WO2021169516A1 - 一种路径检测方法、电子设备及存储介质 - Google Patents
一种路径检测方法、电子设备及存储介质 Download PDFInfo
- Publication number
- WO2021169516A1 WO2021169516A1 PCT/CN2020/137304 CN2020137304W WO2021169516A1 WO 2021169516 A1 WO2021169516 A1 WO 2021169516A1 CN 2020137304 W CN2020137304 W CN 2020137304W WO 2021169516 A1 WO2021169516 A1 WO 2021169516A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- algorithm
- node
- fec element
- igp
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/50—Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/06—Deflection routing, e.g. hot-potato routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/70—Routing based on monitoring results
Definitions
- the embodiments of the present application relate to the field of communications, and in particular, to a path detection method, electronic device, and storage medium.
- Draft-ietf-lsr-flex-algo-05 proposed IGP (Interior Gateway Protocol) Flexible Algorithm (Flex-algorithm) technology (Flex-algo for short) to run multiple IGP algorithm calculations in the same network topology , Obtain multiple Flex-Algo planes and plan data transmission paths in each plane.
- Flex-algo plane each node will take itself as the root node and use the corresponding IGP algorithm to calculate the optimal forwarding path to other destination nodes. According to the destination node to be reached, this node will obtain and know the next destination node.
- Flex-algo can be used in combination with SR-MPLS (Segment Routing MPLS segment routing applied to MPLS (Multiprotocol Label Switching) forwarding plane) or SRv6 (Segment Routing IPv6 segment routing applied to IPv6 forwarding plane).
- SR-MPLS Segment Routing MPLS segment routing applied to MPLS (Multiprotocol Label Switching) forwarding plane
- SRv6 Segment Routing IPv6 segment routing applied to IPv6 forwarding plane
- the purpose of the embodiments of the present application is to provide a path detection method.
- the implementation of the present application provides a path detection method, including: determining the target FEC element of the target node to be detected according to the forwarding path related to the algorithm in the network topology plane; wherein the target FEC element includes The internal gateway protocol IGP algorithm information corresponding to the network topology plane; the echo request message generated according to the target FEC element is sent to the target node along the forwarding path related to the algorithm for the target node to verify the target FEC element; The explicit request message includes the target FEC element; according to the check result of the target FEC element fed back by the target node, it is determined whether the forwarding path is valid.
- the embodiment of the present application also provides a path detection method, including: receiving an echo request message, the echo request message including the target FEC element of the target node to be detected; wherein the target FEC element includes the network topology where the forwarding path is located The interior gateway protocol IGP algorithm information corresponding to the plane; verify the target FEC element, and generate an echo response message including the verification result of the target FEC element; feedback the echo response message to the root node for the root node according to the target The check result of the FEC element determines whether the forwarding path is valid.
- the embodiment of the present application also provides an electronic device, including: at least one processor; and a memory communicatively connected with the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are at least One processor executes, so that at least one processor can execute the above-mentioned path detection method.
- the embodiment of the present application also provides a computer-readable storage medium that stores a computer program, and the computer program is executed by a processor to implement the above-mentioned path detection method.
- Fig. 1 is a flowchart of a path detection method according to the first embodiment of the present application
- Fig. 2 is a schematic diagram of a network topology according to the first embodiment of the present application.
- FIG. 3 is a schematic diagram of the structure of the first FEC element according to the first embodiment of the present application.
- FIG. 4 is a schematic diagram of a second FEC element structure according to the first embodiment of the present application.
- FIG. 5 is a schematic diagram of the structure of a third FEC element in the first embodiment of the present application.
- Fig. 6 is a schematic diagram of a network topology according to the second embodiment of the present application.
- Fig. 7 is a schematic diagram of a network topology according to the third embodiment of the present application.
- FIG. 8 is a flowchart of a path detection method in the fourth embodiment of the present application.
- FIG. 9 is a schematic diagram of the structure of an electronic device according to the fifth embodiment of the present application.
- the purpose of the implementation of this application is to provide a path detection method to achieve accurate detection and verification of the validity of the algorithm-related forwarding path in the Flex-algo plane, so as to avoid the invalidity of the calculated forwarding path from causing data transmission and business operation. Influence.
- the first embodiment of the present application relates to a path detection method, which determines the target FEC (forwarding equivalence class) element of the target node to be detected according to the forwarding path related to the algorithm in the network topology plane; wherein, the target FEC element includes the network The interior gateway protocol IGP algorithm information corresponding to the topology plane; the echo request message generated according to the target FEC element is sent to the target node along the forwarding path related to the algorithm for the target node to verify the target FEC element; among them, echo The request message includes the target FEC element; according to the verification result of the target FEC element fed back by the target node, it is determined whether the forwarding path is valid.
- the target FEC element forwarding equivalence class
- the FEC element including the IGP algorithm information is constructed in advance to proceed the forwarding path.
- it can directly call the target FEC element containing the specific IGP algorithm information to perform path detection according to the algorithm corresponding to the Flex-algo plane, ensuring that the forwarding path in each Flex-algo plane can be accurately detected.
- the path detection method in this embodiment can be applied to the path detection of whether a variety of forwarding paths are valid.
- a segmented routing architecture based on strict shortest path The segment routing and forwarding path calculated by the forwarding (strict SPF) algorithm, the segment routing and forwarding path based on the flexible IGP algorithm technology, the overlay service forwarding path, and the segment routing traffic engineering (SR-TE) example, etc., in this embodiment It is applied to the segmented routing and forwarding path based on the flexible IGP algorithm technology as an example for description, which specifically includes the following steps:
- Step 101 Determine the target FEC element of the target node to be detected according to the forwarding path related to the algorithm in the network topology plane.
- the root node of the forwarding path determines the target FEC element of the target node to be detected according to the forwarding path related to the algorithm in the network topology plane; where the target FEC element includes the network topology
- the network topology diagram of the forwarding path related to the algorithm is shown in Figure 2.
- ISIS Intermediate System to Intermediate System
- SR-MPLS the control plane protocol of SR-MPLS.
- Two Flex-algo planes are created, where the Algorithm corresponding to the Flex-algo 128 plane is 128, and the Algorithm corresponding to the Flex-algo 129 plane is 129.
- the Flex-algo 128 plane includes nodes S, A, B, D and the bidirectional links connecting these nodes.
- the Flex-algo 129 plane includes nodes S, B, C, D and the bidirectional links connecting these nodes.
- the Prefix-SIDs associated with Algorithm 128 and 129 are 1280 and 1290, respectively.
- Other nodes learn the FTN (FEC to NHLFE Map, FEC to Next Hop Label Forwarding Unit Mapping) and ILM (Incoming Label Mapping) forwarding entries that will be established to Prefix-D in the future.
- the MPLS label information included in the entries is based on the Prefix -SID 1280 or 1290 is generated according to the existing technology. Assume that in the Flex-algo 128 plane and the Flex-algo 129 plane, the shortest forwarding path from the source node S to the end node D is S-B-D.
- the root node initiates LSPPingSR-LSP Prefix-D Algorithm 128 to check whether the SR-BE (Segment Routing Best Effort) path SBD from the Flex-algo 128 plane to the destination node D is valid, and then node S will act as the Initiator
- the (root) node takes node D as the target node, and the FEC element of node D as the target FEC element, where the FEC element of node D includes the algorithm information corresponding to the Flex-algo 128 plane.
- the root node determines the target FEC element of the target node to be detected according to the forwarding path related to the algorithm in the network topology plane, it determines the path detection method of the forwarding path; if the path detection method is LSPPing detection, it will forward The terminal node of the path is used as the target node to obtain the target FEC element; if the path detection method is LSPTraceroute detection, each route node in the forwarding path is used as the target node to obtain the target FEC element.
- a route node is a node in a segment list (Segment List), and the target FEC element may be an IGP-Prefix Segment type or an IGP-Adjacency Segment type.
- Step 102 Send the echo request message generated according to the target FEC element to the target node along the forwarding path related to the algorithm for the target node to verify.
- the root node After obtaining the target FEC element of the target node, the root node generates an echo request message according to the target FEC element, and sends the echo request message generated according to the target FEC element to the target along the forwarding path related to the algorithm Node, for the target node to verify the target FEC element; wherein, the echo request message includes the target FEC element.
- the IGP algorithm information is included in the extension field of the target FEC element.
- the target FEC element including the algorithm information is added to the target FEC element stack of the echo request message, and it is encapsulated with the relevant label information generated according to the prefix identifier
- the echo request message is then sent to the target node along the forwarding path related to the algorithm, and the target node verifies the target FEC element, so as to check whether the path calculated by the specific IGP algorithm is valid Detection.
- the target FEC element is obtained by adding an extension field including algorithm information to the existing IGP Segment FEC element.
- the types of the FEC element adding the extension field include: IPv4 IGP-Prefix Segment ID, IPv6 IGP-Prefix Segment ID Sub -TLV or IGP-Adjacency Segment ID Sub-TLV, after adding an extension field including IGP algorithm information on the basis of the existing IGP SegmentFEC element, the three types of including algorithms for IPV4 IGP-Prefix, IPV6 IGP-Prefix and IGP-Adjacency
- the FEC element of the information, IPv4 IGP-Prefix Segment ID per Algorithm Sub-TLV, IPv6 IGP-Prefix Segment ID per Algorithm Sub-TLV and IGP-Adjacency Segment ID per Algorithm Sub-TLV are shown in Figure 3 and Figure 4, respectively.
- the algorithm field may include an algorithm value identifying the algorithm.
- the addition position and value of the extended algorithm field can be adjusted as needed, and this embodiment does not limit the specific setting of the extended field.
- node D After the root node S generates the echo request message, it first sends the message to Transit (transit node) B, and then transparently transmits the echo request message to the destination node D through node B.
- Transit node B According to the definition of RFC8029, node D checks itself according to the preset conditions of sending the echo request message to the control plane, and performs subsequent processing according to the check result.
- the preset condition for uploading the echo request message to the control plane can be any of the following conditions: the TTL of the top label of the MPLS label stack is timed out, the top label of the MPLS label stack is the router alert label (Router Alert Label), and the IP header
- the destination IP in the IP header is in the range of 127/8, the Router Alert Option in the IP header is valid, and the TTL in the IP header has timed out.
- node D sends the received echo request message to the control plane, and node D acts as the responder (response) node in the control
- the plane recognizes the path detection type according to the destination UDPport as 3503, and checks the target FEC element.
- an echo reply echo response
- the destination node when the destination node performs the verification of the FEC element, it can generally refer to the verification process of RFC8029.
- the responding node determines the type of the IGP protocol according to the target FEC element, and The target FEC element is checked according to the type of the IGP protocol. That is, first, according to the Protocol value in the target FEC element, determine the type of the IGP protocol used when creating the path related to the algorithm, and determine the verification of the target FEC element and label according to the type of the IGP protocol.
- modify step 4 of section 4.4.1 in RFC8029 to the following in advance, and perform verification according to the modified process:
- step 4.a If the incoming label bound to the FEC element currently to be checked is an implicit empty label, set the FEC-status to 2, and then execute step 4.a.
- FEC-return-code 10 which means "The label mapped by the current FEC element is not the current top-level label in the label stack (Mapping for this FEC is not the given label at stack-depth)", and FEC-status is set to 1, Then return.
- IPv4 IGP-Prefix Segment ID per Algorithm sub-TLV is 0, then any locally enabled IGP protocol will be used;
- IPv4 IGP-Prefix Segment ID per Algorithm sub-TLV is 1, the IGP protocol is OSPF;
- IPv4 IGP-Prefix Segment ID per Algorithm sub-TLV is 2
- IGP protocol is ISIS
- the value of the protocol in the IPv4 IGP-Prefix-Segment ID per Algorithm sub-TLV cannot be identified, the value of the protocol is regarded as 0;
- the Best-return-code is set to 10, which means "The label of the current FEC element mapping is not the label of the ⁇ Return Subcode> layer in the label stack (Mapping for this FEC) is not the given label at stack- depth ⁇ RSC>)".
- Verification 1 The non-PHP flag is set during node-SID notification: If the protocol is OSPF (Open Shortest Path First), the NP-Flag in SR-OSPF should be set to 0; if the protocol is ISIS , The P-Flag in SR-ISIS should be set to 0.
- OSPF Open Shortest Path First
- ISIS ISIS
- the method for determining the IGP protocol type is similar to the method in CASE1, so I won't repeat it here.
- Best-return-code 10 which means "The label of the current FEC element mapping is not the label of the ⁇ Return Subcode> layer in the label stack (Mapping for this FEC) is not the given label at stack-depth ⁇ RSC>)".
- CASE4 If Label-stack-depth is greater than 0, and the FEC-stack-depth in Target FEC Stack sub-TLV is IPv6 IGP-Prefix Segment ID per Algorithm Sub-TLV, the processing is similar to the above CASE2 and will not be repeated.
- the IGP protocol is OSPF
- the IGP protocol is ISIS
- Verification 2 IGP-Adjacency Segment ID per Algorithm sub-TLV
- the Advertising Node Identifier in the sub-TLV indicates that the node represented by the IGP-Adjacency Segment ID per Algorithm FEC, this verification only needs to be in the link state database maintained by the node Query confirmation;
- Adj.Type is equal to 4 or 6 (IGP Adjacency or LAN Adjacency):
- Verification 3 IGP-Adjacency Segment ID per Algorithm sub-TLV
- the Advertising Node Identifier in the sub-TLV indicates that the node represented by the IGP-Adjacency Segment ID per Algorithm FEC, this verification only needs to be in the link state database maintained by the node Query confirmation;
- an echo response message including the verification result of the target FEC element is generated, and then the echo response message including the verification result of the target FEC element is fed back to the root node.
- Step 103 Determine whether the forwarding path is valid according to the verification result of the target FEC element fed back by the target node.
- the destination node After the destination node generates an echo response message according to the check result of the target FEC element, it feeds back the echo response message including the check result of the target FEC element to the root node of the path, and the root node feeds back according to the target node's feedback
- the check result of the target FEC element determines whether the forwarding path is valid.
- the root node after receiving the echo response message, determines the check result of the target FEC element according to the return code value of the target FEC element detection result in the message, and then determines the check result of the target FEC element Whether the forwarding path is valid.
- the result of the target FEC element check is the value of the return code Best-return-code, and the value of Best-return-code in the received echo response message is 12.
- the root node determines the verification result of the target FEC element according to the corresponding meaning assigned to different values of Best-return-code in advance. After querying, the result corresponding to the value of 12 is learned; the current element in the FEC stack is not connected to the interface Protocol not associated with interface at FEC-stack-depth, then the root node can determine that the verification of the target FEC element fails, and then the root node determines that the forwarding path is an invalid path based on the result of the target FEC element verification failure, and Displays the detection result of invalid forwarding path.
- this embodiment provides a path detection method, which redefines the FEC element including the IGP algorithm information by adding an extension field including the IGP algorithm information to the existing FEC element;
- detecting whether the path is valid determine the target FEC element to be detected that includes the algorithm information corresponding to the network topology plane where the forwarding path is located, and determine whether the forwarding path is valid according to the check result of the target FEC element, by checking the FEC element and
- the extension of the path detection protocol ensures that it can accurately detect whether the forwarding path in the Flex-algo plane is effective.
- the second embodiment of this application relates to a path detection method.
- the second embodiment is roughly the same as the first embodiment.
- the value of the algorithm for identifying the algorithm in the algorithm field can be obtained through IANA (Internet Assigned Numbers Authority).
- the standard value assigned by the Internet Digital Distribution Agency) for the algorithm can also be a user-defined algorithm value.
- IANA assigns standard values to some algorithms to detect whether the paths calculated by some commonly used algorithms are valid; through user-defined algorithm values for the algorithms, the path calculated by the algorithm selected by the user is effective and efficient. Detection, the specific detection steps in the path detection process can refer to the first embodiment.
- Step 101 Determine the target FEC element of the target node to be detected according to the forwarding path related to the algorithm in the network topology plane.
- the root node determines the target FEC element of the target node according to the algorithm corresponding to the network topology plane and the forwarding path and detection method.
- the target FEC element is added with an extension field including IGP algorithm information.
- IGP algorithm in the extension field The information is indicated by the value of the algorithm, where the value of the algorithm includes the standard value assigned by the Internet digital distribution agency IANA for the algorithm and the value of the algorithm defined by the user.
- the value and meaning of the algorithm in the algorithm field added by the FEC element are as follows: 0 ⁇ 127: the standard value assigned by IANA, for example, 0 means “SPF algorithm based on link metric" shortest path forwarding based on link metric Algorithm, 1 means “Strict SPF algorithm based on link metric” Strict shortest path forwarding algorithm based on link metric; 128-255: Used to identify IGP Flex-algo, which is defined by the user. For example, the user can create a Flex-algo plane with an Algorithm of 128 or a Flex-algo plane with an Algorithm of 129. In practical applications, the range of the algorithm value can be set according to actual conditions or needs, and this embodiment does not limit the setting of the algorithm value.
- the root node R1 detects the path calculated based on the strict shortest path algorithm under the segmented routing architecture.
- the algorithm standard assigned by IANA for the strict shortest path algorithm is 1.
- ISIS is used as the control plane protocol of SR-MPLS in the IPv4 network.
- Ingress (start) node R1 is established to egress (exit) node R3 based on Strict SPF (strict shortest path) algorithm SR LSP (Segment Routing Label Switching Path) ,
- Strict SPF strict shortest path
- SR LSP Segment Routing Label Switching Path
- the Strict SPF Prefix-SID assigned by the R3 node to its loopback route Prefix-R3 is 300, and the R1 and R2 nodes will learn the FTN and ILM forwarding entries that will be established to the Prefix-R3 in the future, and the MPLS labels included in the entries
- the information is generated according to the Prefix-SID 300 with reference to the prior art.
- Root node R1 initiates LSP ping SR-LSP Prefix-R3 Algorithm 1
- node R3 is used as the target node according to the forwarding path and path detection method
- IPv4 IGP-Prefix is set according to the algorithm corresponding to the network topology plane where the forwarding path is located.
- Segment ID per Algorithm ⁇ Prefix-R3, Algorithm 1> as the target FEC element.
- Step 102 Send the echo request message generated according to the target FEC element to the target node along the forwarding path related to the algorithm for the target node to verify.
- the top label of the stack is the label corresponding to Prefix-SID 300
- the label TTL 255
- an echo request message is generated.
- the target FEC stack TLV may also include FEC elements corresponding to the remaining tags in the label stack.
- R3 After generating the echo request message, it sends the message to the R2 node, and the R2 node transparently transmits the message to node R3. After receiving the echo request message, R3 will send the echo request message to the control plane according to the conditions After detecting itself, R3 detects that it meets the preset conditions and sends the message to the control plane. The R3 node, as the responding node, verifies the target FEC element.
- the R3 node constructs an echo reply message according to the verification result of the target FEC element, and the echo reply message contains the information of successful verification, and feeds back the echo reply message to the root node R1.
- Step 103 Determine whether the forwarding path is valid according to the verification result of the target FEC element fed back by the target node.
- the root node determines whether the path is valid according to the inspection result of the target FEC element, and outputs the inspection result.
- the algorithm value in the extension field of the FEC element includes the standard value assigned by IANA for a specific algorithm or a user-defined algorithm value, and some specific algorithms are used by IANA. Allocate standard values so that when detecting paths calculated by some algorithms, the target FEC element including specific algorithm information can be called to accurately detect whether the forwarding path is effective; the value can be obtained by user-defined algorithm directly in Flex-algo
- the path detection of the forwarding path calculated by a custom-valued algorithm in the plane ensures that the path calculated by the algorithm selected by the user can be efficiently and accurately determined whether the path calculated by the algorithm selected by the user is valid.
- the third embodiment of the present application relates to a path detection method.
- This embodiment is roughly similar to the first embodiment.
- the adjacent links are identified by the IGP algorithm corresponding to the Flex-algo plane.
- the specific detection steps can refer to the first embodiment.
- Step 101 Determine the target FEC element of the target node to be detected according to the forwarding path related to the algorithm in the network topology plane.
- the root node determines the target FEC element of the target node that needs to be detected according to the forwarding path, the network topology plane where the path is located, and the path detection mode.
- the SR-TE (Segment Routing Traffic Engineering) path in the network topology needs to be tested for LSPTraceroute, and then the corresponding segment list (Segment List) corresponding to the SR-TE instance is determined. Identify the list (SID List), and then determine the target FEC element according to the algorithm corresponding to each segment.
- SID List Segment Routing Traffic Engineering
- SR-TE instance path detection is performed.
- ISIS is used as the control plane protocol of SR-MPLS in the IPv4 network to create two Flex -Algo plane, where the Algorithm corresponding to the Flex-algo 128 plane is 128, and the Algorithm corresponding to the Flex-algo 129 plane is 129.
- the Flex-algo 128 plane includes nodes S1, A, B, and D and the bidirectional links connecting these nodes.
- the Flex-algo 129 plane includes nodes S2, B, C, D and the bidirectional links connecting these nodes.
- Both planes use IGPmetric (IGP metric) to calculate the shortest path, and the IGPmetric of the link (B-D) is 100, and the IGPmetric of the remaining links is 10.
- the Prefix-SID related to Algorithm 128 allocated by node B for its loopback route Prefix-B is 1280.
- Other nodes learn the FTN and ILM forwarding entries that will be established to Prefix-B in the future.
- the MPLS label information included in the entries is generated according to the Prefix-SID 128 according to the existing technology, and node B allocates and distributes information to its local link (BD)
- BD local link
- the Adjacency-SID (adjacent segment identifier) related to the algorithm 128 is 1281, and other nodes will store it in the local link state database after learning.
- An SR-TE instance in the Flex-algo 128 plane (denoted as sr-te-100) is created on node S1, then its Segment List is ⁇ Node-B, Link(BD) ⁇ , and the corresponding SID List is ⁇ 1280 ,1281 ⁇ .
- the S1 node serves as the root node and sets the end node B of the first segment of the SR-TE and the end node D of the adjacent segment link (BD) of the second segment in the SR-TE
- FEC element IGP-Adjacency Segment ID per Algorithm ⁇ link(BD) corresponding to the link (BD) ),128> as the target FEC element.
- Step 102 Send the echo request message generated according to the target FEC element to the target node along the forwarding path related to the algorithm for the target node to verify.
- the root node constructs an echo request message according to the FEC element to be detected, and hands the FEC element to be detected to the corresponding target node for verification.
- the root node S1 reconstructs the echo request message according to the received echo reply message.
- the target FEC element stack remains unchanged.
- the TTL value of the top label is set to 2, and then it is sent to node A again, because the top label is 2, A After subtracting 1 from the TTL value, the message is directly forwarded to node B.
- Node B replies to the S1 node with an echo reply message.
- the echo reply message contains information about the successful verification and contains FEC Stack Change TLV, prompting the root node S1 to pop up the IPv4 IGP-Prefix Segment ID in the target FEC stack TLV. Algorithm Sub-TLV.
- the TTL of the top label is set to 3. Forward to the next hop node A.
- the TTL of the top label is 3, and after the TTL of the top label is reduced by 1, it is directly forwarded to node B.
- the TTL of the top label is 2, and the prefix is terminated.
- -SID 1280 corresponding label continue to check the ILM table according to the label corresponding to the lower Adjacency-SID 1281, subtract 1 from the top label and pop up the label, and put the label in the lower layer IP header of the TTL copy, and then forward the message to node D.
- Node D replies to the S1 node with an echo reply message.
- the echo reply message contains information about successful verification and FEC Stack Change TLV, prompting the head node to pop up the IGP-Adjacency Segment ID per Algorithm Sub in the target FEC stack TLV. -TLV.
- the responding node can directly include the echo response message that the verification failed to the root node, and terminate the subsequent Path detection.
- Step 103 Determine whether the forwarding path is valid according to the verification result of the target FEC element fed back by the target node.
- the root node determines whether the path is valid according to the inspection result of the FEC element, and outputs the inspection result.
- this embodiment provides a path detection method, which determines the target FEC element corresponding to the algorithm-related path in the SR-TE instance according to the network topology plane, path detection method, and forwarding path where the created SR-TE instance is located. , According to the target FEC element to realize whether the segment path related to the algorithm in the SR-TE instance is valid or not.
- the fourth embodiment of the present application relates to a path detection method, including: receiving an echo request message, the echo request message including the target FEC element of the target node to be detected; wherein the target FEC element includes the network topology where the forwarding path is located The interior gateway protocol IGP algorithm information corresponding to the plane; verify the target FEC element, and generate an echo response message including the verification result of the target FEC element; feedback the echo response message to the root node for the root node according to the target The check result of the FEC element determines whether the forwarding path is valid.
- FIG. 8 The specific process of the path detection method in this embodiment is shown in FIG. 8, and specifically includes the following steps:
- Step 801 Receive an echo request message.
- the responding node when checking whether the forwarding path is valid, receives an echo request message.
- the echo request message includes the target FEC element of the target node to be detected, where the target FEC element includes the network topology where the forwarding path is located.
- the interior gateway protocol IGP algorithm information corresponding to the plane determines the target FEC element to be verified according to the received echo request message.
- the IGP algorithm information is included in the extension field of the target FEC element.
- the IGP algorithm information in the extended field is indicated by the standard value assigned by the Internet digital distribution agency IANA for the algorithm or by the user-defined algorithm.
- the type of the FEC element to which the extension field is added includes: IPv4 IGP-Prefix Segment ID Sub-TLV, IPv6 IGP-Prefix Segment ID Sub-TLV, or IGP-Adjacency Segment ID Sub-TLV.
- Step 802 Verify the target FEC element contained in the echo request message, and generate an echo response message including the result of the target FEC element verification.
- the responding node verifies the target FEC element, and generates a checksum including the target FEC element according to the verification result of the target FEC element. Echo response message of the inspection result.
- the responding node when it performs the verification of the target FEC element, it can generally refer to the verification process of RFC8029.
- the responding node verifies the target FEC element.
- determine the type of the IGP protocol, and check the target FEC element according to the type of the IGP protocol that is, first determine the IGP protocol used when creating the algorithm-related path according to the protocol value in the target FEC element
- the type of the target FEC element and label is determined according to the type of the IGP protocol.
- the return code value indicating the FEC element verification result is set according to the verification result of the target FEC element, and the target FEC element is generated to include the target FEC Echo response message of element check result.
- Step 803 Feed back an echo response message to the root node for the root node to determine whether the forwarding path is valid according to the verification result of the target FEC element.
- the echo response message is fed back to the root node of the forwarding path, and the root node indicates the target FEC according to the echo response message
- the return code value of the element check result determines the check result of the target FEC element, and then determines whether the forwarding path is valid according to the check result of the target FEC element.
- this embodiment provides a path detection method, which implements the extension of the existing path detection protocol by adding an extension field including IGP algorithm information to the existing FEC element, and introduces the FEC element including the IGP algorithm information; Therefore, in the detection of whether the forwarding path calculated by the IGP algorithm is valid, the root node can call the target FEC element including the IGP algorithm information to initiate path detection, and the responding node can accurately calibrate the target FEC element containing the IGP algorithm information. The root node then determines whether the forwarding path is valid according to the verification result of the target FEC element, so as to achieve accurate and efficient detection of whether the forwarding path calculated by the IGP algorithm is valid.
- the implementation of this application determines whether the forwarding path in the Flex-algo plane is valid or not, according to the IGP algorithm and forwarding path corresponding to the Flex-algo plane, the target node to be detected is determined and invoked
- the target node is related to the target FEC element of the IGP algorithm, and constructs an echo request message for path detection for the target node to verify the target FEC element.
- the Flex is accurately determined.
- the forwarding path in the algo plane is valid, by extending the existing path detection protocol, pre-build FEC elements including IGP algorithm information, so that when the forwarding path is valid, it can be directly based on the algorithm corresponding to the Flex-algo plane. Calling the target FEC element containing the IGP algorithm information to perform path detection ensures that the validity of the forwarding path in each Flex-algo plane can be accurately detected.
- the IGP algorithm information is included in the extended field of the target FEC element.
- the path in the Flex-algo plane can be directly called when the path in the Flex-algo plane is detected.
- the target FEC element ensures that it can accurately detect whether the path in the Flex-algo plane is effective.
- the IGP algorithm information in the extended field is indicated by the algorithm value, where the algorithm value includes the standard value assigned by the Internet Digital Distribution Agency IANA for the algorithm and the user-defined algorithm value, and the IANA is the algorithm.
- the assigned standard value can accurately identify the commonly used algorithm, which is convenient for detecting the path calculated by the commonly used IGP algorithm.
- the forwarding path calculated by the algorithm that the user needs to be detected is guaranteed Perform testing.
- FEC elements that add extension fields include: IPv4 IGP-Prefix Segment ID Sub-TLV, IPv6 IGP-Prefix Segment ID Sub-TLV, or IGP-Adjacency Segment ID Sub-TLV, making the implementation of this application broad Application scenarios.
- determining the target FEC element of the target node to be detected includes: determining the path detection method of the forwarding path; if the path detection method is LSP Ping detection, the end of the forwarding path is determined The node serves as the target node to obtain the target FEC element; if the path detection method is LSP Traceroute detection, each route node in the forwarding path is used as the target node, and the target FEC element is obtained.
- the target node is determined by the path detection method, and the target The FEC element of the node is used as the target element to ensure the efficiency of the detection and the accuracy of the path detection result.
- the fifth embodiment of the present application relates to an electronic device. As shown in FIG. 9, it includes at least one processor 901; and a memory 902 communicatively connected to the at least one processor 901; The instructions executed by the processor 901 are executed by the at least one processor 901, so that the at least one processor 901 can execute the foregoing path detection method.
- the memory and the processor are connected in a bus mode
- the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors and various circuits of the memory together.
- the bus can also connect various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all well-known in the art, and therefore, no further description will be given herein.
- the bus interface provides an interface between the bus and the transceiver.
- the transceiver may be one element or multiple elements, such as multiple receivers and transmitters, providing a unit for communicating with various other devices on the transmission medium.
- the data processed by the processor is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor.
- the processor is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interfaces, voltage regulation, power management, and other control functions.
- the memory can be used to store data used by the processor when performing operations.
- the sixth embodiment of the present application relates to a computer-readable storage medium storing a computer program.
- the computer program is executed by the processor, the above method embodiment is realized.
- the program is stored in a storage medium and includes several instructions to enable a device ( It may be a single-chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (10)
- 一种路径检测方法,包括:根据网络拓扑平面中与算法相关的转发路径,确定待检测的目标节点的目标FEC元素;其中,所述目标FEC元素包括所述网络拓扑平面对应的内部网关协议IGP算法信息;将根据所述目标FEC元素生成的回显请求报文沿与算法相关的所述转发路径发送到所述目标节点,供所述目标节点对所述目标FEC元素进行校验;其中,所述回显请求报文包括所述目标FEC元素;根据所述目标节点反馈的所述目标FEC元素的校验结果,确定所述转发路径是否有效。
- 根据权利要求1所述的路径检测方法,其中,所述IGP算法信息包括在所述目标FEC元素的扩展字段中。
- 根据权利要求2所述的路径检测方法,其中,所述扩展字段中的IGP算法信息通过算法取值指示,其中,所述算法取值包括由互联网数字分配机构IANA为算法分配的标准取值及由用户自定义的算法取值。
- 根据权利要求2所述的路径检测方法,其中,添加所述扩展字段的FEC元素的类型包括:IPv4 IGP-Prefix Segment ID Sub-TLV、IPv6 IGP-Prefix Segment ID Sub-TLV或IGP-Adjacency Segment ID Sub-TLV。
- 根据权利要求1所述的路径检测方法,其中,所述根据网络拓扑平面中与算法相关的转发路径,确定待检测的目标节点的目标FEC元素,包括:确定所述转发路径的路径检测方式;若所述路径检测方式为LSP Ping检测,则将所述转发路径的终节点作为所述目标节点,得到所述目标FEC元素;若所述路径检测方式为LSP Traceroute检测,则将所述转发路径中的各航路节点均作为所述目标节点,得到所述目标FEC元素。
- 一种路径检测方法,包括:接收回显请求报文,所述回显请求报文包括待检测的目标节点的目标FEC元素;其中,所述目标FEC元素包括转发路径所在网络拓扑平面对应的内部网关协议IGP算法信息;对所述目标FEC元素进行校验,并生成包括所述目标FEC元素的校验结果的回显应答报文;向根节点反馈所述回显应答报文,供所述根节点根据所述目标FEC元素的校验结果确定所述转发路径是否有效。
- 根据权利要求6所述的路径检测方法,其中,所述IGP算法信息包括在所述目标FEC元素的扩展字段中。
- 根据权利要求6所述的路径检测方法,其中,所述对所述目标FEC元素进行校验,包括:根据所述目标FEC元素,确定IGP协议的类型;根据所述IGP协议的类型对所述目标FEC元素进行校验。
- 一种电子设备,,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如权利要求1至5中任一项所述的路径检测方法,或,能够执行如权利要求6至8中任一项所述的路径检测方法。
- 一种计算机可读存储介质,存储有计算机程序,其中,所述计算机程序被处理器执行时实现权利要求1至5中任一项所述的路径检测方法,或,实现权利要求6至8中任一项所述的路径检测方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010123741.4A CN113315701A (zh) | 2020-02-27 | 2020-02-27 | 一种路径检测方法、电子设备及存储介质 |
CN202010123741.4 | 2020-02-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021169516A1 true WO2021169516A1 (zh) | 2021-09-02 |
Family
ID=77370793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/137304 WO2021169516A1 (zh) | 2020-02-27 | 2020-12-17 | 一种路径检测方法、电子设备及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113315701A (zh) |
WO (1) | WO2021169516A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114205188B (zh) * | 2021-12-08 | 2023-08-29 | 中盈优创资讯科技有限公司 | 一种基于srte时延优化的隧道调度方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136995A (zh) * | 2010-08-09 | 2011-07-27 | 华为技术有限公司 | Mpls与mpls-tp之间oam转换的方法及装置 |
CN102404145A (zh) * | 2011-11-17 | 2012-04-04 | 华为技术有限公司 | 多协议标签交换环网的检测方法、装置及系统 |
CN102571601A (zh) * | 2012-02-13 | 2012-07-11 | 中兴通讯股份有限公司 | 一种保证双向转发检测可靠性的方法及标记交换路径设备 |
CN107147508A (zh) * | 2016-03-01 | 2017-09-08 | 中兴通讯股份有限公司 | 故障检测方法及装置 |
US20180026880A1 (en) * | 2016-07-21 | 2018-01-25 | Cisco Technology, Inc. | Target fec (forwarding equivalence class) stack based fec query in segment routing environments |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7463591B1 (en) * | 2001-06-25 | 2008-12-09 | Juniper Networks, Inc. | Detecting data plane liveliness of a label-switched path |
CN101729391B (zh) * | 2008-10-23 | 2012-09-19 | 华为技术有限公司 | 获取链路汇聚组信息的方法、节点和系统 |
CN102217235B (zh) * | 2011-04-20 | 2013-11-06 | 华为技术有限公司 | 一种lsp路径检验方法及检测系统 |
CN103297340B (zh) * | 2013-06-07 | 2017-02-08 | 杭州华三通信技术有限公司 | Mpls和bgp组网中的路由收敛方法和设备 |
CN105337785B (zh) * | 2014-07-18 | 2018-10-02 | 华为技术有限公司 | 一种路径连通性检测方法及装置 |
CN107645401A (zh) * | 2016-07-22 | 2018-01-30 | 中兴通讯股份有限公司 | 多协议标签交换的检测、处理方法、装置及系统 |
CN109120449B (zh) * | 2018-08-28 | 2022-04-22 | 新华三技术有限公司 | 一种链路故障的检测方法及装置 |
-
2020
- 2020-02-27 CN CN202010123741.4A patent/CN113315701A/zh active Pending
- 2020-12-17 WO PCT/CN2020/137304 patent/WO2021169516A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136995A (zh) * | 2010-08-09 | 2011-07-27 | 华为技术有限公司 | Mpls与mpls-tp之间oam转换的方法及装置 |
CN102404145A (zh) * | 2011-11-17 | 2012-04-04 | 华为技术有限公司 | 多协议标签交换环网的检测方法、装置及系统 |
CN102571601A (zh) * | 2012-02-13 | 2012-07-11 | 中兴通讯股份有限公司 | 一种保证双向转发检测可靠性的方法及标记交换路径设备 |
CN107147508A (zh) * | 2016-03-01 | 2017-09-08 | 中兴通讯股份有限公司 | 故障检测方法及装置 |
US20180026880A1 (en) * | 2016-07-21 | 2018-01-25 | Cisco Technology, Inc. | Target fec (forwarding equivalence class) stack based fec query in segment routing environments |
Also Published As
Publication number | Publication date |
---|---|
CN113315701A (zh) | 2021-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10855574B2 (en) | Method and network device for computing forwarding path | |
US9832127B2 (en) | LSP ping/trace over MPLS networks using entropy labels | |
US10965590B2 (en) | Packet processing method and router | |
US10581732B2 (en) | Target FEC (forwarding equivalence class) stack based FEC query in segment routing environments | |
KR102397232B1 (ko) | 네트워크에서의 패킷을 송신하기 위한 방법 및 노드 | |
US11431633B2 (en) | Label forwarding entry generation method and apparatus, packet sending method and apparatus, and device | |
EP2911350B1 (en) | Neighbor-label distribution with label distribution protocol | |
JP6622922B2 (ja) | DSCP(Differentiated Services Code Point)およびECN(Explicit Congestion Notification)をモニタリングするデータプレーンのための方法および装置 | |
US9667517B2 (en) | Method and apparatus for checking connection of bi-directional LSP | |
US10764175B1 (en) | Validating resource isolation between network slices in a mobile network | |
US8971195B2 (en) | Querying health of full-meshed forwarding planes | |
WO2021232906A1 (zh) | 报文转发备份路径确定方法及相关设备 | |
CN103297340A (zh) | Mpls和bgp组网中的路由收敛方法和设备 | |
CN114650242A (zh) | 路径故障检测方法、装置、相关设备及存储介质 | |
US20210258242A1 (en) | Loop detection in multiprotocol label switching | |
WO2021169516A1 (zh) | 一种路径检测方法、电子设备及存储介质 | |
US11165695B1 (en) | Identifying egress of nil forward equivalency class (FEC) used for FEC hiding | |
CN114342334B (zh) | 用于标签交换路径路由跟踪的方法和网络节点 | |
CN110881006B (zh) | 发送报文的方法、网络设备及计算机存储介质 | |
CN113709033A (zh) | 用于分段路由流量工程的分段跟踪路由 | |
WO2022266905A1 (zh) | 一种转发路径生成方法、装置、网络设备及存储介质 | |
TW202029701A (zh) | 通信鏈路檢查方法 | |
WO2023173989A1 (zh) | 转发表的生成方法及装置、存储介质、电子装置 | |
WO2023030141A1 (zh) | 探测公网转发设备的方法、公网转发设备和存储介质 | |
WO2024001324A1 (zh) | 网络路径的检测方法、系统及计算机设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20921275 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20921275 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21/02/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20921275 Country of ref document: EP Kind code of ref document: A1 |