WO2021018150A1 - Procédé et appareil de détection de liaison - Google Patents

Procédé et appareil de détection de liaison Download PDF

Info

Publication number
WO2021018150A1
WO2021018150A1 PCT/CN2020/105265 CN2020105265W WO2021018150A1 WO 2021018150 A1 WO2021018150 A1 WO 2021018150A1 CN 2020105265 W CN2020105265 W CN 2020105265W WO 2021018150 A1 WO2021018150 A1 WO 2021018150A1
Authority
WO
WIPO (PCT)
Prior art keywords
network device
bfd
session
timeout
bgp
Prior art date
Application number
PCT/CN2020/105265
Other languages
English (en)
Chinese (zh)
Inventor
张梅刚
杨冰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021018150A1 publication Critical patent/WO2021018150A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Definitions

  • the present invention relates to the field of network technology, in particular to a method and device for link detection in a network.
  • Border Gateway Protocol (Border Gateway Protocol, BGP) is a dynamic routing protocol used between Autonomous Systems (AS). It achieves reachability between ASs by maintaining IP routing tables or ‘prefix’ tables.
  • AS Autonomous Systems
  • BGP Border Gateway Protocol
  • Each AS must designate a node running BGP to exchange routing information with other ASs on behalf of the AS.
  • This node can be a host, but it is usually a router to perform BGP.
  • the routers in the two ASs that use BGP to exchange information are also called Border Gateways or Border Routers. BGP nodes that exchange messages are called peers.
  • BGP uses Transmission Control Protocol (TCP) as its transport layer protocol.
  • TCP Transmission Control Protocol
  • a TCP connection is established between BGP peers first, and after the TCP connection is established, a connection relationship (ie, a BGP session) between the BGP peers is established through an Open message (start message). After that, the BGP node will periodically send Keepalive messages (keep messages) to the peer to maintain the validity of the connection.
  • BGP can implement the neighbor detection mechanism by periodically sending Keepalive messages.
  • the sending cycle of Keepalive messages is more than 1 second. Therefore, the detection cycle of this detection mechanism is relatively long. When the data reaches the Gbit/s rate level, the detection time of this mechanism will cause a large amount of data loss .
  • BFD bidirectional forwarding detection
  • BGP linkage function uses the fast detection mechanism of BFD to quickly discover the link failures between BGP peers and report them to the BGP protocol.
  • BFD is a universal and standardized rapid fault detection mechanism that is independent of media and protocol.
  • BFD establishes a session on two network devices to detect the bidirectional forwarding path between the network devices and serve upper-layer applications.
  • BFD itself does not have a neighbor discovery mechanism, but relies on the served upper application to notify its neighbor information to establish a session. After the session is established, BFD packets will be quickly sent periodically.
  • BFD and BGP linkage After a BGP node establishes a BGP session with a peer, the BGP node establishes a BFD session with the peer based on the peer information, and uses BFD to detect link failures. When a link failure is detected, the BFD session between the BGP node and the peer is interrupted, and the BGP session between the associated BGP node and the peer is interrupted. Because BFD can achieve millisecond level detection, BGP can achieve rapid convergence through linkage.
  • the problem with using the BFD detection mechanism in BGP is that the establishment of the BFD session and the establishment of the BGP session are asynchronous, that is, the establishment of the BFD session starts after the establishment of the BGP session. If link flutter occurs after the BGP session is established and before the BFD session is established, BGP can only rely on Keeplive to detect the status of the peer, which may still cause data loss for a long period of time.
  • the present invention provides a method and a device for dividing an IGP domain in a network to solve the problem of high maintenance overhead during network expansion or adjustment in the prior art.
  • the present invention adopts the following technical solutions:
  • an embodiment of the present invention provides a link detection method, which is applied in a linkage scenario where the upper layer is applied to BFD.
  • the method includes: the first network device and the second network device negotiate a timeout period for establishing a bidirectional forwarding detection (BFD) session in the process of establishing an application layer session.
  • the first network device sets and starts a timer according to the negotiated timeout time, and establishes a bidirectional forwarding detection (BFD) session with the second network device. If the establishment of the BFD session is not completed before the timer ends, the first network device interrupts the application layer session with the second network device.
  • BFD bidirectional forwarding detection
  • the application layer session will be interrupted, the path between the two network devices will be converged, and data will not be sent to the path, thereby reducing data loss.
  • the first network device performs link detection through the BFD session.
  • the embodiment of the present invention may use BFD to quickly detect the link, thereby accelerating the convergence speed.
  • the first network device and the second network device may carry the timeout period defined for the BFD session in the negotiation message for establishing the application layer session. Then, one of the timeout periods defined by the first network device and the second network device is selected as the timeout period of the BFD session.
  • the negotiation message of the application layer session to negotiate the timeout period of the BFD session, the changes to the device can be reduced and the implementation of the solution is easier.
  • the solutions of the embodiments of the present invention can be applied to the linkage between BGP and BFD.
  • the first network device and the second network device can be Border Gateway Protocol (BGP) nodes, and the first The network device and the second network device respectively carry the timeout time defined for the BFD session in the negotiation message for establishing the application layer session, including: after the first network device establishes a connection with the second network device , Sending a first start (OPEN) message to the second network device, and receiving a second OPEN message sent by the second network device, in the first OPEN message and the second OPEN message Respectively carry the timeout time defined by the first network device and the second network device for the BFD session.
  • the embodiment of the present invention directly uses the OPEN message to implement the negotiation of the timeout time, which not only improves the ease of implementation, but also achieves good compatibility.
  • the first OPEN message and the second OPEN message carry the timeout time defined for the BFD session through a BFD enable field (BFD enable TLV);
  • BFD enable TLV includes the type, length, and value, and the timeout period defined for the BFD session is carried in the value of the BFD enable TLV.
  • the first network device and the second network device may select a maximum time value from the timeout time defined by the first network device and the second network device as the timeout time of the BFD session.
  • the present invention provides a network device.
  • the network device is used to execute the first aspect or the method in any possible implementation manner of the first aspect.
  • the network device includes a module for executing the method in the first aspect or any possible implementation of the first aspect, for example, a negotiation unit that performs functions related to negotiation in an application layer session, and performs a BFD session A BFD unit that establishes related functions, and an interrupt unit that performs interrupt processing for judging whether the establishment of a BFD session has timed out and after the timeout.
  • the present invention provides a network device, which includes a communication interface, a processor, a memory, and a bus.
  • the processor is respectively coupled to the communication interface and the memory through the bus.
  • the basic input output system solidified in the memory or the bootloader in the embedded system is used to guide the system to start, and the network device is guided to enter a normal operating state.
  • the application program and the operating system in the memory are then run, so that the processor executes the first aspect or the method in any possible implementation manner of the first aspect.
  • the present invention provides a computer-readable medium for storing a computer program, and the computer program includes instructions for executing the first aspect or any possible implementation of the first aspect.
  • FIG. 1 is a schematic diagram of a networking of an upper-layer application and BFD linkage provided by an embodiment of the present invention
  • Figure 2 is an interaction diagram of a link detection method provided by an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a BGP network provided by an embodiment of the present invention.
  • Figure 4 is a flowchart of a link detection method provided by an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a format of BFD enable TLV provided by an embodiment of the present invention.
  • Figure 6 is a schematic structural diagram of a network device provided by an embodiment of the present invention.
  • Fig. 7 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the linkage function means that upper-layer applications use BFD's rapid detection mechanism to quickly find link failures and report them to the upper-layer applications, so that the upper-layer applications quickly converge.
  • the establishment of application layer sessions that is, the sessions of upper-layer applications
  • the establishment of BFD sessions are asynchronous, which leads to link failures during the establishment of the upper-layer application sessions but the BFD session is not established. It is impossible to use BFD to quickly find out, which may result in data loss for a long period of time.
  • the embodiment of the present invention negotiates the timeout period for establishing the BFD session during the process of establishing the session by the upper application of the two network devices, and sets and starts the timer according to the negotiated timeout period.
  • the BFD session is established, If the establishment of the BFD session is not completed at the end of the timer, the established application layer session is interrupted. In this way, if the BFD session is not established for a long time, the application layer session will be interrupted, the path between the two network devices will be converged, and data will not be sent to the path, thereby reducing data loss.
  • FIG. 1 is a schematic diagram of a networking of an upper layer application and BFD linkage provided by an embodiment of the present invention.
  • the networking includes network devices 101-104.
  • the network device can be a host, a router, or a switch.
  • Network devices can be located in the same network or in different networks.
  • the network device 101 establishes an application layer session with the network device 103 and the network device 104 respectively, and establishes a BFD session after the establishment of the application layer session is completed.
  • the route outbound interface from the network device 101 to the network device 102 is the interface 1, and the network device 103 reaches the network device 102 through the network device 103.
  • the BFD first perceives and informs the upper layer application of the network device 103.
  • the network device 103 processes the Down event (that is, interrupts the application layer session), re-calculates the route, and the new route outgoing interface is interface 2, which passes through the network device 104 to the network device 102.
  • the above is the linkage process between upper-layer applications and BFD.
  • the embodiment of the present invention further supplements the above process.
  • the network device 101 and the network device 103 when the network device 101 and the network device 103 establish an application layer session, they further negotiate the timeout period for establishing a BFD session.
  • the network device 101 also performs Down event processing to converge the link between the network device 101 and the network device 103, and the new route outgoing interface is interface 2, which passes through the network device 104 to the network device 102. That is to say, in the embodiment of the present invention, the application layer session will be interrupted in the case of link failure and BFD session establishment timeout, so as to avoid long-term data loss.
  • the above-mentioned solution mainly involves the use of two network devices (for example, network device 101 and network device 103) that link upper-layer applications with BFD.
  • these two network devices are referred to as a first network device and a second network device, and the first network device and the second network device may be referred to as opposite end network devices.
  • the first network device and the second network device establish an application layer session, they perform application layer session negotiation.
  • the negotiation of the timeout period for establishing the BFD session can be added to the negotiation message of the application layer session.
  • Figure 2 is an interaction diagram of the link detection method provided by an embodiment of the present invention.
  • the method includes an application layer session establishment process and a BFD session establishment process.
  • the application layer session establishment process includes:
  • Steps S201-S202 The first network device sends a negotiation message for establishing an application layer session to the second network device, and receives a negotiation message for establishing an application layer session sent by the second network device. Wherein, the first network device and the second network device send the negotiation message to carry the timeout time defined for the BFD session.
  • the negotiation message may be a message with a negotiation function during the session establishment process, for example, a session creation message or an initial message.
  • the BFD session establishment process includes:
  • Steps S203-S204 the first network device and the second network device select one of the timeout periods defined by the first network device and the second network device as the timeout period of the BFD session, and the first network device and the second network device negotiate Set the timeout period and start the timer.
  • the first network device and the second network device can be selected according to a uniform rule.
  • the maximum time value can be selected as the timeout time of the BFD session in the timeout time.
  • the timeout time selected according to the uniform rule is the timeout time of the negotiated BFD session.
  • Step S205 The first network device and the second network device start to establish a BFD session.
  • Step S206 It is judged whether the establishment of the BFD session is completed before the timer ends.
  • the first network device interrupts the application layer session with the second network device. If the establishment of the BFD session is completed before the timer ends, the first network device detects the link with the second network device through the BFD session.
  • the solution of the embodiment of the present invention can be applied to scenarios where a variety of upper-layer applications and BFD are linked, for example, BFD is linked with Open Shortest Path First (OSPF), and BFD is linked with an intermediate system to an intermediate system (Intermediate System). to Intermediate System (IS-IS) linkage, BFD and BGP linkage, BFD and Virtual Router Redundancy Protocol (VRRP) linkage, etc.
  • OSPF Open Shortest Path First
  • IRP Intermediate System
  • the upper layer application protocols enabled on the first network device and the second network device are different.
  • the first network device and the second network device may be devices with OSPF enabled.
  • the first network device and the second network device It may be a device with the IS-IS function enabled; in the scenario where BFD and BGP are linked, the first network device and the second network device may be devices with the BGP function enabled.
  • the embodiment of the present invention takes the linkage of BFD and BGP as an example for description.
  • the device that sends BGP messages is called the BGP speaker. It receives or generates new message information and advertises to other BGP Speakers.
  • the BGP speaker is a BGP-enabled network device.
  • BGP Speaker is referred to as a BGP node.
  • Peer Speakers exchanging messages are called peers or neighbors.
  • BGP is generally applied between ASs, as shown in FIG. 3, which is a schematic structural diagram of a network using BGP according to an embodiment of the present invention.
  • the network includes two autonomous systems, AS1 and AS2.
  • AS1 includes BGP nodes 101, 102, 103.
  • AS2 includes BGP nodes 104 and 105.
  • a BGP node is a network device with the BGP function enabled.
  • the network device can be a host, router, switch, etc.
  • the BGP nodes at both ends shown by the dotted arrows are peers.
  • the BGP node 101 is a peer of the BGP node 102
  • the BGP node 102 is also a peer of the BGP node 101.
  • AS1 and AS2 exchange information through the BGP node 102 and the BGP node 104. It should be noted that not any two BGP nodes can interact with each other. Two BGP nodes must form a pair (ie BGP peer) to interact. Two BGP nodes establish a BGP session to form a peer. If the two BGP nodes that form a peer have the BFD capability enabled, the two BGP nodes can further establish a BFD session, and realize rapid detection through the linkage between BGP and BFD. When two BGP nodes realize the linkage between BGP and BFD, the solution of the embodiment shown in FIG. 2 can be implemented to reduce data loss.
  • Fig. 4 is a flowchart of a link detection method provided by an embodiment of the present invention. The method includes:
  • the first BGP node establishes a TCP connection with the second BGP node.
  • BGP uses TCP as its transport layer protocol. Before establishing a BGP session, a TCP connection can be established first. The process of establishing the TCP connection can adopt the existing technology, which will not be repeated here.
  • the first BGP node sends a BGP start message (ie, BGP OPEN message) for establishing a BGP session to the second BGP node, and the BGP OPEN message carries the timeout period for establishing a BFD session defined by the first BGP node.
  • BGP start message ie, BGP OPEN message
  • the Open message is the first message sent after the TCP connection is established, and is used to establish a connection relationship between BGP peers (ie, a BGP session).
  • This message can negotiate various capabilities when the BGP session is initially established, such as address family capabilities, Refresh capabilities, GR (Graceful Restart) capabilities, and so on.
  • the embodiment of the present invention may use the message to negotiate the BFD capability, and the negotiated BFD capability may include the timeout period for establishing the BFD session.
  • a BFD enable field can be added to the OPEN message to negotiate BFD capabilities.
  • Type-Length-Value (Type-Length-Value, TLV) is a message format.
  • the BFD enable TLV is used to inform the local BFD capability (that is, whether to support BFD) and negotiate the timeout period for establishing a BFD session.
  • FIG. 5 is a schematic diagram of a format of BFD-enable TLV according to an embodiment of the present invention. Among them, the meaning of each parameter in the message format is as follows:
  • TLV type (identifies whether BFD is enabled)
  • Length Length (2Byte)
  • Timer identifies the timer time, this parameter can be used to define the timeout time for establishing a BFD session
  • the configurable range of Timer is 1-65534, and the maximum value of 65535 means that the timer is not enabled.
  • the BGP OPEN message sent by the first BGP node to the second BGP node may carry BFDenable TLV to indicate that the first BGP node has enabled the BFD capability.
  • the Value in the BFDenable TLV can be set to 10, which means that the timer is set to 10S, that is, the timeout period for establishing a BFD session defined by the first BGP node is 10S.
  • the second BGP node sends a BGP OPEN message to the first BGP node, and the BGP OPEN message carries the timeout period for establishing a BFD session defined by the second BGP node.
  • the BGP OPEN message sent by the second BGP node to the first BGP node may also carry BFDenable TLV to indicate that the second BGP node has enabled the BFD capability.
  • the Value in the BFDenable TLV can be set to 20, which means that the timer is set to 20S, that is, the timeout period for establishing a BFD session defined by the second BGP node is 20S.
  • S404-S405 After receiving the BGP OPEN message sent by the opposite end, the first BGP node and the second BGP node send a Keepalive message to the opposite end for confirmation, and keep the connection.
  • the BGP session After receiving the Keepalive message from the peer, the BGP session is established.
  • S406-S408 After the BGP session is established, the first BGP node and the second BGP node respectively set and start timers according to the received BGP OPEN message, and establish a BFD session.
  • the first BGP node and the second BGP node negotiate a timer value (that is, the timeout period for establishing a BFD session) according to the BFDenable TLV carried in the BGP OPEN message.
  • a timer value that is, the timeout period for establishing a BFD session
  • the larger value (such as 20s) of the timer values defined by the two can be taken as the timer value, the timer is set, and the timer is started.
  • the received BGP OPEN message does not carry BFD enable TLV, it means that the other party does not support BFD enable TLV or has no BFD capability. In this case, the timer is not started. In this embodiment, the carrying of BFD-enable TLV is taken as an example for description.
  • the establishment of the BFD session can be achieved by using the existing technology, which will not be repeated here.
  • the BGP Notification message is a message to notify that an error has been detected. After the first network device and the second network device send the BGP Notification message, they will set the peer down at the local end (that is, the BGP session with the peer will be interrupted).
  • the establishment of the BFD session is not completed before the timer expires as an example. If the establishment of the BFD session is completed before the timer ends, the first network device and the second network device pass the established Link detection for the BFD session.
  • the foregoing embodiment implements the control over whether the establishment of the BFD session is overtime by extending the OPEN message in the BGP, which greatly reduces the service damage time. Moreover, the method of expanding existing messages makes the changes to existing equipment small and has good compatibility.
  • Fig. 6 schematically shows a network device 600 provided by an embodiment of the present invention.
  • the network device 600 includes a negotiation unit 601, a BFD unit 602, and an interrupt unit 603.
  • the negotiating unit 601 is configured to negotiate a timeout period for establishing a bidirectional forwarding detection (BFD) session with the peer network device in the process of establishing an application layer session.
  • BFD bidirectional forwarding detection
  • the peer network device is the second network device or the second BGP node in the foregoing method embodiment.
  • the negotiation unit 601 refer to the function of the first network device or the first BGP node and the second network device or the second BGP node in the method embodiments shown in FIG. 2 and FIG. 4 to negotiate a timeout period for establishing a BFD session.
  • the BFD unit 602 is configured to set and start a timer according to the timeout time negotiated by the negotiation unit 601, and establish a bidirectional forwarding detection (BFD) session with the peer network device.
  • BFD bidirectional forwarding detection
  • the interrupting unit 603 is configured to interrupt the application layer session with the peer network device when the BFD unit 602 does not complete the establishment of the BFD session before the timer ends.
  • the interrupt unit 603 refer to the part of the first network device or the first BGP node interrupting the application layer session with the second network device or the second BGP node in the method embodiments shown in FIG. 2 and FIG. 4.
  • the BFD unit 602 may also perform link detection through the established BFD session when the establishment of the BFD session has been completed before the timer ends.
  • the above-mentioned network equipment can be used in different scenarios to enable different upper-layer application functions.
  • the network equipment can enable the BGP function and execute the first method in the method embodiment shown in Figure 4.
  • the network device 600 here is embodied in the form of a functional unit. In an optional example, those skilled in the art can understand that the network device 600 may correspond to the network device in the foregoing embodiment.
  • the first network device, the second network device, the first BGP node, and the second BGP node can be used In order to avoid repetition, the various processes and/or steps corresponding to the related equipment in the foregoing method embodiments are not repeated here.
  • the network device (for example, the first network device, the second network device, the first BGP node, the second BGP node) implementing the embodiments of the present invention may be a host, a router, or a switch.
  • the hardware structure of the network device in the embodiment of the present invention is introduced below.
  • Figure 7 is a schematic structural diagram of a network device provided by an embodiment of the present invention.
  • the network device 700 includes: a communication interface 701, a processor 702, and a memory 703.
  • the network device 700 may further include a bus 704.
  • the communication interface 701, the processor 702, and the memory 703 may be connected to each other through a bus 704.
  • the processor may be composed of one or more general-purpose processors, such as a central processing unit (CPU).
  • the processor can be used to run programs for processing functions in related program codes. That is to say, the program code executed by the processor can realize the functions of the negotiation unit, the BFD unit, and the interrupt unit in the embodiment shown in FIG. 6, or realize the function of the first network device in FIG. 2, and the first BGP in FIG. The function of the node.
  • the communication interface 701 may be a wired interface (such as an Ethernet interface) or a wireless interface (such as a cellular network interface or using a wireless local area network interface) for communicating with other modules or devices.
  • the communication interface 7011 in the first network device in the embodiment of the present application may be specifically used to receive a message sent by the second network device, or send a message to the second network device.
  • the memory 703 may include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM); the memory may also include non-volatile memory (Non-Volatile Memory), such as read-only memory (Read-Only Memory). Memory, ROM), Flash Memory (Flash Memory), Hard Disk Drive (HDD), or Solid-State Drive (SSD); the memory 703 may also include a combination of the foregoing types of memories.
  • volatile memory such as random access memory (Random Access Memory, RAM
  • non-Volatile Memory such as read-only memory (Read-Only Memory).
  • Memory ROM
  • Flash Memory Flash Memory
  • HDD Hard Disk Drive
  • SSD Solid-State Drive
  • the memory may be used to store a set of program codes, so that the processor can call the program codes stored in the memory to implement the functions of the communication module and/or processing module involved in the embodiment of the present application, which is not limited in the embodiment of the present application.
  • the features, functions, and/or methods described in the embodiments of the present application may be implemented in the network device 700.
  • the features, functions, or methods in the embodiments of the present application may be implemented by hardware, firmware, and/or software installed and running on hardware.
  • the network device 700 may be any device (for example, a switch, a router, a bridge, a server, a client, etc.) that transmits data through a network, a system, and/or a domain.
  • network nodes, network components, network devices, network elements, and/or similar terms can be used interchangeably to describe network devices in general; and unless otherwise specified and/or stated in this application, these terms have no specific meaning. Or special meaning.
  • the network device 700 may be a device for implementing the linkage between an upper layer application and BFD to detect a link. It should be noted that FIG. 7 is only a possible implementation of the embodiment of the present application. In practical applications, the network device may also include more or fewer components, which is not limited here. Regarding the content not shown or described in the embodiment of the present application, please refer to the relevant description in the embodiment described in FIG. 2 or FIG. 4, which will not be repeated here.
  • the network device may also be a virtual network device implemented based on a general physical server and network function virtualization (English: Netwrk Function Virtulization, NFV) technology, and the virtual network device may be a virtual router.
  • the virtual network device may be a virtual machine (Virtual Machine) running to provide an upper-layer application in conjunction with BFD to detect a link, and the virtual machine is deployed on a hardware device (for example, a physical server).
  • Virtual machine refers to a complete computer system with complete hardware system functions that is simulated by software and runs in a completely isolated environment. This virtual network device performs all the functions and operations of the network device 600 or the network device 700.
  • An embodiment of the present invention also provides a computer non-transitory storage medium, which stores instructions in the computer non-transitory storage medium. When it runs on a processor, the flow of any method described in FIG. 2 or FIG. 4 Achieved.
  • the embodiment of the present invention also provides a computer program product.
  • the computer program product runs on a processor, any method flow described in FIG. 2 or FIG. 4 is realized.
  • the steps of the method or algorithm described in conjunction with the disclosure of the embodiments of the present invention may be implemented in a hardware manner, or may be implemented in a manner that a processor executes software instructions.
  • Software instructions can be composed of corresponding software modules.
  • the software modules can be stored in Random Access Memory (RAM), flash memory, Read Only Memory (ROM), and erasable programmable read-only memory (Random Access Memory, RAM). Erasable Programmable ROM (EPROM), Electrically Erasable Programmable Read-Only Memory (Electrically EPROM, EEPROM), register, hard disk, mobile hard disk, CD-ROM or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor, so that the processor can read information from the storage medium and can write information to the storage medium.
  • the storage medium may also be an integral part of the processor.
  • the processor and the storage medium may be located in the ASIC.
  • the ASIC may be located in the computing device.
  • the processor and the storage medium may also exist as discrete components in the computing device.
  • the program can be stored in a computer readable storage medium. When executed, it may include the procedures of the above-mentioned method embodiments.
  • the aforementioned storage media include: ROM, RAM, magnetic disks, or optical disks and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de détection de liaison, consistant à : négocier et établir une période de temporisation d'une session BFD pendant le processus d'applications supérieures de deux dispositifs de réseau établissant une session et configurer et lancer un temporisateur en fonction de la période de temporisation négociée ; et pendant l'établissement de la session BFD, si l'établissement de la session BFD n'est pas achevé au moment où le temporisateur expire, interrompre la session de couche d'application établie. De cette manière, si une session BFD n'est pas établie pendant une longue période, une session de couche d'application est interrompue, un trajet entre deux dispositifs de réseau est amené à converger et des données ne sont pas envoyées au trajet, réduisant ainsi la perte de données.
PCT/CN2020/105265 2019-07-29 2020-07-28 Procédé et appareil de détection de liaison WO2021018150A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910691227.8A CN112311613A (zh) 2019-07-29 2019-07-29 一种链路检测的方法和装置
CN201910691227.8 2019-07-29

Publications (1)

Publication Number Publication Date
WO2021018150A1 true WO2021018150A1 (fr) 2021-02-04

Family

ID=74230243

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/105265 WO2021018150A1 (fr) 2019-07-29 2020-07-28 Procédé et appareil de détection de liaison

Country Status (2)

Country Link
CN (1) CN112311613A (fr)
WO (1) WO2021018150A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114363342A (zh) * 2021-12-30 2022-04-15 科大讯飞股份有限公司 故障收敛方法及其相关装置和负载均衡集群

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110848A (zh) * 2006-07-20 2008-01-23 华为技术有限公司 一种检测通道故障的方法
CN101483647A (zh) * 2009-02-05 2009-07-15 中兴通讯股份有限公司 一种协议版本号协商方法及网络实体装置
CN102769573A (zh) * 2012-08-01 2012-11-07 杭州华三通信技术有限公司 借助bfd报文实现bgp保活信息发送的方法及路由设备
US20190207803A1 (en) * 2017-07-05 2019-07-04 Juniper Networks, Inc. DETECTING LINK FAULTS IN NETWORK PATHS THAT INCLUDE LINK AGGREGATION GROUPS (LAGs)

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170459B (zh) * 2007-11-28 2010-07-14 中兴通讯股份有限公司 基于双向转发链路进行故障检测与链路恢复的方法
CN109245961B (zh) * 2018-09-29 2020-12-22 优刻得科技股份有限公司 链路质量检测方法、装置、存储介质和设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110848A (zh) * 2006-07-20 2008-01-23 华为技术有限公司 一种检测通道故障的方法
CN101483647A (zh) * 2009-02-05 2009-07-15 中兴通讯股份有限公司 一种协议版本号协商方法及网络实体装置
CN102769573A (zh) * 2012-08-01 2012-11-07 杭州华三通信技术有限公司 借助bfd报文实现bgp保活信息发送的方法及路由设备
US20190207803A1 (en) * 2017-07-05 2019-07-04 Juniper Networks, Inc. DETECTING LINK FAULTS IN NETWORK PATHS THAT INCLUDE LINK AGGREGATION GROUPS (LAGs)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114363342A (zh) * 2021-12-30 2022-04-15 科大讯飞股份有限公司 故障收敛方法及其相关装置和负载均衡集群

Also Published As

Publication number Publication date
CN112311613A (zh) 2021-02-02

Similar Documents

Publication Publication Date Title
JP5913635B2 (ja) 冗長ネットワーク接続
US9294343B2 (en) System and method using RSVP hello suppression for graceful restart capable neighbors
JP5981533B2 (ja) アクティブtcpアプリケーションからスタンバイtcpアプリケーションへのヒットレススイッチオーバ
WO2008077333A1 (fr) Procédé, système et routeur pour mettre en œuvre une communication entre des dispositifs ip
US10164824B2 (en) Indicating a master network controller in a virtual router redundancy protocol
WO2015184739A1 (fr) Procédé et dispositif de détection de défaut
WO2008031334A1 (fr) Procédé et système de mise à jour de chemin, et routage
WO2011161575A1 (fr) Notification à un contrôleur d'un changement sur une configuration de renvoi de paquets d'un élément de réseau sur un canal de communication
TW201134151A (en) RSVP-TE graceful restart under fast re-route conditions
JP2006135970A (ja) SoftRouter動的バインディング・プロトコル
WO2017054547A1 (fr) Procédé et appareil de détection de transfert bidirectionnel
CN111988213B (zh) 一种在evpn mlag环境下同步vxlan隧道的方法及设备、介质
JP7306642B2 (ja) ループ回避通信方法、ループ回避通信デバイスおよびループ回避通信システム
EP2748989B1 (fr) Procédés et appareil pour éviter un basculement de redondance inter-châssis vers des n uds de secours non fonctionnels
EP2577921B1 (fr) Procédé, système et routeur pour modifier une application dans une session bgp
EP3750073B1 (fr) Procédé de migration sans coupure d'authentification de session vers un homologue d'authentification diameter différent à état
US7609618B1 (en) Dynamically controlling HSRP preemption dependent on stateful NAT convergence
WO2021018150A1 (fr) Procédé et appareil de détection de liaison
WO2021109997A1 (fr) Procédé et dispositif anti-rupture de fibre pour tunnel de routage de segment, nœud d'entrée et support de données
US20150334019A1 (en) Routing control method and non-transitory computer-readable recording medium storing routing control program
EP2575306B1 (fr) Synchronisation sans acquittement du routage ininterrompu ospf
JP2022052741A (ja) 境界ゲートウェイプロトコルのためのターゲットネイバー探索
WO2017036176A1 (fr) Procédé et appareil d'identification de pseudo-nœud
WO2020103718A1 (fr) Procédé d'établissement de connexion, procédé de transmission de paquets, dispositif et support d'informations
WO2022143689A1 (fr) Procédé et système de protection de session

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20847844

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20847844

Country of ref document: EP

Kind code of ref document: A1