failures caused by these factors may cause the base station to drop out of service (that is, the base station goes offline and loses management) and data traffic loss.
  • CRC cyclic redundancy check
  • the bidirectional forwarding detection (BFD) protocol is used for end-to-end link detection. It is a fast and independent of the routing protocol, and the detection speed can reach the subtle level.
  • the two ends first establish a session through negotiation. After the session is established (UP), the two ends periodically send BFD packets to the opposite end, and in this way, the links through which BFD packets are exchanged are detected. If one end does not receive the BFD packet from the opposite end within a certain period of time, the session status changes to DOWN, and it indicates that the link through which the BFD packet passes has failed.
  • the BFD message here refers to various transmission protocol messages that carry content related to the BFD protocol, or in other words, the payload part of these protocol messages carries content related to the BFD protocol.
  • both ends can negotiate the sending frequency of their respective BFD packets. The higher the frequency, the faster the fault is detected.
  • BFD messages In an IPv4 or IPv6 network, BFD messages must use the user datagram protocol (UDP) and Internet protocol (IP) encapsulation formats.
  • UDP user datagram protocol
  • IP Internet protocol
  • BFD messages or intermediate system-to-intermediate system (intermediate system-to-intermediate system, IS-IS) messages are generally used to transfer error information.
  • BFD packets are used to transmit error information. It is necessary to extend the length of BFD packets, and add a type length value (TLV) at the end of the BFD packets. Because this method modifies the format of BFD packets, what is transmitted is not Standard BFD packets are difficult to communicate with each other. For example, the peer device may not be able to parse BFD packets with modified formats, and thus cannot obtain the error information carried in the BFD packets.
  • the use of IS-IS packets to transmit error information can only transmit error information in the Layer 2 network. If there are Layer 3 devices or multiple intermediate devices between the end and end, this method will no longer be applicable. Only applicable to the transmission of error information between directly connected devices.
  • This application provides a method and related equipment for transmitting error information, which can transmit error information and realize end-to-end service linkage switching.
  • a method for error notification including: an intermediate node on a first tunnel detects that the error rate of a message sent through the first tunnel exceeds a threshold; and the intermediate node passes the first tunnel.
  • a tunnel sends a first message to the egress node of the first tunnel, where the first message is used to indicate that a code error occurs in the first tunnel, and the first message is also used to instruct the egress node to
  • the ingress node of the first tunnel sends a second message, where the second message is used to indicate that a code error occurs in the first tunnel.
  • the intermediate node on the first tunnel detects the bit error rate of the message sent through the first tunnel, and when the bit error rate exceeds the threshold, the intermediate node sends an instruction to the egress node of the first tunnel After receiving the first packet with an error in the first tunnel, the egress node sends a second packet indicating the error in the first tunnel to the ingress node of the first tunnel.
  • the transmission of error information realizes end-to-end service linkage switching.
  • the first message includes a label and an error identifier
  • the label is used by the egress node to determine the first tunnel
  • the error The code identifier is used to indicate that a code error occurs in the tunnel through which the first message is sent.
  • the intermediate node carries the label and the error code identifier in the first message and sends it to the egress node.
  • the egress node After receiving the first message, the egress node can determine the first tunnel based on the label carried in it. According to the error code, it can be determined that an error has occurred, and the tag can be combined to determine that an error has occurred in the first tunnel, ensuring that the egress node can accurately determine that an error has occurred in the first tunnel.
  • the first message is used to instruct the egress node to send a second message to the ingress node of the first tunnel through a second tunnel,
  • the second tunnel is a reverse tunnel of the first tunnel.
  • the first tunnel and the second tunnel are each other's reverse tunnels. After receiving the first packet sent by the intermediate node, the exit node of the first tunnel needs to pass the reverse direction of the first tunnel.
  • the tunnel that is, the second tunnel, sends a second message to the ingress node of the first tunnel to notify the ingress node that there is an error in the first tunnel.
  • the label is also used by the egress node to determine the second tunnel.
  • the transfer between messages is determined by the label. After the egress node of the first tunnel receives the first message, since the first message carries the label, the egress node can According to the label, the entry node of the first tunnel can be determined, and the second tunnel can be determined. Since the IP address is not relied on, the message transmission is more efficient and convenient.
  • the intermediate node calculates the sum of the bit error rates of the packets forwarded on the multi-segment path on the first tunnel, and detects the error The sum of code rates exceeds the threshold.
  • the intermediate node calculates the sum of the bit error rate of the messages forwarded on multiple paths, and then compares it with the threshold value to determine the bit error rate transmission and avoid the bit error rate of each path.
  • the threshold is reached and the overall bit error rate exceeds the threshold, it is ensured that the intermediate node can accurately send the first message indicating the error of the first tunnel to the egress node, so that the egress node can take corresponding measures to avoid data traffic loss .
  • the first message is a two-way forwarding detection BFD message
  • the BFD message includes a diagnostic word field
  • the diagnostic word field is used to carry
  • the value of the error code identifier is 30.
  • the value of the error code can also be other values, such as 10, 15, etc., as long as the value range is between 9 and 31.
  • the special value of the diagnostic word field in the BFD message is used to characterize the error identifier, and there is no need to add other fields or send other information to carry the error identifier, and there is no need to modify the BFD message.
  • the format ensures that the sent message is still a standard BFD message, avoids the problem of intercommunication difficulties, and can effectively realize the transmission of the error status, which is simple to implement and improves the transmission efficiency.
  • the first message is a BFD message
  • the BFD message includes a minimum echo message receiving interval field
  • the minimum echo message is received
  • the interval field is used to carry the bit error rate
  • the first m bits of the minimum echo message receiving interval field represent the coefficient of the bit error rate
  • the middle n bits of the minimum echo message receiving interval field represent the bit error rate.
  • the power of the bit error rate wherein the m is a positive integer greater than or equal to 1, the n is a positive integer greater than or equal to 1, and the sum of the m and the n is less than the minimum echo message receiving interval
  • the length value of the field wherein the m is a positive integer greater than or equal to 1, the n is a positive integer greater than or equal to 1, and the sum of the m and the n is less than the minimum echo message receiving interval.
  • the bit error rate can be transmitted, so that the exit node of the first tunnel can more intuitively send the first message from the intermediate node.
  • the bit error rate is obtained in the message, and no additional bit error rate transmission is required, which reduces transmission resource overhead and improves transmission efficiency.
  • a method for error notification including: an exit node of a first tunnel receives a first packet sent by a first intermediate node on the first tunnel through the first tunnel, and A message is a message sent to the egress node by the first intermediate node detecting that the error rate of the message sent through the first tunnel exceeds a threshold, and the first message is used to indicate the The first tunnel has an error; the egress node sends a second message to the ingress node of the first tunnel according to the first message, and the second message is used to indicate that the first tunnel has an error code.
  • the exit node of the first tunnel receives a first message indicating that an error occurs in the first tunnel, and the first message is a message sent by the intermediate node of the first tunnel when it detects A message whose bit error rate exceeds the threshold and is sent to the egress node.
  • the egress node After receiving the first message, the egress node sends to the ingress node of the first tunnel a second message indicating that a bit error occurs in the first tunnel, In this way, error information can be transmitted, and end-to-end service linkage switching can be realized.
  • the first message includes a first label and a first error identifier
  • the first label corresponds to the first tunnel
  • the The first error code identifier is used to indicate that a code error occurs in the tunnel through which the first message is sent; the egress node determines that a code error occurs in the first tunnel according to the first label and the first error code identifier.
  • the egress node determines a second tunnel according to the first label; the egress node uses the second tunnel to connect to the first tunnel The ingress node sends a second packet, and the second tunnel is a reverse tunnel of the first tunnel.
  • the second message includes a second label and a second error identifier
  • the second label is used by the ingress node to determine the first A tunnel, where the second error identifier is used to indicate that an error occurs in the reverse tunnel of the tunnel through which the second packet is sent.
  • the egress node carries the second label and the second error identifier in a second message and sends it to the ingress node.
  • the ingress node can be based on the second label. Determine the first tunnel.
  • the second error identifier it can be determined that an error has occurred.
  • the first tunnel has an error, ensuring that the ingress node can accurately determine that the first tunnel has an error. Subsequent service switching can be performed.
  • the egress node determines a second tunnel according to the first label; the egress node uses the second tunnel to connect to the first tunnel The ingress node sends a second packet, and the second tunnel is a reverse tunnel of the first tunnel.
  • the second message includes a second label and a second error identifier
  • the second label is used by the ingress node to determine the first A tunnel, where the second error identifier is used to indicate that an error occurs in the reverse tunnel of the tunnel through which the second packet is sent.
  • the first message is a two-way forwarding detection BFD message
  • the BFD message includes a diagnostic word field, and the diagnostic word field is used to carry For the first error code identifier, the value of the first error code identifier is 30
  • the second message is a BFD message
  • the BFD message includes a diagnostic word field, and the diagnostic word field is used to carry For the second error code identifier, the value of the second error code identifier is 31.
  • the first message and the second message are BFD messages
  • the BFD message includes a minimum echo message reception interval field
  • the minimum echo message reception interval field is used to carry the bit error rate
  • the first m bits of the minimum echo message reception interval field represent the coefficient of the bit error rate
  • the minimum echo message reception interval field The n bits in the middle represent the power of the bit error rate, where m is a positive integer greater than or equal to 1, the n is a positive integer greater than or equal to 1, and the sum of m and n is less than The length value of the minimum echo message receiving interval field.
  • the egress node receives a third packet sent by a second intermediate node on the first tunnel through the first tunnel, and the first tunnel
  • the third message is a message sent to the egress node by the second intermediate node detecting that the error rate of the message sent through the first tunnel exceeds a threshold, and the first message includes a first error code
  • the third message includes a second error rate; the egress node calculates the sum of the first error rate and the second error rate, and the first error rate and the second error rate The sum of the bit error rates exceeds the switching threshold of the exit node.
  • the egress node can calculate the sum of the error rates of the messages sent by multiple intermediate nodes, and then compare it with the switching threshold to determine the error rate, and avoid errors caused by multiple links at the same time. Code, and the bit error rate of each link does not reach the switching threshold occurs, to ensure that the egress node can accurately grasp the transmission status of the first tunnel, and timely feedback to the ingress node so that the ingress node can take corresponding measures ( For example, perform service switching) to avoid data traffic loss.
  • measures For example, perform service switching
  • a method for error notification includes: an ingress node of a first tunnel receiving a second message sent by an egress node of the first tunnel, the second message indicating the first tunnel A code error occurs; the ingress node determines that a code error occurs in the first tunnel according to the second message.
  • the ingress node of the first tunnel after the ingress node of the first tunnel receives the second message sent by the egress node of the first tunnel indicating that the first tunnel has an error, it can be determined that the first tunnel has an error. In this way, error information can be transmitted to realize end-to-end service linkage switching.
  • the ingress node of the first tunnel receives the second packet sent by the egress node of the first tunnel through the second tunnel, and the second The tunnel is a reverse tunnel of the first tunnel.
  • the second message includes a label and an error code identifier, and the error code identifier is used to indicate the reverse of the tunnel through which the second message is sent.
  • An error occurs to the tunnel; the ingress node determines, according to the label, that the tunnel through which the second message is sent is the second tunnel, and determines that the first tunnel is the reverse tunnel of the second tunnel; The ingress node determines that an error occurs in the first tunnel according to the error identifier.
  • the second message is a BFD message
  • the BFD message includes a diagnostic word field
  • the diagnostic word field is used to carry the error Code identifier
  • the value of the error code identifier is 31.
  • the second message is a BFD message
  • the BFD message includes a minimum echo message reception interval field
  • the minimum echo message is received
  • the interval field is used to carry the bit error rate
  • the first m bits of the minimum echo message receiving interval field represent the coefficient of the bit error rate
  • the middle n bits of the minimum echo message receiving interval field represent the error
  • the power of the code rate wherein the m is a positive integer greater than or equal to 1, the n is a positive integer greater than or equal to 1, and the sum of the m and the n is less than the minimum echo message receiving interval field The length value.
  • a method for error notification which includes: a first node performs bit error rate detection on a message received from a second node; when the bit error rate is detected to reach a threshold, creating a second node Two-way forwarding between nodes detects a BFD session; the first node sends a BFD packet to the second node through the BFD session, and the BFD packet is used to instruct to transfer from the second node to the first node
  • the message sent by the node has an error.
  • the first node when the first node detects that the bit error rate reaches the threshold, it creates a BFD session and sends a BFD message to the second node to notify the second node that the message sent by the second node has an error, which can be faster The error information is accurately transmitted to the second node.
  • the Internet Protocol IP address of the BFD message is a multicast IP address, or the MAC address of the BFD message is a multicast MAC address.
  • the first node transmits error information through a BFD message using a multicast IP address or a multicast MAC address, and can directly transmit error information to the second node without relying on the configuration of the IP address. It is applied to the three-layer network and the two-layer network at the same time, which expands the transmission range of error information.
  • the diagnosis Diag field of the BFD message is used to identify that the message sent by the second node to the first node has an error.
  • the special value of the Diag field of the diagnostic word in the BFD message is used to characterize the error identifier, and there is no need to add other fields or send other information to carry the error identifier, and there is no need to modify the BFD message
  • the format ensures that the sent message is still a standard BFD message, avoids the problem of intercommunication difficulties, and can effectively realize the transmission of the error status, which is simple to implement and improves the transmission efficiency.
  • the first node when it is detected that the bit error rate is less than the threshold, deletes the BFD session and stops sending to the second node BFD packets.
  • the first node when the first node detects that the bit error rate is less than the threshold, it deletes the BFD session and stops sending BFD packets to the second node, which can avoid waste of transmission resources, improve processor performance, and reduce power consumption .
  • a method for error notification including: a second node uses a first tunnel to send a message to a first node; and the second node receives a two-way forwarding detection BFD message sent by the first node , The BFD message is used to indicate that a message sent from the second node to the first node has an error; the second node uses the second tunnel to send the message to the first node, and The second tunnel is different from the first tunnel.
  • the second node uses the first tunnel to send a message to the first node, and by receiving the BFD message sent by the first node, it determines that the message sent to the first node has an error, and then reuses A second tunnel different from the first tunnel sends a message to the first node.
  • the error code information sent by the first node can be received more quickly and accurately, so that the second tunnel can be used to send messages in time to avoid data traffic loss.
  • the diagnosis Diag field of the BFD message is used to identify that the message sent by the second node to the first node has an error.
  • an intermediate node is provided.
  • the intermediate node may be a router or a switch, or a chip in the router or the switch.
  • the intermediate node has the function of realizing the intermediate node involved in the first aspect. This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • the intermediate node includes a processing module and a transceiver module.
  • the processing module may be, for example, a processor, and the transceiver module may be, for example, a transceiver.
  • the transceiver module is used to support the communication between the intermediate node and the egress node of the first tunnel and between the intermediate node and the ingress node of the first tunnel.
  • the transceiver module may also include a sending module and a receiving module, which may be used to support the intermediate The node performs uplink communication and downlink communication.
  • the sending module can be used to send the first message to the egress node of the first tunnel
  • the receiving module can be used to receive the message sent through the first tunnel
  • the processing module can be used to detect the received message Bit error rate.
  • the intermediate node may further include a memory, which is configured to be coupled with the processor and stores necessary program instructions and data of the intermediate node.
  • the intermediate node includes a processor and a transceiver.
  • the processor is used to control the functions of each component, and the transceiver is used to support the communication between the intermediate node and the exit node of the first tunnel and the entry node of the first tunnel.
  • the transceiver of the intermediate node may receive the message sent by the entry node of the first tunnel, and perform CRC detection to obtain the bit error rate.
  • the intermediate node further includes a memory, which stores the necessary program instructions and data of the intermediate node; for example, in the uplink communication, the transceiver of the intermediate node may send the first message carrying the label and the error identifier to Exit node.
  • the chip when the intermediate node is a chip in a router or a switch, the chip includes a processing module and a transceiver module.
  • the processing module may be a processor, for example, and the processor may be used to The data packet received by the transceiver module performs bit error rate detection, and the transceiver module may be, for example, an input/output interface on the chip.
  • the processing module can execute computer-executable instructions stored in the storage unit to support the intermediate node to perform the corresponding functions of the first aspect.
  • the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the intermediate node, such as a read-only memory. (read-only memory, ROM for short) or other types of static storage devices that can store static information and instructions, random access memory (RAM for short), etc.
  • the intermediate node includes a processor configured to couple with the memory, read instructions in the memory, and perform functions related to the intermediate node in the first aspect according to the instructions.
  • the memory may be located inside the processor or outside the processor.
  • an egress node is provided.
  • the egress node may be a router or a switch, or a chip in the router or the switch.
  • the exit node has the function of implementing the second aspect involving the exit node. This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • the egress node includes a processing module and a transceiver module.
  • the processing module may be, for example, a processor, and the transceiver module may be, for example, a transceiver.
  • the transceiver module is used to support communication between the egress node and the intermediate node of the first tunnel and the egress node and the ingress node of the first tunnel.
  • the transceiver module may also include a sending module and a receiving module, which may be used to support the egress The node performs uplink communication and downlink communication.
  • the receiving module can be used to receive the first packet sent by the intermediate node through the first tunnel
  • the sending module can be used to send the second packet to the entry node of the first tunnel
  • the processing module can be used to The first label and the first error identifier determine that an error occurs in the first tunnel.
  • the exit node may further include a memory, which is configured to be coupled with the processor and stores necessary program instructions and data of the exit node.
  • the exit node includes a processor and a transceiver.
  • the processor is used to control the functions of each component, and the transceiver is used to support the communication between the egress node and the intermediate node of the first tunnel and the entry node of the first tunnel.
  • the transceiver of the egress node may receive the first message sent by the intermediate node of the first tunnel.
  • the egress node further includes a memory, which stores the program instructions and data necessary for the egress node; for example, in uplink communication, the transceiver of the egress node may transfer the second label and the second error identifier to the second The message is sent to the ingress node.
  • the egress node when the egress node is a chip in a router or a switch, the chip includes: a processing module and a transceiver module.
  • the processing module may be a processor, for example, and the processor may be used to The data packet received by the transceiver module calculates the sum of the bit error rate, and the transceiver module may be an input/output interface on the chip, for example.
  • the processing module can execute computer-executable instructions stored in the storage unit to support the exit node to perform the corresponding functions of the second aspect.
  • the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the exit node, such as a read-only memory. (read-only memory, ROM for short) or other types of static storage devices that can store static information and instructions, random access memory (RAM for short), etc.
  • a read-only memory read-only memory
  • ROM read-only memory
  • RAM random access memory
  • the exit node includes a processor configured to couple with the memory, read instructions in the memory, and execute the functions related to the exit node in the second aspect described above according to the instructions.
  • the memory may be located inside the processor or outside the processor.
  • an ingress node may be a router or a switch, or a chip in the router or the switch.
  • the entry node has the function of implementing the third aspect involving entry nodes. This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • the entry node includes a processing module and a transceiver module.
  • the processing module may be, for example, a processor, and the transceiver module may be, for example, a transceiver.
  • the transceiver module is used to support the communication between the ingress node and the egress node of the first tunnel and between the ingress node and the intermediate node of the first tunnel.
  • the transceiver module may also include a sending module and a receiving module, which can be used to support the ingress.
  • the node performs uplink communication and downlink communication.
  • the sending module can be used to send a message to the intermediate node of the first tunnel
  • the receiving module can be used to receive the second message sent by the egress node through the second tunnel
  • the processing module can be used to send a message according to the second message It is determined that a bit error occurs in the first tunnel.
  • the entry node may further include a memory, which is configured to be coupled with the processor and stores necessary program instructions and data of the entry node.
  • the entry node includes a processor and a transceiver.
  • the processor is used to control the functions of each component, and the transceiver is used to support communication between the ingress node and the egress node of the first tunnel and the intermediate node of the first tunnel.
  • the transceiver of the ingress node may receive the second message sent by the egress node through the second tunnel, and determine that an error occurs in the first tunnel according to the second message.
  • the ingress node further includes a memory, which stores program instructions and data necessary for the ingress node; for example, in uplink communication, the transceiver of the ingress node can send messages to the intermediate node.
  • the ingress node when the ingress node is a chip in a router or a switch, the chip includes a processing module and a transceiver module.
  • the processing module may be, for example, a processor.
  • the data packet received by the transceiver module is analyzed to determine that a code error occurs in the first tunnel.
  • the transceiver module may be, for example, an input/output interface on the chip.
  • the processing module can execute computer-executable instructions stored in the storage unit to support the entry node to perform the corresponding functions of the third aspect.
  • the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the entry node, such as a read-only memory. (read-only memory, ROM for short) or other types of static storage devices that can store static information and instructions, random access memory (RAM for short), etc.
  • a read-only memory read-only memory
  • ROM read-only memory
  • RAM random access memory
  • the entry node includes a processor configured to couple with the memory, read instructions in the memory, and perform functions related to the entry node in the third aspect according to the instructions.
  • the memory may be located inside the processor or outside the processor.
  • a first node is provided.
  • the first node may be a router or a switch, or a chip in the router or the switch.
  • the first node has the function of implementing the fourth aspect related to the first node. This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • a second node is provided.
  • the second node may be a router or a switch, or a chip in the router or the switch.
  • the second node has the function of implementing the fifth aspect related to the second node. This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more units corresponding to the above-mentioned functions.
  • a computer non-transitory storage medium which includes instructions that, when the instructions run on an intermediate node, cause the intermediate node to perform the method according to any one of the first aspect.
  • a computer non-transitory storage medium including instructions, which when the instructions are executed on an exit node, cause the exit node to execute the method according to any one of the second aspects.
  • a computer non-transitory storage medium including instructions, which when the instructions run on an ingress node, cause the ingress node to execute the method according to any one of the third aspects.
  • a computer non-transitory storage medium including instructions, which when the instructions are executed on a first node, cause the first node to execute the method according to any one of the fourth aspects.
  • a computer non-transitory storage medium including instructions, which, when the instructions run on a second node, cause the second node to perform the method according to any one of the fifth aspects.
  • FIG. 1 is a schematic diagram of a standard two-way forwarding detection message payload format provided by an embodiment of the application
  • Figure 2 is a schematic diagram of an application scenario provided by an embodiment of the application
  • FIG. 3 is a schematic flowchart of a method for error notification provided by an embodiment of the application.
  • FIG. 4 is a schematic diagram of a multi-segment error rate superposition principle according to an embodiment of the application.
  • FIG. 5 is a schematic flowchart of another error notification method provided by an embodiment of this application.
  • FIG. 6 is a schematic flowchart of another error notification method provided by an embodiment of the application.
  • FIG. 7 is a schematic structural diagram of an intermediate node provided by an embodiment of the application.
  • FIG. 8 is a schematic structural diagram of an egress node provided by an embodiment of this application.
  • FIG. 9 is a schematic structural diagram of an ingress node provided by an embodiment of this application.
  • FIG. 10 is a schematic structural diagram of a first node provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a second node provided by an embodiment of this application.
  • FIG. 12 is a schematic structural diagram of a network device provided by an embodiment of this application.
  • Cyclic redundancy check is a hash function that generates a fixed-digit check code based on data such as network data packets or computer files. It is mainly used to detect or verify the possibility of data transmission or storage. The error that occurs is detected by the principle of division and remainder. For example, in this application, the intermediate node device may use CRC to perform error detection on the received data.
  • Bidirectional forwarding detection is a network protocol used to detect faults between two forwarding points.
  • BFD can perform bidirectional fault detection on the link between two network nodes.
  • the link can be a physical link or a logical link (such as a label switched path (LSP), tunnel, etc.).
  • BFD can be different upper-layer applications (such as multi-protocol label switching (MPLS), open shortest path first (OSPF), intermediate system-to-intermediate system , IS-IS), etc.) provide fault detection services and provide the same fault detection time.
  • MPLS multi-protocol label switching
  • OSPF open shortest path first
  • IS-IS intermediate system-to-intermediate system
  • BFD can also link with upper-layer routing protocols to achieve rapid routing convergence and ensure business continuity.
  • the BFD message can also carry other information to be transmitted to the peer device. For example, in this application, the BFD message is used to carry error information and a label to be transmitted to the peer device.
  • IS-IS Intermediate system-to-intermediate system
  • a hierarchical link state routing protocol uses the Hello protocol to find adjacent nodes and uses a propagation protocol to send link information.
  • IS-IS messages can also carry error information and be transmitted, but they can only be transmitted in a Layer 2 network.
  • a label switched path is a packet forwarding path established using the MPLS protocol.
  • Each node in the LSP is composed of a label switching router (LSR), and the packet is labeled and transmitted along the LSP formed by a series of LSRs.
  • LSR label switching router
  • the label edge router (LER) of the ingress node is called the ingress router (Ingress), which is used to receive and label the packets
  • the LER of the egress node is called the egress router (Egress).
  • the LSR performs forwarding according to the label on the packet and the label forwarding information base (LFIB).
  • LFIB label forwarding information base
  • TLV type length value
  • the type field is the information about the label and encoding format
  • the length field is the length of the defined value
  • the value field indicates the actual Numerical value.
  • the message includes a 3-bit BFD protocol version number field (version), a 5-bit diagnostic word field (diagnostic), a 2-bit BFD local state field (state), and a 1-bit request confirmation Field (poll), a 1-bit response field (final), a 1-bit forwarding/control separation flag field (control plane independen), a 1-bit authentication identification field (authentication present), a 1-bit length
  • the query request field (demand) a 1-bit length reserved for BFD to support point-to-multipoint expansion in the future (multipoint), an 8-bit detection timeout multiple field (detect Mult), a length of 8 BFD packet length field (length) with a length of 32 bits, BFD session connection local identifier field with a length of 32 bits (my discriminator), BFD session connection remote identifier field with a length of 32 bits (your discriminator), with a length of 32 bits
  • the locally supported minimum BFD message sending interval field (desired min tx interval)
  • a TLV is added to the end of the standard BFD message shown in FIG. 1, such as a bit error rate type field, a bit error rate coefficient field, etc., to transmit the error information.
  • this method modifies the format of the BFD message, and the transmitted BFD message is no longer a standard BFD message. Since there is no unified standard, it is difficult to communicate. The peer device may not be able to parse the modified BFD message. Text, the error information contained in it cannot be obtained.
  • error information can also be transmitted by using IS-IS messages.
  • the IS-IS Hello message is first generated, and error information, such as the error level indicating the severity of the error, and the error identifier indicating the error category, are carried in the TLV field of the IS-IS Hello message.
  • IS-IS packets can only be transmitted in the Layer 2 network, so this method can only transmit error information in the Layer 2 network, that is, the error information can only be transmitted between two directly connected devices. There are three-layer devices or multiple intermediate devices between two endpoint devices. This method will not be applicable, that is, the endpoint devices cannot directly sense error codes, and cannot link the endpoint device to the endpoint device's service switching, resulting in data traffic loss.
  • this application proposes an error notification method and related equipment, which can transmit error information when an error occurs on the transmission link, realize end-to-end service linkage switching, and reduce probabilistic loss. Packet failure to avoid data flow loss.
  • the technical solutions of the embodiments of this application can be applied to wide area networks (WAN), metropolitan area networks (MAN), wireless local area networks (wireless local area networks, WLAN), or other networks.
  • WAN wide area networks
  • MAN metropolitan area networks
  • WLAN wireless local area networks
  • the network has the same characteristics, that is, BFD sessions and LSPs can be established between any two devices in the network, and BFD packets can be used to transmit error information.
  • the first endpoint 210, the second endpoint 220, and the first node 230 form a communication system.
  • a first tunnel 240 is established between the first endpoint 210 and the second endpoint 220, and the first tunnel 240 may specifically be expressed as a label transfer between the first endpoint 210 and the second endpoint 220.
  • An LSP An LSP.
  • the first endpoint 210 is an exit node of the first tunnel 240
  • the second endpoint 220 is an entrance node of the first tunnel 240
  • the first node 230 is an intermediate node on the first tunnel 240.
  • the first node 230 performs error detection on the message sent through the first tunnel 240.
  • the first node 230 When it is detected that the error rate exceeds the threshold, the first node 230 sends a first message to the first endpoint 210.
  • the first message Indicate that the first tunnel 240 has an error code.
  • the first endpoint 210 After receiving the first packet, the first endpoint 210 sends a second packet to the second endpoint 220 through the second tunnel 250.
  • the second tunnel 250 is the first tunnel 240
  • the second message is used to indicate that an error occurs in the first tunnel 240, and the second endpoint 220 determines that an error occurs in the first tunnel 240 after receiving the second message.
  • the embodiments of this application involve egress/entrance nodes and intermediate nodes.
  • the egress/entrance nodes and intermediate nodes may be entities used to receive or transmit signals, such as switches, routers, distributed cluster servers, and wireless local area networks. , WLAN) stations (stations, STAs), access points (access points, APs), etc., which are not limited in this application.
  • FIG. 3 is a schematic flowchart of a method for error notification provided by an embodiment of the application. As shown in Figure 3, the method includes but is not limited to the following steps:
  • S301 The intermediate node performs error detection on the message sent through the first tunnel.
  • the first tunnel is established between the egress node and the ingress node, and the intermediate node is a node on the first tunnel. It should be understood that there may be multiple intermediate nodes on the first tunnel, and each intermediate node can perform error detection on the messages it receives.
  • the intermediate node may use the CRC to perform error detection on the message sent through the first tunnel, and detect whether the error rate of the message exceeds a threshold.
  • the threshold value can be set according to actual needs, and the specific setting value is not limited in this application.
  • the bit error rate threshold on each intermediate node can be set to the same or different.
  • the intermediate node calculates the sum of the bit error rates of the packets forwarded on the multiple paths on the first tunnel, and detects whether the sum of the bit error rates exceeds a threshold.
  • the intermediate node calculates the sum of the error rates of the multi-segment paths that produce errors, and detects whether the sum of the error rates exceeds the threshold.
  • the intermediate node calculates the sum of the bit error rates generated by the multi-segment path, it does not perform simple algebraic addition, but uses specific rules and algorithms to calculate the sum of the bit error rates, such as vector addition. There is no restriction on which algorithm to use.
  • the threshold is 2%.
  • the bit error rate generated on the first section of the path is 1.5%
  • the bit error rate generated on the second section of the path is also 1.5%, both of which have not reached the threshold.
  • the intermediate node calculates the sum of the error rates of the two paths, and obtains that the sum of the error rates is 2.5%, which exceeds the threshold.
  • the intermediate node needs to send the first message to the exit node of the first tunnel to transmit the error information.
  • the sum of the bit error rates finally calculated should be greater than the maximum value of the bit error rates respectively generated by the multi-segment path. It is less than the algebraic sum of the bit error rate generated by the multi-segment path.
  • the sum of the calculated bit error rates is 2.5%, which is greater than 1.5% and less than 3%.
  • the intermediate node can calculate the sum of the bit error rate of the multi-segment paths that generate errors, which can prevent the bit error rate of each path from not reaching the threshold and the overall bit error rate exceeding the threshold.
  • the egress node on a tunnel can receive the first message sent by the intermediate node in time to obtain error information, so that corresponding measures can be taken to avoid data traffic loss.
  • the intermediate node sends the first message to the egress node.
  • the intermediate node detects that the bit error rate exceeds the threshold, the first message is sent to the exit node of the first tunnel, and the first message carries error information.
  • the first message includes a first label and a first error identifier
  • the first label is used for the egress node to determine the first tunnel
  • the first error identifier is used for instructing to send the first tunnel. An error occurred in the tunnel of the packet.
  • the message is transmitted according to the label in the first tunnel.
  • the intermediate node After the intermediate node performs error detection, it will search for all LSPs in the LFIB of the local node, and find the corresponding LSP (that is, the first tunnel) After that, the corresponding label is carried in the first message and sent directly to the egress node of the first tunnel, or sent to the next intermediate node, and then indirectly sent to the egress node of the first tunnel through the next intermediate node.
  • the egress node receives (including directly received or indirectly received) the first packet, it can determine the first tunnel according to the label carried therein, and then can determine the ingress node of the first tunnel.
  • the intermediate node also carries the first error identifier in the first message and sends it together. After receiving the first message, the egress node can determine to send the first message according to the first error identifier therein. A bit error occurred in the tunnel of, and then combined with the label in the first packet, it can be determined that the bit error occurred in the first tunnel.
  • the intermediate node creates the first BFD session, carries the first label and the first error identifier in the first BFD message, and sends it to the egress node.
  • the first BFD message includes a diagnostic word field, the diagnostic word field is used to carry a first error code identifier, and the value of the first error code identifier is 30.
  • the intermediate node sends a first BFD message to the egress node, and the format of the first BFD message is the adopted BFD standard message format, and the specific form is as shown in FIG. 1 above. It should be understood that because the BFD standard message format is adopted, the problem of intercommunication difficulties and inability to be resolved is overcome.
  • the message format shown in FIG. 1 includes a 5-bit diagnostic word field.
  • RFC request for comments
  • 1 means control detection time expired (control detection time expired)
  • 2 means echo function failed (echo function failed)
  • 4 means forwarding plane reset.
  • the meaning of each value from 9 to 31 is not defined in the RFC and is a reserved value.
  • This application adds the value of the diagnostic word field (the value range is 9-31), and defines the newly added value, so that the BFD message can transmit the first error identifier.
  • the diagnostic word field when the value of the diagnostic word field is 30, it indicates that a forward error code has occurred (that is, an error code exists on the path of the message passing through the ingress node of the first tunnel to the egress node of the first tunnel). After receiving the first BFD message, the egress node can know that there is an error in the message sent through the first tunnel according to the value of the diagnostic word field therein. It should be understood that the value of other diagnostic word fields may also be used to represent the first error identifier, such as 10, which is not limited in this application.
  • the intermediate node when the intermediate node is sending the first BFD message to the egress node, when the diagnostic word field takes the value defined in this application, the intermediate node can determine the remote identifier field contained in the message The bits of are all set to 1. It should be understood that the value of the remote identifier field in the BFD packet needs to be determined through negotiation with the peer end of the session (that is, the value is obtained from the peer end of the session), for example, when the intermediate node needs to send the first BFD packet to the egress node , The value of the remote identifier field in the first BFD message needs to be negotiated with the egress node first.
  • the first BFD message includes a minimum echo message reception interval field
  • the minimum echo message reception interval field is used to carry the bit error rate
  • the minimum echo message reception interval The first m bits of the field represent the coefficient of the bit error rate
  • the middle n bits of the minimum echo message receiving interval field represent the power of the bit error rate, where m is a positive value greater than or equal to 1.
  • the minimum echo message receiving interval field conveys the bit error rate.
  • the coefficient part and the power part of the bit error rate are respectively represented by the first m bits and the middle n bits in the minimum echo message receiving interval field.
  • the intermediate node detects that the bit error rate is 7 ⁇ 10 -5 , and uses the first 4 bits of the minimum echo message reception interval field to indicate the coefficient of the bit error rate, which is 0111, and uses the minimum echo message reception interval field
  • the middle 3 bits represent the power of the bit error rate, which is 101, and the remaining 25 bits are reserved bits.
  • the intermediate node can pass the detected bit error rate to the egress node of the first tunnel, so that the egress node can more directly from the received first message
  • the bit error rate is obtained, there is no need to perform additional bit error rate transmission, which reduces transmission resource overhead and improves transmission efficiency.
  • the egress node receives a third packet sent by a second intermediate node on the first tunnel through the first tunnel, and the third packet is the second intermediate node
  • the third packet is the second intermediate node
  • Error rate; the exit node calculates the sum of the first error rate and the second error rate, and the sum of the first error rate and the second error rate exceeds the exit node The switching threshold.
  • each intermediate node can perform CRC detection on the received data to obtain the bit error rate on the path. After the bit error rate is obtained, each intermediate node can establish a BFD session with the egress node and send BFD packets to it, The corresponding label, error identifier and error rate are carried in the BFD message.
  • the egress node can superimpose the error rate of each received BFD message to obtain the total error rate, and then It is compared with the switching threshold to determine, and when the total bit error rate exceeds the switching threshold, feedback is made to the entry node of the first tunnel.
  • exit node when the exit node performs bit error rate superposition, it does not perform simple algebra and addition, but uses specific rules or algorithms to perform calculations, such as vector addition for bit error rate superposition. There are no restrictions on the rules or algorithms used.
  • bit error rate superposition reference may be made to the relevant description in S301 above. For the sake of brevity, details are not repeated here.
  • FIG. 4 is a schematic diagram of a multi-segment error rate superposition principle provided by an embodiment of the present application.
  • the ingress node 410 is connected to the egress node 440 through the first intermediate node 420 and the second intermediate node 430.
  • This path is the first tunnel established between the ingress node 410 and the egress node 440, and the message is In a tunnel, it is transmitted through labels.
  • the port of the first intermediate node 420 performs CRC detection after receiving the data sent by the ingress node 410, and detects that there is an error code that will establish the first BFD session, and sends the first BFD packet to the egress node 440.
  • the first BFD packet is The text carries the first bit error rate.
  • the port of the second intermediate node 430 also performs CRC detection after receiving the data forwarded by the first intermediate node 420, and detects that there is an error code to establish a second BFD session, and sends a second BFD packet to the egress node 440.
  • the second BFD message carries the second bit error rate.
  • the egress node 440 After receiving the first BFD message and the second BFD message, the egress node 440 superimposes the error rate of the first error rate and the second error rate to obtain the total error rate, which is then compared with the switching threshold . When the total bit error rate exceeds the switching threshold, the egress node 440 feedbacks to the ingress node 410 through the second tunnel.
  • the second tunnel is a reverse tunnel of the first tunnel.
  • the second tunnel may be established by connecting the egress node 440 to the ingress node 410 through the second intermediate node 430 and the first intermediate node 420, or it may be The egress node 440 is established by connecting with the ingress node 410 through other intermediate nodes. Only the entrance node 410 of the first tunnel becomes the exit node of the second tunnel, and the exit node 440 of the first tunnel becomes the entrance node of the second tunnel.
  • the egress node after determining that the total bit error rate exceeds the switching threshold, the egress node generates a first tunnel error event, which triggers the upper layer application in the egress node to perform traffic engineering (traffic engineering, TE) hot-standby (HSB) Or virtual link (pseudo wire, PW) switching.
  • traffic engineering traffic engineering, TE
  • HLB hot-standby
  • PW virtual link
  • S303 The egress node sends a second message to the ingress node.
  • the egress node after determining the ingress node according to the label in the first message, the egress node sends a second message to the ingress node through the second tunnel to notify the ingress node of the error in the first tunnel.
  • the second tunnel is a reverse tunnel of the first tunnel.
  • the second message includes a second label and a second error code identifier, and the second error code identifier is used to indicate that a code error occurs in the reverse tunnel of the tunnel through which the second message is sent.
  • the second label is used by the ingress node to determine that the tunnel through which the second packet is sent is the second tunnel, and to determine that the first tunnel is the reverse tunnel of the second tunnel.
  • the egress node determines the second tunnel according to the second label in the second message, and can determine that the reverse tunnel of the second tunnel is the first tunnel, because the egress node of the first tunnel is the ingress node of the second tunnel . Combined with the second error identifier in the second message, it can be determined that an error occurred in the first tunnel.
  • the egress node creates a second BFD session, and carries the second label and the second error identifier in the second BFD message and sends it to the ingress node through the second tunnel.
  • the second BFD message includes a diagnostic word field, and the diagnostic word field is used to carry a second error code identifier, and the value of the second error code identifier is 31.
  • the diagnostic word field reference may be made to the relevant description in S302 above. For brevity, details are not described herein again.
  • the second BFD message includes a minimum echo message reception interval field
  • the minimum echo message reception interval field is used to carry the bit error rate
  • the minimum echo message reception interval The first m bits of the field represent the coefficient of the bit error rate, and the middle n bits of the minimum echo message receiving interval field represent the power of the bit error rate, where m is a positive value greater than or equal to 1.
  • the ingress node determines that the first tunnel has a bit error, it generates a first tunnel error event to trigger the upper layer application in the ingress node to perform TE HSB or PW switching, that is, no longer use the first tunnel to send data to the egress node. Instead, the backup tunnel is used to send data to the egress node to avoid data traffic loss.
  • the egress node establishes a third BFD session that matches the first BFD session, receives the first BFD packet sent by the intermediate node, and detects whether the error code is eliminated.
  • the intermediate node periodically sends the first BFD packet to the egress node. If the egress node does not receive the first BFD packet sent by the intermediate node within the first preset time, it is considered that the error code has been recovered, that is, the first tunnel There is no bit error in the above, and it can be used normally.
  • the egress node deletes the second BFD session and the third BFD session.
  • the first preset time can be set according to actual needs. For example, it can be set to 3.5 BFD packet sending cycles. This is not limited.
  • the intermediate node detects that the error rate does not exceed the threshold, and uses the diagnostic word field to carry the error elimination identifier. For example, when the diagnostic word field is set to 29, it means that the error has been eliminated, and the exit node carries the error elimination identifier after receiving it. According to the value of the diagnostic word field, it can be determined that the error code has been eliminated, the first tunnel can continue to be used normally, and the second BFD session and the third BFD session are deleted.
  • the ingress node establishes a fourth BFD session matching the second BFD session, and receives the second BFD packet sent by the egress node to detect whether the error code of the first tunnel is eliminated.
  • the egress node periodically sends the second BFD packet to the ingress node. If the ingress node does not receive the second BFD packet sent by the egress node within the second preset time, it is considered that the bit error of the first tunnel has been eliminated, and it can In normal use, the ingress node will reuse the first tunnel to send data to the egress node, that is, switch the data traffic from the backup tunnel to the first tunnel, delete the fourth BFD session, and the second preset time can be the same as the first preset time.
  • the egress node determines that the error code of the first tunnel is eliminated, it uses the diagnostic word field to carry the error elimination identifier. After the ingress node receives the BFD message carrying the error elimination identifier, it can be based on the value of the diagnostic word field. It is determined that the error code in the first tunnel has been eliminated, the first tunnel will be reused to send data to the egress node, and the fourth BFD session will be deleted.
  • FIG. 5 is a schematic flowchart of another error notification method provided by an embodiment of the application. As shown in Figure 5, the method includes but is not limited to the following steps:
  • S501 The first node receives a message sent by the second node.
  • the first node and the second node are two devices directly connected, and there is no intermediate device between them.
  • S502 The first node performs bit error rate detection on the received message.
  • the port of the first node may use CRC to perform error detection on the message, and detect whether the error rate of the message exceeds the threshold.
  • the threshold value can be set according to actual needs, and the specific setting value is not limited in this application.
  • S503 The first node creates a BFD session with the second node.
  • the link protocol status of the port will become Down, and the first node will create a BFD session with the second node.
  • S504 The first node sends a BFD packet to the second node through the BFD session.
  • the first node After the first node creates the BFD session, it will periodically send BFD packets to the second node.
  • the internet protocol (IP) address of the BFD message is a multicast IP address, or the media access control (MAC) address of the BFD message is Multicast MAC address.
  • IP internet protocol
  • MAC media access control
  • the multicast IP address or multicast MAC address used by the BFD message sent by the first node to the second node that is, the first node can directly send the BFD message to the second node without first obtaining the second node's IP address, and then send a BFD packet to the second node according to the acquired IP address.
  • the diagnostic word field of the BFD message is used to identify that the message sent by the second node to the first node has an error.
  • the BFD message sent by the first node is a BFD message in a standard format, and there is a 5-bit diagnostic word field in the BFD message, which corresponds to 32 values, that is, 0-31.
  • the RFC only defines the meaning of each value from 0 to 8.
  • This application can use undefined values to identify that the message sent by the second node to the first node has an error. For example, when the value of the diagnostic word field is 28, it means When the error occurs, after the second node receives the BFD message, it can be determined that the message sent to the first node has an error according to the value of the diagnostic word field.
  • the diagnostic word field and how to obtain a value reference may be made to the related description in the method embodiment described in FIG. 3, which is not repeated here for brevity.
  • the second node after receiving the BFD packet sent by the first node, the second node triggers protection switching of the upper-layer service associated with the port of the first node, that is, the second node sends data to the first node by using the backup link to avoid data Traffic is lost.
  • the second node creates a BFD session with the first node, receives BFD packets periodically sent by the first node, and detects whether the error code is eliminated. If the first node detects that the bit error rate is less than the threshold, the first node stops sending BFD packets to the second node, and deletes the BFD session. If the second node does not receive the BFD packet sent by the first node within the preset time, it considers that the error code has been eliminated, and the second node deletes the BFD session, and will reuse the original link to send data to the first node. The data traffic is switched from the backup link to the previous link, and the preset time can be set according to actual needs.
  • the first node detects that the error rate is less than the threshold, and the first node uses the diagnostic word field to carry the error elimination identifier. For example, when the diagnostic word field takes a value of 29, it indicates that the error has been eliminated, and the second node carries After the BFD message identified by the error elimination, it can be determined that the error has been eliminated according to the value of the diagnostic word field.
  • the second node deletes the BFD session and will reuse the original link to send data to the first node.
  • the link protocol status of the port of the first node will be restored to valid (Up).
  • FIG. 6 is a schematic flowchart of another error notification method provided by an embodiment of the application. As shown in Figure 6, the method includes but is not limited to the following steps:
  • the second node uses the first tunnel to send a message to the first node.
  • the second node and the first node may be two devices directly connected, that is, the first tunnel may be a direct link between the second node and the first node, or the second node and the first node There are one or more intermediate devices.
  • S602 The second node receives the BFD packet sent by the first node.
  • the first node performs bit error rate detection after receiving the message sent by the second node, and when the bit error rate exceeds the threshold, establishes a BFD session with the second node, and communicates to the second node through the BFD session.
  • the node sends a BFD message to notify the second node that the message sent by the second node has an error.
  • the IP address of the BFD message is a multicast IP address, or the MAC address of the BFD message is a multicast MAC address.
  • the diagnostic word field in the BFD message is used to identify an error in the message sent by the second node to the first node.
  • S603 The second node uses the second tunnel to send a message to the first node.
  • the second node after receiving the BFD packet sent by the first node, performs protection switching, that is, uses the backup tunnel (that is, the second tunnel) to send the packet to the first node to avoid data traffic loss.
  • the second node will reuse the first tunnel to send the message to the first node, that is, switch the data traffic from the second tunnel to the first tunnel.
  • steps S601 to S603 involved in the foregoing method embodiments are only schematic descriptions and should not constitute specific limitations. The involved steps can be added, reduced, or combined as needed.
  • FIG. 7 is a schematic structural diagram of an intermediate node provided by an embodiment of the present application.
  • the intermediate node 100 includes a processing module 110 and a transceiver module 120. among them,
  • the processing module 110 is configured to detect the bit error rate of the message sent through the first tunnel
  • the transceiver module 120 is configured to detect that the bit error rate exceeds a threshold value in the processing module 110, and send a first message to the exit node of the first tunnel, where the first message is used to indicate the first When a code error occurs in the tunnel, the first message is also used to instruct the egress node to send a second message to the ingress node of the first tunnel, and the second message is used to indicate that an error occurs in the first tunnel. code.
  • the first message includes a label and an error code identifier
  • the label is used by the egress node to determine the first tunnel
  • the error code identifier is used to indicate the sender of the first message A bit error occurred in the tunnel.
  • the first message is used to instruct the egress node to send a second message to the ingress node of the first tunnel through a second tunnel, and the second tunnel is the reverse of the first tunnel. To the tunnel.
  • the label is also used by the egress node to determine the second tunnel.
  • the processing module 110 calculates the sum of bit error rates of packets forwarded on multiple paths on the first tunnel, and detects that the sum of bit error rates exceeds the threshold.
  • the first message is a two-way forwarding detection BFD message
  • the BFD message includes a diagnostic word field
  • the diagnostic word field is used to carry the error code identifier.
  • the value is 30.
  • the first message is a BFD message
  • the BFD message includes a minimum echo message receiving interval field
  • the minimum echo message receiving interval field is used to carry the bit error rate
  • the first m bits of the minimum echo message reception interval field represent the coefficient of the bit error rate
  • the middle n bits of the minimum echo message reception interval field represent the power of the bit error rate, where the m Is a positive integer greater than or equal to 1, the n is a positive integer greater than or equal to 1, and the sum of the m and the n is less than the length value of the minimum echo message receiving interval field.
  • transceiver module 120 in the embodiment of the present application may be implemented by a transceiver or transceiver-related circuit components, and the processing module 110 may be implemented by a processor or processor-related circuit components.
  • the egress node 200 includes a receiving module 210 and a sending module 220. among them,
  • the receiving module 210 is configured to receive a first message sent by a first intermediate node on a first tunnel through the first tunnel, where the first message is detected by the first intermediate node through the first tunnel A message sent to the egress node with a bit error rate of a sent message exceeding a threshold, and the first message is used to indicate that a bit error occurs in the first tunnel;
  • the sending module 220 is configured to send a second message to the ingress node of the first tunnel, where the second message is used to indicate that a code error occurs in the first tunnel.
  • the first message includes a first tag and a first error identifier
  • the first tag corresponds to the first tunnel
  • the first error identifier is used to instruct to send the first A code error occurs in the tunnel of the message
  • the egress node 200 further includes a processing module 230 configured to determine that a code error occurs in the first tunnel according to the first label and the first error code identifier.
  • the processing module 230 is specifically configured to: determine a second tunnel according to the first label; and instruct the sending module to use the second tunnel to send a second packet to the ingress node of the first tunnel ,
  • the second tunnel is a reverse tunnel of the first tunnel.
  • the second message includes a second label and a second error code identifier
  • the second label is used by the ingress node to determine the first tunnel
  • the second error code identifier is used to indicate The reverse tunnel of the tunnel that sent the second message has an error
  • the first message is a two-way forwarding detection BFD message
  • the BFD message includes a diagnostic word field, and the diagnostic word field is used to carry the first error identifier, and the first error
  • the value of the code identifier is 30
  • the second message is a BFD message
  • the BFD message includes a diagnostic word field, and the diagnostic word field is used to carry the second error identifier.
  • the value of the code identifier is 31.
  • the first message and the second message are BFD messages
  • the BFD message includes a minimum echo message reception interval field
  • the minimum echo message reception interval field is used to carry all The bit error rate
  • the first m bits of the minimum echo message receiving interval field represent the coefficient of the bit error rate
  • the middle n bits of the minimum echo message receiving interval field represent the power of the bit error rate
  • the m is a positive integer greater than or equal to 1
  • the n is a positive integer greater than or equal to 1
  • the sum of the m and the n is less than the length value of the minimum echo message receiving interval field.
  • the receiving module 210 is further configured to receive a third packet sent by a second intermediate node on the first tunnel through the first tunnel, where the third packet is the second The intermediate node detects that the bit error rate of the message sent through the first tunnel exceeds the threshold and sends the message to the egress node, where the first message includes the first bit error rate, and the third message Including a second bit error rate; the processing module 230 is further configured to calculate the sum of the first bit error rate and the second bit error rate, the first bit error rate and the second bit error rate The sum exceeds the switching threshold of the exit node.
  • receiving module 210 and the sending module 220 in the embodiments of the present application may be implemented by a transceiver or transceiver-related circuit components
  • processing module 230 may be implemented by a processor or processor-related circuit components.
  • the ingress node 300 includes a transceiver module 310 and a processing module 320. among them,
  • the transceiver module 310 is configured to receive a second message sent by the exit node of the first tunnel, the second message indicating that a code error occurs in the first tunnel;
  • the processing module 320 is configured to determine that an error occurs in the first tunnel according to the second message.
  • the transceiver module 310 is specifically configured to: receive a second packet sent by the egress node of the first tunnel through a second tunnel, where the second tunnel is a reverse tunnel of the first tunnel.
  • the second message includes a label and an error code identifier, and the error code identifier is used to indicate that an error code occurs in the reverse tunnel of the tunnel through which the second message is sent; the processing module 320 specifically uses Yu: Determine, according to the label, that the tunnel through which the second message is sent is the second tunnel, and determine that the first tunnel is the reverse tunnel of the second tunnel; and determine the first tunnel according to the error identifier A bit error occurred in the tunnel.
  • the second message is a BFD message
  • the BFD message includes a diagnostic word field
  • the diagnostic word field is used to carry the error code identifier
  • the value of the error code identifier is 31 .
  • the second message is a BFD message
  • the BFD message includes a minimum echo message reception interval field
  • the minimum echo message reception interval field is used to carry a bit error rate
  • the minimum echo message The first m bits of the message reception interval field represent the coefficient of the bit error rate
  • the middle n bits of the minimum echo message reception interval field represent the power of the bit error rate, where m is greater than A positive integer equal to 1, the n is a positive integer greater than or equal to 1, and the sum of the m and the n is less than the length value of the minimum echo message receiving interval field.
  • transceiver module 310 in the embodiment of the present application may be implemented by a transceiver or transceiver-related circuit components
  • processing module 320 may be implemented by a processor or processor-related circuit components.
  • the structure of the intermediate node, the egress node, or the ingress node and the error notification process are only an example, and should not constitute a specific limitation.
  • the intermediate node, the egress node, or each unit in the ingress node can be specified as needed. Make an increase, less or merge.
  • FIG. 10 is a schematic structural diagram of a first node provided by an embodiment of the present application.
  • the first node 400 includes a processing module 410 and a transceiver module 420. among them,
  • the processing module 410 is configured to perform bit error rate detection on the message received from the second node, and when it is detected that the bit error rate reaches a threshold, create a bidirectional forwarding detection BFD session with the second node;
  • the transceiver module 420 is configured to send a BFD message to the second node through the BFD session, where the BFD message is used to indicate that a message sent from the second node to the first node has an error.
  • the Internet Protocol IP address of the BFD message is a multicast IP address, or the MAC address of the BFD message is a multicast MAC address.
  • the diagnosis Diag field of the BFD message is used to identify that the message sent by the second node to the first node has an error.
  • the processing module 410 is further configured to delete the BFD session when it is detected that the bit error rate is less than the threshold, and instruct the transceiver module 420 to stop sending BFD packets to the second node.
  • transceiver module 420 in the embodiment of the present application may be implemented by a transceiver or a transceiver-related circuit component
  • processing module 410 may be implemented by a processor or a processor-related circuit component.
  • FIG. 11 is a schematic structural diagram of a second node provided by an embodiment of the present application.
  • the second node 500 includes a sending module 510 and a receiving module 520. among them,
  • the sending module 510 is configured to send a message to the first node by using the first tunnel;
  • the receiving module 520 is configured to receive a bidirectional forwarding detection BFD message sent by the first node, where the BFD message is used to indicate that a message sent from the second node to the first node has an error;
  • the sending module 510 is further configured to send a message to the first node by using a second tunnel, and the second tunnel is different from the first tunnel.
  • the diagnosis Diag field of the BFD message is used to identify that the message sent by the second node to the first node has an error.
  • the sending module 510 and the receiving module 520 in the embodiment of the present application may be implemented by a transceiver or transceiver-related circuit components.
  • first node or the second node and the process of error notification are only used as an example, and should not constitute a specific limitation.
  • Each unit in the first node or the second node can be added as needed. , Less or combined.
  • the network device 600 includes a processor 610, a communication interface 620, and a memory 630, and the processor 610, the communication interface 620, and the memory 630 are connected to each other through an internal bus 640. It should be understood that the network device may be a router or a switch.
  • the processor 610 may be composed of one or more general-purpose processors, such as a central processing unit (CPU), or a combination of a CPU and a hardware chip.
  • the aforementioned hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof.
  • ASIC application-specific integrated circuit
  • PLD programmable logic device
  • the above-mentioned PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a general array logic (generic array logic, GAL), or any combination thereof.
  • the bus 640 may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnect standard
  • EISA extended industry standard architecture
  • the bus 640 can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used to represent in FIG. 12, but it does not mean that there is only one bus or one type of bus.
  • the memory 630 may include a volatile memory (volatile memory), such as a random access memory (random access memory, RAM); the memory 630 may also include a non-volatile memory (non-volatile memory), such as a read-only memory (read-only memory). Only memory (ROM), flash memory (flash memory), hard disk drive (HDD), or solid-state drive (SSD); the memory 630 may also include a combination of the above types.
  • the memory 630 may be used to store programs and data, so that the processor 610 can call the program codes and data stored in the memory 630 to implement the functions of the aforementioned processing modules.
  • the program code can be used to implement the functions of the intermediate node shown in Figure 7, the exit node shown in Figure 8, the entry node shown in Figure 9, the first node shown in Figure 10, or the second node shown in Figure 11 Module, or used to implement the method embodiment shown in Figure 3 with the intermediate node, the exit node or the entry node as the execution subject, the method embodiment shown in Figure 5 with the first node as the execution subject, and the method shown in Figure 6
  • the second node is the execution subject of the method steps.
  • the embodiments of the present application also provide a computer-readable storage medium on which a computer program is stored.
  • the program When the program is executed by a processor, it can implement part or all of the steps of any one of the above method embodiments, and realize the above-mentioned figure. 7.
  • the embodiment of the present application also provides a computer program product, which when it runs on a computer or a processor, causes the computer or the processor to execute one or more steps in any of the foregoing error notification methods. If each component module of the aforementioned equipment is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in the computer readable storage medium.
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution.
  • the execution order of each process should be determined by its function and internal logic, and should not be implemented in this application.
  • the implementation process of the example constitutes any limitation.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .
  • the modules in the devices in the embodiments of the present application may be combined, divided, and deleted according to actual needs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

本申请提供了一种误码通告的方法和相关设备。其中,该方法包括:第一隧道上的中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值;所述中间节点通过所述第一隧道向所述第一隧道的出口节点发送第一报文,所述第一报文用于指示所述第一隧道出现误码,所述第一报文还用于指示所述出口节点向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。上述方法能够进行误码信息的传递,实现端到端业务联动倒换。

Description

一种误码通告的方法及相关设备
本申请要求于2019年6月10日提交中国国家知识产权局、申请号201910499061.X、申请名称为“一种误码通告的方法及相关设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及网络通信技术领域,尤其涉及一种误码通告的方法及相关设备。
背景技术
误码(bit error)是指通信设备接收到的信号与该信号发出时相比出现了比特差错,通常体现为通信设备根据循环冗余校验(cyclic redundancy check,CRC)算法检测到数据包出错。由于线路故障而引起的误码,可以通过排除故障进行消除,但由于光路抖动、线路老化等原因导致的概率性误码,则很难消除。这些因素导致的概率性丢包故障可能引发基站退服(即基站掉线,失去管理)以及数据流量丢失等问题。
双向转发探测(bidirectional forwarding detection,BFD)协议用于端到端的链路探测,是一种快速并且独立于路由协议的协议,探测速度可达微妙级。探测时,两端首先通过协商建立起会话,待会话建立(UP)之后,两端周期性的向对端发送BFD报文,并通过这种方式对BFD报文交互时经过的链路进行探测,如果有一端在一定时间之内没有接收到对端发来的BFD报文,则会话状态转变为断开(DOWN),并说明了BFD报文经过的链路发生了故障。这里的BFD报文是指携带有与BFD协议有关内容的各种传输协议报文,或者说,这些协议报文中的净荷部分携带的是与BFD协议有关的内容。对于BFD报文的互发,两端可以协商各自的BFD报文的发送频率,频率越高,则探测到故障就越快。在IPv4或IPv6网络中,BFD报文必须使用用户数据报文协议(user datagram protocol,UDP)及因特网协议(internet protocol,IP)的封装格式。
目前一般使用BFD报文或中间系统到中间系统(intermediate system-to-intermediate system,IS-IS)报文传递误码信息。当前使用BFD报文传递误码信息,需要扩展BFD报文的长度,在BFD报文的尾部增加类型长度值(type length value,TLV),由于该方式修改了BFD报文的格式,传递的不是标准的BFD报文,所以互通比较困难,例如,对端设备可能无法解析修改了格式的BFD报文,进而不能获取到BFD报文中携带的误码信息。而使用IS-IS报文传递误码信息,只能在二层网络中传递误码信息,若端与端之间存在三层设备或多个中间设备,该方式将不再适用,即该方式只适用于直接相连的设备之间传递误码信息。
发明内容
本申请提供了一种误码信息传递的方法及相关设备,可以进行误码信息的传递,实现端到端业务联动倒换。
第一方面,提供了一种误码通告的方法,包括:第一隧道上的中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值;所述中间节点通过所述第一隧道向所述第一隧道的出口节点发送第一报文,所述第一报文用于指示所述第一隧道出现误码,所述第一报文还用于指示所述出口节点向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。
在本申请提供的方案中,第一隧道上的中间节点对通过第一隧道发送的报文的误码率进行检测,当误码率超过阈值时,中间节点向第一隧道的出口节点发送指示该第一隧道出现误码的第一报文,出口节点在接收到该第一报文之后,向第一隧道的入口节点发送用于指示第一隧道出现误码的第二报文,可以进行误码信息的传递,实现端到端业务联动倒换。
结合第一方面,在第一方面的一种可能的实现方式中,所述第一报文包括标签和误码标识,所述标签用于所述出口节点确定所述第一隧道,所述误码标识用于指示发送所述第一报文的隧道出现误码。
在本申请提供的方案中,中间节点将标签和误码标识携带在第一报文中发送给出口节点,出口节点在接收到该第一报文后,根据其中携带的标签可以确定第一隧道,根据误码标识可以确定出现了误码,结合标签就可以确定第一隧道出现了误码,保证出口节点可以准确的判别是第一隧道出现了误码。
结合第一方面,在第一方面的一种可能的实现方式中,所述第一报文用于指示所述出口节点通过第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
在本申请提供的方案中,第一隧道和第二隧道互为各自的反向隧道,第一隧道的出口节点在接收到中间节点发送的第一报文之后,需要通过第一隧道的反向隧道,即第二隧道,向第一隧道的入口节点发送第二报文,以通知入口节点第一隧道出现了误码。
结合第一方面,在第一方面的一种可能的实现方式中,所述标签还用于所述出口节点确定所述第二隧道。
在本申请提供的方案中,报文之间的传递是依靠标签来确定传递路径,第一隧道的出口节点在接收到第一报文之后,由于该第一报文中携带标签,出口节点可以根据该标签确定第一隧道的入口节点,进而可以确定第二隧道,由于不依赖IP地址,所以报文传递更加高效和便捷。
结合第一方面,在第一方面的一种可能的实现方式中,所述中间节点计算通过所述第一隧道上多段路径上转发的报文的误码率之和,并检测到所述误码率之和超过所述阈值。
在本申请提供的方案中,中间节点计算通过多段路径上转发的报文的误码率之和,再与阈值进行比较判别,可以实现误码率的传递,避免每一段路径的误码率未达到阈值而总体的误码率超过阈值的情况发生,保证中间节点可以准确的向出口节点发送指示第一隧道出现误码的第一报文,从而让出口节点采取相应的措施以避免数据流量丢失。
结合第一方面,在第一方面的一种可能的实现方式中,所述第一报文为双向转发 检测BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述误码标识,所述误码标识的取值为30。
可选地,误码标识的取值也可以是其它值,例如10、15等,只要该值的范围在9~31之间即可。
在本申请提供的方案中,利用BFD报文中诊断字字段的特殊取值来表征误码标识,可以不用再新增其它字段或发送其它的信息以携带误码标识,不必修改BFD报文的格式,保证发送的报文仍旧是标准的BFD报文,避免出现互通困难的问题,还可以有效的实现误码状态的传递,实现简单,提高传递效率。
结合第一方面,在第一方面的一种可能的实现方式中,所述第一报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
在本申请提供的方案中,通过复用BFD报文中的最小回声报文接收间隔字段,可以实现误码率的传递,使第一隧道的出口节点可以更加直观的从中间节点发送的第一报文中获取到误码率,不用再额外进行误码率的传递,减少了传输资源开销,提高了传输效率。
第二方面,提供了一种误码通告的方法,包括:第一隧道的出口节点接收所述第一隧道上的第一中间节点通过所述第一隧道发送的第一报文,所述第一报文为所述第一中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文用于指示所述第一隧道出现误码;所述出口节点根据所述第一报文,向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。
在本申请提供的方案中,第一隧道的出口节点接收指示第一隧道出现误码的第一报文,该第一报文是第一隧道的中间节点在检测到通过第一隧道发送的报文的误码率超过阈值而发送给出口节点的报文,出口节点在接收到该第一报文之后向第一隧道的入口节点发送用于指示第一隧道出现误码的第二报文,这样可以进行误码信息的传递,实现端到端业务联动倒换。
结合第二方面,在第二方面的一种可能的实现方式中,所述第一报文包括第一标签和第一误码标识,所述第一标签与所述第一隧道对应,所述第一误码标识用于指示发送所述第一报文的隧道出现误码;所述出口节点根据所述第一标签和所述第一误码标识确定所述第一隧道出现误码。
结合第二方面,在第二方面的一种可能的实现方式中,所述出口节点根据所述第一标签确定第二隧道;所述出口节点利用所述第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
结合第二方面,在第二方面的一种可能的实现方式中,所述第二报文包括第二标签和第二误码标识,所述第二标签用于所述入口节点确定所述第一隧道,所述第二误 码标识用于指示发送所述第二报文的隧道的反向隧道出现误码。
在本申请提供的方案中,出口节点将第二标签和第二误码标识携带在第二报文中发送给入口节点,入口节点在接收到第二报文之后,根据其中的第二标签可以确定第一隧道,根据第二误码标识可以确定出现了误码,结合第二标签可以确定是第一隧道出现了误码,保证入口节点可以准确的判别是第一隧道出现了误码,从而可以进行后续的业务倒换。
结合第二方面,在第二方面的一种可能的实现方式中,所述出口节点根据所述第一标签确定第二隧道;所述出口节点利用所述第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
结合第二方面,在第二方面的一种可能的实现方式中,所述第二报文包括第二标签和第二误码标识,所述第二标签用于所述入口节点确定所述第一隧道,所述第二误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码。
结合第二方面,在第二方面的一种可能的实现方式中,所述第一报文为双向转发检测BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述第一误码标识,所述第一误码标识的取值为30;所述第二报文为BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述第二误码标识,所述第二误码标识的取值为31。
结合第二方面,在第二方面的一种可能的实现方式中,所述第一报文和所述第二报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
结合第二方面,在第二方面的一种可能的实现方式中,所述出口节点接收所述第一隧道上的第二中间节点通过所述第一隧道发送的第三报文,所述第三报文为所述第二中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文包括第一误码率,所述第三报文包括第二误码率;所述出口节点计算所述第一误码率和所述第二误码率之和,所述第一误码率和所述第二误码率之和超过所述出口节点的倒换阈值。
在本申请提供的方案中,出口节点可以计算多个中间节点发送的报文的误码率之和,再与倒换阈值进行比较判别,可以实现误码率的传递,避免多段链路同时产生误码,而每一段链路的误码率未达到倒换阈值的情况发生,保证出口节点能够准确的掌握第一隧道的传输状况,及时的向入口节点进行反馈,以使入口节点采取相应的措施(例如进行业务倒换)以避免数据流量丢失。
第三方面,提供了一种误码通告的方法,包括:第一隧道的入口节点接收所述第一隧道的出口节点发送的第二报文,所述第二报文指示所述第一隧道出现误码;所述入口节点根据所述第二报文确定所述第一隧道出现误码。
在本申请提供的方案中,第一隧道的入口节点接收到第一隧道的出口节点发送的 指示第一隧道出现误码的第二报文之后,可以确定第一隧道出现了误码,通过这种方式可以进行误码信息的传递,实现端到端业务联动倒换。
结合第三方面,在第三方面的一种可能的实现方式中,所述第一隧道的入口节点接收所述第一隧道的出口节点通过第二隧道发送的第二报文,所述第二隧道为所述第一隧道的反向隧道。
结合第三方面,在第三方面的一种可能的实现方式中,所述第二报文包括标签和误码标识,所述误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码;所述入口节点根据所述标签确定发送所述第二报文的隧道为所述第二隧道,确定所述第一隧道为所述第二隧道的反向隧道;所述入口节点根据所述误码标识确定所述第一隧道出现误码。
结合第三方面,在第三方面的一种可能的实现方式中,所述第二报文为BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述误码标识,所述误码标识的取值为31。
结合第三方面,在第三方面的一种可能的实现方式中,所述第二报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
第四方面,提供了一种误码通告的方法,包括:第一节点对从第二节点接收的报文进行误码率检测;当检测到误码率达到阈值时,创建与所述第二节点之间的双向转发检测BFD会话;所述第一节点通过所述BFD会话向所述第二节点发送BFD报文,所述BFD报文用于指示从所述第二节点向所述第一节点发送的报文出现误码。
在本申请提供的方案中,第一节点在检测到误码率达到阈值时,创建BFD会话,并向第二节点发送BFD报文以通知第二节点发送的报文出现误码,可以更加快速准确的向第二节点传递误码信息。
结合第四方面,在第四方面的一种可能的实现方式中,所述BFD报文的网际互联协议IP地址为组播IP地址,或所述BFD报文的MAC地址为组播MAC地址。
在本申请提供的方案中,第一节点通过采用组播IP地址或组播MAC地址的BFD报文传递误码信息,可以直接向第二节点传递误码信息,不依赖于配置IP地址,可以同时应用于三层网络和二层网络,扩大了误码信息的传递范围。
结合第四方面,在第四方面的一种可能的实现方式中,所述BFD报文的诊断Diag字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
在本申请提供的方案中,利用BFD报文中诊断字Diag字段的特殊取值来表征误码标识,可以不用再新增其它字段或发送其它的信息以携带误码标识,不必修改BFD报文的格式,保证发送的报文仍旧是标准的BFD报文,避免出现互通困难的问题,还可以有效的实现误码状态的传递,实现简单,提高传递效率。
结合第四方面,在第四方面的一种可能的实现方式中,当检测到误码率小于所述 阈值时,所述第一节点删除所述BFD会话,并停止向所述第二节点发送BFD报文。
在本申请提供的方案中,第一节点在检测到误码率小于阈值时,删除BFD会话,停止向第二节点发送BFD报文,可以避免传输资源的浪费,提高处理器性能,降低功耗。
第五方面,提供了一种误码通告的方法,包括:第二节点利用第一隧道向第一节点发送报文;所述第二节点接收所述第一节点发送的双向转发检测BFD报文,所述BFD报文用于指示从所述第二节点向所述第一节点发送的报文出现误码;所述第二节点利用第二隧道向所述第一节点发送报文,所述第二隧道与所述第一隧道不同。
在本申请提供的方案中,第二节点利用第一隧道向第一节点发送报文,通过接收第一节点发送的BFD报文,从而确定发送给第一节点的报文出现误码,再利用与第一隧道不同的第二隧道向第一节点发送报文。可以更加快速准确的接收到第一节点发送的误码信息,从而可以及时的利用第二隧道发送报文,避免数据流量丢失。
结合第五方面,在第五方面的一种可能的实现方式中,所述BFD报文的诊断Diag字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
第六方面,提供了一种中间节点,该中间节点可以是路由器或交换机,也可以是路由器或交换机内的芯片。该中间节点具有实现第一方面涉及中间节点的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元。
在一种可能的设计中,该中间节点包括:处理模块和收发模块,所述处理模块例如可以是处理器,所述收发模块例如可以是收发器。收发模块用于支持中间节点与第一隧道的出口节点以及中间节点与第一隧道的入口节点之间的通信,一个示例中,收发模块,还可以包括发送模块和接收模块,可以用于支持中间节点进行上行通信、下行通信。例如,发送模块,可以用于向第一隧道的出口节点发送第一报文,接收模块,可以用于接收通过第一隧道发送的报文;处理模块,可以用于检测接收到的报文的误码率。可选的,该中间节点还可以包括存储器,所述存储器用于与处理器耦合,其保存该中间节点必要的程序指令和数据。
在另一种可能的设计中,该中间节点包括:处理器和收发器。其中处理器用于实现对各个部件功能的控制,收发器,用于支持中间节点与第一隧道的出口节点及第一隧道的入口节点之间的通信。例如,在下行通信中,该中间节点的收发器可以接收由第一隧道的入口节点发送的报文,并进行CRC检测,得到误码率。可选的,该中间节点还包括存储器,其保存中间节点必要的程序指令和数据;例如,在上行通信中,该中间节点的收发器可以将携带标签和误码标识的第一报文发送给出口节点。
在又一种可能的设计中,当该中间节点为路由器或交换机内的芯片时,该芯片包括:处理模块和收发模块,所述处理模块例如可以是处理器,此处理器可以用于对经由收发模块接收到的数据分组进行误码率检测,所述收发模块例如可以是该芯片上的输入/输出接口。该处理模块可执行存储单元存储的计算机执行指令,以支持中间节点执行上述第一方面相应的功能。可选地,所述存储单元可以为所述芯片内的存储单元, 如寄存器、缓存等,所述存储单元还可以是所述中间节点内的位于所述芯片外部的存储单元,如只读存储器(read-only memory,简称ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,简称RAM)等。
在又一种可能的实现方式中,该中间节点包括处理器,该处理器用于与存储器耦合,并读取存储器中的指令并根据所述指令执行上述第一方面中涉及中间节点的功能。该存储器可以位于该处理器内部,还可以位于该处理器外部。
第七方面,提供了一种出口节点,该出口节点可以是路由器或交换机,也可以是路由器或交换机内的芯片。该出口节点具有实现第二方面涉及出口节点的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元。
在一种可能的设计中,该出口节点包括:处理模块和收发模块,所述处理模块例如可以是处理器,所述收发模块例如可以是收发器。收发模块用于支持出口节点与第一隧道的中间节点以及出口节点与第一隧道的入口节点之间的通信,一个示例中,收发模块,还可以包括发送模块和接收模块,可以用于支持出口节点进行上行通信、下行通信。例如,接收模块,可以用于接收中间节点通过第一隧道发送的第一报文,发送模块,可以用于向第一隧道的入口节点发送第二报文;处理模块,可以用于根据所述第一标签和所述第一误码标识确定所述第一隧道出现误码。可选的,该出口节点还可以包括存储器,所述存储器用于与处理器耦合,其保存该出口节点必要的程序指令和数据。
在另一种可能的设计中,该出口节点包括:处理器和收发器。其中处理器用于实现对各个部件功能的控制,收发器,用于支持出口节点与第一隧道的中间节点及第一隧道的入口节点之间的通信。例如,在下行通信中,该出口节点的收发器可以接收由第一隧道的中间节点发送的第一报文。可选的,该出口节点还包括存储器,其保存出口节点必要的程序指令和数据;例如,在上行通信中,该出口节点的收发器可以将携带第二标签和第二误码标识的第二报文发送给入口节点。
在又一种可能的设计中,当该出口节点为路由器或交换机内的芯片时,该芯片包括:处理模块和收发模块,所述处理模块例如可以是处理器,此处理器可以用于对经由收发模块接收到的数据分组进行误码率之和的计算,所述收发模块例如可以是该芯片上的输入/输出接口。该处理模块可执行存储单元存储的计算机执行指令,以支持出口节点执行上述第二方面相应的功能。可选地,所述存储单元可以为所述芯片内的存储单元,如寄存器、缓存等,所述存储单元还可以是所述出口节点内的位于所述芯片外部的存储单元,如只读存储器(read-only memory,简称ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,简称RAM)等。
在又一种可能的实现方式中,该出口节点包括处理器,该处理器用于与存储器耦合,并读取存储器中的指令并根据所述指令执行上述第二方面中涉及出口节点的功能。该存储器可以位于该处理器内部,还可以位于该处理器外部。
第八方面,提供了一种入口节点,该入口节点可以是路由器或交换机,也可以是路由器或交换机内的芯片。该入口节点具有实现第三方面涉及入口节点的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元。
在一种可能的设计中,该入口节点包括:处理模块和收发模块,所述处理模块例如可以是处理器,所述收发模块例如可以是收发器。收发模块用于支持入口节点与第一隧道的出口节点以及入口节点与第一隧道的中间节点之间的通信,一个示例中,收发模块,还可以包括发送模块和接收模块,可以用于支持入口节点进行上行通信、下行通信。例如,发送模块,可以用于向第一隧道的中间节点发送报文,接收模块,可以用于接收出口节点通过第二隧道发送的第二报文;处理模块,可以用于根据第二报文确定第一隧道出现误码。可选的,该入口节点还可以包括存储器,所述存储器用于与处理器耦合,其保存该入口节点必要的程序指令和数据。
在另一种可能的设计中,该入口节点包括:处理器和收发器。其中处理器用于实现对各个部件功能的控制,收发器,用于支持入口节点与第一隧道的出口节点及第一隧道的中间节点之间的通信。例如,在下行通信中,该入口节点的收发器可以接收出口节点通过第二隧道发送的第二报文,并根据第二报文确定第一隧道出现误码。可选的,该入口节点还包括存储器,其保存入口节点必要的程序指令和数据;例如,在上行通信中,该入口节点的收发器可以将报文发送给中间节点。
在又一种可能的设计中,当该入口节点为路由器或交换机内的芯片时,该芯片包括:处理模块和收发模块,所述处理模块例如可以是处理器,此处理器可以用于对经由收发模块接收到的数据分组进行解析,确定第一隧道出现误码,所述收发模块例如可以是该芯片上的输入/输出接口。该处理模块可执行存储单元存储的计算机执行指令,以支持入口节点执行上述第三方面相应的功能。可选地,所述存储单元可以为所述芯片内的存储单元,如寄存器、缓存等,所述存储单元还可以是所述入口节点内的位于所述芯片外部的存储单元,如只读存储器(read-only memory,简称ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,简称RAM)等。
在又一种可能的实现方式中,该入口节点包括处理器,该处理器用于与存储器耦合,并读取存储器中的指令并根据所述指令执行上述第三方面中涉及入口节点的功能。该存储器可以位于该处理器内部,还可以位于该处理器外部。
第九方面,提供了一种第一节点,该第一节点可以是路由器或交换机,也可以是路由器或交换机内的芯片。该第一节点具有实现第四方面涉及第一节点的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元。
第十方面,提供了一种第二节点,该第二节点可以是路由器或交换机,也可以是路由器或交换机内的芯片。该第二节点具有实现第五方面涉及第二节点的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元。
第十一方面,提供了一种计算机非瞬态存储介质,包括指令,当所述指令在中间 节点上运行时,使得所述中间节点执行如第一方面任一项所述的方法。
第十二方面,提供了一种计算机非瞬态存储介质,包括指令,当所述指令在出口节点上运行时,使得所述出口节点执行如第二方面任一项所述的方法。
第十三方面,提供了一种计算机非瞬态存储介质,包括指令,当所述指令在入口节点上运行时,使得所述入口节点执行如第三方面任一项所述的方法。
第十四方面,提供了一种计算机非瞬态存储介质,包括指令,当所述指令在第一节点上运行时,使得所述第一节点执行如第四方面任一项所述的方法。
第十五方面,提供了一种计算机非瞬态存储介质,包括指令,当所述指令在第二节点上运行时,使得所述第二节点执行如第五方面任一项所述的方法。
附图说明
图1为本申请实施例提供的一种标准双向转发检测报文有效载荷格式的示意图;
图2为本申请实施例提供的一种应用场景的示意图;
图3为本申请实施例提供的一种误码通告的方法的流程示意图;
图4为本申请实施例提供的一种多段误码率叠加原理示意图;
图5为本申请实施例提供的又一种误码通告的方法的流程示意图;
图6为本申请实施例提供的又一种误码通告的方法的流程示意图;
图7为本申请实施例提供的一种中间节点的结构示意图;
图8为本申请实施例提供的一种出口节点的结构示意图;
图9为本申请实施例提供的一种入口节点的结构示意图;
图10为本申请实施例提供的一种第一节点的结构示意图;
图11为本申请实施例提供的一种第二节点的结构示意图;
图12为本申请实施例提供的一种网络设备的结构示意图。
具体实施方式
下面结合附图对本申请实施例中的技术方案进行清楚、完整的描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。
首先,结合附图对本申请中所涉及的部分用语和相关技术进行解释说明,以便于本领域技术人员理解。
误码率(symbol error rate,SER)是衡量在规定时间内数据传输精确性的指标。误码的产生是由于在信号传输中,衰变改变了信号的电压,致使信号在传输中遭到破坏。噪音、交流电或闪电造成的脉冲、传输设备故障以及其它因素都会导致误码(例如传送的信号是1,而接收到的是0)。误码率=传输中的误码/所传输的总码数*100%,因此,如果有误码就一定存在误码率。
循环冗余检验(cyclic redundancy check,CRC)是一种根据网络数据包或电脑文件等数据产生固定位数校验码的一种散列函数,主要用于检测或校验数据传输或者保存后可能出现的错误,它是利用除法及余数的原理来作错误侦测的。例如,在本申请中,中间节点设备可以利用CRC对接收到的数据进行误码检测。
双向转发检测(bidirectional forwarding detection,BFD)是一个用于检测两个转发点之间故障的网络协议。BFD可以对两个网络节点之间的链路进行双向故障检测,链 路可以是物理链路,也可以是逻辑链路(例如标签交换路径(label switched path,LSP)、隧道等)。BFD可以为不同的上层应用(例如多协议标签交换(multi-protocol label switching,MPLS)、开放式最短路径优先(open shortest path first,OSPF)、中间系统到中间系统(intermediate system-to-intermediate system,IS-IS)等)提供故障检测的服务,并提供相同的故障检测时间。BFD还可以通过与上层路由协议联动,实现路由的快速收敛,确保业务的永续性。此外,BFD报文除了用于对链路进行故障检测外,还可以携带其它信息传递到对端设备,例如,在本申请中,利用BFD报文携带误码信息和标签传递到对端设备。
中间系统到中间系统(intermediate system-to-intermediate system,IS-IS)是一种内部网关协议,是一个分级的链接状态路由协议,它使用Hello协议寻找毗邻节点,使用一个传播协议发送链接信息。IS-IS报文也可以携带误码信息并进行传递,但是只能在二层网络中进行传递。
标签交换路径(label switched path,LSP)是一种使用MPLS协议建立起来的分组转发路径。LSP中的每个节点由标签交换路由器(label switching router,LSR)组成,分组被打上标签后沿着一系列LSR构成的LSP传送。其中,入节点标签边缘路由器(label edge router,LER)被称为入口路由器(Ingress),用于接收分组并给分组加上标签,出节点LER被称为出口路由器(Egress),在LSR构成的网络中,LSR根据分组上的标签以及标签转发表(label forwarding information base,LFIB)进行转发。
为了提高服务质量,减少概率性丢包故障以避免数据流量丢失,需要在传输链路出现误码时,将误码信息传递到端点设备,以使端点设备能够接收到误码信息后,及时的进行端到端业务联动倒换,即使得业务流量可以通过备用传输链路进行传递,从而绕过误码严重的链路,保证业务的不中断。
通过对BFD报文进行扩展,在BFD报文的尾部增加类型长度值(type length value,TLV)可以传递误码信息。TLV是一种高效率、扩展性好的协议报文编码方式,类型(type)字段是关于标签和编码格式的信息,长度字段(length)是定义数值的长度,数值(value)字段表示实际的数值。参见图1,是一种标准BFD报文有效载荷格式的示意图。该报文包括长度为3比特的BFD协议版本号字段(version)、长度为5比特的诊断字字段(diagnostic)、长度为2比特的BFD本地状态字段(state)、长度为1比特的请求确认字段(poll)、长度为1比特的响应字段(final)、长度为1比特的转发/控制分离标志字段(control plane independen)、长度为1比特的认证标识字段(authentication present)、长度为1比特的查询请求字段(demand)、长度为1比特的为BFD将来支持点对多点扩展而设的预留位字段(multipoint)、长度为8比特的检测超时倍数字段(detect mult)、长度为8比特的BFD报文长度字段(length)、长度为32比特的BFD会话连接本地标识符字段(my discriminator)、长度为32比特的BFD会话连接远端标识符字段(your discriminator)、长度为32比特的本地支持的最小BFD报文发送间隔字段(desired min tx interval)、长度为32比特的本地支持的最小BFD报文接收间隔字段(required min rx interval)以及长度为32比特的本地支持的最小回声报文接收间隔字段(required min echo rx interval)。
为了传递误码信息,在图1所示的标准BFD报文的尾部增加TLV,例如误码率类型字段、误码率系数字段等,以传递误码信息。但这种方式修改了BFD报文的格式,传递的BFD报文不再是标准BFD报文,由于没有制定统一的标准,所以互通比较困难,对端设备可能无法解析该修改了格式的BFD报文,不能获取到其中携带的误码信息。
此外,还可以通过使用IS-IS报文传递误码信息。首先生成IS-IS Hello报文,将误码信息,例如指示误码严重级别的误码等级、指示误码类别的误码标识等,携带在IS-IS Hello报文的TLV字段中。但IS-IS报文只能在二层网络中进行传递,所以这种方式只能在二层网络中传递误码信息,即只能在两个直接连接的设备之间传递误码信息,若两个端点设备之间存在三层设备或者多个中间设备,该方式将不适用,即端点设备之间无法直接感知误码,不能联动端点设备到端点设备的业务倒换,导致数据流量丢失。
为了解决上述问题,本申请提出了一种误码通告的方法及相关设备,可以在传输链路上出现误码时,进行误码信息的传递,实现端到端业务联动倒换,减少概率性丢包故障,避免数据流量丢失。
本申请实施例的技术方案可以应用于广域网(wide area network,WAN),也可以应用于城域网(metropolitan area network,MAN)、无线局域网(wireless local area network,WLAN)或者其它网络,上述通信网络都具备相同的特征,即网络中任意两个设备之间都可以建立BFD会话以及LSP,可以利用BFD报文传递误码信息。
在一个具体的实施例中,如图2所示,第一端点210、第二端点220和第一节点230组成一个通信系统。在该通信系统中,第一端点210与第二端点220之间建立有第一隧道240,该第一隧道240具体可以表现为第一端点210与第二端点220之间通过标签传递的一条LSP。第一端点210为该第一隧道240的出口节点,第二端点220为该第一隧道240的入口节点,第一节点230为该第一隧道240上的中间节点。第一节点230对通过第一隧道240发送的报文进行误码检测,在检测到误码率超过阈值时,第一节点230向第一端点210发送第一报文,该第一报文指示第一隧道240出现误码,第一端点210在接收到第一报文之后,通过第二隧道250向第二端点220发送第二报文,该第二隧道250是第一隧道240的反向隧道,第二报文用于指示第一隧道240出现误码,第二端点220接收到第二报文后确定第一隧道240出现误码。
本申请实施例涉及出/入口节点和中间节点,出/入口节点和中间节点可以是一种用于接收或发射信号的实体,例如交换机、路由器、分布式集群服务器以及无线局域网(wireless local area networks,WLAN)中的站点(station,STA),接入点(access point,AP)等,本申请对此不作限定。
请参见图3,图3为本申请实施例提供的一种误码通告的方法的流程示意图。如图3所示,该方法包括但不限于以下步骤:
S301:中间节点对通过第一隧道发送的报文进行误码检测。
具体地,出口节点和入口节点之间建立有该第一隧道,中间节点为该第一隧道上的一个节点。应理解,第一隧道上可以存在多个中间节点,每个中间节点都可以对其 接收到的报文进行误码检测。
可选地,中间节点可以利用CRC对通过第一隧道发送的报文进行误码检测,检测该报文的误码率是否超过阈值。阈值可以根据实际需求进行设置,具体设置为何值,本申请对此不作限定。特别的,当存在多个中间节点时,每个中间节点上的误码率阈值可以设置为一样的,也可以设置为不一样的。
在一具体的实施例中,中间节点计算通过第一隧道上多段路径上转发的报文的误码率之和,并检测所述误码率之和是否超过阈值。
具体地,第一隧道上存在多段路径同时产生误码,每段路径上的误码率未超过阈值。中间节点对产生误码的多段路径的误码率之和进行计算,检测误码率之和是否超过阈值。
应理解,中间节点在计算多段路径产生的误码率之和时,不是进行简单的代数相加,而是利用特定的规则和算法计算误码率之和,例如利用向量加法进行计算,本申请对具体选用何种算法不作限定。
示例性的,第一隧道上存在两段路径同时产生误码,阈值为2%。第一段路径上产生的误码率为1.5%,第二段路径上产生的误码率也为1.5%,均未达到阈值。中间节点对这两段路径的误码率之和进行计算,得到误码率之和为2.5%,超过阈值,中间节点需要向第一隧道的出口节点发送第一报文以传递误码信息。
需要说明的是,报文在第一隧道的传递过程中,若在多段路径上产生误码,最终计算得到的误码率之和应该大于该多段路径分别产生的误码率中的最大值,小于该多段路径分别产生的误码率的代数和。例如在上述示例中,计算得到的误码率之和为2.5%,大于1.5%,小于3%。容易理解,报文在传递过程中,在多段路径上产生的误码可能存在重叠,所以最终产生的误码小于每一段产生的误码之和,即最终计算得到的误码率小于每一段路径产生的误码率的代数和。
可以看出,中间节点可以对产生误码的多段路径的误码率之和进行计算,可以避免每一段路径的误码率未达到阈值,而总体的误码率超过阈值的情况发生,保证第一隧道上的出口节点能够及时的接收到中间节点发送的第一报文,以获取到误码信息,从而能够采取相应的措施以避免数据流量丢失。
S302:中间节点向出口节点发送第一报文。
具体地,中间节点在检测到误码率超过阈值时向第一隧道的出口节点发送第一报文,第一报文携带着误码信息。
在一具体的实施例中,第一报文包括第一标签和第一误码标识,所述第一标签用于出口节点确定第一隧道,所述第一误码标识用于指示发送第一报文的隧道出现误码。
具体地,报文在第一隧道中是根据标签进行传递的,中间节点在进行误码检测之后,将在本节点的LFIB中进行查找所有的LSP,在找到相应的LSP(即第一隧道)之后,将对应的标签携带在第一报文中直接发送给第一隧道的出口节点,或者是发送给下一个中间节点,进而间接的通过下一个中间节点发送给第一隧道的出口节点。出口节点在接收到(包括直接接收到或间接接收到)第一报文之后,根据其中携带的标签就可以确定第一隧道,进而可以确定第一隧道的入口节点。
进一步的,中间节点将第一误码标识也携带在第一报文中一起进行发送,出口节点在接收到第一报文后,根据其中的第一误码标识可以确定发送该第一报文的隧道出现了误码,然后结合第一报文中的标签,就可以确定第一隧道出现了误码。
可选的,中间节点创建第一BFD会话,并将第一标签和第一误码标识携带在第一BFD报文中发送给出口节点。
在一具体的实施例中,所述第一BFD报文包括诊断字字段,所述诊断字字段用于携带第一误码标识,所述第一误码标识的取值为30。
具体地,中间节点向出口节点发送第一BFD报文,该第一BFD报文的格式是采用的BFD标准报文格式,其具体形式如上述图1所示。应理解,由于采用的是BFD标准报文格式,所以克服了互通困难,无法解析的问题。
进一步的,在图1所示的报文格式中,包含5比特的诊断字字段。在现有的请求协议(request for comments,RFC)中,只定义了0~8各个值的含义,例如1表示控制检测时间到期(control detection time expired),2表示回声函数失效(echo function failed),4表示转发平面重置(forwarding plane reset)。对于9~31各个值的含义,RFC并没有进行定义,属于保留值。本申请增加了诊断字字段的取值(取值范围为9~31),并对新增加的取值进行了定义,以实现BFD报文可以传递第一误码标识。例如,当诊断字字段的取值为30时,表示正向误码产生(即报文通过第一隧道的入口节点到达第一隧道的出口节点的路径上存在误码)。出口节点在接收到第一BFD报文后,根据其中的诊断字字段的值就可以知道通过第一隧道发送的报文存在误码。应理解,也可以采用其它的诊断字字段的值来表示第一误码标识,例如10,本申请对此不作限定。
可以看出,通过利用诊断字字段的特殊取值来表征误码标识,可以不用再新增其它字段或发送其它的信息来携带误码标识,不必修改BFD报文的格式,保证进行传输的报文仍旧是标准的BFD报文,避免出现互通困难的问题,还可以有效的实现误码标识的传递,提高传输效率。
需要说明的是,当中间节点在向出口节点发送第一BFD报文时,当诊断字字段取值为本申请定义的取值时,中间节点可以对报文中的远端标识符字段所包含的比特全部置为1。应理解,BFD报文中的远端标识符字段的值需要和会话对端协商才能确定(即从会话对端中获取到该值),例如中间节点需要向出口节点发送第一BFD报文时,需要先和出口节点进行协商才能确定第一BFD报文中的远端标识符字段的值。而在本申请中,中间节点在向出口节点发送第一BFD报文时,并没有协商过程,所以中间节点无法确定第一BFD报文中的远端标识符字段的值,因此,为了便于管理,对该字段取特殊值,例如将该字段所包含的比特全部置为1。
在一具体的实施例中,所述第一BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
具体地,在中间节点发送给出口节点的标准格式的BFD报文中,存在32比特的 最小回声报文接收间隔字段,在诊断字字段取值为本申请定义的取值时,可以利用该最小回声报文接收间隔字段传递误码率。误码率的系数部分和幂数部分分别用该最小回声报文接收间隔字段中的前m个比特和中间n个比特进行表示。
示例性的,中间节点检测到误码率为7×10 -5,利用最小回声报文接收间隔字段的前4个比特表示该误码率的系数,为0111,利用最小回声报文接收间隔字段的中间3个比特表示该误码率的幂数,为101,剩余的25个比特为预留比特。
可以看出,通过复用最小回声报文接收间隔字段,中间节点可以将检测到的误码率传递给第一隧道的出口节点,使出口节点可以更加直接的从接收到的第一报文中获取到误码率,不需要再额外进行误码率的传递,减少了传输资源开销,提高了传输效率。
在一具体的实施例中,所述出口节点接收所述第一隧道上的第二中间节点通过所述第一隧道发送的第三报文,所述第三报文为所述第二中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文包括第一误码率,所述第三报文包括第二误码率;所述出口节点计算所述第一误码率和所述第二误码率之和,所述第一误码率和所述第二误码率之和超过所述出口节点的倒换阈值。
具体地,第一隧道上存在多段传输路径,即第一隧道的入口节点发送的报文或数据需要经过第一隧道上的多个中间节点的转发才能被第一隧道的出口节点接收。每个中间节点可以对接收的数据进行CRC检测得到该段路径上的误码率,在得到误码率之后,每个中间节点可以分别与出口节点建立BFD会话,向其发送BFD报文,将相应的标签、误码标识以及误码率携带在BFD报文中,出口节点可以对接收到的每个BFD报文中的误码率进行误码率的叠加,得到总的误码率,然后与倒换阈值进行比较判别,在总误码率超过倒换阈值时,向第一隧道的入口节点进行反馈。
应理解,出口节点在进行误码率的叠加的时候,不是进行进行简单的代数和相加,而是利用特定的规则或算法进行计算,例如向量加法进行误码率的叠加,本申请对具体选用何种规则或算法不作限定。关于误码率叠加可以参照上述S301中的相关描述,为了简洁,在此不再赘述。
示例性的,参见图4,图4是本申请实施例提供的一种多段误码率叠加原理示意图。如图4所示,入口节点410通过第一中间节点420和第二中间节点430与出口节点440连接,该路径即为入口节点410与出口节点440之间建立的第一隧道,报文在第一隧道中是通过标签进行传递的。第一中间节点420的端口在接收到入口节点410发送的数据后进行CRC检测,检测到有误码产生将建立第一BFD会话,向出口节点440发送第一BFD报文,该第一BFD报文中携带着第一误码率。第二中间节点430的端口在接收到第一中间节点420转发的数据后也进行CRC检测,检测到有误码产生将建立第二BFD会话,向出口节点440发送第二BFD报文,该第二BFD报文中携带着第二误码率。出口节点440在接收到第一BFD报文和第二BFD报文之后,对第一误码率和第二误码率进行误码率的叠加,得到总误码率,然后与倒换阈值进行比较。在总误码率超过倒换阈值时,出口节点440通过第二隧道向入口节点410进行反馈。应理解,该第二隧道是第一隧道的反向隧道,该第二隧道可以是由出口节点440通过 第二中间节点430、第一中间节点420与入口节点410连接而建立的,也可以是出口节点440通过其它的中间节点与入口节点410连接而建立的。只是第一隧道的入口节点410变成了第二隧道的出口节点,第一隧道的出口节点440变成了第二隧道的入口节点。
可选的,出口节点在确定总误码率超过倒换阈值后,生成第一隧道误码事件,触发出口节点中的上层应用进行流量工程(traffic engineering,TE)热备份(hot-standby,HSB)或虚链路(pseudo wire,PW)倒换。
S303:出口节点向入口节点发送第二报文。
具体地,出口节点根据第一报文中的标签确定入口节点之后,通过第二隧道向该入口节点发送第二报文,以通知入口节点第一隧道出现误码。其中,第二隧道是第一隧道的反向隧道。
在一具体的实施例中,第二报文包括第二标签和第二误码标识,所述第二误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码,所述第二标签用于入口节点确定发送所述第二报文的隧道为第二隧道,并确定第一隧道为第二隧道的反向隧道。
具体地,出口节点根据第二报文中的第二标签确定了第二隧道,且可以确定第二隧道的反向隧道是第一隧道,因为第一隧道的出口节点是第二隧道的入口节点。再结合第二报文中的第二误码标识,可以确定是第一隧道出现了误码。
可选的,出口节点创建第二BFD会话,并将第二标签和第二误码标识携带在第二BFD报文中通过第二隧道发送给入口节点。
在一具体的实施例中,第二BFD报文包括诊断字字段,该诊断字字段用于携带第二误码标识,所述第二误码标识的取值为31。当然,也可以采用其它的取值来表征第二误码标识,本申请对此不作限定。关于诊断字字段可以参照上述S302中的相关描述,为了简洁,在此不再赘述。
在一具体的实施例中,所述第二BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
关于最小回声报文接收间隔字段可以参照上述S302中的相关描述,为了简洁,在此不再赘述。
进一步的,入口节点在确定第一隧道出现误码之后,生成第一隧道误码事件,触发入口节点中的上层应用进行TE HSB或PW倒换,即不再利用第一隧道向出口节点发送数据,而是利用备用隧道向出口节点发送数据以避免数据流量丢失。
可选的,出口节点建立与第一BFD会话匹配的第三BFD会话,接收中间节点发送的第一BFD报文,检测误码是否消除。中间节点周期性的向出口节点发送第一BFD报文,若出口节点在第一预设时间内没有接收到中间节点发送的第一BFD报文,则认为误码已经得到恢复,即第一隧道上不存在误码,可以正常使用,出口节点删除第二BFD会话和第三BFD会话,第一预设时间可以根据实际需要进行设置,例如可以设置 为3.5个BFD报文发送周期,本申请对此不作限定。或者是,中间节点检测到误码率未超过阈值,利用诊断字字段携带误码消除标识,例如当诊断字字段取值为29时表征误码已经消除,出口节点在接收到携带误码消除标识的BFD报文后,根据其中诊断字字段的值就可以确定误码已经消除,第一隧道可以继续正常使用,删除第二BFD会话和第三BFD会话。
进一步的,入口节点建立与第二BFD会话匹配的第四BFD会话,接收出口节点发送的第二BFD报文,以检测第一隧道的误码是否消除。出口节点周期性的向入口节点发送第二BFD报文,若入口节点在第二预设时间内没有接收到出口节点发送的第二BFD报文,则认为第一隧道的误码已经消除,可以正常使用,则入口节点将重新使用第一隧道向出口节点发送数据,即将数据流量从备用隧道切换到第一隧道,删除第四BFD会话,第二预设时间可以和第一预设时间相同,例如为3.5个BFD报文发送周期,本申请对此不作限定。或者是,出口节点在确定第一隧道误码消除之后,利用诊断字字段携带误码消除标识,入口节点在接收到携带误码消除标识的BFD报文后,根据其中诊断字字段的值就可以确定第一隧道中的误码已经消除,将重新使用第一隧道向出口节点发送数据,并删除第四BFD会话。
应理解,上述方法实施例所涉及的步骤S301至步骤S303只是示意性的描述概况,不应构成具体限定,可以根据需要对所涉及的步骤进行增加、减少或合并。
请参见图5,图5为本申请实施例提供的又一种误码通告的方法的流程示意图。如图5所示,该方法包括但不限于以下步骤:
S501:第一节点接收第二节点发送的报文。
具体地,第一节点与第二节点是直接连接的两个设备,它们之间不存在中间设备。
S502:第一节点对接收到的报文进行误码率检测。
具体地,第一节点的端口在接收第二节点发送的报文之后,可以利用CRC对该报文进行误码检测,检测该报文的误码率是否超过阈值。阈值可以根据实际需要进行设置,具体设置为何值,本申请对此不作限定。
S503:第一节点创建与第二节点之间的BFD会话。
具体地,第一节点的端口在检测到误码率超过阈值后,该端口的链路协议状态将变为失效(Down),第一节点将创建与第二节点之间的BFD会话。
S504:第一节点通过BFD会话向第二节点发送BFD报文。
具体地,第一节点在创建BFD会话后,将会周期性的向第二节点发送BFD报文。
在一具体的实施例中,所述BFD报文的网际互联协议(internet protocol,IP)地址为组播IP地址,或所述BFD报文的媒体接入控制(media access control,MAC)地址为组播MAC地址。
具体地,第一节点发送给第二节点的BFD报文采用的组播IP地址或组播MAC地址,即第一节点可以直接向第二节点发送BFD报文,不需要先获取第二节点的IP地址,进而根据获取到的IP地址向第二节点发送BFD报文。
可以理解,通过采用组播IP地址或组播MAC地址的方式发送BFD报文,将不依赖于节点端口配置IP地址,即不需要提前获取到目标节点端口的IP地址,可以同时 满足在三层网络或二层网络中传递BFD报文,统一了三层网络和二层网络传递BFD报文的方法。
在一具体的实施例中,所述BFD报文的诊断字字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
具体地,第一节点发送的BFD报文是标准格式的BFD报文,该BFD报文中存在5比特的诊断字字段,对应有32个取值,即0~31。RFC只定义了0~8各个值的含义,本申请可以利用未定义的值来标识第二节点向第一节点发送的报文出现误码,例如当诊断字字段的取值为28时,表示误码产生,第二节点在接收到BFD报文之后,根据诊断字字段的值就可以确定发送给第一节点的报文出现了误码。关于诊断字字段以及如何取值可以参照上述图3所述的方法实施例中的相关描述,为了简洁,在此不再赘述。
进一步的,第二节点在接收到第一节点发送的BFD报文之后,触发关联第一节点端口的上层业务进行保护倒换,即第二节点通过使用备用链路向第一节点发送数据以避免数据流量丢失。
可选的,第二节点创建与第一节点之间的BFD会话,接收第一节点周期性发送的BFD报文,检测误码是否消除。若第一节点检测到误码率小于阈值,第一节点停止向第二节点发送BFD报文,并删除BFD会话。第二节点在预设时间内没有接收到第一节点发送的BFD报文,则认为误码已经消除,则第二节点删除BFD会话,将重新使用原先的链路向第一节点发送数据,即将数据流量从备用链路切换到之前的链路,预设时间可以根据实际需要进行设置,例如可以设置为3.5个BFD报文发送周期,本申请对此不作限定。或者是,第一节点检测到误码率小于阈值,第一节点利用诊断字字段携带误码消除标识,例如当诊断字字段取值为29时表征误码已经消除,第二节点在接收到携带误码消除标识的BFD报文后,根据其中诊断字字段的值就可以确定误码已经消除,第二节点删除BFD会话,将重新使用原先的链路向第一节点发送数据。此外,在误码消除后,第一节点的端口的链路协议状态将恢复为有效(Up)。
应理解,上述方法实施例所涉及的步骤S501至步骤S504只是示意性的描述概况,不应构成具体限定,可以根据需要对所涉及的步骤进行增加、减少或合并。
请参见图6,图6为本申请实施例提供的又一种误码通告的方法的流程示意图。如图6所示,该方法包括但不限于以下步骤:
S601:第二节点利用第一隧道向第一节点发送报文。
具体地,第二节点与第一节点可以是直接相连的两个设备,即第一隧道可以是第二节点与第一节点之间的直连链路,或者,第二节点与第一节点之间存在一个或多个中间设备。
S602:第二节点接收第一节点发送的BFD报文。
可选的,第一节点在接收到第二节点发送的报文之后进行误码率检测,在误码率超过阈值时,创建与第二节点之间的BFD会话,并通过BFD会话向第二节点发送BFD报文,以通知第二节点所发送的报文出现了误码。
进一步的,该BFD报文的IP地址为组播IP地址,或者该BFD报文的MAC地址 为组播MAC地址。
可选的,该BFD报文中的诊断字字段用于标识第二节点向第一节点发送的报文出现误码。
S603:第二节点利用第二隧道向第一节点发送报文。
具体地,第二节点在接收到第一节点发送的BFD报文之后,进行保护倒换,即使用备用隧道(即第二隧道)向第一节点发送报文,以避免数据流量丢失。
可选的,当误码消除后,第二节点将重新使用第一隧道向第一节点发送报文,即将数据流量从第二隧道切换到第一隧道。
应理解,上述方法实施例所涉及的步骤S601至步骤S603只是示意性的描述概况,不应构成具体限定,可以根据需要对所涉及的步骤进行增加、减少或合并。
需要说明的是,图6所述的方法实施例中的具体细节可以参照上述S501~S504中的相关描述,为了简洁,在此不再赘述。
为了便于更好地实施本申请实施例的上述方案,相应地,下面还提供用于配合实施上述方案的相关设备。
参见图7,图7是本申请实施例提供的一种中间节点的结构示意图。如图7所示,所述中间节点100包括处理模块110和收发模块120。其中,
处理模块110,用于检测通过第一隧道发送的报文的误码率;
收发模块120,用于在所述处理模块110检测到所述误码率超过阈值,向所述第一隧道的出口节点发送第一报文,所述第一报文用于指示所述第一隧道出现误码,所述第一报文还用于指示所述出口节点向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。
作为一个实施例,所述第一报文包括标签和误码标识,所述标签用于所述出口节点确定所述第一隧道,所述误码标识用于指示发送所述第一报文的隧道出现误码。
作为一个实施例,所述第一报文用于指示所述出口节点通过第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
作为一个实施例,所述标签还用于所述出口节点确定所述第二隧道。
作为一个实施例,所述处理模块110计算通过所述第一隧道上多段路径上转发的报文的误码率之和,并检测到所述误码率之和超过所述阈值。
作为一个实施例,所述第一报文为双向转发检测BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述误码标识,所述误码标识的取值为30。
作为一个实施例,所述第一报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
可以理解,本申请实施例中的收发模块120可以由收发器或收发器相关电路组件实现,处理模块110可以由处理器或处理器相关电路组件实现。
参见图8,图8是本申请实施例提供的一种出口节点的结构示意图。如图8所示,所述出口节点200包括接收模块210和发送模块220。其中,
接收模块210,用于接收第一隧道上的第一中间节点通过所述第一隧道发送的第一报文,所述第一报文为所述第一中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文用于指示所述第一隧道出现误码;
发送模块220,用于向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。
作为一个实施例,所述第一报文包括第一标签和第一误码标识,所述第一标签与所述第一隧道对应,所述第一误码标识用于指示发送所述第一报文的隧道出现误码;所述出口节点200还包括处理模块230,用于根据所述第一标签和所述第一误码标识确定所述第一隧道出现误码。
作为一个实施例,所述处理模块230具体用于:根据所述第一标签确定第二隧道;指示所述发送模块利用所述第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
作为一个实施例,所述第二报文包括第二标签和第二误码标识,所述第二标签用于所述入口节点确定所述第一隧道,所述第二误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码。
作为一个实施例,所述第一报文为双向转发检测BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述第一误码标识,所述第一误码标识的取值为30;所述第二报文为BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述第二误码标识,所述第二误码标识的取值为31。
作为一个实施例,所述第一报文和所述第二报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
作为一个实施例,所述接收模块210还用于,接收所述第一隧道上的第二中间节点通过所述第一隧道发送的第三报文,所述第三报文为所述第二中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文包括第一误码率,所述第三报文包括第二误码率;所述处理模块230还用于,计算所述第一误码率和所述第二误码率之和,所述第一误码率和所述第二误码率之和超过所述出口节点的倒换阈值。
可以理解,本申请实施例中的接收模块210和发送模块220可以由收发器或收发器相关电路组件实现,处理模块230可以由处理器或处理器相关电路组件实现。
参见图9,图9是本申请实施例提供的一种入口节点的结构示意图。如图9所示, 所述入口节点300包括收发模块310和处理模块320。其中,
收发模块310,用于接收第一隧道的出口节点发送的第二报文,所述第二报文指示所述第一隧道出现误码;
处理模块320,用于根据所述第二报文确定所述第一隧道出现误码。
作为一个实施例,所述收发模块310具体用于:接收所述第一隧道的出口节点通过第二隧道发送的第二报文,所述第二隧道为所述第一隧道的反向隧道。
作为一个实施例,所述第二报文包括标签和误码标识,所述误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码;所述处理模块320具体用于:根据所述标签确定发送所述第二报文的隧道为所述第二隧道,确定所述第一隧道为所述第二隧道的反向隧道;根据所述误码标识确定所述第一隧道出现误码。
作为一个实施例,所述第二报文为BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述误码标识,所述误码标识的取值为31。
作为一个实施例,所述第二报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
可以理解,本申请实施例中的收发模块310可以由收发器或收发器相关电路组件实现,处理模块320可以由处理器或处理器相关电路组件实现。
需要说明的是,上述中间节点、出口节点或入口节点的结构以及误码通告的过程仅仅作为一种示例,不应构成具体限定,可以根据需要对中间节点、出口节点或入口节点中的各个单元进行增加,较少或合并。
参见图10,图10是本申请实施例提供的一种第一节点的结构示意图。如图10所示,所述第一节点400包括处理模块410和收发模块420。其中,
处理模块410,用于对从第二节点接收的报文进行误码率检测,当检测到误码率达到阈值时,创建与所述第二节点之间的双向转发检测BFD会话;
收发模块420,用于通过所述BFD会话向所述第二节点发送BFD报文,所述BFD报文用于指示从所述第二节点向所述第一节点发送的报文出现误码。
作为一个实施例,所述BFD报文的网际互联协议IP地址为组播IP地址,或所述BFD报文的MAC地址为组播MAC地址。
作为一个实施例,所述BFD报文的诊断Diag字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
作为一个实施例,所述处理模块410还用于,检测到误码率小于所述阈值时,删除所述BFD会话,并指示所述收发模块420停止向所述第二节点发送BFD报文。
可以理解,本申请实施例中的收发模块420可以由收发器或收发器相关电路组件实现,处理模块410可以由处理器或处理器相关电路组件实现。
参见图11,图11是本申请实施例提供的一种第二节点的结构示意图。如图11所示,所述第二节点500包括发送模块510和接收模块520。其中,
发送模块510,用于利用第一隧道向第一节点发送报文;
接收模块520,用于接收所述第一节点发送的双向转发检测BFD报文,所述BFD报文用于指示从所述第二节点向所述第一节点发送的报文出现误码;
发送模块510,还用于利用第二隧道向所述第一节点发送报文,所述第二隧道与所述第一隧道不同。
作为一个实施例,所述BFD报文的诊断Diag字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
可以理解,本申请实施例中的发送模块510和接收模块520可以由收发器或收发器相关电路组件实现。
需要说明的是,上述第一节点或第二节点的结构以及误码通告的过程仅仅作为一种示例,不应构成具体限定,可以根据需要对第一节点或第二节点中的各个单元进行增加,较少或合并。
参见图12,图12为本申请实施例提供的一种网络设备的结构示意图。如图12所示,该网络设备600包括:处理器610、通信接口620以及存储器630,所述处理器610、通信接口620以及存储器630通过内部总线640相互连接。应理解,该网络设备可以是路由器,或者可以是交换机。
所述处理器610可以由一个或者多个通用处理器构成,例如中央处理器(central processing unit,CPU),或者CPU和硬件芯片的组合。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,ASIC)、可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD)、现场可编程逻辑门阵列(field-programmable gate array,FPGA)、通用阵列逻辑(generic array logic,GAL)或其任意组合。
总线640可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。所述总线640可以分为地址总线、数据总线、控制总线等。为便于表示,图12中仅用一条粗线表示,但不表示仅有一根总线或一种类型的总线。
存储器630可以包括易失性存储器(volatile memory),例如随机存取存储器(random access memory,RAM);存储器630也可以包括非易失性存储器(non-volatile memory),例如只读存储器(read-only memory,ROM)、快闪存储器(flash memory)、硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD);存储器630还可以包括上述种类的组合。存储器630可用于存储程序和数据,以便于处理器610调用存储器630中存储的程序代码和数据以实现上述处理模块的功能。程序代码可以是用来实现图7所示的中间节点、图8所示的出口节点、图9所示的入口节点、图10所示的第一节点或图11所示的第二节点的功能模块,或者用于实现图3所示的方法实施例中以中间节点、出口节点或入口节点为执行主体、图5所示的方法实施例中以第一节点为执行主体以及图6所示的方法实施例中以第二节点为执行主体的方法步骤。
本申请实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时可以实现上述方法实施例中记载的任意一种的部分或全部步骤,以及实现上述图7、图8、图9、图10和图11所描述的任意一个功能模块的功能。
本申请实施例还提供了一种计算机程序产品,当其在计算机或处理器上运行时,使得计算机或处理器执行上述任一个误码通告的方法中的一个或多个步骤。上述所涉及的设备的各组成模块如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在所述计算机可读取存储介质中。
在上述实施例中,对各个实施例的描述各有侧重,某个实施例中没有详述的部分,可以参见其它实施例的相关描述。
应理解,本文中涉及的第一、第二、第三、第四以及各种数字编号仅为描述方便进行的区分,并不用来限制本申请的范围。
应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
还应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以 存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
本申请实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。
本申请实施例装置中的模块可以根据实际需要进行合并、划分和删减。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。

Claims (60)

  1. 一种误码通告的方法,其特征在于,包括:
    第一隧道上的中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值;
    所述中间节点通过所述第一隧道向所述第一隧道的出口节点发送第一报文,所述第一报文用于指示所述第一隧道出现误码,所述第一报文还用于指示所述出口节点向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。
  2. 如权利要求1所述的方法,其特征在于,所述第一报文包括标签和误码标识,所述标签用于所述出口节点确定所述第一隧道,所述误码标识用于指示发送所述第一报文的隧道出现误码。
  3. 如权利要求1或2所述的方法,其特征在于,所述第一报文用于指示所述出口节点向所述第一隧道的入口节点发送第二报文包括:
    所述第一报文用于指示所述出口节点通过第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
  4. 如权利要求3所述的方法,其特征在于,所述标签还用于所述出口节点确定所述第二隧道。
  5. 如权利要求1至4任一项所述的方法,其特征在于,所述中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值包括:
    所述中间节点计算通过所述第一隧道上多段路径上转发的报文的误码率之和,并检测到所述误码率之和超过所述阈值。
  6. 如权利要求2至5任一项所述的方法,其特征在于,所述第一报文为双向转发检测BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述误码标识,所述误码标识的取值为30。
  7. 如权利要求1至6任一项所述的方法,其特征在于,所述第一报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
  8. 一种误码通告的方法,其特征在于,包括:
    第一隧道的出口节点接收所述第一隧道上的第一中间节点通过所述第一隧道发送的第一报文,所述第一报文为所述第一中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文用于指示所述第一隧道出现误码;
    所述出口节点根据所述第一报文,向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。
  9. 如权利要求8所述的方法,其特征在于,还包括:
    所述第一报文包括第一标签和第一误码标识,所述第一标签与所述第一隧道对应,所述第一误码标识用于指示发送所述第一报文的隧道出现误码;
    所述出口节点根据所述第一标签和所述第一误码标识确定所述第一隧道出现误码。
  10. 如权利要求9所述的方法,其特征在于,所述出口节点根据所述第一报文,向所述第一隧道的入口节点发送第二报文包括:
    所述出口节点根据所述第一标签确定第二隧道;
    所述出口节点利用所述第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
  11. 如权利要求8至10任一项所述的方法,其特征在于,
    所述第二报文包括第二标签和第二误码标识,所述第二标签用于所述入口节点确定所述第一隧道,所述第二误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码。
  12. 如权利要求9至11任一项所述的方法,其特征在于,
    所述第一报文为双向转发检测BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述第一误码标识,所述第一误码标识的取值为30;
    所述第二报文为BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述第二误码标识,所述第二误码标识的取值为31。
  13. 如权利要求8至12任一项所述的方法,其特征在于,所述第一报文和所述第二报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
  14. 如权利要求8至13任一项所述的方法,其特征在于,还包括:
    所述出口节点接收所述第一隧道上的第二中间节点通过所述第一隧道发送的第三报文,所述第三报文为所述第二中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文包括第一误码率,所述第三报文包括第二误码率;
    所述出口节点计算所述第一误码率和所述第二误码率之和,所述第一误码率和所述第二误码率之和超过所述出口节点的倒换阈值。
  15. 一种误码通告的方法,其特征在于,包括:
    第一隧道的入口节点接收所述第一隧道的出口节点发送的第二报文,所述第二报文指示所述第一隧道出现误码;
    所述入口节点根据所述第二报文确定所述第一隧道出现误码。
  16. 如权利要求15所述的方法,其特征在于,所述第一隧道的入口节点接收所述第一隧道的出口节点发送的第二报文包括:
    所述第一隧道的入口节点接收所述第一隧道的出口节点通过第二隧道发送的第二报文,所述第二隧道为所述第一隧道的反向隧道。
  17. 如权利要求16所述的方法,其特征在于,
    所述第二报文包括标签和误码标识,所述误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码;所述入口节点根据所述第二报文确定所述第一隧道出现误 码包括:
    所述入口节点根据所述标签确定发送所述第二报文的隧道为所述第二隧道,确定所述第一隧道为所述第二隧道的反向隧道;
    所述入口节点根据所述误码标识确定所述第一隧道出现误码。
  18. 如权利要求17所述的方法,其特征在于,所述第二报文为BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述误码标识,所述误码标识的取值为31。
  19. 如权利要求15至18任一项所述的方法,其特征在于,所述第二报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
  20. 一种误码通告的方法,其特征在于,包括:
    第一节点对从第二节点接收的报文进行误码率检测;
    当检测到误码率达到阈值时,创建与所述第二节点之间的双向转发检测BFD会话;
    所述第一节点通过所述BFD会话向所述第二节点发送BFD报文,所述BFD报文用于指示从所述第二节点向所述第一节点发送的报文出现误码。
  21. 根据权利要求20所述的方法,其特征在于,所述BFD报文的网际互联协议IP地址为组播IP地址,或所述BFD报文的MAC地址为组播MAC地址。
  22. 根据权利要求20或21所述的方法,其特征在于,所述BFD报文的诊断Diag字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
  23. 根据权利要求20至22任一权利要求所述的方法,其特征在于,包括:
    当检测到误码率小于所述阈值时,删除所述BFD会话,并停止向所述第二节点发送BFD报文。
  24. 一种误码通告的方法,其特征在于,包括:
    第二节点利用第一隧道向第一节点发送报文;
    所述第二节点接收所述第一节点发送的双向转发检测BFD报文,所述BFD报文用于指示从所述第二节点向所述第一节点发送的报文出现误码;
    所述第二节点利用第二隧道向所述第一节点发送报文,所述第二隧道与所述第一隧道不同。
  25. 如权利要求24所述的方法,其特征在于,所述BFD报文的诊断Diag字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
  26. 一种中间节点,其特征在于,包括:
    处理模块,用于检测通过第一隧道发送的报文的误码率;
    收发模块,用于在所述处理模块检测到所述误码率超过阈值,向所述第一隧道的出口节点发送第一报文,所述第一报文用于指示所述第一隧道出现误码,所述第一报文还用于指示所述出口节点向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。
  27. 如权利要求26所述的中间节点,其特征在于,所述第一报文包括标签和误码标识,所述标签用于所述出口节点确定所述第一隧道,所述误码标识用于指示发送所述第一报文的隧道出现误码。
  28. 如权利要求26或27所述的中间节点,其特征在于,所述第一报文用于指示所述出口节点通过第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
  29. 如权利要求28所述的中间节点,其特征在于,所述标签还用于所述出口节点确定所述第二隧道。
  30. 如权利要求26至29任一项所述的中间节点,其特征在于,所述处理模块计算通过所述第一隧道上多段路径上转发的报文的误码率之和,并检测到所述误码率之和超过所述阈值。
  31. 如权利要求27至30任一项所述的中间节点,其特征在于,所述第一报文为双向转发检测BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述误码标识,所述误码标识的取值为30。
  32. 如权利要求26至31任一项所述的中间节点,其特征在于,所述第一报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
  33. 一种出口节点,其特征在于,包括:
    接收模块,用于接收第一隧道上的第一中间节点通过所述第一隧道发送的第一报文,所述第一报文为所述第一中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文用于指示所述第一隧道出现误码;
    发送模块,用于向所述第一隧道的入口节点发送第二报文,所述第二报文用于指示所述第一隧道出现误码。
  34. 如权利要求33所述的出口节点,其特征在于,所述第一报文包括第一标签和第一误码标识,所述第一标签与所述第一隧道对应,所述第一误码标识用于指示发送所述第一报文的隧道出现误码;
    所述出口节点还包括处理模块,用于根据所述第一标签和所述第一误码标识确定所述第一隧道出现误码。
  35. 如权利要求34所述的出口节点,其特征在于,所述处理模块具体用于:
    根据所述第一标签确定第二隧道;
    指示所述发送模块利用所述第二隧道向所述第一隧道的入口节点发送第二报文,所述第二隧道为所述第一隧道的反向隧道。
  36. 如权利要求33至35任一项所述的出口节点,其特征在于,所述第二报文包括第二标签和第二误码标识,所述第二标签用于所述入口节点确定所述第一隧道,所述第二误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码。
  37. 如权利要求34至36所述的出口节点,其特征在于,所述第一报文为双向转发检测BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述第一误码标识,所述第一误码标识的取值为30;
    所述第二报文为BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述第二误码标识,所述第二误码标识的取值为31。
  38. 如权利要求33至37任一项所述的出口节点,其特征在于,所述第一报文和所述第二报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带所述误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述n的和小于所述最小回声报文接收间隔字段的长度值。
  39. 如权利要求33至38任一项所述的出口节点,其特征在于,
    所述接收模块还用于,接收所述第一隧道上的第二中间节点通过所述第一隧道发送的第三报文,所述第三报文为所述第二中间节点检测到通过所述第一隧道发送的报文的误码率超过阈值而发送给所述出口节点的报文,所述第一报文包括第一误码率,所述第三报文包括第二误码率;
    所述处理模块还用于,计算所述第一误码率和所述第二误码率之和,所述第一误码率和所述第二误码率之和超过所述出口节点的倒换阈值。
  40. 一种入口节点,其特征在于,包括:
    收发模块,用于接收第一隧道的出口节点发送的第二报文,所述第二报文指示所述第一隧道出现误码;
    处理模块,用于根据所述第二报文确定所述第一隧道出现误码。
  41. 如权利要求40所述的入口节点,其特征在于,所述收发模块具体用于:
    接收所述第一隧道的出口节点通过第二隧道发送的第二报文,所述第二隧道为所述第一隧道的反向隧道。
  42. 如权利要求41所述的入口节点,其特征在于,所述第二报文包括标签和误码标识,所述误码标识用于指示发送所述第二报文的隧道的反向隧道出现误码;
    所述处理模块具体用于:
    根据所述标签确定发送所述第二报文的隧道为所述第二隧道,确定所述第一隧道为所述第二隧道的反向隧道;
    根据所述误码标识确定所述第一隧道出现误码。
  43. 如权利要求42所述的入口节点,其特征在于,所述第二报文为BFD报文,所述BFD报文包括诊断字字段,所述诊断字字段用于携带所述误码标识,所述误码标识的取值为31。
  44. 如权利要求40至43任一项所述的入口节点,其特征在于,所述第二报文为BFD报文,所述BFD报文包括最小回声报文接收间隔字段,所述最小回声报文接收间隔字段用于携带误码率,所述最小回声报文接收间隔字段的前m个比特表示所述误码率的系数,所述最小回声报文接收间隔字段的中间n个比特表示所述误码率的幂数,其中,所述m为大于等于1的正整数,所述n为大于等于1的正整数,所述m和所述 n的和小于所述最小回声报文接收间隔字段的长度值。
  45. 一种第一节点,其特征在于,包括:
    处理模块,用于对从第二节点接收的报文进行误码率检测,当检测到误码率达到阈值时,创建与所述第二节点之间的双向转发检测BFD会话;
    收发模块,用于通过所述BFD会话向所述第二节点发送BFD报文,所述BFD报文用于指示从所述第二节点向所述第一节点发送的报文出现误码。
  46. 如权利要求45所述的第一节点,其特征在于,所述BFD报文的网际互联协议IP地址为组播IP地址,或所述BFD报文的MAC地址为组播MAC地址。
  47. 如权利要求45或46所述的第一节点,其特征在于,所述BFD报文的诊断Diag字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
  48. 如权利要求45至47任一项所述的第一节点,其特征在于,
    所述处理模块还用于,检测到误码率小于所述阈值时,删除所述BFD会话,并指示所述收发模块停止向所述第二节点发送BFD报文。
  49. 一种第二节点,其特征在于,包括:
    发送模块,用于利用第一隧道向第一节点发送报文;
    接收模块,用于接收所述第一节点发送的双向转发检测BFD报文,所述BFD报文用于指示从所述第二节点向所述第一节点发送的报文出现误码;
    所述发送模块还用于,利用第二隧道向所述第一节点发送报文,所述第二隧道与所述第一隧道不同。
  50. 如权利要求49所述的第二节点,其特征在于,所述BFD报文的诊断Diag字段用于标识所述第二节点向所述第一节点发送的报文出现误码。
  51. 一种中间节点,其特征在于,包括:处理器和收发器,其中:
    所述处理器和所述收发器相互连接,所述收发器用于与其它设备通信,所述处理器被配置用于执行如权利要求1至7所述的方法。
  52. 一种出口节点,其特征在于,包括:处理器和收发器,其中:
    所述处理器和所述收发器相互连接,所述收发器用于与其它设备通信,所述处理器被配置用于执行如权利要求8至14所述的方法。
  53. 一种入口节点,其特征在于,包括:处理器和收发器,其中:
    所述处理器和所述收发器相互连接,所述收发器用于与其它设备通信,所述处理器被配置用于执行如权利要求15至19所述的方法。
  54. 一种第一节点,其特征在于,包括:处理器和收发器,其中:
    所述处理器和所述收发器相互连接,所述收发器用于与其它设备通信,所述处理器被配置用于执行如权利要求20至23所述的方法。
  55. 一种第二节点,其特征在于,包括:处理器和收发器,其中:
    所述处理器和所述收发器相互连接,所述收发器用于与其它设备通信,所述处理器被配置用于执行如权利要求24或25所述的方法。
  56. 一种计算机非瞬态存储介质,其特征在于,包括指令,当所述指令在中间节点上运行时,使得所述中间节点执行如权利要求1至7任一权利要求所述的方法。
  57. 一种计算机非瞬态存储介质,其特征在于,包括指令,当所述指令在出口节点上运行时,使得所述出口节点执行如权利要求8至14任一权利要求所述的方法。
  58. 一种计算机非瞬态存储介质,其特征在于,包括指令,当所述指令在出口节点上运行时,使得所述出口节点执行如权利要求15至19任一权利要求所述的方法。
  59. 一种计算机非瞬态存储介质,其特征在于,包括指令,当所述指令在出口节点上运行时,使得所述出口节点执行如权利要求20至23任一权利要求所述的方法。
  60. 一种计算机非瞬态存储介质,其特征在于,包括指令,当所述指令在出口节点上运行时,使得所述出口节点执行如权利要求24或25所述的方法。
PCT/CN2020/095481 2019-06-10 2020-06-10 一种误码通告的方法及相关设备 WO2020249033A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
BR112021023534A BR112021023534A2 (pt) 2019-06-10 2020-06-10 Método de notificação de erro de bit e dispositivos associados
JP2021568956A JP7334392B2 (ja) 2019-06-10 2020-06-10 ビットエラーを通知する方法および関連するデバイス
KR1020217040774A KR20220007689A (ko) 2019-06-10 2020-06-10 비트 에러 통지 방법 및 관련 디바이스
EP20822228.1A EP3962000B1 (en) 2019-06-10 2020-06-10 Bit error notification method and related device
US17/546,404 US20220103312A1 (en) 2019-06-10 2021-12-09 Method for Advertising Bit Error and Related Devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910499061.XA CN112073285B (zh) 2019-06-10 2019-06-10 一种误码通告的方法及相关设备
CN201910499061.X 2019-06-10

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/546,404 Continuation US20220103312A1 (en) 2019-06-10 2021-12-09 Method for Advertising Bit Error and Related Devices

Publications (1)

Publication Number Publication Date
WO2020249033A1 true WO2020249033A1 (zh) 2020-12-17

Family

ID=73658370

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/095481 WO2020249033A1 (zh) 2019-06-10 2020-06-10 一种误码通告的方法及相关设备

Country Status (7)

Country Link
US (1) US20220103312A1 (zh)
EP (1) EP3962000B1 (zh)
JP (1) JP7334392B2 (zh)
KR (1) KR20220007689A (zh)
CN (2) CN112073285B (zh)
BR (1) BR112021023534A2 (zh)
WO (1) WO2020249033A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115103038B (zh) * 2021-12-29 2023-02-03 武汉绿色网络信息服务有限责任公司 一种基于隧道报文的匹配方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281931A (zh) * 2014-06-18 2016-01-27 中兴通讯股份有限公司 Potn的误码检测方法、装置及系统
CN105471736A (zh) * 2014-09-02 2016-04-06 中兴通讯股份有限公司 一种隧道信号劣化通知及切换方法、装置
CN105765909A (zh) * 2013-06-27 2016-07-13 华为技术有限公司 一种链路切换方法及装置
US20170302567A1 (en) * 2014-12-29 2017-10-19 Huawei Technologies Co., Ltd. Bit Error Information Transfer Method, Network Device, and Communications System
CN109150761A (zh) * 2018-10-24 2019-01-04 新华三技术有限公司 一种隧道切换的方法及装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5965061B2 (ja) * 2012-06-30 2016-08-03 ▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. データ伝送方法、ネットワーク要素デバイスおよび通信システム
EP3001615B1 (en) * 2013-07-08 2018-09-19 Huawei Technologies Co., Ltd. Bit error rate detecting method and network device
CN104734865A (zh) * 2013-12-18 2015-06-24 中国移动通信集团贵州有限公司 一种分组传送网的网络保护方法、装置及网元设备
US10291431B2 (en) * 2014-03-03 2019-05-14 Pismo Labs Technology Limited Methods and systems for transmitting and receiving data through tunnel groups
CN104518914B (zh) * 2014-12-17 2018-03-02 华为技术有限公司 链路切换方法和设备
US9929879B2 (en) * 2015-06-09 2018-03-27 Oracle International Corporation Multipath support of real-time communications
JP2017034463A (ja) 2015-07-31 2017-02-09 富士通株式会社 プロテクション方法、通信システム、及び、エンドノード
US10038494B1 (en) * 2017-02-02 2018-07-31 Infinera Corporation Proactive multi-layer mechanisms to protect packet-optical transport networks
CN108989120A (zh) * 2018-08-01 2018-12-11 中国联合网络通信集团有限公司 一种数据传输方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105765909A (zh) * 2013-06-27 2016-07-13 华为技术有限公司 一种链路切换方法及装置
CN105281931A (zh) * 2014-06-18 2016-01-27 中兴通讯股份有限公司 Potn的误码检测方法、装置及系统
CN105471736A (zh) * 2014-09-02 2016-04-06 中兴通讯股份有限公司 一种隧道信号劣化通知及切换方法、装置
US20170302567A1 (en) * 2014-12-29 2017-10-19 Huawei Technologies Co., Ltd. Bit Error Information Transfer Method, Network Device, and Communications System
CN109150761A (zh) * 2018-10-24 2019-01-04 新华三技术有限公司 一种隧道切换的方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
AGGARWAL, R. ET AL.: "Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs)", INTERNET ENGINEERING TASK FORCE (IETF) REQUEST FOR COMMENTS: 5884, 30 June 2010 (2010-06-30), XP015070824 *

Also Published As

Publication number Publication date
JP2022536039A (ja) 2022-08-12
EP3962000A4 (en) 2022-06-15
EP3962000A1 (en) 2022-03-02
JP7334392B2 (ja) 2023-08-29
CN112073285A (zh) 2020-12-11
CN112073285B (zh) 2022-04-22
US20220103312A1 (en) 2022-03-31
KR20220007689A (ko) 2022-01-18
EP3962000B1 (en) 2024-04-17
BR112021023534A2 (pt) 2022-01-18
CN114938317A (zh) 2022-08-23

Similar Documents

Publication Publication Date Title
US9059902B2 (en) Procedures, apparatuses, systems, and computer-readable media for operating primary and backup network elements
US7742400B2 (en) Method and system for detecting link failure between nodes in a hybrid network
US8259590B2 (en) Systems and methods for scalable and rapid Ethernet fault detection
US8675479B2 (en) Methods and apparatus for improving network communication using ethernet switching protection
WO2013182059A1 (zh) 多协议标签交换流量工程隧道建立方法及设备
WO2008055426A1 (fr) Procédé, système et appareil de nœud pour transmettre un message de gestion de défaut de connectivité ethernet
US9425893B1 (en) Methods and apparatus for implementing optical integrated routing with traffic protection
CN108206759B (zh) 一种转发报文的方法、设备及系统
CN108243114B (zh) 一种转发报文的方法、设备及系统
EP2553870B1 (en) An operations, administrations and management proxy and a method for handling operations, administrations and management messages
WO2016050177A1 (zh) 确定隧道最大传输单元的方法、网络设备和系统
US20200044964A1 (en) Defect detection in ip/mpls network tunnels
US20230231798A1 (en) Conditional routing delivery in a compromised network
WO2020173424A1 (zh) 报文处理的方法和网关设备
US8724454B2 (en) System and method for summarizing alarm indications in a network environment
WO2020249033A1 (zh) 一种误码通告的方法及相关设备
CN106161232B (zh) 一种隧道保护切换的方法和装置
US11368564B2 (en) Packet fragmentation and reassembly
US7061859B2 (en) Fast protection in ring topologies
WO2011011934A1 (zh) 一种以太网隧道分段保护方法和装置
US20220224410A1 (en) Protection switching based on exchange of protection information
EP3955531A1 (en) Processing method and apparatus based on link error code
CN109039728B (zh) 基于bfd的流量拥塞检测方法及系统
CN111885630A (zh) 数据传输方法及通信装置
CN107317753B (zh) 双向转发检测bfd会话建立的方法、装置和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20822228

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021568956

Country of ref document: JP

Kind code of ref document: A

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112021023534

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 2020822228

Country of ref document: EP

Effective date: 20211123

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20217040774

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 112021023534

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20211123