WO2021109997A1 - 分段路由隧道的防断纤方法、装置,入口节点及存储介质 - Google Patents
分段路由隧道的防断纤方法、装置,入口节点及存储介质 Download PDFInfo
- Publication number
- WO2021109997A1 WO2021109997A1 PCT/CN2020/133115 CN2020133115W WO2021109997A1 WO 2021109997 A1 WO2021109997 A1 WO 2021109997A1 CN 2020133115 W CN2020133115 W CN 2020133115W WO 2021109997 A1 WO2021109997 A1 WO 2021109997A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tunnel
- path
- data
- node
- backup path
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 239000000835 fiber Substances 0.000 title claims abstract description 24
- 238000005516 engineering process Methods 0.000 claims description 19
- 238000001514 detection method Methods 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 13
- 238000012790 confirmation Methods 0.000 claims description 8
- 230000015654 memory Effects 0.000 description 20
- 238000010586 diagram Methods 0.000 description 17
- 238000004891 communication Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 230000006855 networking Effects 0.000 description 4
- 230000002265 prevention Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000002457 bidirectional effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/34—Source routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/22—Alternate routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/50—Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
Definitions
- This application relates to a wireless communication network, such as a method and device for preventing fiber breakage of a segmented routing tunnel, an entry node, and a storage medium.
- Segment Routing is a protocol designed based on the concept of source routing to forward data packets on the network. It can control the real-time fast forwarding of data by specifying a set of ordered instruction lists at the ingress node. It is widely used in current communication systems. As the requirements for ultra-large bandwidth and ultra-low delay in communication systems become more and more stringent, how to ensure the stability of SR tunnels has become the current focus of discussion.
- This application provides an anti-fiber breaking method, device, ingress node, and storage medium for segmented routing tunnels, which can realize multi-level carrier-grade performance protection for links, and ensure the stability and timeliness of the system.
- the embodiment of the application provides a method for preventing fiber breakage of a segmented routing tunnel, which includes: when data is carried on the segmented routing-traffic engineering SR-TE tunnel and the primary path fails, the ingress node confirms whether the backup path fails , Where the primary path and the backup path are both the label forwarding path LSP of the SR-TE tunnel; if the backup path fails, the ingress node will switch the data-bearing tunnel from the SR-TE tunnel to the segment routing-best-effort forwarding SR-BE tunnel.
- the embodiment of the present application provides an anti-fiber breaking device for a segmented routing tunnel, which includes: a confirmation module and a switching module; the confirmation module is set to perform when the data is carried on the segment routing-traffic engineering SR-TE tunnel and the main path occurs In the event of a failure, confirm whether the backup path fails.
- the primary path and the backup path are both the label forwarding path LSP of the SR-TE tunnel; the switch module is set to transfer the data-carrying tunnel from the SR-TE tunnel if the backup path fails.
- the tunnel is switched to segment routing-best-effort forwarding SR-BE tunnel.
- An embodiment of the present application provides an entry node including a processor, and the processor is configured to implement the method of any one of the foregoing embodiments when a computer program is executed.
- the embodiments of the present application also provide a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, the method of any of the foregoing embodiments is implemented.
- FIG. 1 is a schematic diagram of data forwarding in an SR-TE tunnel according to an embodiment
- Figure 2 is a schematic diagram of an SR-TE primary path and a backup path according to an embodiment
- FIG. 3 is a schematic flowchart of a method for preventing fiber breakage of a segmented routing tunnel according to an embodiment
- FIG. 4 is a schematic diagram of data forwarding in an SR-BE tunnel provided by an embodiment
- FIG. 5 is a schematic diagram of a Japanese font networking provided by an embodiment
- Figure 6 is a schematic diagram of a spoken and cross networking provided by an embodiment
- FIG. 7 is a schematic structural diagram of an anti-fiber breaking device for a segmented routing tunnel according to an embodiment
- FIG. 8 is a schematic structural diagram of another anti-fiber device for segmented routing tunnels according to an embodiment
- Fig. 9 is a schematic structural diagram of an ingress node provided by an embodiment.
- SR forwarding technology can reduce the complexity of network connections and make the service path easier to maintain. Supports flexible scheduling under massive 5G network connections.
- SR forwarding technology is widely used by operators as one of the necessary technologies for software-defined network (Software Defined Network, SDN) deployment.
- Segment Routing-Traffic Engineering (SR-TE) tunnel is a new type of TE tunnel technology that uses SR as a control protocol.
- SR-TE refers to a tunnel created using the SR protocol based on the constraint attributes of TE.
- the controller is responsible for calculating the forwarding path of the tunnel, and delivering the label stack strictly corresponding to the path to the forwarder.
- the repeater can control the transmission path of data in the network according to the label stack.
- Fig. 1 is a schematic diagram of data forwarding in an SR-TE tunnel according to an embodiment.
- the ingress node is node 0, the egress node is node 5, and node 1, node 2, node 3, and node 4 are intermediate nodes.
- the forwarding path calculated by the controller is (30001, 30102, 30204, 30405), where 3 is the prefix of the tunnel, 1.1.1.5 is the Internet Protocol (IP) address, and 30001 represents the data slave node 0 Sent to node 1, 30102 represents data sent from node 1 to node 2, 30204 represents data sent from node 2 to node 4, and 30405 represents data sent from node 4 to node 5.
- IP Internet Protocol
- the forwarding path is strictly set to the top by the controller as required. However, it can be seen from Figure 1 that the label stack will occupy a lot of space due to too many layers of the segment ID (SID).
- SID segment ID
- SR-TE primary path a path using SR-TE technology
- QoS Quality of Service
- An additional static protection path (Hot-Standy) (referred to as SR-TE backup path) for hot backup will also be configured.
- the ingress node is node 0, the egress node is node 2, and node 1, node 3, node 4, and node 5 are intermediate nodes.
- the SR-TE main path is the path from node 0 to node 1 to node 2.
- SR-TE backup path is the path from node 0-node3-node4-node5-node2.
- the escape path (the path marked by the dashed line in Figure 2) is calculated by the upper-layer protocol (ie, the controller) to avoid multi-point faults (also called double-fiber faults).
- the upper-layer protocol ie, the controller
- the embodiments of the application provide a mobile communication network (including but not limited to the fifth-generation mobile communication network (5th-Generation, 5G)).
- the network architecture of the network may include core network equipment (such as UDM equipment) and network side equipment.
- core network equipment such as UDM equipment
- network side equipment For example, one or more types of base stations, transmission nodes, access nodes (AP, Access Point), relays, Node B (Node B, NB), Terrestrial Radio Access (UTRA, Universal Terrestrial Radio Access), evolution Type terrestrial radio access (EUTRA, Evolved Universal Terrestrial Radio Access, etc.) and terminal equipment (User Equipment (UE), user equipment data card, relay, mobile equipment, etc.).
- a fiber-break prevention method, device, ingress node, and storage medium for segmented routing tunnels that can run in the above network architecture are provided, which can realize multi-level carrier-level performance protection for links, and ensure The stability and timeliness of the system.
- the operating environment of the above-mentioned anti-fiber breaking method for segmented routing tunnels provided in the embodiments of the present application is not limited to the above-mentioned network architecture.
- system and "network” in this application are often used interchangeably in this application.
- the following embodiments of the present application can be implemented individually, and the various embodiments can also be implemented in combination with each other, which is not specifically limited by the embodiments of the present application.
- FIG. 3 is a schematic flowchart of a method for preventing fiber breakage of a segmented routing tunnel according to an embodiment. As shown in FIG. 1, the method provided in this embodiment is applicable to an ingress node, and the method includes the following steps.
- the ingress node confirms whether the backup path fails, where the primary path and the backup path are both label switching paths of the SR-TE tunnel (Label Switching Path, LSP).
- data is sent on the SR-TE tunnel by default.
- data is forwarded according to the main path by default; when the main path fails, the ingress node needs to confirm whether the backup path fails.
- the ingress node may detect the main path according to, but not limited to, the label forwarding path-bidirectional forwarding detection (Label Switching Path-Bidirectional Forwarding Detection, LSP-BFD) technology to confirm whether the main path is faulty.
- the LSP-BFD technology can be used to detect whether the LSP path fails.
- the LSP-BFD technology sends detection messages periodically. If the detection message is not received for a certain number of times after the detection message is sent, the detection path is considered to be faulty.
- the ingress node may detect the backup path according to, but not limited to, Traffic Engineering-Bidirectional Forwarding Detection (TE-BFD) technology to confirm whether the backup path is faulty.
- TE-BFD technology can be used to detect whether the TE path fails.
- TE-BFD technology can include BFD for TE Tunnel and BFD for TE CR-LSP.
- BFD detects the connectivity of a data protocol (data protocol) on the same path between two systems , This path can be a physical link or a logical link, including TE tunnels.
- the LSP failure detection of the SR-TE tunnel needs to rely on the deployment of bidirectional forwarding detection (Bidirectional Forwarding Detection, BFD) detection.
- BFD Bidirectional Forwarding Detection
- the ingress node switches the data-bearing tunnel from the SR-TE tunnel to the segment routing-best effort forwarding (Segment Routing Best Effort, SR-BE) tunnel.
- the SR-BE tunnel refers to a label forwarding path established by using SR technology, which uses Prefix or Node Segment to guide the forwarding of data packets.
- the interior gateway protocol (Interior Gateway Protocol, IGP) uses the shortest path algorithm to calculate the optimal SR LSP. It can be implemented by extending the IGP protocol intermediate system to intermediate system (IS-IS, Intermediate system to intermediate system) and Open Shortest Path First (OSPF) Type-length-value (Type-length-value, TLV) ), while the existing topology and reachability information is distributed, the SR information is distributed in the IGP domain. Each node in the IGP domain uses the additional SR information, together with its calculated network topology view and prefix reachability, to issue forwarding entries.
- IGP Interior Gateway Protocol
- OSPF Open Shortest Path First
- Figure 4 is a schematic diagram of SR-BE tunnel data forwarding provided by an embodiment.
- the ingress node is node 0, the egress node is node 5, and node 1, node 2, node 3, and node 4 are intermediate nodes.
- 16 is the prefix of the tunnel, 1.1.1.5 is the IP address, and 16005 represents that the data will eventually be transmitted to node 5.
- the node calculates the optimal path according to the shortest path algorithm, and transmits the data to the next node 1, which is also calculated according to the shortest path algorithm
- the obtained optimal path transmits the data to the next node 2.
- the node 2 transmits the data to the egress node 5 according to the optimal path calculated by the shortest path algorithm.
- the ingress node switches the data-bearing tunnel from the SR-TE tunnel to the SR-BE tunnel, which can ensure that data forwarding does not need to rely on the calculation performance of the protocol, and realizes the link Multi-level carrier-class performance protection ensures the stability and timeliness of the system.
- the method for the ingress node to switch the data-bearing tunnel from the SR-TE tunnel to the SR-BE tunnel may include: the ingress node marks the tunnel switching corresponding to the tunnel ID according to the tunnel identification ID of the SR-TE tunnel Switch from the first preset value to the second preset value.
- the tunnel switching flag is the first preset value, it indicates that the data is carried on the SR-TE tunnel.
- the tunnel switching flag is the second preset value, it indicates that the data is carried on the SR-TE tunnel.
- the BE tunnel On the BE tunnel.
- the virtual private network (Virtual Private Network, VPN) service is carried on the tunnel, and the service prefix table usually includes a routing table or a media access control (MAC) table, etc., and the public and private networks are separated by the next hop Table (NH table) is associated.
- the NH table stores public network information, such as the following level of SR-TE tunnel information (ie SR-TE forwarding index) and remote Border Gateway Protocol (Border Gateway Protocol, BGP) neighbor IP address (also known as peerIp) and the tunnel switching flag.
- the first preset value (usually the default value) of the tunnel switching flag is set to 0, that is, when the tunnel switching flag is 0, it means that the data is carried on the SR-TE tunnel.
- the ingress node When the ingress node wants to switch the data-bearing tunnel from the SR-TE tunnel to the SR-BE tunnel, the ingress node looks up the NH table according to the tunnel identifier ID of the SR-TE tunnel (the tunnel identifier of the SR-TE tunnel is stored in the ingress node The mapping relationship between ID and NH table), and the tunnel switching flag is set to switch from the first preset value to the second preset value.
- the second preset value usually takes 1, which means that the data is carried on the SR-BE tunnel.
- the values of the first preset value and the second preset value of the tunnel switching flag can be set according to actual conditions.
- the first preset value of the tunnel switching flag can also be set to 1, that is, the tunnel When the switching flag is 1, it means that the data is carried on the SR-TE tunnel;
- the second preset value of the tunnel switching flag is set to 0, that is, when the tunnel switching flag is 0, it means that the data is carried on the SR-BE tunnel.
- the SR BE tunnel may be configured with TI-LFA FRR (Topology-Independent Loop-free Alternate FRR) to provide link and node protection for the SR BE tunnel.
- TI-LFA FRR Topic-Independent Loop-free Alternate FRR
- the ingress node forwards the data according to the backup path.
- the ingress node does not need to switch the data-bearing tunnel from the SR-TE tunnel to the SR-BE tunnel, and only forwards the data according to the backup path.
- FIG. 5 is a schematic diagram of a Japanese font networking provided by an embodiment.
- the ingress node is node A
- the egress node is node C
- node B, node D, node E, and node F are intermediate nodes.
- the path between node A and node B is called path 1
- the path between node B and node C is called path 2
- the path between node C and node D is called path 3
- the path is called path 4
- the path between node E and node F is called path 5
- the path between node E and node B is called path 6
- the path between node F and node A is called path 7.
- the main path is the path indicated by the solid arrow, namely path 1 and path 2
- the backup path is the path indicated by the dashed arrow, namely path 7, path 5, path 4, and path 3.
- the solution provided by this application can solve the multi-point failures (also known as double-fiber failures) caused by simultaneous failures of paths 1 and 4, paths 1 and 3, paths 2 and 5, and paths 2 and 7 to ensure that data is not forwarded. It is necessary to rely on the computing performance of the protocol to realize the multi-level carrier-level performance protection of the link, which ensures the stability and timeliness of the system.
- FIG. 6 is a schematic diagram of a spoken and cross networking provided by an embodiment.
- the ingress node is node A
- the egress node is node D
- node B and node C are intermediate nodes.
- the path between node A and node B is called path 1
- the path between node B and node C is called path 2
- the path between node C and node D is called path 3
- the path is called path 4
- the path between node A and node C is called path 5
- the path between node B and node D is called path 6.
- the main path is the path indicated by the solid arrow, namely path 4;
- the backup path is the path indicated by the dashed arrow, namely path 1, path 2, and path 3.
- the solution provided by this application can solve the multi-point failure caused by simultaneous failures of paths 1 and 4, paths 2 and 4, and paths 3 and 4 (also referred to as double-fiber failure), and ensure that data forwarding no longer needs to rely on protocols. Calculating performance, realizing multi-level carrier-level performance protection of the link, ensuring the stability and timeliness of the system.
- the embodiment of the application provides a method for preventing fiber breakage of a segmented routing tunnel, which includes: when data is carried on the segmented routing-traffic engineering SR-TE tunnel and the primary path fails, the ingress node confirms whether the backup path fails , Where the primary path and the backup path are both the label forwarding path LSP of the SR-TE tunnel; if the backup path fails, the ingress node will switch the data-bearing tunnel from the SR-TE tunnel to the segment routing-best-effort forwarding SR-BE tunnel.
- the application can realize multi-level carrier-level performance protection of the link, which ensures the stability and timeliness of the system.
- FIG. 7 is a schematic structural diagram of an anti-fiber breaking device for a segmented routing tunnel according to an embodiment.
- the anti-fiber breaking device of the segmented routing tunnel may be configured in an ingress node, as shown in FIG. 7, including: a confirmation module 10 and switching module 11.
- the confirmation module 10 is set to confirm whether the backup path fails when the data is carried on the segment routing-traffic engineering SR-TE tunnel and the main path fails.
- the main path and the backup path are both of the SR-TE tunnel.
- the switching module 11 is configured to switch the data-bearing tunnel from the SR-TE tunnel to the segment routing-best-effort forwarding SR-BE tunnel if the backup path fails.
- the fiber-breakage prevention device for segmented routing tunnels provided in this embodiment is to implement the fiber-breakage prevention method for segmented routing tunnels of the foregoing embodiment.
- the implementation principles and technical effects of the fiber-breakage prevention device for segmented routing tunnels provided in this embodiment are similar. , I won’t repeat it here.
- the confirmation module 10 is configured to detect the backup path according to the traffic engineering-two-way forwarding detection TE-BFD technology after confirming the failure of the primary path according to the label forwarding path-bidirectional forwarding detection LSP-BFD technology, Check whether the backup path is faulty.
- the switching module 11 is configured to switch the tunnel switching flag corresponding to the tunnel ID from the first preset value to the second preset value according to the tunnel identification ID of the SR-TE tunnel, and the tunnel switching flag is The first preset value indicates that the data is carried on the SR-TE tunnel, and when the tunnel switching flag is the second preset value, it indicates that the data is carried on the SR-BE tunnel.
- FIG. 8 is a schematic structural diagram of another anti-fiber breaking device for segmented routing tunnels provided by an embodiment, and further includes: a forwarding module 12.
- the forwarding module 12 is configured to forward data according to the backup path if there is no failure in the backup path.
- FIG. 9 is a schematic structural diagram of an ingress node provided by an embodiment.
- the ingress node includes a processor 60, a memory 61, and a communication interface 62; the number of processors 60 in the ingress node may be one or more One, a processor 60 is taken as an example in FIG. 9; the processor 60, the memory 61, and the communication interface 62 in the ingress node may be connected by a bus or other methods.
- the connection by a bus is taken as an example.
- the bus represents one or more of several types of bus structures, including a memory bus or a memory controller, a peripheral bus, a graphics acceleration port, a processor, or a local bus using any bus structure among multiple bus structures.
- the memory 61 can be configured to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the methods in the embodiments of the present application.
- the processor 60 executes at least one functional application and data processing of the ingress node by running the software programs, instructions, and modules stored in the memory 61, that is, realizes the above-mentioned anti-fiber breaking method of the segmented routing tunnel.
- the memory 61 may include a program storage area and a data storage area.
- the program storage area may store an operating system and an application program required for at least one function; the data storage area may store data created according to the use of the entry node.
- the memory 61 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other non-volatile solid-state storage devices.
- the memory 61 may include a memory remotely provided with respect to the processor 60, and these remote memories may be connected to a Japanese invader node through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
- the communication interface 62 can be configured to receive and send data.
- the embodiment of the present application also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
- a computer program is stored on the computer-readable storage medium.
- the computer storage medium of the embodiment of the present application may adopt any combination of one or more computer-readable media.
- the computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium.
- the computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above.
- Computer-readable storage media include (non-exhaustive list): electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (Read-Only Memory) , ROM), electrically erasable, programmable Read-Only Memory (EPROM), flash memory, optical fiber, compact Disc Read-Only Memory (CD-ROM), optical storage Components, magnetic storage devices, or any suitable combination of the above.
- the computer-readable storage medium may be any tangible medium that contains or stores a program, and the program may be used by or in combination with an instruction execution system, apparatus, or device.
- the computer-readable signal medium may include a data signal propagated in baseband or as a part of a carrier wave, and the computer-readable program code is carried in the data signal. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
- the computer-readable signal medium may also be any computer-readable medium other than the computer-readable storage medium, and the computer-readable medium may send, propagate, or transmit the program for use by or in combination with the instruction execution system, apparatus, or device .
- the program code contained on the computer-readable medium can be transmitted by any suitable medium, including but not limited to wireless, wire, optical cable, radio frequency (RF), etc., or any suitable combination of the foregoing.
- suitable medium including but not limited to wireless, wire, optical cable, radio frequency (RF), etc., or any suitable combination of the foregoing.
- the computer program code used to perform the operations of this application can be written in one or more programming languages or a combination of multiple programming languages.
- the programming languages include object-oriented programming languages-such as Java, Smalltalk, C++, Ruby , Go, also includes conventional procedural programming languages-such as "C" language or similar programming languages.
- the program code can be executed entirely on the user's computer, partly on the user's computer, executed as an independent software package, partly on the user's computer and partly executed on a remote computer, or entirely executed on the remote computer or server.
- the remote computer can be connected to the user's computer through any kind of network-including Local Area Network (LAN) or Wide Area Network (WAN)-or it can be connected to an external computer (for example, use an Internet service provider to connect via the Internet).
- LAN Local Area Network
- WAN Wide Area Network
- user terminal encompasses any suitable type of wireless user equipment, such as a mobile phone, a portable data processing device, a portable web browser, or a vehicle-mounted mobile station.
- the various embodiments of the present application can be implemented in hardware or dedicated circuits, software, logic or any combination thereof.
- some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor, or other computing device, although the present application is not limited thereto.
- Computer program instructions can be assembly instructions, Instruction Set Architecture (ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or written in any combination of one or more programming languages Source code or object code.
- ISA Instruction Set Architecture
- the block diagram of any logic flow in the drawings of the present application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions.
- the computer program can be stored on the memory.
- the memory can be of any type suitable for the local technical environment and can be implemented using any suitable data storage technology, such as but not limited to read only memory (ROM), random access memory (RAM), optical storage devices and systems (digital multi-function optical discs) DVD or CD) etc.
- Computer-readable media may include non-transitory storage media.
- the data processor can be any type suitable for the local technical environment, such as but not limited to general-purpose computers, special-purpose computers, microprocessors, digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (ASICs) ), programmable logic devices (Field-Programmable Gate Array, FGPA), and processors based on multi-core processor architecture.
- DSP Digital Signal Processing
- ASICs application specific integrated circuits
- FGPA programmable logic devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
分段路由隧道的防断纤方法、装置,入口节点及存储介质,该方法包括:当数据承载在分段路由-流量工程SR-TE隧道上、且主路径发生故障时,入口节点确认备份路径是否发生故障(S110),其中,主路径和备份路径均为SR-TE隧道的标签转发路径LSP;若备份路径发生故障,则入口节点将承载数据的隧道从SR-TE隧道切换到分段路由-尽力转发SR-BE隧道(S120)。
Description
相关申请的交叉引用
本申请基于申请号为201911234039.9、申请日为2019年12月05日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
本申请涉及无线通信网络,例如涉及分段路由隧道的防断纤方法、装置,入口节点及存储介质。
分段路由(Segment Routing,SR)是基于源路由理念而设计的在网络上转发数据包的一种协议,能够在入口节点通过指定一组有序的指令列表来控制数据的实时快速转发,被广泛使用在当前的通信系统中。随着对通信系统超大带宽、超低时延的要求越来越严格,如何保证SR隧道的稳定性成为当前的重点讨论方向。
发明内容
本申请提供一种分段路由隧道的防断纤方法、装置,入口节点及存储介质,能够实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。
本申请实施例提供一种分段路由隧道的防断纤方法,包括:当数据承载在分段路由-流量工程SR-TE隧道上、且主路径发生故障时,入口节点确认备份路径是否发生故障,其中,主路径和备份路径均为SR-TE隧道的标签转发路径LSP;若备份路径发生故障,则入口节点将承载数据的隧道从SR-TE隧道切换到分段路由-尽力转发SR-BE隧道。
本申请实施例提供一种分段路由隧道的防断纤装置,包括:确认模块和切换模块;确认模块,设置为当数据承载在分段路由-流量工程SR-TE隧道上、且主路径发生故障时,确认备份路径是否发生故障,其中,主路径和备份路径均为SR-TE隧道的标签转发路径LSP;切换模块,设置为若备份路径发生故障,则将承载数据的隧道从SR-TE隧道切换到分段路由-尽力转发SR-BE隧道。
本申请实施例提供一种入口节点,包括:处理器,处理器用于在执行计算机程序时实现上述任一实施例的方法。
本申请实施例还提供了一种计算机可读存储介质,存储有计算机程序,计算机程序被处理器执行时实现上述任一实施例的方法。
关于本申请的以上实施例和其他方面以及其实现方式,在附图说明、具体实施方式和权利要求中提供更多说明。
图1为一实施例提供的一种SR-TE隧道数据转发示意图;
图2为一实施例提供的一种SR-TE主路径和备份路径示意图;
图3为一实施例提供的一种分段路由隧道的防断纤方法的流程示意图;
图4为一实施例提供的一种SR-BE隧道数据转发示意图;
图5为一实施例提供的一种日字型组网示意图;
图6为一实施例提供的一种口字与交叉组网示意图;
图7为一实施例提供的一种分段路由隧道的防断纤装置的结构示意图;
图8为一实施例提供的另一种分段路由隧道的防断纤装置的结构示意图;
图9为一实施例提供的一种入口节点的结构示意图。
下文中将结合附图对本申请的实施例进行详细说明。
在第五代移动通信网络(5th-Generation,5G)中,承载网需要提供超大带宽、超低时延的传输通道,使用SR转发技术可以降低网络连接的复杂度,使得业务路径更易维护,能支撑5G网路海量连接下的灵活调度。其中,SR转发技术作为软件定义网络(Software Defined Network,SDN)部署的必备技术之一被广泛的运营商应用。
分段路由-流量工程(Segment Routing-Traffic Engineering,SR-TE)隧道是使用SR作为控制协议的一种新型TE隧道技术。SR-TE是指基于TE的约束属性,利用SR协议创建的隧道。控制器负责计算隧道的转发路径,并将与路径严格对应的标签栈下发给转发器。在SR-TE隧道的入口节点上,转发器根据标签栈,即可控制数据在网络中的传输路径。图1为一实施例提供的一种SR-TE隧道数据转发示意图。如图1所示,入口节点为节点0,出口节点为节点5,节点1、节点2、节点3和节点4为中间节点。控制器计算得出的转发路径为(30001,30102,30204,30405),其中,3为该隧道的前缀,1.1.1.5为网际互连协议(Internet Protocol,IP)地址,30001代表数据从节点0发送到节点1,30102代表数据从节点1发送到节点2,30204代表数据从节点2发送到节点4,30405代表数据从节点4发送到节点5。转发路径由控制器按需严格置顶,但是从图1中可以看出,由于端标识(Segment ID,SID)的层数太多,导致标签栈会占用大量的空间。
在SR网络中,通常会为重要业务配置一条具有服务质量(Quality of Service,QoS)保证的使用SR-TE技术的路径(简称SR-TE主路径),同时,为了进一步保证业务的稳定性,也会额外配置一条热备份的静态保护路径(Hot-Standy)(简称SR-TE备份路径)。当检测到SR-TE路径主路径发生故障时,业务能快速切换到SR-TE备份路径,保证业务不中断。图2为一实施例提供的一种SR-TE主路径和备份路径示意图。入口节点为节点0,出口节点为节点2,节点1、节点3、节点4和节点5为中间节点,如图2所示,SR-TE主路径为由节点0-节点1-节点2的路径,SR-TE备份路径为由节点0-节点3-节点4-节点5-节点2的路径。当SR-TE主路径和SR-TE备份路径均发生故障时(如图2所示,节点0- 节点1的链路故障,节点4-节点5的链路故障),为了保证数据仍然可以传输,在一些情形中是通过上层协议(即控制器)计算逃生路径(如图2中虚线所标注的路径)来避免多点故障(也称为双断纤故障)。然而,上层协议计算逃生路径需要花费很长时间,远远达不到运营商要求的电信级保护要求。
本申请实施例提供了一种移动通信网络(包括但不限于第五代移动通信网络(5th-Generation,5G)),该网络的网络架构可以包括核心网设备(例如UDM设备)、网络侧设备(例如一种或多种类型的基站,传输节点,接入节点(AP,Access Point),中继,节点B(Node B,NB),陆地无线电接入(UTRA,Universal Terrestrial Radio Access),演进型陆地无线电接入(EUTRA,Evolved Universal Terrestrial Radio Access)等)和终端设备(用户设备(User Equipment,UE),用户设备数据卡,中继(relay),移动设备等)。在本申请实施例中,提供一种可运行于上述网络架构的分段路由隧道的防断纤方法、装置,入口节点及存储介质,能够实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。本申请实施例中提供的上述分段路由隧道的防断纤方法的运行环境并不限于上述网络架构。
本申请中术语“系统”和“网络”在本申请中常被可互换使用。本申请下述各个实施例可以单独执行,各个实施例之间也可以相互结合执行,本申请实施例对此不作具体限制。
下面,对分段路由隧道的防断纤方法、装置及其技术效果进行描述。
图3为一实施例提供的一种分段路由隧道的防断纤方法的流程示意图,如图1所示,本实施例提供的方法适用于入口节点,该方法包括如下步骤。
S110、当数据承载在SR-TE隧道上、且主路径发生故障时,入口节点确认备份路径是否发生故障,其中,主路径和备份路径均为SR-TE隧道的标签转发路径(Label Switching Path,LSP)。
通常,数据默认在SR-TE隧道上进行发送。当主路径正常时,数据默认按照主路径进行转发;当主路径发生故障时,入口节点需要确认备份路径是否发生故障。
在一实施例中,入口节点可以根据但不限于标签转发路径-双向转发检测(Label Switching Path-Bidirectional Forwarding Detection,LSP-BFD)技术对主路径进行检测,确认主路径是否发生故障。具体的,LSP-BFD技术可以用于检测LSP路径是否发生故障。LSP-BFD技术是通过周期性发送检测报文,如果在发送该检测报文一定次数后,仍没有接收到该检测报文的回复消息,就认为该检测路径存在故障。
在一实施例中,入口节点可以根据但不限于流量工程-双向转发检测(Traffic Engineering-Bidirectional Forwarding Detection,TE-BFD)技术对备份路径进行检测,确认备份路径是否发生故障。具体的,TE-BFD技术可以用于检测TE路径是否发生故障。TE-BFD技术可以包括BFD for TE Tunnel和BFD for TE CR-LSP两种方式,具体来说,BFD对两个系统间的、同一路径上的一种数据协议(data protocol)的连通性进行检测,这 条路径可以是物理链路或逻辑链路,其中包括TE隧道。
SR-TE隧道由于没有协议建立,只要标签栈下发,LSP就会建立成功,且除了撤销标签栈之外,LSP不会出现协议Down的情况。所以SR-TE隧道的LSP故障检测需要依靠部署双向转发检测(Bidirectional Forwarding Detection,BFD)检测。
S120、若备份路径发生故障,则入口节点将承载数据的隧道从SR-TE隧道切换到分段路由-尽力转发(Segment Routing Best Effort,SR-BE)隧道。
SR-BE隧道是指使用SR技术建立的标签转发路径,通过Prefix或Node Segment指导数据报文转发,由内部网关协议(Interior Gateway Protocol,IGP)使用最短路径算法计算得到的最优SR LSP。其实现可以利用扩展IGP协议中间系统到中间系统(IS-IS,Intermediate system to intermediate system)和开放式最短路径优先(Open Shortest Path First,OSPF)类型-长度-值(Type-length-value,TLV),在现有分发拓扑和可达性信息的同时,在IGP域内分发SR信息。IGP域内每个节点使用附加的SR信息,连同其计算出来的网络拓扑视图和前缀可达性,下发转发表项。
图4为一实施例提供的一种SR-BE隧道数据转发示意图。如图4所示,如图1所示,入口节点为节点0,出口节点为节点5,节点1、节点2、节点3和节点4为中间节点。16为该隧道的前缀,1.1.1.5为IP地址,16005代表数据最终要传输到节点5。入口节点0在收到数据时,通过解析得知数据最终要传输到节点5,节点根据最短路径算法计算得到的最优路径,将数据传输至下一个节点1,节点1同样根据最短路径算法计算得到的最优路径,将数据传输至下一个节点2,同理,节点2根据最短路径算法计算得到的最优路径,将数据传输至出口节点5。
如此,当主路径和备份路径均发生故障时,入口节点将承载数据的隧道从SR-TE隧道切换到SR-BE隧道,可以保证数据的转发不再需要依赖协议的计算性能,实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。
在一实施例中,入口节点将承载数据的隧道从SR-TE隧道切换到SR-BE隧道的方法可以包括:入口节点根据SR-TE隧道的隧道标识ID,将与隧道ID对应的隧道切换标记从第一预设值切换为第二预设值,隧道切换标记为第一预设值时指示数据承载在SR-TE隧道上,隧道切换标记为第二预设值时指示数据承载在SR-BE隧道上。
示例性的,虚拟专用网络(Virtual Private Network,VPN)业务承载在隧道上,业务前缀表通常包括路由表或者媒体访问控制(Media Access Control,MAC)表等,公私网之间靠下一跳分离表(NH表)关联,NH表中保存公网信息,如下一级SR-TE隧道信息(即SR-TE转发索引)及远端边界网关协议(Border Gateway Protocol,BGP)邻居IP地址(又称peerIp)和隧道切换标记,隧道切换标记的第一预设值(通常为默认值)设置为0,即隧道切换标记为0时,代表数据承载在SR-TE隧道上。
当入口节点要将承载数据的隧道从SR-TE隧道切换到SR-BE隧道时,入口节点根据 SR-TE隧道的隧道标识ID查找到NH表(入口节点内存储有SR-TE隧道的隧道标识ID与NH表的映射关系),并将隧道切换标记设置为从第一预设值切换为第二预设值,第二预设值通常取1,代表数据承载在SR-BE隧道上。
可以理解的是,隧道切换标记的第一预设值和第二预设值的取值可以根据实际情况设定,例如,也可以设置隧道切换标记的第一预设值设置为1,即隧道切换标记为1时,代表数据承载在SR-TE隧道上;隧道切换标记的第二预设值设置为0,即隧道切换标记为0时,代表数据承载在SR-BE隧道上。
在一实施例中,SR BE隧道可以配置TI-LFA FRR(Topology-Independent Loop-free Alternate FRR),为SR BE隧道提供链路及节点的保护。当某处链路或节点故障时,数据会快速切换到备份路径,继续转发,从而最大程度上避免数据的丢失。
S130、若备份路径未发生故障,则入口节点按照备份路径转发数据。
若备份路径未发生故障,则入口节点无需将承载数据的隧道从SR-TE隧道切换到SR-BE隧道,仅按照备份路径转发数据即可。
示例性的,图5为一实施例提供的一种日字型组网示意图。如图5所示,入口节点为节点A,出口节点为节点C,节点B、节点D、节点E和节点F为中间节点。节点A和节点B之间的路径称为路径1,节点B和节点C之间的路径称为路径2,节点C和节点D之间的路径称为路径3,节点D和节点E之间的路径称为路径4,节点E和节点F之间的路径称为路径5,节点E和节点B之间的路径称为路径6,节点F和节点A之间的路径称为路径7。主路径为实线箭头所指示的路径,即路径1和路径2;备份路径为虚线箭头所指示的路径,即路径7、路径5、路径4和路径3。本申请提供的方案,可以解决路径1和4、路径1和3、路径2和5、路径2和7同时故障所导致的多点故障(也称为双断纤故障),保证数据的转发不再需要依赖协议的计算性能,实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。
又示例性的,图6为一实施例提供的一种口字与交叉组网示意图。如图6所示,入口节点为节点A,出口节点为节点D,节点B和节点C为中间节点。节点A和节点B之间的路径称为路径1,节点B和节点C之间的路径称为路径2,节点C和节点D之间的路径称为路径3,节点D和节点A之间的路径称为路径4,节点A和节点C之间的路径称为路径5,节点B和节点D之间的路径称为路径6。主路径为实线箭头所指示的路径,即路径4;备份路径为虚线箭头所指示的路径,即路径1、路径2和路径3。本申请提供的方案,可以解决路径1和4、路径2和4、路径3和4同时故障所导致的多点故障(也称为双断纤故障),保证数据的转发不再需要依赖协议的计算性能,实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。
本申请实施例提供一种分段路由隧道的防断纤方法,包括:当数据承载在分段路由-流量工程SR-TE隧道上、且主路径发生故障时,入口节点确认备份路径是否发生故障,其 中,主路径和备份路径均为SR-TE隧道的标签转发路径LSP;若备份路径发生故障,则入口节点将承载数据的隧道从SR-TE隧道切换到分段路由-尽力转发SR-BE隧道。本申请能够实现对链路的多级电信级性能保护,保证了系统的稳定性和时效性。
图7为一实施例提供的一种分段路由隧道的防断纤装置的结构示意图,该分段路由隧道的防断纤装置可以配置于入口节点中,如图7所示,包括:确认模块10和切换模块11。
确认模块10,设置为当数据承载在分段路由-流量工程SR-TE隧道上、且主路径发生故障时,确认备份路径是否发生故障,其中,主路径和备份路径均为SR-TE隧道的标签转发路径LSP;
切换模块11,设置为若备份路径发生故障,则将承载数据的隧道从SR-TE隧道切换到分段路由-尽力转发SR-BE隧道。
本实施例提供的分段路由隧道的防断纤装置为实现上述实施例的分段路由隧道的防断纤方法,本实施例提供的分段路由隧道的防断纤装置实现原理和技术效果类似,此处不再赘述。
在一实施例中,确认模块10,是设置为在根据标签转发路径-双向转发检测LSP-BFD技术确认主路径发生故障后,根据流量工程-双向转发检测TE-BFD技术对备份路径进行检测,确认备份路径是否发生故障。
在一实施例中,切换模块11,是设置为根据SR-TE隧道的隧道标识ID,将与隧道ID对应的隧道切换标记从第一预设值切换为第二预设值,隧道切换标记为第一预设值时指示数据承载在SR-TE隧道上,隧道切换标记为第二预设值时指示数据承载在SR-BE隧道上。
在一实施例中,结合图7,图8为一实施例提供的另一种分段路由隧道的防断纤装置的结构示意图,还包括:转发模块12。
转发模块12,设置为若备份路径未发生故障,则按照备份路径转发数据。
本申请实施例还提供了一种入口节点,包括:处理器,处理器用于在执行计算机程序时实现如本申请任意实施例所提供的方法。图9为一实施例提供的一种入口节点的结构示意图,如图9所示,该入口节点包括处理器60、存储器61和通信接口62;入口节点中处理器60的数量可以是一个或多个,图9中以一个处理器60为例;入口节点中的处理器60、存储器61、通信接口62可以通过总线或其他方式连接,图9中以通过总线连接为例。总线表示几类总线结构中的一种或多种,包括存储器总线或者存储器控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。
存储器61作为一种计算机可读存储介质,可设置为存储软件程序、计算机可执行程序以及模块,如本申请实施例中的方法对应的程序指令/模块。处理器60通过运行存储在存储器61中的软件程序、指令以及模块,从而执行入口节点的至少一种功能应用以及数据处理,即实现上述的分段路由隧道的防断纤方法。
存储器61可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至 少一个功能所需的应用程序;存储数据区可存储根据入口节点的使用所创建的数据等。此外,存储器61可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储器61可包括相对于处理器60远程设置的存储器,这些远程存储器可以通过网络连接至日寇节点。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
通信接口62可设置为数据的接收与发送。
本申请实施例还提供了一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现如本申请任意实施例所提供的方法。
本申请实施例的计算机存储介质,可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质包括(非穷举的列表):具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、可擦式可编程只读存储器(electrically erasable,programmable Read-Only Memory,EPROM)、闪存、光纤、便携式紧凑磁盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本申请中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,数据信号中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括——但不限于无线、电线、光缆、射频(Radio Frequency,RF)等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言或多种程序设计语言组合来编写用于执行本申请操作的计算机程序代码,程序设计语言包括面向对象的程序设计语言—诸如Java、Smal ltalk、C++、Ruby、Go,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(Local Area Network,LAN)或广域网(Wide Area Network,WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。
本领域内的技术人员应明白,术语用户终端涵盖任何适合类型的无线用户设备,例如移动电话、便携数据处理装置、便携网络浏览器或车载移动台。
一般来说,本申请的多种实施例可以在硬件或专用电路、软件、逻辑或其任何组合中实现。例如,一些方面可以被实现在硬件中,而其它方面可以被实现在可以被控制器、微处理器或其它计算装置执行的固件或软件中,尽管本申请不限于此。
本申请的实施例可以通过移动装置的数据处理器执行计算机程序指令来实现,例如在处理器实体中,或者通过硬件,或者通过软件和硬件的组合。计算机程序指令可以是汇编指令、指令集架构(Instruction Set Architecture,ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码。
本申请附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于只读存储器(ROM)、随机访问存储器(RAM)、光存储器装置和系统(数码多功能光碟DVD或CD光盘)等。计算机可读介质可以包括非瞬时性存储介质。数据处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑器件((Field-Programmable Gate Array,FGPA)以及基于多核处理器架构的处理器。
Claims (10)
- 一种分段路由隧道的防断纤方法,包括:当数据承载在分段路由-流量工程SR-TE隧道上、且主路径发生故障时,入口节点确认备份路径是否发生故障,其中,所述主路径和所述备份路径均为所述SR-TE隧道的标签转发路径LSP;若所述备份路径发生故障,则所述入口节点将承载所述数据的隧道从所述SR-TE隧道切换到分段路由-尽力转发SR-BE隧道。
- 根据权利要求1所述的方法,其中,所述入口节点确认备份路径是否发生故障,包括:在所述入口节点根据标签转发路径-双向转发检测LSP-BFD技术确认所述主路径发生故障后,所述入口节点根据流量工程-双向转发检测TE-BFD技术对所述备份路径进行检测,确认所述备份路径是否发生故障。
- 根据权利要求1所述的方法,其中,所述入口节点将承载所述数据的隧道从所述SR-TE隧道切换到SR-BE隧道,包括:所述入口节点根据所述SR-TE隧道的隧道标识ID,将与所述隧道ID对应的隧道切换标记从第一预设值切换为第二预设值,所述隧道切换标记为所述第一预设值时指示所述数据承载在所述SR-TE隧道上,所述隧道切换标记为所述第二预设值时指示所述数据承载在所述SR-BE隧道上。
- 根据权利要求1或2所述的方法,还包括:若所述备份路径未发生故障,则所述入口节点按照所述备份路径转发所述数据。
- 一种分段路由隧道的防断纤装置,包括:确认模块和切换模块;所述确认模块,设置为当数据承载在分段路由-流量工程SR-TE隧道上、且主路径发生故障时,确认备份路径是否发生故障,其中,所述主路径和所述备份路径均为所述SR-TE隧道的标签转发路径LSP;所述切换模块,设置为若所述备份路径发生故障,则将承载所述数据的隧道从所述SR-TE隧道切换到分段路由-尽力转发SR-BE隧道。
- 根据权利要求5所述的装置,其中,所述确认模块,是设置为在根据标签转发路径-双向转发检测LSP-BFD技术确认所述主路径发生故障后,根据流量工程-双向转发检测TE-BFD技术对所述备份路径进行检测,确认所述备份路径是否发生故障。
- 根据权利要求5所述的装置,其中,所述切换模块,是设置为根据所述SR-TE隧道的隧道标识ID,将与所述隧道ID对应的隧道切换标记从第一预设值切换为第二预设值,所述隧道切换标记为所述第一预设值时指示所述数据承载在所述SR-TE隧道上,所述隧道切换标记为所述第二预设值时指示所述 数据承载在所述SR-BE隧道上。
- 根据权利要求5或6所述的装置,还包括转发模块;所述转发模块,设置为若所述备份路径未发生故障,则按照所述备份路径转发所述数据。
- 一种入口节点,包括:处理器,所述处理器用于在执行计算机程序时实现如权利要求1-4中任一所述的分段路由隧道的防断纤方法。
- 一种计算机可读存储介质,存储有计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1-4中任一所述的分段路由隧道的防断纤方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20897134.1A EP4072079A4 (en) | 2019-12-05 | 2020-12-01 | ANTI-FIBER BREAKAGE METHOD AND DEVICE FOR SEGMENT ROUTING TUNNEL, ENTRY NODE AND DATA BEARER |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911234039.9A CN112929261B (zh) | 2019-12-05 | 2019-12-05 | 分段路由隧道的防断纤方法、装置,入口节点及存储介质 |
CN201911234039.9 | 2019-12-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021109997A1 true WO2021109997A1 (zh) | 2021-06-10 |
Family
ID=76161241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/133115 WO2021109997A1 (zh) | 2019-12-05 | 2020-12-01 | 分段路由隧道的防断纤方法、装置,入口节点及存储介质 |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4072079A4 (zh) |
CN (1) | CN112929261B (zh) |
WO (1) | WO2021109997A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114205289A (zh) * | 2021-10-22 | 2022-03-18 | 清华大学 | 一种分段路由网络中考虑故障的流量工程计算方法和装置 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113810276B (zh) * | 2021-08-31 | 2024-06-18 | 锐捷网络股份有限公司 | 一种段路由故障处理方法、装置、电子设备及存储介质 |
CN115499368A (zh) * | 2022-08-10 | 2022-12-20 | 新华三技术有限公司 | 路径保护方法及装置 |
CN115801674A (zh) * | 2022-11-14 | 2023-03-14 | 中国联合网络通信集团有限公司 | 双栈的sdn控制方法、装置、介质以及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160173366A1 (en) * | 2014-12-16 | 2016-06-16 | Cisco Technology, Inc. | Node protection for segment routing adjacency segments |
CN107979499A (zh) * | 2018-01-26 | 2018-05-01 | 福州大学 | 基于有状态数据平面的网络多点故障恢复方法 |
CN109218176A (zh) * | 2017-06-30 | 2019-01-15 | 华为技术有限公司 | 一种报文处理的方法及装置 |
WO2019062249A1 (zh) * | 2017-09-28 | 2019-04-04 | 华为技术有限公司 | Sr-be内层隧道标签的配置方法、设备及通信系统 |
CN109861913A (zh) * | 2018-12-25 | 2019-06-07 | 北京华为数字技术有限公司 | 一种跨内部网关协议的前缀标识通告方法和装置 |
CN110086712A (zh) * | 2019-05-13 | 2019-08-02 | 何梓菁 | 一种基于sr-te隧道的链路保护方法和本地修复节点 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8072879B2 (en) * | 2006-02-03 | 2011-12-06 | Cisco Technology, Inc. | Technique for determining whether to reestablish fast rerouted primary tunnels based on backup tunnel path quality feedback |
CN102724117B (zh) * | 2012-06-06 | 2015-09-30 | 华为技术有限公司 | 多协议标签交换流量工程隧道建立方法及设备 |
CN106302165A (zh) * | 2015-05-22 | 2017-01-04 | 中兴通讯股份有限公司 | 一种点到多点隧道的保护方法和装置 |
CN106936683B (zh) * | 2015-12-31 | 2019-09-17 | 北京网御星云信息技术有限公司 | 一种实现隧道配置的方法及装置 |
CN111901235A (zh) * | 2017-12-01 | 2020-11-06 | 华为技术有限公司 | 处理路由的方法和装置、以及数据传输的方法和装置 |
CN112491687B (zh) * | 2018-03-29 | 2022-04-12 | 华为技术有限公司 | 一种处理报文的方法及装置 |
CN109167700B (zh) * | 2018-08-21 | 2020-06-09 | 新华三技术有限公司 | 段路由sr隧道的检测方法和装置 |
-
2019
- 2019-12-05 CN CN201911234039.9A patent/CN112929261B/zh active Active
-
2020
- 2020-12-01 WO PCT/CN2020/133115 patent/WO2021109997A1/zh unknown
- 2020-12-01 EP EP20897134.1A patent/EP4072079A4/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160173366A1 (en) * | 2014-12-16 | 2016-06-16 | Cisco Technology, Inc. | Node protection for segment routing adjacency segments |
CN109218176A (zh) * | 2017-06-30 | 2019-01-15 | 华为技术有限公司 | 一种报文处理的方法及装置 |
WO2019062249A1 (zh) * | 2017-09-28 | 2019-04-04 | 华为技术有限公司 | Sr-be内层隧道标签的配置方法、设备及通信系统 |
CN107979499A (zh) * | 2018-01-26 | 2018-05-01 | 福州大学 | 基于有状态数据平面的网络多点故障恢复方法 |
CN109861913A (zh) * | 2018-12-25 | 2019-06-07 | 北京华为数字技术有限公司 | 一种跨内部网关协议的前缀标识通告方法和装置 |
CN110086712A (zh) * | 2019-05-13 | 2019-08-02 | 何梓菁 | 一种基于sr-te隧道的链路保护方法和本地修复节点 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4072079A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114205289A (zh) * | 2021-10-22 | 2022-03-18 | 清华大学 | 一种分段路由网络中考虑故障的流量工程计算方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
CN112929261B (zh) | 2024-03-12 |
EP4072079A1 (en) | 2022-10-12 |
EP4072079A4 (en) | 2023-01-11 |
CN112929261A (zh) | 2021-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3591912B1 (en) | Evpn packet processing method, device and system | |
US10432514B2 (en) | Multiprotocol label switching traffic engineering tunnel establishing method and device | |
WO2021109997A1 (zh) | 分段路由隧道的防断纤方法、装置,入口节点及存储介质 | |
AU2011306508B2 (en) | Method and apparatus to improve LDP convergence using hierarchical label stacking | |
US7765306B2 (en) | Technique for enabling bidirectional forwarding detection between edge devices in a computer network | |
EP2996290B1 (en) | Packet forwarding method, apparatus, and system | |
US7957306B2 (en) | Providing reachability information in a routing domain of an external destination address in a data communications network | |
US9668160B2 (en) | Topology discovery based on SCTP/X2 snooping | |
US9185025B2 (en) | Internetworking and failure recovery in unified MPLS and IP networks | |
WO2020135395A1 (zh) | 一种跨内部网关协议的前缀标识通告方法和装置 | |
US9294986B2 (en) | Topology discovery based on explicit signaling | |
KR20110129451A (ko) | 브로드캐스트 네트워크에 대한 ldp igp 동기화 | |
US20220294728A1 (en) | Packet Transmission Path Switching Method, Device, and System | |
WO2021115162A1 (zh) | 一种链路保护方法、装置,入口节点及存储介质 | |
CN106878173B (zh) | 一种路由发送方法及装置 | |
CN114567593A (zh) | 路径切换方法及其装置、网络设备、计算机可读存储介质 | |
US20240259300A1 (en) | Method and apparatus for path switchover management | |
US20240039829A1 (en) | Route refresh method, apparatus, and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20897134 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2020897134 Country of ref document: EP Effective date: 20220704 |