WO2022083563A1 - 链路检测方法、链路检测装置、终端设备和存储介质 - Google Patents

链路检测方法、链路检测装置、终端设备和存储介质 Download PDF

Info

Publication number
WO2022083563A1
WO2022083563A1 PCT/CN2021/124555 CN2021124555W WO2022083563A1 WO 2022083563 A1 WO2022083563 A1 WO 2022083563A1 CN 2021124555 W CN2021124555 W CN 2021124555W WO 2022083563 A1 WO2022083563 A1 WO 2022083563A1
Authority
WO
WIPO (PCT)
Prior art keywords
sending node
node
sending
response message
icmp
Prior art date
Application number
PCT/CN2021/124555
Other languages
English (en)
French (fr)
Inventor
赵路
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2022083563A1 publication Critical patent/WO2022083563A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular, to a link detection method, a link detection apparatus, a terminal device, and a storage medium.
  • VXLAN Virtual Extensible Local Area Network
  • NVO3 Network Virtualization over Layer 3
  • VTEPGROUP networking scenario has always been a popular solution in data center application scenarios.
  • an original VTEP node is physically dispersed into two entity nodes, and logically still appears as one node externally.
  • Two VTEP nodes provide services to users at the same time.
  • a VTEP node fails, another VTEP node provides services continuously.
  • One of the biggest features of VTEPGROUP's active-active networking is that it makes full use of resources and avoids waste caused by a VTEP being in an idle state all the year round.
  • VTEPGROUP's service capabilities are doubled. The second is that if one VTEP node fails in the active-active networking, the other VTEP node is still running, which is imperceptible to users.
  • a VXLAN virtual tunnel is established between the local VTEPGROUP and the peer node, resulting in ambiguity in the backhaul of ICMP packets.
  • a VTEP node in the VTEPGROUP initiates the Ping/Trace detection, and the ICMP response packet returned by the peer end returns to another VTEP node, but not to the VTEP node that initiated the detection, thus making the Ping/Trace detection fail.
  • the purpose of detecting the status of the network connection cannot be achieved.
  • the present disclosure provides a link detection method, a link detection apparatus, a terminal device and a storage medium.
  • an embodiment of the present disclosure provides a link detection method, which is applied to a second device.
  • the method includes: receiving an ICMP request message of a sending node in a first device, where the ICMP request message carries identity information of the sending node, the first device includes at least two VTEP nodes, and the sending node is any VTEP node; according to the ICMP request The message generates an ICMP response message, the ICMP response message includes the identity information of the sending node; the ICMP response message is sent to the target node in the first device, so that if the target node is inconsistent with the sending node, the target node will ICMP The response message is forwarded to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • an embodiment of the present disclosure provides a link detection method, which is applied to a first device, where the first device includes a sending node and a non-sending node, the non-sending node includes at least one VTEP node, and the sending node is any VTEP node.
  • the method includes: the sending node sends an ICMP request message to the second device, where the ICMP request message carries the identity information of the sending node; if the sending node does not receive the ICMP response message sent by the second device, and the ICMP response message contains If the carried identity information of the sending node does not match that of the non-sending node, the non-sending node forwards the ICMP response message to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • an embodiment of the present disclosure provides a link detection apparatus, which is provided in a second device.
  • the link detection device includes: a first receiving module configured to receive an ICMP request message of a sending node in a first device, where the ICMP request message carries identity information of the sending node, and the first device includes at least two VTEP nodes, The sending node is any VTEP node; the generating module is configured to generate an ICMP response message according to the ICMP request message, and the ICMP response message includes the identity information of the sending node; the first sending module is configured to send the ICMP response message to the first sending node.
  • the target node in a device so that if the target node is inconsistent with the sending node, the target node forwards the ICMP response message to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • an embodiment of the present disclosure provides a link detection apparatus, which is provided in a first device, where the first device includes a sending node and a non-sending node.
  • the sending node includes a second sending module configured to send an ICMP request message to the second device, where the ICMP request message carries the identity information of the sending node.
  • the non-sending node includes a second receiving module, configured to receive the ICMP response message sent by the second device, and the identity information of the sending node carried in the ICMP response message does not match the identity information of the non-sending node, then the non-sending node is not sent.
  • the node forwards the ICMP response message to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • the present disclosure provides a terminal device, including: one or more processors; and a storage device for storing one or more programs.
  • a terminal device including: one or more processors; and a storage device for storing one or more programs.
  • the one or more processors implement the link detection method provided by the embodiments of the present disclosure.
  • an embodiment of the present disclosure provides a storage medium, where a computer program is stored in the storage medium, and when the computer program is executed by a processor, any link detection method in the embodiment of the present disclosure is implemented.
  • FIG. 1 is a schematic flowchart of a link detection method provided by the present disclosure
  • FIG. 1a is a schematic diagram of the physical topology of the VTEPGROUP dual-active networking provided by the present disclosure
  • Figure 1b is a schematic diagram of the logical topology of the VTEPGROUP dual-active networking provided by the present disclosure
  • Fig. 1c is a schematic diagram of the extension fields of the ICMP request message and the ICMP response message provided by the present disclosure
  • 1d is a schematic diagram of correct forwarding of the ICMP response message reporting route provided by the present disclosure
  • Fig. 1e is a kind of forwarding schematic diagram of ICMP response message reporting route error provided by the present disclosure
  • FIG. 1f is a schematic diagram of forwarding of another ICMP response message reporting route error provided by the present disclosure
  • FIG. 2 is a schematic flowchart of another link detection method provided by the present disclosure.
  • FIG. 3 is a schematic structural diagram of a link detection apparatus provided by the present disclosure.
  • FIG. 4 is a schematic structural diagram of another link detection apparatus provided by the present disclosure.
  • FIG. 5 is a schematic structural diagram of a terminal device provided by the present disclosure.
  • VTEPGROUP VXLAN Tunnel Endpoints Group
  • VTEP group VXLAN Tunnel Endpoints Group
  • the original VTEP node is physically dispersed into at least two physical nodes, and logically still appears as one node externally.
  • Two VTEP nodes provide services to users at the same time.
  • a VTEP node fails, another VTEP node provides services continuously.
  • the system architecture of the dual-active networking scenario includes: a first device and a second device, the first device and the second device exchange data through ecmp routing, the first device includes at least two VTEP nodes, and the second device includes at least one VTEP node .
  • Figure 1a is a schematic diagram of the physical topology of the VTEPGROUP active-active networking.
  • the first device includes VTEP1 and VTEP2
  • the second device includes VTEP3
  • the virtual addresses of VTEP1 and VTEP2 are the same
  • the enterprise addresses of VTEP1 and VTEP2 are the same
  • VTEP1 and VTEP2 are connected through a backup link.
  • the method may be performed by a link detection apparatus, and the link detection apparatus may be implemented by software and/or hardware and integrated on a terminal device, and the terminal device may be a computer.
  • the link detection method provided by the present disclosure includes the following steps S110 , S120 and S130 .
  • S110 Receive an ICMP request message of a sending node in the first device, where the ICMP request message carries identity information of the sending node, the first device includes at least two VTEP nodes, and the sending node is any VTEP node.
  • the first device includes at least two VTEP (VXLAN Tunnel Endpoints, VXLAN tunnel endpoints) nodes, and the node that sends the ICMP (Internet Control Message Protocol, Internet Control Message Protocol) request message in the at least two VTEP nodes is the sending node.
  • VTEP VXLAN Tunnel Endpoints, VXLAN tunnel endpoints
  • ICMP Internet Control Message Protocol, Internet Control Message Protocol
  • ICMP is a sub-protocol of the TCP/IP protocol suite, used to transmit control messages between IP hosts and routers.
  • Control messages refer to the messages of the network itself, such as whether the network is reachable, whether the host is reachable, and whether the route is available. It is often used to judge whether the network connection status is normal and reachable. The method is Ping or Trace.
  • the VTEP is the edge device of the VXLAN network and is the start and end point of the VXLAN tunnel. The encapsulation and decapsulation of VXLAN packets is performed on this node.
  • a VTEP can be either an independent network device (such as a switch or router) or a server where the virtual machine is located.
  • the identity information of the sending node may be the MAC address of the sending node, or may be other information used to characterize the identity of the sending node, which is not limited in this embodiment of the present disclosure.
  • the sending node in the first device sends an ICMP request message to the second device, the second device receives the ICMP request message of the sending node, and the ICMP request message carries the identity information of the sending node.
  • the ICMP response message is generated by the second device according to the received ICMP request message.
  • the identity information of the sending node in the ICMP response message is to copy the identity information of the sending node in the ICMP request message to the ICMP response message.
  • identity information For example, if the identity information of the sending node in the ICMP response message is A, copy A into the ICMP request message.
  • the first device includes at least two VTEP nodes, and the nodes in the first device can be divided into sending nodes and non-sending nodes according to whether the nodes send response packets.
  • the target node can be a sending node or a non-sending node.
  • the determination method of the target node may be obtained through hash routing, or may be obtained through other node allocation methods, which is not limited in this embodiment of the present disclosure.
  • Whether the target node and the sending node are consistent can be determined by matching the identity information of the sending node carried in the ICMP response message with the identity information stored locally by the target node after the target node receives the ICMP response message. If the identity information of the sending node carried in the message matches the identity information stored locally on the target node, the target node and the sending node are consistent. If the identity information of the sending node carried in the ICMP response message matches the identity information stored locally on the target node If it does not match, it means that the target node and the sending node are inconsistent.
  • the second device sends the ICMP response message to the target node in the first device. If the target node is the sending node, after receiving the ICMP response message, the sending node according to the sending node in the ICMP response message The identity information of the sending node is matched with the identity information stored locally by the sending node.
  • the node matches the identity information of the sending node in the ICMP response message with the locally stored identity information of the non-sending node. If the identity information of the sending node in the ICMP response message does not match the identity information stored locally by the non-sending node, it means that the target node is inconsistent with the sending node, and the non-sending node forwards the ICMP response message to the sending node, which is sent by the sending node. The node determines that the link detection between the sending node and the second device is successful.
  • the ICMP response message is sent to the target node in the first device, so that if the target node is inconsistent with the sending node, the target node forwards the ICMP response message to the sending node, and the sending node determines the sending node
  • the link detection with the second device is successful, and this step includes: sending an ICMP response message to the target node in the first device, so that if the target node is inconsistent with the sending node, the target node will be based on the identity of the sending node.
  • the information determines the sending node, and forwards the ICMP response message to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • the method for determining the inconsistency between the target node and the sending node may be that after the target node receives the ICMP response message, matching is performed according to the identity information of the sending node carried in the ICMP response message and the locally stored identity information of the target node. If the identity information of the sending node carried in the ICMP response message does not match the identity information stored locally on the target node, it means that the target node and the sending node are inconsistent.
  • the sending node may be determined by querying a pre-established database table according to the identity information of the sending node to obtain the sending node corresponding to the sending node information. Or, query a pre-established database table according to the identity information of the sending node, and obtain the egress port information and node information corresponding to the sending node information. Alternatively, a pre-established database table is queried according to the identity information of the sending node, to obtain outgoing port information corresponding to the sending node information and the interface on the node. This embodiment of the present disclosure does not limit this.
  • the second device sends the ICMP response message to the target node in the first device. If the target node is inconsistent with the sending node, the target node determines the sending node according to the identity information of the sending node, and forwards the ICMP response message. For the sending node, the sending node determines that the link detection between the sending node and the second device is successful.
  • the above method further includes: sending an ICMP response message to the target node in the first device, so that if the target node is consistent with the sending node, the link detection between the sending node and the second device is determined. success.
  • the way of judging whether the target node is consistent with the sending node may be that after the target node receives the ICMP response message, matching is performed according to the identity information of the sending node carried in the ICMP response message and the locally stored identity information of the target node. If the identity information of the sending node carried in the ICMP response message matches the identity information stored locally on the target node, it means that the target node and the sending node are consistent.
  • the second device sends the ICMP response message to the target node in the first device, and if the target node is consistent with the sending node, it is determined that the link between the sending node and the second device is successfully detected.
  • the above method before sending the ICMP response message to the target node in the first device, the above method further includes: sending the ICMP response message to an equal-cost route, and determining the target through hash routing of the equal-cost route. node.
  • the anycast ip address of the VTEPGROUP establishes a VXLAN tunnel with the anycast ip address of the VTEP3 node.
  • the route to the anycast ip address of the VTEPGROUP is the ecmp route.
  • One member points to the VTEP1 node and the other member points to the VTEP2 node.
  • the virtual IPs of both nodes are anycast IP addresses, but the MAC addresses of the two nodes are different.
  • the identity information of the sending node includes: the MAC address of the sending node.
  • the virtual addresses of the at least two VTEP nodes are the same, the enterprise addresses of the at least two VTEP nodes are the same, and the at least two VTEP nodes are connected through a backup link.
  • the backup link between at least two VTEP nodes can be an underlay peerlink link or an overlay VXLAN bypass tunnel.
  • the difference is that the local MAC addresses of at least two VTEP nodes have different storage exits in the MAC table of the opposite VTEP node.
  • the former MAC table exit points to the peerlink port, and the latter MAC table exit points to the VXLAN bypass tunnel, which determines the packet encapsulation format between at least two VTEP nodes.
  • VTEP group VXLAN Tunnel Endpoints group
  • two VTEP nodes form a VTEP group, which implements the features of fault redundancy backup and traffic load balancing.
  • VTEP1 and VTEP2 form a VTEPGROUP system.
  • VTEPGROUP in order for VTEPGROUP to present the same service node to the outside world, it is also necessary to configure the same enterprise address Gateway ip1 on VTEP1 and VTEP2.
  • Two VTEP nodes are connected through a peerlink backup link.
  • the peer VTEP node that establishes the VXLAN tunnel with the VTEPGROUP can be either a single node or a VTEPGROUP.
  • the peer is a VTEP3 node, and the enterprise address Gateway ip2 is used.
  • the VXLAN tunnel encapsulates the original packet so that it can be transmitted on the bearer network (such as an IP network), and restores the original packet after decapsulation on the peer VTEP.
  • VXLAN tunnel is used to transmit VXLAN-encapsulated packets, and it is a virtual channel established between two VTEPs.
  • the anycast ip address of the VTEPGROUP establishes a VXLAN tunnel with the ip address of the VTEP3 node. Since VTEPGROUP is a logical node composed of VTEP1 node and VTEP2 node, it cannot be directly used for link detection such as Ping/Trace. In practical applications, only the actual physical VTEP node can be used as the main body to initiate Ping/Trace link detection.
  • Ping/Trace link detection is initiated from Gateway ip1 of VTEP1 to Gateway ip2 of VTEP3, and the egress is the VXLAN tunnel between VTEPGROUP and VTEP3.
  • the sent packets are divided into two layers, the outer layer is the VXLAN tunnel, and the inner layer is the ICMP request packet.
  • the VTEP3 node receives the ICMP request message and finds that the destination ip is Gateway ip2, which is its own enterprise address, it will re-encapsulate the Ping/Trace response message, and the exit is the VXLAN virtual tunnel between VTEP3 and VTEPGROUP.
  • the VXLAN virtual tunnel uses the VTEPGROUP's own anycast IP virtual address to establish a VXLAN tunnel with the peer VTEP node or VTEPGROUP, which is usually called a VXLAN virtual tunnel.
  • the sent packets are divided into two layers, the outer layer is the VXLAN virtual tunnel, and the inner layer is the ICMP response packet. Since the egress of the VXLAN virtual tunnel is an ecmp route, after hash route selection, if the selected route points to the VTEP1 node, the result of the Ping/Trace initiated by the VTEP1 node is successful. If the selected path points to the VTEP2 node, the result of the Ping/Trace initiated by VTEP1 fails because the ICMP reply message does not return to the VTEP1 node.
  • EVPN In a common EVPN (Ethernet Virtual Private Network, Ethernet VPN) scenario, EVPN transmits information such as MAC and ARP of network nodes by extending the MP-BGP protocol, and performs Layer 2/3 reporting through the generated MAC entries and routing entries. Forwarding of documents to achieve the purpose of WAN interconnection. Ping/Trace is used to detect the connectivity of the overlay IP address. Since the local VTEP node is a single node, there is no ambiguity in ICMP packets during the backhaul, and Ping/Trace detection can be performed normally.
  • EVPN Ethernet Virtual Private Network, Ethernet VPN
  • VTEPGROUP active-active networking scenario since a VXLAN virtual tunnel is established between the local VTEPGROUP and the peer node (which may be a VTEP node or the same VTEPGROUP), ICMP packets appear on the backhaul. Ambiguity. For example, it is a real VTEP node in the VTEPGROUP that initiates Ping/Trace detection, and the ICMP response packet returned by the peer returns to another real VTEP node, but not to the VTEP node that initiated the detection, so that the Ping/Trace detection fails. , the purpose of detecting the network connection status cannot be achieved.
  • the target node After receiving the ICMP response message, the target node determines whether the target node is based on the identity information of the sending node. for the sending node. If it is the sending node, the sending node determines that the link between the sending node and the second device is successfully detected. If it is not the sending node, the target node forwards the ICMP response message to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • the initiator's local MAC field is added to the ICMP request message and the ICMP response message.
  • the MAC field in the ICMP request message is the local MAC address of the sending node.
  • the MAC field in the ICMP response packet is directly copied from the ICMP request packet to the ICMP response packet.
  • the target node needs to determine whether the MAC address carried in the message is the MAC address of the local node. If yes, it means that this node is the sending node of Ping/Trace link detection, and the link detection is successful.
  • this node is not the sending node of Ping/Trace link detection, and the real sending node is another VTEP node that belongs to the same VTEP group as this VTEP node.
  • the local MAC of the two VTEP nodes can be learned from each other through the peerlink port.
  • the MAC address in the ICMP response packet is queried through the MAC table to obtain the outgoing port information and vlan information.
  • the found outgoing port is the peerlink port, vlan It is the interface vlan on the peer VTEP node.
  • the packet is encapsulated and sent out through the peerlink port.
  • the peer VTEP node After the peer VTEP node receives it, it detects the MAC in the ICMP response packet, which is the local MAC, and the Ping/Trace link detection is successful.
  • the embodiment of the present disclosure expands the fields of the ICMP request message and the ICMP response message, adds a MAC address field that identifies the sending node, and clearly records the location of the sending node in this Ping/Trace link detection.
  • the receiving end of the ICMP response message checks the MAC address in the message to confirm whether the sending node is itself. If not, check the MAC table and forward the message to the sending node.
  • VTEPGROUP it is compatible with different connection methods between two VTEP nodes. At the protocol level, it is compatible with V4's ICMP and V6's ICMPv6 protocols.
  • Step S401 VTEP1 initiates Ping/Trace link detection, the source ip is Gateway ip1, the destination ip is Gateway ip2, and the egress is the VXLAN virtual tunnel established by the VTEPGROUP and VTEP3 nodes.
  • the local MAC address 0000.0000.0001 of the sending node is added to identify the sending node.
  • Step S402 After receiving the ICMP request message, the VTEP3 node replies with an ICMP response message, and the MAC field in the response message is directly copied from the ICMP request message. After the hash route selection of the ecmp route, the member route that points to the VTEP1 node is determined, and the destination MAC address is 0000.0000.0001. After the VTEP1 node receives the ICMP response message, it detects the MAC address 0000.0000.0001 of the sending node carried in it and finds that it belongs to the local area, then the Ping/Trace link detection is successful.
  • VTEP1 Since the destination of the ICMP response packet replied on VTEP3 is VTEP1, which is the initiator of this link detection, VTEP1 does not need to forward the ICMP response packet, but can process it directly.
  • FIG. 1e is a schematic diagram of forwarding of an ICMP response message reporting route error.
  • Step S501 VTEP1 initiates Ping/Trace link detection, the source ip is Gateway ip1, the destination ip is Gateway ip2, and the egress is the VXLAN virtual tunnel established by the VTEPGROUP and VTEP3 nodes.
  • the local MAC address 0000.0000.0001 is added to identify the sending node.
  • Step S502 after receiving the ICMP request message, the VTEP3 node replies with the ICMP response message, and the MAC field in the ICMP response message is directly copied from the ICMP request message.
  • the member route that points to the VTEP2 node is determined, and the destination MAC address is 0000.0000.0002.
  • Step S503 after the VTEP2 node receives the ICMP response message, it detects the MAC address of the sending node carried in it, and finds that it does not belong to the local area. Then, the outgoing interface of the MAC address 0000.0000.0001 of the sending node is queried through the MAC table. Sent to the peerlink port. After the VTEP1 node receives the ICMP response message, it detects the MAC address 0000.0000.0001 of the sending node carried in it and finds that it belongs to the local area, then the Ping/Trace link detection is successful.
  • VTEP2 Since the destination of the ICMP response message replied on VTEP3 is VTEP2, which is not the sending node of this link detection, VTEP2 needs to forward the ICMP response message by MAC and send it to the real link detection sending node VTEP1.
  • FIG. 1f is another schematic diagram of forwarding of an ICMP response message reporting route error.
  • Step S601 VTEP1 initiates Ping/Trace link detection, the source ip is Gateway ip1, the destination ip is Gateway ip2, and the egress is the VXLAN virtual tunnel established by the VTEPGROUP and VTEP3 nodes.
  • the local MAC address 0000.0000.0001 is added to identify the sending node.
  • Step S602 after receiving the ICMP request message, the VTEP3 node replies with the ICMP response message, and the MAC field in the ICMP response message is directly copied from the ICMP request message.
  • the member route that points to the VTEP2 node is determined, and the destination MAC address is 0000.0000.0002.
  • Step S603 after receiving the ICMP response message, the VTEP2 node detects the MAC address of the sending node carried in it, and finds that it does not belong to the local area, and then queries the outgoing interface of the initiator's MAC address 0000.0000.0001 through the MAC table as a VXLAN bypass tunnel. Sent to the VXLAN bypass tunnel. After the VTEP1 node receives the ICMP response message, it detects the MAC address 0000.0000.0001 of the sending node carried in it and finds that it belongs to the local area, then the Ping/Trace link detection is successful.
  • the packet Since the MAC table is searched on VTEP2 and the outgoing interface is a VXLAN bypass tunnel, the packet needs to be encapsulated by the VXLAN bypass tunnel before it can be sent to the VTEP1 node correctly.
  • FIG. 2 is a schematic flowchart of another link detection method provided by the present disclosure, and the method can be applied to the situation of link detection in a VTEPGROUP (VXLAN Tunnel Endpoints Group, VTEP group) dual-active networking scenario.
  • the method is applied to a first device including a sending node and a non-sending node.
  • the non-sending node includes at least one VTEP node, and the sending node is any VTEP node.
  • the method may be performed by a link detection apparatus, and the link detection apparatus may be implemented by software and/or hardware and integrated on a terminal device, and the terminal device may be a computer.
  • the link detection method provided by the present disclosure includes steps S210, S220 and S230.
  • the sending node sends an ICMP request message to the second device, where the ICMP request message carries the identity information of the sending node.
  • the sending node is the node that sends the ICMP request message.
  • the identity information of the sending node may be the MAC address of the sending node, or may be other information used to characterize the identity of the sending node, which is not limited in this embodiment of the present disclosure.
  • the sending node in the first device sends an ICMP request message to the second device, where the ICMP request message carries the identity information of the sending node.
  • the non-sending node receives the ICMP response message sent by the second device, and the identity information of the sending node carried in the ICMP response message does not match the identity information of the non-sending node, the non-sending node forwards the ICMP response message For the sending node, the sending node determines that the link detection between the sending node and the second device is successful.
  • the second device includes at least one VTEP node.
  • the sending node may be determined by querying a pre-established database table according to the identity information of the sending node to obtain the sending node corresponding to the sending node information. Or, query a pre-established database table according to the identity information of the sending node, and obtain the egress port information and node information corresponding to the sending node information. Alternatively, a pre-established database table is queried according to the identity information of the sending node, to obtain outgoing port information corresponding to the sending node information and the interface on the node. This embodiment of the present disclosure does not limit this.
  • the non-sending node forwards the ICMP response message to the sending node in a manner that the non-sending node determines the sending node according to the identity information of the sending node carried in the ICMP response message, and the non-sending node forwards the ICMP response message to the sending node. Or, the non-sending node determines the outgoing port information and node information according to the identity information of the sending node carried in the ICMP response message. Or, the non-sending node determines the backup link interface and the interface on the sending node according to the identity information of the sending node carried in the ICMP response message. This embodiment of the present disclosure does not limit this.
  • the first device includes a sending node A and a non-sending node B, if the non-sending node B receives the ICMP response message sent by the second device, and the identity information of the sending node A and the non-sending node A carried in the ICMP response message If the identity information of the node B does not match, the sending node A is determined according to the identity information of the sending node A carried in the CMP response message, and the non-sending node B forwards the ICMP response message to the sending node A.
  • the above method further includes: if the sending node receives the ICMP response message sent by the second device, and the identity information of the sending node carried in the ICMP response message matches the identity information of the sending node, determining the sending node The link detection with the second device is successful.
  • the ICMP response message is generated by the second device according to the received ICMP request message.
  • the identity information of the sending node in the ICMP response message is to copy the identity information of the sending node in the ICMP request message to the ICMP response message.
  • identity information For example, if the identity information of the sending node in the ICMP response message is A, copy A into the ICMP request message.
  • the first device includes a sending node A and a non-sending node B. If the sending node A receives the ICMP response message sent by the second device, and the ICMP response message carries the identity information of the sending node A and the sending node If the identity information stored locally by A matches, it is determined that the link detection between the sending node A and the second device is successful.
  • VTEP1 initiates Ping/Trace link detection
  • the source IP is Gateway ip1
  • the destination IP is Gateway ip2
  • the egress is the VXLAN virtual tunnel established between VTEPGROUP and VTEP3 nodes.
  • the inner layer ICMP request message the local MAC address 0000.0000.0001 of the sending node is added to identify the sending node.
  • the VTEP3 node replies with an ICMP response message.
  • the MAC field in the ICMP response message is directly copied from the ICMP request message.
  • the member route that points to the VTEP1 node is determined, and the destination MAC address is 0000.0000.0001.
  • the VTEP1 node receives the ICMP response message, it detects the MAC address 0000.0000.0001 of the sending node carried in it and finds that it belongs to the local area, then the Ping/Trace link detection is successful.
  • the non-sending node if the non-sending node receives the ICMP response message sent by the second device, and the identity information of the sending node carried in the ICMP response message does not match the identity information of the non-sending node, the non-sending node sends the ICMP The response message is forwarded to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • This step includes: if the sending node does not receive the ICMP response message sent by the second device, and the ICMP response message If the identity information of the sending node carried in the text does not match the identity information of the non-sending node, obtain the outgoing port information and node information corresponding to the identity information of the transmitting node; It is forwarded to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • the port information may be a peerlink port or a VXLAN bypass tunnel, which is not limited in this embodiment of the present disclosure.
  • the node information may be the interface vlan on the VTEP node, or may be other information representing the location of the sending node, which is not limited in this embodiment of the present disclosure.
  • the identity information of the sending node includes: the MAC address of the sending node.
  • this step includes: if the non-sending node receives the ICMP response message sent by the second device, and the MAC address of the sending node and the MAC address of the non-sending node carried in the ICMP response message If it does not match, the MAC table is queried according to the identity information of the sending node, and the egress port information and node information corresponding to the identity information of the sending node are obtained.
  • the non-sending node receives the ICMP response message sent by the second device, and the MAC address of the sending node carried in the ICMP response message does not match the MAC address of the non-sending node, then according to the identity information of the sending node Querying the MAC table to obtain outgoing port information and node information corresponding to the identity information of the sending node.
  • This step includes: if the sending node does not receive the ICMP response message sent by the second device, and the ICMP response message carries the sending node's identity information If the MAC address does not match the MAC address of the non-sending node, query the MAC table according to the identity information of the sending node to obtain the backup link interface and the interface on the sending node corresponding to the identity information of the sending node.
  • the second device includes at least one VTEP node.
  • VTEP1 initiates Ping/Trace link detection
  • the source IP is Gateway ip1
  • the destination IP is Gateway ip2
  • the egress is the VXLAN virtual tunnel established between VTEPGROUP and VTEP3 nodes.
  • the inner layer ICMP request message the local MAC address 0000.0000.0001 is added to identify the sending node.
  • the VTEP3 node replies with an ICMP response message.
  • the MAC field in the ICMP response message is directly copied from the ICMP request message.
  • the member route that points to the VTEP2 node is determined, and the destination MAC address is 0000.0000.0002.
  • the VTEP2 node After the VTEP2 node receives the ICMP response message, it detects the MAC address of the sending node carried in it, and finds that it does not belong to the local area. Then it queries the MAC table of the sending node's MAC address. The outgoing interface of 0000.0000.0001 is the peerlink port, and the message is sent to the peerlink. mouth. After the VTEP1 node receives the ICMP response message, it detects the MAC address 0000.0000.0001 of the sending node carried in it and finds that it belongs to the local area, then the Ping/Trace link detection is successful.
  • VTEP2 Since the destination of the ICMP response message replied on VTEP3 is VTEP2, which is not the sending node of this link detection, VTEP2 needs to forward the ICMP response message by MAC and send it to the real link detection sending node VTEP1.
  • VTEP1 initiates Ping/Trace link detection
  • the source IP is Gateway ip1
  • the destination IP is Gateway ip2
  • the egress is the VXLAN virtual tunnel established between VTEPGROUP and VTEP3 nodes.
  • the inner layer ICMP request message the local MAC address 0000.0000.0001 is added to identify the sending node.
  • the VTEP3 node replies with an ICMP response message.
  • the MAC field in the ICMP response message is copied directly from the ICMP request message.
  • the member route that points to the VTEP2 node is determined, and the destination MAC address is 0000.0000.0002.
  • the VTEP2 node After the VTEP2 node receives the ICMP response packet, it detects the MAC address of the sending node carried in it and finds that it does not belong to the local area. Then, the outgoing interface of the initiator's MAC address 0000.0000.0001 is queried through the MAC table, and the outgoing interface is the VXLAN bypass tunnel, and the packet is sent to the VXLAN. bypass tunnel. After the VTEP1 node receives the ICMP response message, it detects the MAC address 0000.0000.0001 of the sending node carried in it, and finds that it belongs to the local area, then the Ping/Trace link detection is successful. Since the MAC table is searched on VTEP2, and the outgoing interface is a VXLAN bypass tunnel, the packet needs to be encapsulated by the VXLAN bypass tunnel before it can be correctly sent to the VTEP1 node.
  • FIG. 3 is a schematic structural diagram of a link detection apparatus provided by the present disclosure, and the apparatus is configured in a terminal device.
  • the link detection apparatus is provided in the second device, and the link detection apparatus includes a first receiving module 310 , a generating module 320 and a first sending module 330 .
  • the first receiving module 310 is configured to receive an ICMP request message of a sending node in a first device, where the ICMP request message carries identity information of the sending node, the first device includes at least two VTEP nodes, and the sending node is any VTEP node.
  • the generating module 320 is configured to generate an ICMP response message according to the ICMP request message, where the ICMP response message includes the identity information of the sending node.
  • the first sending module 330 is configured to send the ICMP response message to the target node in the first device, so that if the target node is inconsistent with the sending node, the target node forwards the ICMP response message to the sending node, and the sending node determines to send the message.
  • the link detection between the node and the second device is successful.
  • the link detection apparatus provided in this embodiment is used to implement the link detection method of the embodiment of the present disclosure.
  • the implementation principle and technical effect of the link detection apparatus provided in this embodiment are similar to the link detection method of the embodiment of the present disclosure. No longer.
  • the first sending module is configured to send the ICMP response message to the target node in the first device, so that if the target node is inconsistent with the sending node, the target node determines the sending node according to the identity information of the sending node, The ICMP response message is forwarded to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • the above-mentioned link detection apparatus further includes a first determining module configured to send the ICMP response message to the target node in the first device, so that if the target node is consistent with the sending node, the sending node is determined to be the same as the sending node.
  • the link detection between the second devices succeeds.
  • the above-mentioned link detection apparatus further includes a second determination module, configured to send the ICMP response message to the equal-cost route before sending the ICMP response message to the target node in the first device, and after sending the ICMP response message to the equal-cost route, etc.
  • the hash of the price route selects the route to determine the target node.
  • the identity information of the sending node includes: the MAC address of the sending node.
  • the virtual addresses of the at least two VTEP nodes are the same, the enterprise addresses of the at least two VTEP nodes are the same, and the at least two VTEP nodes are connected through a backup link.
  • FIG. 4 is a schematic structural diagram of another link detection apparatus provided by the present disclosure, and the apparatus is configured in a terminal device.
  • the link detection apparatus is provided in the first device, and the link detection apparatus includes a sending node and a non-sending node.
  • the sending node includes a second sending module 410, and the non-sending node includes a second receiving module 420;
  • the second sending module 410 is configured to send an ICMP request message to the second device, where the ICMP request message carries the identity information of the sending node.
  • the second receiving module 420 is configured so that if the ICMP response message sent by the second device is received, and the identity information of the sending node carried in the ICMP response message does not match the identity information of the non-sending node, the non-sending node responds with ICMP The packet is forwarded to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • the link detection apparatus provided in this embodiment is used to implement the link detection method of the embodiment of the present disclosure.
  • the implementation principle and technical effect of the link detection apparatus provided in this embodiment are similar to the link detection method of the embodiment of the present disclosure. No longer.
  • the above-mentioned non-sending node further includes a third receiving module configured to receive an ICMP response message sent by the second device, and the identity information of the sending node and the identity information of the sending node carried in the ICMP response message If they match, it is determined that the link detection between the sending node and the second device is successful.
  • the second receiving module is further configured so that if the non-sending node receives the ICMP response message sent by the second device, and the identity information of the sending node carried in the ICMP response message does not match the identity information of the non-sending node , the egress port information and node information corresponding to the identity information of the sending node are obtained.
  • the non-sending node forwards the ICMP response message to the sending node according to the egress port information and the node information, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • the identity information of the sending node includes: the MAC address of the sending node.
  • the second receiving module is further configured so that if the non-sending node receives the ICMP response message sent by the second device, and the MAC address of the sending node carried in the ICMP response message does not match the MAC address of the non-sending node , the MAC table is queried according to the identity information of the sending node, and the egress port information and node information corresponding to the identity information of the sending node are obtained.
  • the second receiving module is further configured so that if the non-sending node receives the ICMP response message sent by the second device, and the MAC address of the sending node carried in the ICMP response message does not match the MAC address of the non-sending node , the MAC table is queried according to the identity information of the sending node, and the backup link interface corresponding to the identity information of the sending node and the interface on the sending node are obtained.
  • the second device includes at least one VTEP node.
  • FIG. 5 is a schematic structural diagram of a terminal device provided by the present disclosure.
  • the terminal device provided by the present disclosure includes one or more processors 51 and storage devices 52 .
  • a processor 51 is taken as an example in FIG. 5 .
  • the storage device 52 is configured to store one or more programs. When the one or more programs are executed by the one or more processors 51 , the one or more processors 51 implement the method as described in FIG. 1 in the embodiment of the present disclosure.
  • the terminal device also includes a communication device 53 , an input device 54 and an output device 55 .
  • the processor 51 , the storage device 52 , the communication device 53 , the input device 54 and the output device 55 in the terminal device may be connected by a bus or in other ways, and the connection by a bus is taken as an example in FIG. 5 .
  • the input device 54 may be configured to receive input numerical or character information, and to generate key signal input related to user settings and function control of the terminal device.
  • the output device 55 may include a display terminal device such as a display screen.
  • the communication device 53 may include a receiver and a transmitter.
  • the communication device 53 is configured to perform information transceiving and communication according to the control of the processor 51 .
  • the information includes, but is not limited to, uplink authorization information.
  • the storage device 52 can be configured to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the link detection method in FIG. the first receiving module 310, the generating module 320, and the first sending module 330); or program instructions/modules corresponding to the link detection method described in FIG. 2 in the embodiment of the present disclosure (for example, the second sending module in the link detection apparatus module 410 and the second receiving module 420).
  • the storage device 52 may include a storage program area and a storage data area, and the storage program area may store an operating system and an application program required for at least one function.
  • the storage data area can store data or the like created according to the use of the terminal device.
  • storage device 52 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
  • the storage device 52 may further include memories located remotely from the processor 51, and these remote memories may be connected to the terminal device through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • Embodiments of the present disclosure also provide a storage medium, where the storage medium stores a computer program.
  • the method includes: receiving an ICMP request message of a sending node in a first device, where the ICMP request message carries identity information of the sending node, the first device includes at least two VTEP nodes, and the sending node is any VTEP node; according to the ICMP request The message generates an ICMP response message, the ICMP response message includes the identity information of the sending node; the ICMP response message is sent to the target node in the first device, so that if the target node is inconsistent with the sending node, the target node will ICMP The response message is forwarded to the sending node, and the sending node determines that the link between the sending node and the second device is successfully detected.
  • the link detection method described in the embodiment of the present disclosure includes: the sending node sends an ICMP request message to the second device, where the ICMP request message carries the identity information of the sending node ; If the non-sending node receives the ICMP response message sent by the second device, and the identity information of the sending node carried in the ICMP response message does not match the identity information of the non-sending node, then the non-sending node forwards the ICMP response message to The sending node, the sending node determines that the link between the sending node and the second device is successfully detected.
  • the computer storage media of the embodiments of the present disclosure may employ any combination of one or more computer-readable media.
  • the computer-readable medium may be a computer-readable signal medium or a computer-readable storage medium.
  • Computer-readable storage media may include, but are not limited to, electrical, magnetic, optical, electromagnetic, infrared, or semiconductor systems, apparatuses, or devices, or any combination thereof, for example.
  • Computer readable storage media include: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read only memory (Read Only Memory, ROM), erasable programmable read only memory (Erasable Programmable Read Only Memory, EPROM), flash memory, optical fiber, portable CD-ROM, optical storage device, magnetic storage device or any suitable combination of the above.
  • a computer-readable storage medium can be any tangible medium that contains or stores a program that can be used by or in connection with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a propagated data signal in baseband or as part of a carrier wave, with computer-readable program code embodied thereon. Such propagated data signals may take a variety of forms including, but not limited to, electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium can also be any computer-readable medium other than a computer-readable storage medium that can transmit, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device .
  • Program code embodied on a computer-readable medium may be transmitted using any suitable medium, including but not limited to: wireless, wire, optical fiber cable, radio frequency (RF), etc., or any suitable combination of the foregoing.
  • suitable medium including but not limited to: wireless, wire, optical fiber cable, radio frequency (RF), etc., or any suitable combination of the foregoing.
  • Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including object-oriented programming languages, such as Java, Smalltalk, C++, and conventional procedural A programming language, such as the "C" language or similar programming language.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (eg, using an Internet service provider to via Internet connection).
  • LAN local area network
  • WAN wide area network
  • user terminal equipment encompasses any suitable type of wireless user terminal equipment, such as mobile telephones, portable data processing devices, portable web browsers or vehicle mounted mobile stations.
  • various embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic, or any combination thereof.
  • some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor or other computing device, although the disclosure is not limited thereto.
  • Embodiments of the present disclosure may be implemented by the execution of computer program instructions by a data processor of a mobile device, eg, in a processor entity, or by hardware, or by a combination of software and hardware.
  • Computer program instructions may be assembly instructions, Instruction Set Architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or written in any combination of one or more programming languages source or object code.
  • ISA Instruction Set Architecture
  • the block diagrams of any logic flow in the figures of the present disclosure may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions.
  • Computer programs can be stored on memory.
  • the memory may be of any type suitable for the local technical environment and may be implemented using any suitable data storage technology, such as, but not limited to, Read-Only Memory (ROM), Random Access Memory (RAM), optical Memory devices and systems (Digital Video Disc (DVD) or Compact Disk (CD)), etc.
  • Computer-readable media may include non-transitory storage media.
  • the data processor may be of any type suitable for the local technical environment, such as, but not limited to, a general purpose computer, a special purpose computer, a microprocessor, a Digital Signal Processing (DSP), an Application Specific Integrated Circuit (ASIC) ), programmable logic devices (Field-Programmable Gate Array, FGPA) and processors based on multi-core processor architecture.
  • DSP Digital Signal Processing
  • ASIC Application Specific Integrated Circuit
  • FGPA programmable logic devices
  • processors based on multi-core processor architecture.
  • the sending node is found according to the identity information of the sending node carried in the message, and then the sending node determines the relationship between the sending node and the second device.
  • the link detection can solve the problem of ambiguity in the backhaul of ICMP packets due to the VXLAN virtual tunnel established between the local VTEPGROUP and the peer node.
  • the Ping/Trace detection is initiated by a VTEP node in the VTEPGROUP, and the ICMP response packet returned by the peer returns to another VTEP node, but not to the VTEP node that initiated the detection, thus making the Ping/Trace detection fail.
  • the link between the sending node and the second device can be detected by the sending node.

Abstract

本公开公开一种链路检测方法、装置、终端设备和存储介质。该方法包括:接收第一设备中发送节点的ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息,第一设备包括至少两个VTEP节点,发送节点为任意VTEP节点;根据ICMP请求报文生成ICMP应答报文,该ICMP应答报文包括发送节点的身份信息;将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。

Description

链路检测方法、链路检测装置、终端设备和存储介质
相关申请的交叉引用
本申请要求享有2020年10月19日提交的名称为“链路检测方法、装置、设备和存储介质”的中国专利申请CN202011118176.9的优先权,其全部内容通过引用并入本申请中。
技术领域
本公开涉及通信技术领域,尤其涉及链路检测方法、链路检测装置、终端设备和存储介质。
背景技术
虚拟机数量的快速增长与虚拟机迁移业务的日趋频繁,给传统的“二层+三层”数据中心网络带来了新的挑战。VXLAN(Virtual Extensible Local Area Network,虚拟扩展局域网)是由IETF定义的NVO3(Network Virtualization over Layer 3)标准技术之一,采用MAC-in-UDP的报文封装模式,将二层报文用三层协议进行封装,可实现二层网络在三层范围内进行扩展,同时满足数据中心大二层虚拟迁移和多租户的需求。
VTEPGROUP组网场景在数据中心应用场景上一直是比较热门的解决方案。在该工作模式下,将原有的一个VTEP节点物理上分散为两个实体节点,逻辑上依然对外表现为一个节点。两个VTEP节点同时为用户提供服务,当某个VTEP节点出现问题时,由另一个VTEP节点来持续的提供服务。VTEPGROUP双活组网最大的特点之一是充分利用资源,避免了一个VTEP常年处于闲置状态而造成浪费。通过资源整合,VTEPGROUP的服务能力是双倍的。其二是双活组网中如果一个VTEP节点故障,另外一个VTEP节点还在运行,对用户来说是不可感知的。
在VTEPGROUP双活组网场景中,由于本端VTEPGROUP与对端节点之间建立的是VXLAN虚隧道,导致ICMP报文在回程时出现了歧义性。比如:发起Ping/Trace检测的是VTEPGROUP中的一个VTEP节点,而对端返回的ICMP应答报文回到了另一个VTEP节点,而没有回到发起检测的VTEP节点,从而使得Ping/Trace检测失败,无法达到检测网络连接状况的目的。
发明内容
为解决上述技术问题,本公开提供链路检测方法、链路检测装置、终端设备和存储介 质。
第一方面,本公开实施例提供一种链路检测方法,应用于第二设备。
该方法包括:接收第一设备中发送节点的ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息,第一设备包括至少两个VTEP节点,发送节点为任意VTEP节点;根据ICMP请求报文生成ICMP应答报文,该ICMP应答报文包括发送节点的身份信息;将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
第二方面,本公开实施例提供一种链路检测方法,应用于第一设备,该第一设备包括发送节点和非发送节点,非发送节点包括至少一个VTEP节点,发送节点为任意VTEP节点。
该方法包括:发送节点向第二设备发送ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息;若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则非发送节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
第三方面,本公开实施例提供一种链路检测装置,设置于第二设备。
该链路检测装置包括:第一接收模块,配置为接收第一设备中发送节点的ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息,第一设备包括至少两个VTEP节点,发送节点为任意VTEP节点;生成模块,配置为根据ICMP请求报文生成ICMP应答报文,该ICMP应答报文包括发送节点的身份信息;第一发送模块,配置为将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
第四方面,本公开实施例提供一种链路检测装置,设置于第一设备,该第一设备包括发送节点和非发送节点。发送节点包括第二发送模块,配置为向第二设备发送ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息。非发送节点包括第二接收模块,配置为若接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则非发送节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
第五方面,本公开提供了一种终端设备,包括:一个或多个处理器;以及存储装置,用于存储一个或多个程序。当一个或多个程序被一个或多个处理器执行,使得一个或多个处理器实现如本公开实施例提供的链路检测方法。
第六方面,本公开实施例提供了一种存储介质,该存储介质存储有计算机程序,计算 机程序被处理器执行时实现本公开实施例中的任意一种链路检测方法。
关于本公开的以上实施例和其他方面以及其实现方式,在附图说明、具体实施方式和权利要求中提供更多说明。
附图说明
图1是本公开提供的一种链路检测方法的流程示意图;
图1a是本公开提供的VTEPGROUP双活组网物理拓扑示意图;
图1b是本公开提供的VTEPGROUP双活组网逻辑拓扑示意图;
图1c是本公开提供的ICMP请求报文和ICMP应答报文扩展字段示意图;
图1d是本公开提供的ICMP应答报文回报路线正确的转发示意图;
图1e是本公开提供的一种ICMP应答报文回报路线错误的转发示意图;
图1f是本公开提供的另一种ICMP应答报文回报路线错误的转发示意图;
图2是本公开提供的另一种链路检测方法的流程示意图;
图3为本公开提供的一种链路检测装置的结构示意图;
图4为本公开提供的另一种链路检测装置的结构示意图;
图5为本公开提供的一种终端设备的结构示意图。
具体实施方式
为使本公开的目的、技术方案和优点更加清楚明白,下文中将结合附图对本公开的实施例进行详细说明。需要说明的是,在不冲突的情况下,本公开中的实施例及实施例中的特征可以相互任意组合。
在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
图1为本公开提供的一种链路检测方法的流程示意图,该方法可以适用于在VTEPGROUP(VXLAN Tunnel Endpoints Group,VTEP组)双活组网场景中链路检测的情况。在双活组网场景下,将原有的一个VTEP节点,物理上分散为至少两个实体节点,逻辑上依然对外表现为一个节点。两个VTEP节点同时为用户提供服务,当某个VTEP节点出现问题时,由另一个VTEP节点来持续的提供服务。双活组网场景的系统架构包括:第 一设备和第二设备,第一设备和第二设备通过ecmp路由进行数据交互,第一设备包括至少两个VTEP节点,第二设备包括至少一个VTEP节点。如图1a所示,图1a为VTEPGROUP双活组网物理拓扑示意图。图中,第一设备包括VTEP1和VTEP2,第二设备包括VTEP3,VTEP1和VTEP2的虚地址相同,VTEP1和VTEP2的企业地址相同,VTEP1和VTEP2通过备份链路相连。该方法可以由链路检测装置执行,该链路检测装置可以由软件和/或硬件实现,并集成在终端设备上,该终端设备可以为计算机。
如图1所示,本公开提供的链路检测方法包括如下步骤S110、S120和S130。
S110、接收第一设备中发送节点的ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息,第一设备包括至少两个VTEP节点,发送节点为任意VTEP节点。
第一设备包括至少两个VTEP(VXLAN Tunnel Endpoints,VXLAN隧道端点)节点,至少两个VTEP节点中发送ICMP(Internet Control Message Protocol,Internet控制报文协议)请求报文的节点为发送节点。
ICMP是TCP/IP协议簇的一个子协议,用于在IP主机、路由器之间传递控制消息。控制消息是指网络通不通、主机是否可达、路由是否可用等网络本身的消息。经常用于判断网络连接状况是否正常可达。方式为Ping或者Trace。
VTEP为VXLAN网络的边缘设备,是VXLAN隧道的起点和终点,VXLAN报文的封装、解封装是在这个节点上执行的。VTEP既可以是独立的网络设备(比如交换机或者路由器),也可以是虚拟机所在的服务器。
发送节点的身份信息可以为发送节点的MAC地址,也可以为其他用于表征发送节点身份的信息,本公开实施例对此不进行限制。
示例性的,第一设备中的发送节点向第二设备发送ICMP请求报文,第二设备接收发送节点的ICMP请求报文,ICMP请求报文中携带发送节点的身份信息。
S120、根据ICMP请求报文生成ICMP应答报文,该ICMP应答报文包括发送节点的身份信息。
ICMP应答报文为第二设备根据接收到的ICMP请求报文生成的,ICMP应答报文中的发送节点的身份信息为将ICMP请求报文中的发送节点的身份信息拷贝至ICMP应答报文中的身份信息。例如,若ICMP应答报文中的发送节点的身份信息为A,则将A拷贝至ICMP请求报文中。
S130、将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第 二设备之间的链路检测成功。
第一设备包括至少两个VTEP节点,根据节点是否发送应答报文,可以将第一设备中的节点分为发送节点和非发送节点。目标节点可以为发送节点,也可以为非发送节点。
目标节点的确定方式可以为经过hash选路得到的,也可以为通过其他节点分配方式得到,本公开实施例对此不进行限制。
目标节点与发送节点是否一致的判断方式可以为在目标节点接收到ICMP应答报文后,根据ICMP应答报文中携带的发送节点的身份信息和目标节点本地存储的身份信息进行匹配,若ICMP应答报文中携带的发送节点的身份信息和目标节点本地存储的身份信息匹配,则说明目标节点和发送节点一致,若ICMP应答报文中携带的发送节点的身份信息和目标节点本地存储的身份信息不匹配,则说明目标节点和发送节点不一致。
示例性的,第二设备将ICMP应答报文发送至第一设备中的目标节点,若目标节点为发送节点,则发送节点在接收到ICMP应答报文后,根据ICMP应答报文中的发送节点的身份信息和发送节点在本地存储的身份信息进行匹配。若ICMP应答报文中的发送节点的身份信息和发送节点在本地存储的身份信息匹配,则确定发送节点和第二设备之间的链路检测成功,若目标节点为非发送节点,则非发送节点在接收到ICMP应答报文后,根据ICMP应答报文中的发送节点的身份信息和非发送节点在本地存储的身份信息进行匹配。若ICMP应答报文中的发送节点的身份信息和非发送节点在本地存储的身份信息不匹配,则说明目标节点与发送节点不一致,则非发送节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
在上述实施例的基础上,提出了上述实施例的变型实施例,在此需要说明的是,为了使描述简要,在变型实施例中仅描述与上述实施例的不同之处。
在一个实施例中,将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功,这一步骤包括:将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点根据发送节点的身份信息确定发送节点,并将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
目标节点与发送节点不一致的确定方式可以为在目标节点接收到ICMP应答报文后,根据ICMP应答报文中携带的发送节点的身份信息和目标节点本地存储的身份信息进行匹配。若ICMP应答报文中携带的发送节点的身份信息和目标节点本地存储的身份信息不匹配,则说明目标节点和发送节点不一致。
发送节点的确定方式可以为根据发送节点的身份信息查询预先建立的数据库表,得到与发送节点信息对应的发送节点。或者,根据发送节点的身份信息查询预先建立的数据库表,得到与发送节点信息对应的出端口信息和节点信息。或者,根据发送节点的身份信息查询预先建立的数据库表,得到与发送节点信息对应的出端口信息和节点上的接口。本公开实施例对此不进行限制。
示例性的,第二设备将ICMP应答报文发送至第一设备中的目标节点,若目标节点与发送节点不一致,则目标节点根据发送节点的身份信息确定发送节点,并将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
在一个实施例中,上述方法还包括:将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点一致,则确定发送节点与第二设备之间的链路检测成功。
目标节点与发送节点一致的判断方式可以为在目标节点接收到ICMP应答报文后,根据ICMP应答报文中携带的发送节点的身份信息和目标节点本地存储的身份信息进行匹配。若ICMP应答报文中携带的发送节点的身份信息和目标节点本地存储的身份信息匹配,则说明目标节点和发送节点一致。
示例性的,第二设备将ICMP应答报文发送至第一设备中的目标节点,若目标节点与发送节点一致,则确定发送节点与第二设备之间的链路检测成功。
在一个实施例中,在将ICMP应答报文发送至第一设备中的目标节点之前,上述方法还包括:将ICMP应答报文发送至等价路由,经过等价路由的hash选路,确定目标节点。
示例性的,如图1b所示,VTEPGROUP的anycast ip地址与VTEP3节点的anycast ip地址建立VXLAN隧道。从VTEP3节点的角度看,指向VTEPGROUP的anycast ip地址的路由,为ecmp路由。一个成员指向VTEP1节点,另一个成员指向VTEP2节点。两个节点的虚ip都是anycast ip地址,但是两个节点的MAC地址各不相同。
在一个实施例中,发送节点的身份信息包括:发送节点的MAC地址。
在一个实施例中,至少两个VTEP节点的虚地址相同,且至少两个VTEP节点的企业地址相同,至少两个VTEP节点通过备份链路相连。
至少两个VTEP节点之间的备份链路,可以为underlay的peerlink链路,也可以是overlay的VXLAN bypass隧道。区别在于,至少两个VTEP节点的本地MAC地址,在对方VTEP节点MAC表里的存储出口不同。前者MAC表出口指向peerlink口,后者MAC表出口指向VXLAN bypass隧道,由此决定了至少两个VTEP节点之间的报文封装格式。
在一个实例中,如图1a所示,在双活VTEPGRPUP(VXLAN Tunnel Endpoints group, VTEP组)组网场景中,两个VTEP节点组成VTEP组,实现了故障冗余备份和流量负载分担的特性。VTEP1和VTEP2组成了VTEPGROUP系统,为了将两个VTEP节点虚拟为一个VTEP节点,需要在VTEP1和VTEP2上分别配置相同的anycast ip地址作为VTEP ip地址。同时为了让VTEPGROUP对外呈现出同一业务节点,也需要在VTEP1和VTEP2上配置相同的企业地址Gateway ip1。两个VTEP节点之间,通过peerlink备份链路相连。与VTEPGROUP建立VXLAN隧道的对端VTEP节点,既可以是单独节点,也可以是VTEPGROUP。为简化环境说明,假设对端为VTEP3节点,使用企业地址Gateway ip2。VXLAN隧道就是将原始报文进行封装,让它可以在承载网络(比如IP网络)上传输,在对端VTEP上解封装后还原出原始报文。也就是说,“VXLAN隧道”便是用来传输经过VXLAN封装的报文的,它是建立在两个VTEP之间的一条虚拟通道。VTEPGROUP的anycast ip地址与VTEP3节点的ip地址建立VXLAN隧道。由于VTEPGROUP是由VTEP1节点和VTEP2节点组合而成的逻辑节点,无法直接用于Ping/Trace这种链路检测。实际应用中,只能从具体的实际物理VTEP节点作为发起Ping/Trace链路检测的主体。比如从VTEP1的Gateway ip1向VTEP3的Gateway ip2发起Ping/Trace链路检测,出口是VTEPGROUP跟VTEP3之间的VXLAN隧道。发出的报文分两层,外层为VXLAN隧道,内层为ICMP请求报文。当VTEP3节点收到该ICMP请求报文后,发现目的ip为Gateway ip2,是自己的企业地址,则会重新封装Ping/Trace应答报文,出口是VTEP3跟VTEPGROUP之间的VXLAN虚隧道。VXLAN虚隧道使用VTEPGROUP自身anycast IP虚地址与对端VTEP节点或者VTEPGROUP建立VXLAN隧道,通常称为VXLAN虚隧道。发出的报文分两层,外层为VXLAN虚隧道,内层为ICMP应答报文。由于VXLAN虚隧道的出口为ecmp路由,经过hash选路,如果选出的路径是指向VTEP1节点的,那么由VTEP1节点发起的Ping/Trace结果是成功。如果选出的路径是指向VTEP2节点的,那么由VTEP1发起的Ping/Trace结果是失败,因为ICMP应答报文并没有回到VTEP1节点。
在普通EVPN(Ethernet Virtual Private Network,以太网VPN)场景下,EVPN通过扩展MP-BGP协议来传递网络节点的MAC和ARP等信息,通过生成的MAC表项和路由表项进行二/三层报文转发,以实现广域网互联的目的。通过Ping/Trace检测overlay IP地址连通性,由于本端VTEP节点为单一节点,ICMP报文在回程时不会出现歧义性,Ping/Trace检测可以正常进行。但是,在VTEPGROUP双活组网场景中,由于本端VTEPGROUP与对端节点(可能是VTEP节点,也可能是同为VTEPGROUP)之间建立的是VXLAN虚隧道,导致ICMP报文在回程时出现了歧义性。比如发起Ping/Trace检测的是VTEPGROUP中的一个实VTEP节点,而对端返回的ICMP应答报文回到了另一个实VTEP节点,而没有回到发起检测的VTEP节点,从而使得Ping/Trace检测失败,无法达到检测网络连接状 况的目的。因此,提出在ICMP请求报文中携带发送节点的身份信息,在ICMP应答报文中添加发送节点的身份信息,目标节点在接收到ICMP应答报文后,根据发送节点的身份信息判断目标节点是否为发送节点。若为发送节点,则由发送节点确定发送节点与第二设备之间的链路检测成功。若非发送节点,则目标节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
本公开实施例在ICMP请求报文和ICMP应答报文中,增加发起者本地MAC字段,如图1c所示,ICMP请求报文中的MAC字段为发送节点的本地MAC地址。ICMP应答报文中的MAC字段是从ICMP请求报文直接拷贝到ICMP应答报文中的。当ICMP应答报文到到目标节点时,目标节点需要判断报文中携带的MAC地址是否为本节点的MAC地址。如果是,则说明本节点是Ping/Trace链路检测的发送节点,链路检测成功。如果否,则说明本节点不是Ping/Trace链路检测的发送节点,真正的发送节点是跟本VTEP节点同属于一个VTEPGROUP的另一个VTEP节点。而两个VTEP节点的本地MAC是可以通过peerlink口相互学习的,此时通过MAC表查询ICMP应答报文中的MAC地址,得到出端口信息和vlan信息,查到的出端口就是peerlink口,vlan就是在对端VTEP节点上的接口vlan。根据查MAC表的结果封装报文,通过peerlink口发送出去。对端VTEP节点收到后,检测ICMP应答报文中的MAC,就是本地MAC,则此次Ping/Trace链路检测成功。
本公开实施例对ICMP请求报文和ICMP应答报文字段进行了扩展,增加了标识发送节点的MAC地址字段,明确记录了本次Ping/Trace链路检测的发送节点位置。在ICMP应答报文接收端对报文中的MAC地址进行校验,确认发送节点是否是自己。如不是,则查MAC表,将报文转发给发送节点。VTEPGROUP内部,兼容两个VTEP节点之间的不同连接方式,协议层面上,兼容V4的ICMP和V6的ICMPv6协议。
在另一个实例中,如图1d所示,ICMP应答报文回报路线正确的转发示意图。
步骤S401、由VTEP1发起Ping/Trace链路检测,源ip是Gateway ip1,目的ip是Gateway ip2,出口为VTEPGROUP与VTEP3节点建立的VXLAN虚隧道。内层ICMP请求报文中,增加了发送节点的本地MAC地址0000.0000.0001,用于标识发送节点。
步骤S402、VTEP3节点收到了ICMP请求报文后,回复ICMP应答报文,应答报文中的MAC字段,由ICMP请求报文直接拷贝。经过ecmp路由的hash选路,确定指向VTEP1节点的成员路由,目的MAC是0000.0000.0001。VTEP1节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址0000.0000.0001,发现属于本地,则本次Ping/Trace链路检测成功。
由于在VTEP3上回复的ICMP应答报文目的地是VTEP1,也就是本次链路检测的发起 者,VTEP1不需要再将ICMP应答报文进行转发,直接处理即可。
在另一个实例中,如图1e所示,图1e为一种ICMP应答报文回报路线错误的转发示意图。
步骤S501、由VTEP1发起Ping/Trace链路检测,源ip是Gateway ip1,目的ip是Gateway ip2,出口为VTEPGROUP与VTEP3节点建立的VXLAN虚隧道。内层ICMP请求报文中,增加了本地MAC地址0000.0000.0001,用于标识发送节点。
步骤S502、VTEP3节点收到了ICMP请求报文后,回复ICMP应答报文,ICMP应答报文中的MAC字段,由ICMP请求报文直接拷贝。经过ecmp路由的hash选路,确定指向VTEP2节点的成员路由,目的MAC是0000.0000.0002。
步骤S503、VTEP2节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址,发现不属于本地,则通过MAC表查询发送节点的MAC地址0000.0000.0001的出接口为peerlink口,报文发往peerlink口。VTEP1节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址0000.0000.0001,发现属于本地,则本次Ping/Trace链路检测成功。
由于在VTEP3上回复的ICMP应答报文目的地是VTEP2,不是本次链路检测的发送节点,VTEP2需要再将ICMP应答报文进行MAC转发,发送给真正的链路检测发送节点VTEP1。
在另一个实例中,如图1f所示,图1f为另一种ICMP应答报文回报路线错误的转发示意图。
步骤S601、由VTEP1发起Ping/Trace链路检测,源ip是Gateway ip1,目的ip是Gateway ip2,出口为VTEPGROUP与VTEP3节点建立的VXLAN虚隧道。内层ICMP请求报文中,增加了本地MAC地址0000.0000.0001,用于标识发送节点。
步骤S602、VTEP3节点收到了ICMP请求报文后,回复ICMP应答报文,ICMP应答报文中的MAC字段,由ICMP请求报文直接拷贝。经过ecmp路由的hash选路,确定指向VTEP2节点的成员路由,目的MAC是0000.0000.0002。
步骤S603、VTEP2节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址,发现不属于本地,则通过MAC表查询发起者MAC地址0000.0000.0001的出接口为VXLAN bypass隧道,报文发往VXLAN bypass隧道。VTEP1节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址0000.0000.0001,发现属于本地,则本次Ping/Trace链路检测成功。
由于在VTEP2上查找MAC表,出接口为VXLAN bypass隧道,所以报文还需要进行VXLAN bypass隧道的封装,才能正确发送到VTEP1节点。
图2为本公开提供的另一种链路检测方法的流程示意图,该方法可以适用于在VTEPGROUP(VXLAN Tunnel Endpoints Group,VTEP组)双活组网场景中链路检测的情况。该方法应用于第一设备,该第一设备包括发送节点和非发送节点。非发送节点包括至少一个VTEP节点,发送节点为任意VTEP节点。该方法可以由链路检测装置执行,该链路检测装置可以由软件和/或硬件实现,并集成在终端设备上,该终端设备可以为计算机。
如图2所示,本公开提供的链路检测方法包括步骤S210、S220和S230。
S210、发送节点向第二设备发送ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息。
发送节点为发送ICMP请求报文的节点。
发送节点的身份信息可以为发送节点的MAC地址,也可以为其他用于表征发送节点身份的信息,本公开实施例对此不进行限制。
示例性的,第一设备中的发送节点向第二设备发送ICMP请求报文,ICMP请求报文中携带发送节点的身份信息。
S220、若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则非发送节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
第二设备包括至少一个VTEP节点。
发送节点的确定方式可以为根据发送节点的身份信息查询预先建立的数据库表,得到与发送节点信息对应的发送节点。或者,根据发送节点的身份信息查询预先建立的数据库表,得到与发送节点信息对应的出端口信息和节点信息。或者,根据发送节点的身份信息查询预先建立的数据库表,得到与发送节点信息对应的出端口信息和节点上的接口。本公开实施例对此不进行限制。
非发送节点将ICMP应答报文转发给发送节点的方式可以为非发送节点根据ICMP应答报文中携带的发送节点的身份信息确定发送节点,非发送节点将ICMP应答报文转发给发送节点。或者,非发送节点根据ICMP应答报文中携带的发送节点的身份信息确定出端口信息和节点信息。或者,非发送节点根据ICMP应答报文中携带的发送节点的身份信息确定备份链路接口和发送节点上的接口。本公开实施例对此不进行限制。
示例性的,第一设备包括发送节点A和非发送节点B,若非发送节点B接收到第二设 备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点A的身份信息和非发送节点B的身份信息不匹配,则根据CMP应答报文中携带的发送节点A的身份信息确定发送节点A,非发送节点B将ICMP应答报文转发给发送节点A。
在上述实施例的基础上,提出了上述实施例的变型实施例,在此需要说明的是,为了使描述简要,在变型实施例中仅描述与上述实施例的不同之处。
在一个实施例中,上述方法还包括:若发送节点接收第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和发送节点的身份信息匹配,则确定发送节点与第二设备之间的链路检测成功。
ICMP应答报文为第二设备根据接收到的ICMP请求报文生成的,ICMP应答报文中的发送节点的身份信息为将ICMP请求报文中的发送节点的身份信息拷贝至ICMP应答报文中的身份信息。例如,若ICMP应答报文中的发送节点的身份信息为A,则将A拷贝至ICMP请求报文中。
示例性的,第一设备包括发送节点A和非发送节点B,若发送节点A接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点A的身份信息和发送节点A本地存储的身份信息匹配,则确定发送节点A与第二设备之间的链路检测成功。
在一个实例中,由VTEP1发起Ping/Trace链路检测,源ip是Gateway ip1,目的ip是Gateway ip2,出口为VTEPGROUP与VTEP3节点建立的VXLAN虚隧道。内层ICMP请求报文中,增加了发送节点的本地MAC地址0000.0000.0001,用于标识发送节点。VTEP3节点收到了ICMP请求报文后,回复ICMP应答报文,ICMP应答报文中的MAC字段,由ICMP请求报文直接拷贝。经过ecmp路由的hash选路,确定指向VTEP1节点的成员路由,目的MAC是0000.0000.0001。VTEP1节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址0000.0000.0001,发现属于本地,则本次Ping/Trace链路检测成功。
在一个实施例中,若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则非发送节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功,这一步骤包括:若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则获取发送节点的身份信息对应的出端口信息和节点信息;非发送节点根据出端口信息和节点信息将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
端口信息可以为peerlink口,也可以为VXLAN bypass隧道,本公开实施例对此不进行限制。
节点信息可以为VTEP节点上的接口vlan,也可以为其他表征发送节点位置的信息,本公开实施例对此不进行限制。
在一个实施例中,发送节点的身份信息包括:发送节点的MAC地址。
在一个实施例中,若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则获取发送节点的身份信息对应的出端口信息和节点信息,这一步骤包括:若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的MAC地址和非发送节点的MAC地址不匹配,则根据发送节点的身份信息查询MAC表,得到发送节点的身份信息对应的出端口信息和节点信息。
在一个实例中,若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的MAC地址和非发送节点的MAC地址不匹配,则根据发送节点的身份信息查询MAC表,得到发送节点的身份信息对应的出端口信息和节点信息,这一步骤包括:若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的MAC地址和非发送节点的MAC地址不匹配,则根据发送节点的身份信息查询MAC表,得到发送节点的身份信息对应的备份链路接口和发送节点上的接口。
在一个实施例中,第二设备包括至少一个VTEP节点。
在一个实例中,由VTEP1发起Ping/Trace链路检测,源ip是Gateway ip1,目的ip是Gateway ip2,出口为VTEPGROUP与VTEP3节点建立的VXLAN虚隧道。内层ICMP请求报文中,增加了本地MAC地址0000.0000.0001,用于标识发送节点。VTEP3节点收到了ICMP请求报文后,回复ICMP应答报文,ICMP应答报文中的MAC字段,由ICMP请求报文直接拷贝。经过ecmp路由的hash选路,确定指向VTEP2节点的成员路由,目的MAC是0000.0000.0002。VTEP2节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址,发现不属于本地,则通过MAC表查询发送节点的MAC地址0000.0000.0001的出接口为peerlink口,报文发往peerlink口。VTEP1节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址0000.0000.0001,发现属于本地,则本次Ping/Trace链路检测成功。由于在VTEP3上回复的ICMP应答报文目的地是VTEP2,不是本次链路检测的发送节点,VTEP2需要再将ICMP应答报文进行MAC转发,发送给真正的链路检测发送节点VTEP1。
在另一个实例中,由VTEP1发起Ping/Trace链路检测,源ip是Gateway ip1,目的ip是Gateway ip2,出口为VTEPGROUP与VTEP3节点建立的VXLAN虚隧道。内层ICMP请求报文中,增加了本地MAC地址0000.0000.0001,用于标识发送节点。VTEP3节点收 到了ICMP请求报文后,回复ICMP应答报文,ICMP应答报文中的MAC字段,由ICMP请求报文直接拷贝。经过ecmp路由的hash选路,确定指向VTEP2节点的成员路由,目的MAC是0000.0000.0002。VTEP2节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址,发现不属于本地,则通过MAC表查询发起者MAC地址0000.0000.0001的出接口为VXLAN bypass隧道,报文发往VXLAN bypass隧道。VTEP1节点收到了ICMP应答报文后,检测里面携带的发送节点的MAC地址0000.0000.0001,发现属于本地,则本次Ping/Trace链路检测成功。由于在VTEP2上查找MAC表,出接口为VXLAN bypass隧道,所以报文还需要进行VXLAN bypass隧道的封装,才能正确发送到VTEP1节点。
图3为本公开提供的一种链路检测装置的结构示意图,该装置配置于终端设备。参见图3,该链路检测装置设置于第二设备,该链路检测装置包括第一接收模块310、生成模块320和第一发送模块330。
第一接收模块310配置为接收第一设备中发送节点的ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息,第一设备包括至少两个VTEP节点,发送节点为任意VTEP节点。
生成模块320配置为根据ICMP请求报文生成ICMP应答报文,该ICMP应答报文包括发送节点的身份信息。
第一发送模块330配置为将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
本实施例提供的链路检测装置用于实现本公开实施例的链路检测方法,本实施例提供的链路检测装置实现原理和技术效果与本公开实施例的链路检测方法类似,此处不再赘述。
在上述实施例的基础上,提出了上述实施例的变型实施例,在此需要说明的是,为了使描述简要,在变型实施例中仅描述与上述实施例的不同之处。
在一个实施例中,第一发送模块配置为将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点根据发送节点的身份信息确定发送节点,并将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
在一个实施例中,上述链路检测装置还包括第一确定模块,配置为将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点一致,则确定发送节点与第二设备之间的链路检测成功。
在一个实施例中,上述链路检测装置还包括第二确定模块,配置为在将ICMP应答报文发送至第一设备中的目标节点之前,将ICMP应答报文发送至等价路由,经过等价路由的hash选路,确定目标节点。
在一个实施例中,发送节点的身份信息包括:发送节点的MAC地址。
在一个实施例中,至少两个VTEP节点的虚地址相同,且至少两个VTEP节点的企业地址相同,至少两个VTEP节点通过备份链路相连。
图4为本公开提供的另一种链路检测装置的结构示意图,该装置配置于终端设备。参见图4,该链路检测装置设置于第一设备,该链路检测装置包括发送节点和非发送节点。发送节点包括第二发送模块410,非发送节点包括第二接收模块420;
第二发送模块410配置为向第二设备发送ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息。
第二接收模块420配置为若接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则非发送节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
本实施例提供的链路检测装置用于实现本公开实施例的链路检测方法,本实施例提供的链路检测装置实现原理和技术效果与本公开实施例的链路检测方法类似,此处不再赘述。
在上述实施例的基础上,提出了上述实施例的变型实施例,在此需要说明的是,为了使描述简要,在变型实施例中仅描述与上述实施例的不同之处。
在一个实施例中,上述非发送节点还包括第三接收模块,配置为若接收第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和发送节点的身份信息匹配,则确定发送节点与第二设备之间的链路检测成功。
在一个实施例中,第二接收模块还配置为若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则获取发送节点的身份信息对应的出端口信息和节点信息。
非发送节点根据出端口信息和节点信息将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
在一个实施例中,发送节点的身份信息包括:发送节点的MAC地址。
在一个实施例中,第二接收模块还配置为若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的MAC地址和非发送节点的MAC地址不 匹配,则根据发送节点的身份信息查询MAC表,得到发送节点的身份信息对应的出端口信息和节点信息。
在一个实施例中,第二接收模块还配置为若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的MAC地址和非发送节点的MAC地址不匹配,则根据发送节点的身份信息查询MAC表,得到发送节点的身份信息对应的备份链路接口和发送节点上的接口。
在一个实施例中,第二设备包括至少一个VTEP节点。
图5为本公开提供的一种终端设备的结构示意图。如图5所示,本公开提供的终端设备包括一个或多个处理器51和存储装置52。图5中以一个处理器51为例。存储装置52配置为存储一个或多个程序,当一个或多个程序被一个或多个处理器51执行,使得一个或多个处理器51实现如本公开实施例中图1所述的方法。
终端设备还包括通信装置53、输入装置54和输出装置55。
终端设备中的处理器51、存储装置52、通信装置53、输入装置54和输出装置55可以通过总线或其他方式连接,图5中以通过总线连接为例。
输入装置54可配置为接收输入的数字或字符信息,以及产生与终端设备的用户设置以及功能控制有关的按键信号输入。输出装置55可包括显示屏等显示终端设备。
通信装置53可以包括接收器和发送器。通信装置53配置为根据处理器51的控制进行信息收发通信。信息包括但不限于上行授权信息。
存储装置52作为一种计算机可读存储介质,可配置为存储软件程序、计算机可执行程序以及模块,如本公开实施例图1链路检测方法对应的程序指令/模块(例如,链路检测装置中的第一接收模块310、生成模块320和第一发送模块330);或者本公开实施例图2所述链路检测方法对应的程序指令/模块(例如,链路检测装置中的第二发送模块410和第二接收模块420)。存储装置52可包括存储程序区和存储数据区,存储程序区可存储操作系统、至少一个功能所需的应用程序。存储数据区可存储根据终端设备的使用所创建的数据等。此外,存储装置52可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件或其他非易失性固态存储器件。在一些实例中,存储装置52可进一步包括相对于处理器51远程设置的存储器,这些远程存储器可以通过网络连接至终端设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
本公开实施例还提供一种存储介质,该存储介质存储有计算机程序。
计算机程序被处理器执行时实现本公开实施例所述的链路检测方法。该方法包括:接收第一设备中发送节点的ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息,第一设备包括至少两个VTEP节点,发送节点为任意VTEP节点;根据ICMP请求报文生成ICMP应答报文,该ICMP应答报文包括发送节点的身份信息;将ICMP应答报文发送至第一设备中的目标节点,以使如果目标节点与发送节点不一致,则目标节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
或者,计算机程序被处理器执行时实现本公开实施例所述的链路检测方法,该方法包括:发送节点向第二设备发送ICMP请求报文,该ICMP请求报文中携带发送节点的身份信息;若非发送节点接收到第二设备发送的ICMP应答报文,且ICMP应答报文中携带的发送节点的身份信息和非发送节点的身份信息不匹配,则非发送节点将ICMP应答报文转发给发送节点,由发送节点确定发送节点与第二设备之间的链路检测成功。
本公开实施例的计算机存储介质可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以包括但不限于:电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(Random Access Memory,RAM)、只读存储器(Read Only Memory,ROM)、可擦式可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、闪存、光纤、便携式CD-ROM、光存储器件、磁存储器件或者上述的任意合适的组合。计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于:电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、电线、光缆、无线电频率(Radio Frequency,RF)等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言或其组合来编写用于执行本公开操作的计算机程序代码,程序设计语言包括面向对象的程序设计语言,诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言,诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用 户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)——连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。
以上所述,仅为本公开的示例性实施例而已,并非用于限定本公开的保护范围。
本领域内的技术人员应明白,术语用户终端设备涵盖任何适合类型的无线用户终端设备,例如移动电话、便携数据处理装置、便携网络浏览器或车载移动台。
一般来说,本公开的多种实施例可以在硬件或专用电路、软件、逻辑或其任何组合中实现。例如,一些方面可以被实现在硬件中,而其它方面可以被实现在可以被控制器、微处理器或其它计算装置执行的固件或软件中,但本公开不限于此。
本公开实施例可以通过移动装置的数据处理器执行计算机程序指令来实现,例如在处理器实体中,或者通过硬件,或者通过软件和硬件的组合。计算机程序指令可以是汇编指令、指令集架构(Instruction Set Architecture,ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码。
本公开附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于只读存储器(Read-Only Memory,ROM)、随机访问存储器(Random Access Memory,RAM)、光存储器装置和系统(数码多功能光碟(Digital Video Disc,DVD)或光盘(Compact Disk,CD))等。计算机可读介质可以包括非瞬时性存储介质。数据处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑器件(Field-Programmable Gate Array,FGPA)以及基于多核处理器架构的处理器。
利用本公开提供的上述链路检测方法、链路检测装置、终端设备和存储介质,根据报文中携带的发送节点的身份信息找到发送节点,进而由发送节点确定发送节点与第二设备之间的链路检测,能够解决由于本端VTEPGROUP与对端节点之间建立的是VXLAN虚隧道,导致ICMP报文在回程时出现歧义性的问题。比如发起Ping/Trace检测的是VTEPGROUP中的一个VTEP节点,而对端返回的ICMP应答报文回到了另一个VTEP节 点,而没有回到发起检测的VTEP节点,从而使得Ping/Trace检测失败的问题,能够由发送节点对发送节点与第二设备之间的链路进行检测。
通过示范性和非限制性的示例,上文已提供了对本公开的示范实施例的详细描述。但结合附图和权利要求来考虑,对以上实施例的多种修改和调整对本领域技术人员来说是显而易见的,但不偏离本公开的范围。因此,本公开的恰当范围将根据权利要求确定。

Claims (19)

  1. 一种链路检测方法,应用于第二设备,包括:
    接收第一设备中发送节点的ICMP请求报文,其中,所述ICMP请求报文中携带所述发送节点的身份信息,所述第一设备包括至少两个VTEP节点,其中,所述发送节点为任意VTEP节点;
    根据所述ICMP请求报文生成ICMP应答报文,其中,所述ICMP应答报文包括所述发送节点的身份信息;
    将所述ICMP应答报文发送至所述第一设备中的目标节点,以使如果所述目标节点与所述发送节点不一致,则所述目标节点将所述ICMP应答报文转发给所述发送节点,由所述发送节点确定所述发送节点与所述第二设备之间的链路检测成功。
  2. 根据权利要求1所述的方法,其中,所述发送节点的身份信息包括:所述发送节点的MAC地址。
  3. 根据权利要求1所述的方法,其中,所述第一设备中至少两个VTEP节点的虚地址相同,且所述至少两个VTEP节点的企业地址相同,所述至少两个VTEP节点通过备份链路相连。
  4. 根据权利要求1所述的方法,其中,将所述ICMP应答报文发送至所述第一设备中的目标节点,以使如果所述目标节点与所述发送节点不一致,则所述目标节点将所述ICMP应答报文转发给所述发送节点,由所述发送节点确定所述发送节点与所述第二设备之间的链路检测成功,还包括:
    将所述ICMP应答报文发送至所述第一设备中的目标节点,以使如果所述目标节点与所述发送节点不一致,则所述目标节点根据所述发送节点的身份信息确定发送节点,并将所述ICMP应答报文转发给所述发送节点,由所述发送节点确定所述发送节点与所述第二设备之间的链路检测成功。
  5. 根据权利要求1所述的方法,其中,所述方法还包括:
    将所述ICMP应答报文发送至所述第一设备中的目标节点,以使如果所述目标节点与所述发送节点一致,则确定所述发送节点与所述第二设备之间的链路检测成功。
  6. 根据权利要求1所述的方法,其中,在将所述ICMP应答报文发送至所述第一设备中的目标节点之前,所述方法还包括:
    将所述ICMP应答报文发送至等价路由,经过等价路由的hash选路,确定目标节点。
  7. 根据权利要求1所述的方法,其中,所述第二设备包括至少一个VTEP节点。
  8. 一种链路检测方法,应用于第一设备,所述第一设备包括发送节点和非发送节 点,所述非发送节点包括至少一个VTEP节点,所述发送节点为任意VTEP节点,包括:
    所述发送节点向第二设备发送ICMP请求报文,其中,所述ICMP请求报文中携带所述发送节点的身份信息;
    若所述非发送节点接收到第二设备发送的ICMP应答报文,且所述ICMP应答报文中携带的发送节点的身份信息和所述非发送节点的身份信息不匹配,则所述非发送节点将所述ICMP应答报文转发给所述发送节点,由所述发送节点确定所述发送节点与所述第二设备之间的链路检测成功。
  9. 根据权利要求8所述的方法,其中,若所述非发送节点接收到第二设备发送的ICMP应答报文,且所述ICMP应答报文中携带的发送节点的身份信息和所述非发送节点的身份信息不匹配,则所述非发送节点将所述ICMP应答报文转发给所述发送节点,由所述发送节点确定所述发送节点与所述第二设备之间的链路检测成功,还包括:
    若所述非发送节点接收到第二设备发送的ICMP应答报文,且所述ICMP应答报文中携带的发送节点的身份信息和所述非发送节点的身份信息不匹配,则获取所述发送节点的身份信息对应的出端口信息和节点信息;
    所述非发送节点根据所述出端口信息和节点信息将所述ICMP应答报文转发给所述发送节点,由所述发送节点确定所述发送节点与所述第二设备之间的链路检测成功。
  10. 根据权利要求9所述的方法,其中,若所述非发送节点接收到第二设备发送的ICMP应答报文,且所述ICMP应答报文中携带的发送节点的身份信息和所述非发送节点的身份信息不匹配,则获取所述发送节点的身份信息对应的出端口信息和节点信息,还包括:
    若所述非发送节点接收到第二设备发送的ICMP应答报文,且所述ICMP应答报文中携带的发送节点的MAC地址和所述非发送节点的MAC地址不匹配,则根据所述发送节点的身份信息查询MAC表,得到所述发送节点的身份信息对应的出端口信息和节点信息;
    或者
    若所述非发送节点接收到第二设备发送的ICMP应答报文,且所述ICMP应答报文中携带的发送节点的MAC地址和所述非发送节点的MAC地址不匹配,则根据所述发送节点的身份信息查询MAC表,得到所述发送节点的身份信息对应的备份链路接口和发送节点上的接口。
  11. 根据权利要求8所述的方法,其中,所述方法还包括:
    若所述发送节点接收所述第二设备发送的ICMP应答报文,且所述ICMP应答报 文中携带的发送节点的身份信息和所述发送节点的身份信息匹配,则确定所述发送节点与所述第二设备之间的链路检测成功。
  12. 根据权利要求8所述的方法,其中,所述发送节点的身份信息包括:所述发送节点的MAC地址。
  13. 一种链路检测装置,设置于第二设备,包括:
    第一接收模块,配置为接收第一设备中发送节点的ICMP请求报文,其中,所述ICMP请求报文中携带所述发送节点的身份信息,所述第一设备包括至少两个VTEP节点,其中,所述发送节点为任意VTEP节点;
    生成模块,配置为根据所述ICMP请求报文生成ICMP应答报文,其中,所述ICMP应答报文包括所述发送节点的身份信息;
    第一发送模块,配置为将所述ICMP应答报文发送至所述第一设备中的目标节点,以使如果所述目标节点与所述发送节点不一致,则所述目标节点将所述ICMP应答报文转发给所述发送节点,由所述发送节点确定所述发送节点与所述第二设备之间的链路检测成功。
  14. 根据权利要求13所述的链路检测装置,其中,所述链路检测装置还包括:
    第一确定模块,配置为将所述ICMP应答报文发送至所述第一设备中的目标节点,以使如果所述目标节点与所述发送节点一致,则确定所述发送节点与所述第二设备之间的链路检测成功;
  15. 根据权利要求14所述的链路检测装置,其中,所述链路检测装置还包括:
    第二确定模块,配置为在将所述ICMP应答报文发送至所述第一设备中的目标节点之前,将所述ICMP应答报文发送至等价路由,经过等价路由的hash选路,确定目标节点。
  16. 一种链路检测装置,设置于第一设备,包括:发送节点和非发送节点;
    所述发送节点包括:
    第二发送模块,配置为向第二设备发送ICMP请求报文,其中,所述ICMP请求报文中携带所述发送节点的身份信息;
    所述非发送节点包括:
    第二接收模块,配置为若接收到第二设备发送的ICMP应答报文,且所述ICMP应答报文中携带的发送节点的身份信息和所述非发送节点的身份信息不匹配,则所述非发送节点将所述ICMP应答报文转发给所述发送节点,由所述发送节点确定所述发送节点与所述第二设备之间的链路检测成功。
  17. 根据权利要求16所述的链路检测装置,其中,所述链路检测装置还包括:
    第三接收模块,配置为若接收所述第二设备发送的ICMP应答报文,且所述ICMP应答报文中携带的发送节点的身份信息和所述发送节点的身份信息匹配,则确定所述发送节点与所述第二设备之间的链路检测成功。
  18. 一种终端设备,包括:
    一个或多个处理器;
    存储装置,配置为存储一个或多个程序;
    当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-12任一所述的方法。
  19. 一种存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-12任一项所述的方法。
PCT/CN2021/124555 2020-10-19 2021-10-19 链路检测方法、链路检测装置、终端设备和存储介质 WO2022083563A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011118176.9 2020-10-19
CN202011118176.9A CN114389967A (zh) 2020-10-19 2020-10-19 链路检测方法、装置、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2022083563A1 true WO2022083563A1 (zh) 2022-04-28

Family

ID=81192970

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/124555 WO2022083563A1 (zh) 2020-10-19 2021-10-19 链路检测方法、链路检测装置、终端设备和存储介质

Country Status (2)

Country Link
CN (1) CN114389967A (zh)
WO (1) WO2022083563A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115378816B (zh) * 2022-08-02 2024-02-23 深信服科技股份有限公司 网络配置检测方法、装置及存储介质
CN116170304B (zh) * 2022-12-09 2023-08-08 广州通则康威智能科技有限公司 网络设备配置文件检查方法、装置、设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160142291A1 (en) * 2013-05-01 2016-05-19 Joseph Polland Enhanced route tracing
CN106559325A (zh) * 2015-09-25 2017-04-05 华为技术有限公司 路径检测方法和装置
CN107517116A (zh) * 2016-06-16 2017-12-26 中兴通讯股份有限公司 一种多段伪线检测方法和网元
CN107646185A (zh) * 2015-05-27 2018-01-30 思科技术公司 在覆盖数据中心环境中的操作、管理和处理(oam)

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160142291A1 (en) * 2013-05-01 2016-05-19 Joseph Polland Enhanced route tracing
CN107646185A (zh) * 2015-05-27 2018-01-30 思科技术公司 在覆盖数据中心环境中的操作、管理和处理(oam)
CN106559325A (zh) * 2015-09-25 2017-04-05 华为技术有限公司 路径检测方法和装置
CN107517116A (zh) * 2016-06-16 2017-12-26 中兴通讯股份有限公司 一种多段伪线检测方法和网元

Also Published As

Publication number Publication date
CN114389967A (zh) 2022-04-22

Similar Documents

Publication Publication Date Title
US11431554B2 (en) Mechanism for control message redirection for SDN control channel failures
CN108574616B (zh) 一种处理路由的方法、设备及系统
US9860150B2 (en) Fast convergence of EVPN networks for multi homing topologies
US11303528B2 (en) Communications connection detection method and apparatus
WO2021258754A1 (zh) 报文指示方法、装置、设备和存储介质
EP3694145B1 (en) Method and device for sending messages
WO2020073685A1 (zh) 转发路径确定方法、装置、系统、计算机设备及存储介质
WO2022083563A1 (zh) 链路检测方法、链路检测装置、终端设备和存储介质
JP7124206B2 (ja) パケット処理方法およびゲートウェイ・デバイス
WO2020024828A1 (zh) 通信方法、通信设备和通信系统
JP7306642B2 (ja) ループ回避通信方法、ループ回避通信デバイスおよびループ回避通信システム
WO2022042503A1 (zh) 一种报文传输方法、装置及系统
US11522792B2 (en) Method for discovering forwarding path and related device thereof
US20220124033A1 (en) Method for Controlling Traffic Forwarding, Device, and System
CN107547373B (zh) 一种报文转发方法、装置、设备及机器可读存储介质
US20230171178A1 (en) Systems and methods for data plane validation of multiple paths in a network
WO2010045838A1 (zh) 报文处理的方法和装置
WO2022078338A1 (zh) 路径确定方法及装置、计算机存储介质
EP3151486A1 (en) Fast convergence of evpn networks for multi homing topologies
WO2023024867A1 (zh) 跨设备链路聚合组网的网络诊断方法及网络接入设备
WO2022161061A1 (zh) 一种故障检测方法、网络设备及系统
US20240056389A1 (en) Information processing method, and device and storage medium
WO2022053007A1 (zh) 网络可达性验证方法及装置、计算机存储介质

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 04/09/2023)