WO2022088967A1 - 确定下一跳的方法及装置 - Google Patents
确定下一跳的方法及装置 Download PDFInfo
- Publication number
- WO2022088967A1 WO2022088967A1 PCT/CN2021/116119 CN2021116119W WO2022088967A1 WO 2022088967 A1 WO2022088967 A1 WO 2022088967A1 CN 2021116119 W CN2021116119 W CN 2021116119W WO 2022088967 A1 WO2022088967 A1 WO 2022088967A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bfr
- attribute
- next hop
- identifier
- prefix
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 148
- 238000013461 design Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 8
- 235000008694 Humulus lupulus Nutrition 0.000 claims 1
- 241000764238 Isis Species 0.000 description 65
- 230000008569 process Effects 0.000 description 46
- 241000465502 Tobacco latent virus Species 0.000 description 15
- FFBHFFJDDLITSX-UHFFFAOYSA-N benzyl N-[2-hydroxy-4-(3-oxomorpholin-4-yl)phenyl]carbamate Chemical compound OC1=C(NC(=O)OCC2=CC=CC=C2)C=CC(=C1)N1CCOCC1=O FFBHFFJDDLITSX-UHFFFAOYSA-N 0.000 description 12
- 238000005538 encapsulation Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/34—Source routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/16—Multipoint routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/72—Routing based on the source address
Definitions
- the present invention relates to the field of communication technologies, and in particular, to a method and apparatus for determining a next hop.
- the bit forwarding ingress router (BFIR) or the first intermediate bit forwarding router (transit BFR) can receive other data in the BIER domain.
- BIER information flooded by a BFR (such as a second intermediate BFR or a bit forwarding egress router (BFER)) through an internal gateway protocol (IGP).
- the BIER information includes: the BFR prefix (prefix) of the BFR sending the BIER information, the bit forwarding router identifier (bit forwarding router identifier, BFR-id) of one or more BFERs, and its BFR prefix.
- the BFR prefix indicates the address of the BFR in the BIER domain.
- the BFIR or the first intermediate BFR may obtain a bit index forwarding table (BIFT) according to the BIER information flooded through the IGP.
- the BIFT entry includes the forwarding bitmask (F-BM) and the BFR neighbor (BFR neighbor, BFR-NBR) as the next hop.
- the bits set to 1 in the bit string included in the F-BM correspond to the BFER in the received BIER information.
- the address in the BFR-NBR is the BFR prefix of the BFR included in the BIER information that sends the BIER information.
- the published BIER information includes the same BFER parameters, such as the BFR-id of the BFER and the BIER prefix of the BFER, and received from the second BFR and the third BFR
- the BFR of the BIER information published by the BFR such as BFIR or the first BFR, can select the BIER information published by a BFR according to the longest matching strategy or the equal-cost multi-path routing (ECMP) strategy. The method of next hop is not flexible enough.
- the embodiments of the present application provide a method and apparatus for determining a next hop, which can improve flexibility.
- a first aspect provides a method for determining a next hop, wherein the method is applied to forwarding and routing BIER domains based on bit indices, including:
- the third device acquires first BIER information of the first device, attributes of the first device, second BIER information of the second device, and attributes of the second device, where the first BIER information includes edges in the subdomain a bit forwarding router identifier BFR-id of a bit forwarding router BFR, and the second BIER information includes the BFR-id of the edge BFR in the subdomain;
- the third device determines, according to the first BIER information, the second BIER information, the attribute of the first device, and the attribute of the second device, to reach the lower part of the edge BFR in the subdomain. One hop.
- the third device can flexibly select the next hop to reach the edge BFR of the subdomain based on the attributes of the first device and the attributes of the second device, and is not limited to the longest matching strategy or the ECMP strategy for selection, which improves the Determines the flexibility of the next hop.
- the attribute of the first device and the attribute of the second device include a first identifier
- the first identifier is used to identify the BFR prefix of anycast
- the method further includes: the first identifier
- the third device performs the determination to reach the The next hop of the edge BFR.
- the attribute of the first device or the attribute of the second device includes a first identifier
- the first identifier is used to identify the BFR prefix of anycast
- the third device uses the first identifier to identify the BFR prefix of anycast.
- One BIER information, the second BIER information, the attribute of the first device and the attribute of the second device, and determining the next hop to the edge BFR in the subdomain includes: the third device When the first BIER information and the second BIER information are the same, a device whose attribute includes the first identifier is determined as the next hop.
- the method further includes: the first BFR information and the second BIER information of the third device are the same, and the attributes of the first device and the attributes of the second device are the same.
- the first identifiers are included, an alarm is output, and the first identifier is used to identify the BFR prefix of anycast.
- the attribute of the first device further includes the node identifier of the first device
- the attribute of the second device includes the node identifier of the second device
- the third device the first BIER information, the second BIER information, the attributes of the first device and the attributes of the second device, and determining the next hop to the edge BFR in the subdomain includes: the first When the first BIER information is the same as the second BIER information, the third device determines the first device and the second device based on the first policy, the node identifier of the first device, and the node identifier of the second device One of the two devices is used as the next hop, and the first strategy includes using a device with a larger node identification as the next hop or a device with a smaller node identification as the next hop.
- the attribute of the first device further includes a second identifier
- the attribute of the second device further includes a third identifier
- the second identifier is used to identify the priority of the first device
- the third identifier is used to identify the priority of the second device
- the attribute of the first device includes the BFR prefix of the first device
- the attribute of the second device includes the BFR prefix of the second device
- the BFR prefix of the first device Different from the BFR prefix of the second device, the third device determines, according to the first BIER information, the second BIER information, the attributes of the first device and the attributes of the second device, to reach the destination.
- the next hop of the edge BFR in the subdomain includes: the third device, when the first BIER information and the second BIER information are the same, according to the third policy, the overhead cost value of the first link and the cost value of the second link, determine one of the first device and the second device as the next hop, and the third strategy includes using the device at the opposite end of the link with a smaller cost value as the next hop hop or use the device on the opposite end of the link with a larger cost value as the next hop, the first link is the link from the third device to the first device, and the second link is the first link The link of the three devices to the second device.
- the attribute of the first device includes the BFR prefix of the first device
- the attribute of the second device includes the BFR prefix of the second device
- the BFR prefix of the first device Different from the BFR prefix of the second device, the third device determines, according to the first BIER information, the second BIER information, the attributes of the first device and the attributes of the second device, to reach the destination.
- the next hop of the edge BFR in the subdomain includes: when the first BIER information and the second BIER information are the same by the third device, according to the fourth policy, the BFR prefix of the first device and the BFR prefix of the second device, determine one of the first device and the second device as the next hop, and the fourth strategy includes using the device with a smaller BFR prefix as the next hop or using the device with a smaller BFR prefix as the next hop.
- a device with a larger BFR prefix is used as the next hop.
- the attribute of the first device includes the BFR prefix of the first device and the node identifier of the first device
- the attribute of the second device includes the BFR prefix of the second device and the node identifier of the second device
- the BFR prefix of the first device is different from the BFR prefix of the second device
- the third device is based on the first BIER information, the second BIER information
- the The attribute of the first device and the attribute of the second device, and determining the next hop to the edge BFR in the subdomain includes: the third device in the first BIER information and the second When the BIER information is the same, according to the first policy, the node identifier of the first device and the node identifier of the second node, determine one of the first device and the second device as the next hop, and the first policy Including taking the device with the larger node identification as the next hop or taking the device with the smaller node identification as the next hop.
- the attribute of the first device includes a BFR prefix and a second identifier of the first device
- the attribute of the second device includes a BFR prefix and a third identifier of the second device
- the second identifier is used to identify the priority of the first device
- the third identifier is used to identify the priority of the second device
- the BFR prefix of the first device is the same as the BFR of the second device.
- the next hop of the BFR includes: when the first BIER information and the second BIER information are the same, the third device determines the first device according to the second policy, the second identifier and the third identifier and one of the second devices is used as the next hop, and the second strategy includes using a device with a higher priority as the next hop or a device with a lower priority as the next hop.
- a second aspect provides an apparatus for determining a next hop, the apparatus comprising a unit for implementing the functions of the steps included in the first aspect or any possible design of the first aspect.
- a system comprising the apparatus for determining the next hop provided by the second aspect or any possible design of the second aspect.
- a chip in a fourth aspect, includes a memory and a processor, the memory is used to store computer instructions, and the processor is used to call and run the computer instructions from the memory, so as to execute the above-mentioned first The method for determining the next hop provided by the aspect or any possible implementation manner of the first aspect.
- a fifth aspect provides a computer program product, the computer program product comprising one or more computer program instructions, when the computer program instructions are loaded and executed by a computer, cause the computer to perform the first aspect or the first The method for determining the next hop provided by any possible implementation manner of the aspect.
- a computer-readable storage medium is provided, where the computer-readable storage medium is used to store instructions, and the instructions include the determination provided by the first aspect or any possible implementation manner of the first aspect.
- the next set of methods are designed to program.
- FIG. 1 is a schematic diagram of a network scenario.
- FIG. 2 is a schematic flowchart of a method for determining a next hop according to Embodiment 1 of the present application.
- FIG. 3 is a schematic flowchart of a method for determining a next hop according to Embodiment 2 of the present application.
- FIG. 4 is a message format provided by Embodiment 3 of the present application.
- FIG. 5 is a message format provided by Embodiment 4 of the present application.
- FIG. 6 is another message format provided by Embodiment 4 of the present application.
- FIG. 7 is a message format provided by Embodiment 5 of the present application.
- FIG. 8 is a schematic structural diagram of an apparatus for determining a next hop according to an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of another apparatus for determining a next hop provided by an embodiment of the present application.
- FIG. 1 is a schematic diagram of a network scenario.
- R1, R2, R3, R4, R5, R11, R12, R13, R21, R22, and R23 represent BFRs in the BIER domain.
- R1, R2, R3, R4 and R5 are in the same IGP domain, and this area may be called area A1.
- the value of the BFR-id configured on R1 is 1.
- the value of the BFR-id configured for R2 is 2.
- the value of the BFR-id configured on R3 is 3.
- the value of the BFR-id configured for R4 is 4.
- the value of the BFR-id configured on R5 is 5.
- R3, R4 and R5 are edge BFRs.
- R1 and R2 can act as area border routers (ABRs). When R1 and R2 are not used as BFERs, R1 and R2 do not need to configure BFR-id or the configured BFR-id is invalid.
- R11, R12, and R13 are in the same IGP domain, which may be referred to as area A10.
- R11, R12, and R13 are all edge BFRs, such as BFER.
- the value of the BFR-id assigned to R11 is 11.
- the value of the BFR-id configured for R12 is 12.
- the value of the BFR-id configured for R13 is 13.
- R21, R22 and R23 are in the same IGP domain, which may be referred to as area A20.
- R21, R22, and R23 are all edge BFRs, such as BFER.
- the value of the BFR-id configured for R21 is 21.
- the value of the BFR-id configured for R22 is 22.
- the value of the BFR-id configured for R23 is 23.
- R1 and R2 will flood the BIER information of R11, R12, R13, R21, R22, and R23 to BFRs in the A1 domain, such as R3, R4, and R5.
- R1 and R2 also flood the BIER information of R3, R4, and R5 to BFRs in the A10 domain, such as R11, R12, and R13, and BFRs in the A20 domain, such as R21, R22, and R23.
- the method of releasing the obtained BIER information to the BFR in the A1 domain by R1 and R2 is the same as the method of releasing the obtained BIER information to the BFR in the A10 domain and the BFR in the A20 domain.
- the method of BIER information will be described as an example.
- R1 and R2 can directly or indirectly obtain the BFR-id as the edge BFR from the BFR of the area A10 and the BFR of the area A20, such as the values of 11, 12, 13, 21, 22 and 23.
- BFR-id The BIER information issued by R1 to the area A1 includes: BFR-ids with values of 11, 12, 13, 21, 22 and 23.
- the BIER information issued by R2 to the area A1 includes: BFR-ids with values of 11, 12, 13, 21, 22 and 23. Among them, R1 and R2 can issue BFR-ids with values of 11, 12, 13, 21, 22 and 23 through the sub-tlv of the BFR-id range.
- the sub-tlv of the BFR-id range can be carried by the BIER Proxy Range sub-TLV defined by draft-ietf-bier-prefix-redistribute-00.
- the sub-TLV represents three BFR-ids whose BFR-id starts from 21, that is, the BFR-id is 21, 22 and 23. numerical value.
- the device serving as BFER can carry the BFR-id configured by itself in the published BIER information.
- the BIER information released by R1 to area A1 also includes the valid BFR-id assigned by R1.
- the BIER information released by R2 to area A1 also includes the valid BFR-id assigned by R2.
- R1's host prefix may be used when R1 publishes BIER information.
- R2's host prefix can be used when R2 publishes BIER information.
- the above-mentioned host prefix is a prefix of a 32-bit mask under the Internet Protocol version 4 (Internet Protocol version 4, IPv4) network, and its information is a complete IPv4 address.
- the above host prefix is a prefix of a 128-bit mask under the Internet Protocol version 6 (Internet Protocol version 6, IPv6) network, and its information is a complete IPv6 address.
- R1 can use the non-host routing prefix representing R1 to advertise BIER information to area A1, for example, a 64-masked IPv6 address as Locator to identify R1; or draft-ietf-bier-prefix- redistribute-00 uses an aggregated route or default route to carry the BIER information advertised by R1.
- R2 can use the non-host routing prefix representing R2 to advertise BIER information to area A1, such as an IPv6 address with a 64 mask as the Locator to identify R2; or draft-ietf-bier-prefix-redistribute-00 can use an aggregated route or default route to carry the BIER information released by R2.
- R1 in Figure 1 can respectively receive its own BFR-id issued by R11, R12 and R13 in area A10, receive its own BFR-id issued by R21, R22 and R23 in area A20, and also receive BIER issued by R2 information.
- R11 uses the IP address of R11 as the BFR-prefix and publishes it together with the BFR-id value of 11.
- the BIER Sub-TLV (Type value 9) defined by RFC8444 is carried in OSPFv2 Extended Prefix TLV.
- the above sub-TLV can be used to carry the IP address of R11 and the BFR-id with a value of 11.
- the BFR-id of R11 released by R2 can be carried in the BIER Proxy Range sub-TLV defined by draft-ietf-bier-prefix-redistribute-00, and the TLV can also carry the BFR-prefix whose value is the IP address of R2.
- R1 preferentially uses the information published by R11 through BIER-info TLV or BIER sub-TLV to establish bit index routing table (BIRT) entries and bit index forwarding table (BIFT) entries to reach R11 .
- the BIRT entry and BIFT entry established by R1 to reach R11 include the BFR-id value of 11, the next hop is the BFR-prefix of R11, and the outgoing interface is the interface between R1 and R11.
- the BIRT entry and BIFT entry established by R1 to reach R12 include the BFR-id value of 12, the next hop is the BFR-prefix of R12, and the outgoing interface is the interface between R1 and R12.
- the method of establishing the BIRT entry and the BIFT entry to R13, R21, R22 and R23 established by R1 is the same as the method of establishing the above-mentioned BIRT entry and BIFT entry, and will not be repeated here.
- any of the above devices will receive the BIER information released by R1 and the BIER information released by R2.
- the BIFT entry includes the next hop node information and the forwarding bit mask (Forwarding-Bit-Mask, FBM) to the BFR-id, which can be represented by (BFR-id, NextHop, FBM).
- FBM forwarding bit mask
- any one of the above three devices will receive the BIER information released by R1 and the BIER information released by R2.
- Both the BIER information published by R1 and the BIER information published by R2 include BFR-ids with values of 11, 12, 13, 21, 22, and 23.
- R3, R4 or R5 can determine the next hop and outgoing port according to the routing and longest matching algorithm of the BFR-id advertised with values of 11, 12, 13, 21, 22 and 23.
- the publisher of the selected BIER information is not the performance Best equipment, flexibility and forwarding performance to be improved.
- the method provided by this embodiment of the present application can solve the problem of how one or more of R3, R4, and R5 select the next hop with the best performance in the scenario where R1 and R2 publish the same BFR-id in FIG. 1 . question.
- both R1 and R2 publish the BFR-id of the device serving as the BFER in the area A10
- R3 and R4 in the area A1 use the method provided by the embodiment of the present application to select the next hop as an example for description.
- the method adopted by R5 is the same as the method adopted by R3 or R4, which is not repeated in this embodiment of the present application.
- the method for selecting the next hop for the edge BFR in area A1 can refer to the method used in the above R3 or R4, which is no longer used in this embodiment of the application. Repeat.
- FIG. 2 is a schematic flowchart of a method for determining a next hop according to Embodiment 1 of the present application.
- both R3 and R4 in Figure 1 will receive attributes from R1, attributes of R2, and BIER information sent by R1 and R2.
- R3 or R4 is based on attributes of R1, attributes of R2, attributes of R1 and R2
- the next hop is determined in the sent BIER information.
- the attributes of R1 and R2 are of the same type, but the values can be the same or different.
- R3 or R4 uses the BIER information sent by the next hop to generate entries for forwarding BIER packets.
- the entry used to forward the BIER message can be one entry or multiple entries in the BIFT entry and the BIRT entry.
- Embodiment 1 of the present application is described by taking an example that the BFR-prefixes of R1 and R2 are the same.
- the method for determining the next hop provided by Embodiment 1 of the present application will be described below with reference to FIG. 1 and FIG. 2 .
- R1 and R2 can be configured with the same BFR-prefix.
- the edge BFR of the area A10 shown in FIG. 1 includes R11, R12 and R13.
- the same BFR-prefix in this embodiment of the present application may be represented by an address prefix, and the BFR-prefix may be an IPv4 address or an IPv6 address disclosed in RFC8401 or RFC8444, or the BFR-prefix may be an IPv6 address block.
- the IPv6 address block may be a 64-masked address block.
- the first identifier is a BFR-prefix for identifying as anycast.
- the BIER information published by R1 may be the first BIER information
- the BIER information published by R2 may be the second BIER information.
- the BFR-id included in the first BIER information or the second BIER information can be sent in the manner mentioned in RFC8401 or RFC8444, or carried in the BFR-id range of draft-ietf-bier-prefix-redistribute-00 for sending .
- the BFR-prefix of R1 and R2 can be carried and sent through the Adv-bfr-prefix field.
- the first identifiers included in the attributes of R1 and R2 may be carried and sent through the Adv-anycast-flag field.
- the attribute of R1 may further include one or more of a node identifier of R1 and a second identifier for identifying a priority.
- the attributes of R2 may also include one or more of the node identification of R2 and a third identification for identifying the priority.
- the node identifier in the embodiment of the present application is a system identifier (system-id) in an intermediate system to intermediate system (ISIS) protocol, and is a system-id in an Open Shortest Path First (Open Shortest Path First, OSPF) protocol
- the router-id is carried in the Adv-router-id field for transmission.
- the above-mentioned second identifier and the above-mentioned third identifier may be carried in the Adv-admin-tag field for transmission.
- R3 receives attributes from R1, attributes from R2, first BIER information from R1, and second BIER information from R2.
- the second BIER information from R2 received by R3 may come from one interface or multiple interfaces among the interface through which R3 communicates with R1 and the interface through which R3 communicates with R4.
- R3 determines based on the first BIER information and the second BIER information that both R1 and R2 can be used as intermediate BFRs reaching the edge BFRs included in the area A10.
- R3 can determine whether the first identifier exists in the attribute of R1 and the attribute of R2. If neither the attribute of R1 nor the attribute of R2 includes the first identifier, then R3 determines that the configuration is incorrect, and outputs an alarm.
- the R3 method determines that the configuration is correct, and S203 is executed.
- the method of outputting the alarm may output the alarm to the network management device or other management device through the Network Configuration Protocol (NETCONF).
- NETCONF Network Configuration Protocol
- R3 determines the next hop to the edge BFR included in the area A10.
- R3 determines the next hop as the device corresponding to the attribute carrying the first identifier, for example, the attribute published by R1 includes the first identifier. ID, and the attribute published by R2 does not include the first ID, then R3 sets the next hop to the edge BFR of the area A10 as R1, then the BIRT entry or BIFT entry corresponding to the edge BFR of the area A10 obtained by R3
- the next hop included is R1, and the outgoing interface is the interface through which R3 communicates with R1.
- the attribute advertised by R2 includes the first identifier, but the attribute advertised by R1 does not include the first identifier, then R3 will reach the next hop device R2 of the edge BFR of the area A10, then the BIRT table obtained by R3 corresponding to the edge BFR of the area A10
- the next hop included in the entry or BIFT entry is R2, and the outgoing interface is the interface on R3 that can communicate with R2.
- the interfaces on R3 that can communicate with R2 include an interface through which R3 communicates with R1 and an interface through which R3 communicates with R4.
- R3 determines an interface capable of communicating with R2, it may select an interface capable of communicating with R2 according to a link cost (cost) or a link state.
- cost cost
- BIRT entries can be in the following ways:
- BIFT entries can be in the following ways:
- R3 can use the following methods to determine the next hop:
- R3 can according to the first strategy, the node identification of R1 and the node identification of R2. , and determine the device as the next hop from R1 and R2.
- the first strategy may be that the node identifies the larger device as the next hop, or the node identifies the smaller device as the next hop.
- the attribute of R1 includes the node identification and the second identification of R1
- the attribute of R2 includes the node identification and third identification of R2.
- R3 can be based on the second strategy,
- the second identifier and the third identifier determine the device as the next hop from R1 and R2.
- the second policy may be that the device with the higher priority among the second identifier and the third identifier is used as the next hop, or the second policy may be the device with the lower priority among the second identifier and the third identifier as the next hop.
- the attribute of R1 includes the second identification
- the attribute of R2 includes the third identification
- the priority identified by the second identification is different from the priority identified by the third identification
- R3 can be based on the second policy, the second identification and the third identification.
- the attribute of R1 includes the node identification and the second identification of R1
- the attribute of R2 includes the node identification and the third identification of R2, when the priority identified by the second identification and the priority identified by the third identification are the same
- R3 can determine the device as the next hop from R1 and R2 according to the first policy, the node identifier of R1 and the node identifier of R2.
- the first strategy may be that the node identifies the larger device as the next hop, or the node identifies the smaller device as the next hop.
- the attribute of R1 includes the node identification of R1 and the second identification
- the attribute of R2 includes the node identification of R2 and the third identification, when the node identification of R1 and the node identification of R2 are the same, and the second identification is preferred.
- R3 can select any device from R1 and R2 as the next hop.
- R3 may obtain an entry for forwarding the BIER packet.
- the next hop included in the entry for forwarding the BIER packet is the next hop determined by R3.
- R4 judges whether to give an alarm according to the received attribute of R1 and the attribute of R2, and if not, execute S205.
- R4 receives attributes from R1, attributes from R2, first BIER information from R1, and second BIER information from R2.
- R4 determines based on the first BIER information and the second BIER information that both R1 and R2 can be used as intermediate BFRs reaching the edge BFRs included in the area A10.
- R4 can determine whether the first identifier exists in the attribute of R1 and the attribute of R2. If neither the attribute of R1 nor the attribute of R2 has the first identifier, then R4 determines that the configuration is incorrect, and outputs an alarm. If at least one of the attribute of R1 and the attribute of R2 includes the first identifier, then R4 determines that the configuration is correct, and executes S205.
- the method of outputting the alarm please refer to the method adopted by R3.
- R4 determines the next hop to the edge BFR included in the area A10.
- R4 determines the next hop as the device corresponding to the attribute carrying the first identifier, for example, the attribute of R1 published by R1 includes The first identifier, and the attribute of R2 published by R2 does not include the first identifier, then R4 sets the next hop to the edge BFR of the area A10 as R1, then the BIRT entry corresponding to the edge BFR of the area A10 obtained by R4 or The next hop included in the BIFT entry is R1, and the outgoing interface is the interface between R4 and R1.
- the attributes of R2 advertised by R2 include the first identifier, and the attributes of R1 advertised by R1 do not include the first identifier, then R4 will reach the next-hop device R2 of the edge BFR of area A10, then the edge BFR of area A10 obtained by R4 and the edge BFR of area A10 will be reached.
- the next hop included in the corresponding BIRT entry or BIFT entry is R2, and the outgoing interface is the interface through which R4 communicates with R2.
- R4 may obtain an entry for forwarding the BIER packet.
- the next hop included in the entry for forwarding the BIER packet is the next hop determined by R4.
- R3 or R4 when R3 or R4 sends a BEIR multicast packet to the area A10, it can use the obtained entry for forwarding the BIER packet to send the multicast packet to the next hop.
- the method for determining the next hop of the edge BFR reaching the area A10 is more flexible, and an alarm can be raised for a configuration error.
- the priority comparison method the priority of the device with better performance can be set according to the second policy, so that the node with better performance can be determined as the next hop.
- the node identifier of the device with better performance can be set according to the first strategy, so that the node with better performance can be determined as the next hop. In this way, the method provided by the embodiment of the present application can further meet the performance requirement of the multicast service based on the next hop with better performance and improve the forwarding efficiency.
- FIG. 3 is a schematic flowchart of a method for determining a next hop according to Embodiment 2 of the present application.
- both R3 and R4 in Figure 1 will receive attributes from R1, attributes from R2, and BIER information sent by R1 and R2.
- R3 or R4 determines the next step based on the attributes of R1 and R2.
- R3 or R4 uses the BIER information sent by the next hop to generate entries for forwarding BIER packets.
- the entry used to forward the BIER message can be one entry or multiple entries in the BIFT entry and the BIRT entry.
- the second embodiment of the present application is described by taking an example that the BFR-prefixes of R1 and R2 are different.
- the method for determining the next hop provided by Embodiment 2 of the present application will be described below with reference to FIG. 1 and FIG. 3 .
- R1 and R2 may be configured with different BFR-prefixes
- the BFR-prefix configured with R1 may be the first address
- the BFR-prefix configured with R2 may be the second address.
- the meaning of the BFR-prefix in the second embodiment is the same as that in the first embodiment, and details are not repeated here.
- the edge BFR of the area A10 shown in FIG. 1 includes R11, R12 and R13.
- the first BIER information issued by R1 to R3 in the area A1 through the IGP includes BFR-ids with values of 11, 12 and 13.
- the attribute of R1 advertised by R1 to R3 of the area A1 through the IGP includes the first address.
- the second BIER information issued by R2 to R3 in the area A1 through the IGP includes BFR-ids with values of 11, 12 and 13.
- the attribute of R2 advertised by R2 to R3 of the area A1 through the IGP includes the second address.
- the BFR-id included in the first BIER information or the second BIER information can be sent in the manner disclosed in RFC8401 or RFC8444, or carried in the BFR-id range of draft-ietf-bier-prefix-redistribute-00 for sending.
- the BFR-prefix can be carried and sent through the Adv-bfr-prefix field.
- the attribute of R1 may further include one or more of a node identifier of R1 and a second identifier for identifying a priority.
- the attributes of R1 may also include one or more of the node identification of R2 and a third identification for identifying the priority.
- the node identifier in the second embodiment reference may be made to the corresponding content of the first embodiment, which will not be repeated here.
- the identifier used to identify the priority in the second embodiment reference may be made to the corresponding content of the first embodiment, which will not be repeated here.
- the above node identifier may be carried in the Adv-router-id field for transmission.
- the above-mentioned second identifier and the above-mentioned third identifier may be carried in the Adv-admin-tag field for transmission.
- R3 determines the next hop according to the received attributes of R1 and R2.
- R3 receives attributes from R1, attributes from R2, first BIER information from R1, and second BIER information from R2.
- the second BIER information from R2 received by R3 may come from one interface or multiple interfaces among the interface through which R3 communicates with R1 and the interface through which R3 communicates with R4.
- R3 determines that intermediate BFRs passed through by the edge BFR included in the arrival area A10 include R1 and R2.
- R3 may determine the next hop based on the attributes of R1 and the attributes of R2.
- R3 writes the next hop into the BIRT entry or the BIFT entry corresponding to the edge BFR of the area A10.
- the method in Embodiment 1 may be used to determine the interface capable of communicating with R2, which will not be repeated here.
- R3 can use any one of the following methods or a combination of several methods to determine the device as the next hop from R1 and R2, as follows:
- R3 can according to the first strategy, the node identification of R1 and the node identification of R2. , and determine the device as the next hop from R1 and R2.
- the first strategy may be that the node identifies the larger device as the next hop, or the node identifies the smaller device as the next hop.
- the attribute of R1 includes the node identification and the second identification of R1
- the attribute of R2 includes the node identification and third identification of R2.
- R3 can be based on the second strategy,
- the second identifier and the third identifier determine the device as the next hop from R1 and R2.
- the second policy may be that the device with the higher priority among the second identifier and the third identifier is used as the next hop, or the second policy may be the device with the lower priority among the second identifier and the third identifier as the next hop.
- the attribute of R1 includes the second identification
- the attribute of R2 includes the third identification
- the priority identified by the second identification is different from the priority identified by the third identification
- R3 can be based on the second policy, the second identification and the third identification.
- the attribute of R1 includes the node identification and the second identification of R1
- the attribute of R2 includes the node identification and the third identification of R2, when the priority identified by the second identification and the priority identified by the third identification are the same
- R3 can determine the device as the next hop from R1 and R2 according to the first policy, the node identifier of R1 and the node identifier of R2.
- the attribute of R1 includes the node identification of R1 and the second identification
- the attribute of R2 includes the node identification of R2 and the third identification, when the node identification of R1 and the node identification of R2 are the same, and the second identification is preferred.
- R3 can determine any device from R1 and R2 as the next hop.
- the attribute of R1 includes the cost value of R1 reaching R3, the attribute of R2 includes the cost value of R2 reaching R3, and R3 can be based on the fourth strategy, the cost value of R1 reaching R3 and the cost value of R2 reaching R3, from R1 and R2 The device as the next hop is determined. Among them, the cost value of R2 reaching R3 and the cost value of R1 reaching R3.
- the fourth strategy is to select a device with a smaller cost value as the next hop, or select a device with a larger cost value as the next hop.
- one or a combination of the above manners 1 to 5 may be used to determine the next hop.
- the first BIER information may not need to carry the second identifier
- the second BIER information may not need to carry the third identifier.
- the attributes of R1 include the BFR-prefix of R1
- the attributes of R2 include the BFR-prefix of R2
- the R3 can be determined from R1 and R2 according to the fifth strategy, the BFR-prefix of R1 and the BFR-prefix of R2.
- the fifth strategy is to select a device with a smaller BFR-prefix as the next hop, or select a device with a larger BFR-prefix as the next hop.
- the attribute of R1 does not need to carry the second identification, and the attribute of R2 does not need to carry the third identification; even if the attribute of R1 includes the node identification of R1, the attribute of R2 includes the node identification of R2, and the attribute of R3 does not need to carry the node identification of R2. Identify and compare.
- R3 when R3 cannot determine the next hop by using the sixth method, it can determine the next hop by using the seventh method. Or when R3 cannot determine the next hop by using the sixth method, it can use the first method to determine the next hop. Or when R3 cannot determine the next hop by using the sixth method and the first method, it can use the second method to determine the next hop. Or when R3 cannot determine the next hop by using the sixth, the first and the second mode, it can use the seventh or the fifth mode to determine the next hop. Or when R3 cannot determine the next hop by using the sixth method, it can use the third method to determine the next hop. Or when R3 cannot determine the next hop by using the sixth and third modes, it can determine the next hop by using the fourth mode.
- R4 determines the next hop according to the received attributes of R1 and R2.
- R4 receives the first BIER information from R1 and the second BIER information from R2, and R4 also receives the attributes of R1 and the attributes of R2. Based on the first BIER information and the second BIER information, R4 determines that the intermediate BFRs passed through by the edge BFRs included in the arrival area A10 include R1 and R2. R4 may use the same method as that used by R3 to determine the next hop, which will not be repeated here. Optionally, after determining the next hop, R4 writes the next hop into the BIRT entry or the BIFT entry corresponding to the edge BFR of the area A10.
- the above-obtained entry for forwarding the BIER packet can be used to send the multicast packet to the next hop.
- the method for determining the next hop of the edge BFR reaching the area A10 is more flexible, and an alarm can be raised for a configuration error.
- the priority comparison method is adopted, the priority of the device with better performance can be set according to the second policy, so that the node with better performance can be determined as the next hop.
- the node identifier of the device with better performance can be set according to the first strategy, so that the node with better performance can be determined as the next hop. In this way, the method provided by the embodiment of the present application can further meet the performance requirement of the multicast service based on the next hop with better performance and improve the forwarding efficiency.
- the third embodiment is to determine the BIRT and BIFT of a certain BFR-id according to the size of the adv-admin-tag in multiple messages after the adv-admin-tag is configured.
- the following describes the configuration and processing methods of related equipment in conjunction with the scenario shown in Figure 1:
- R1 publishes the first BIER information with BFR-ids 11, 12, 13, 21, 22, and 23 to the isis 1 process (corresponding to area A1), using the BFR-id Range sub-TLV.
- R1 will also publish the information that the BFR-id of this node is 1 to the isis 1 process, using the BIER-info sub-TLV defined by RFC8401.
- the above information published by R1 to the isis 1 process uses the IP address 2001:1:1:1::10 of loopback1 as the BFR-prefix.
- FIG 4 is an example of an IS-IS message sent by R1 carrying a BFR-id Range sub-TLV, which are all sub-TLVs as ISIS Prefix TLVs (TLV types are one of 135, 235, 236 and 237). exists, where the BFR-id range sub-TLV can be a pair of BIER proxy range sub-TLVs as defined in draft-ietf-bier-prefix-redistribute-00.
- the packet format shown in Figure 4 may be another example in which the IS-IS message sent by R1 carries a BFR-id Range sub-TLV, where the BFR-id Range sub-TLV is used as an ISIS Prefix TLV (TLV type is 135, 235, 236 and 237) sub-TLVs exist.
- the BFR-id Range sub-TLV in the message published by router R1 contains BFR-id ranges of 11, 12, 13, 21, 22 and 23; the BFR-id range sub-TLV can be a pair of draft-ietf-bier-prefix Modified from the BIER proxy range sub-TLV defined in -redistribute-00.
- R1 publishes information with a BFR-id of 3, 4 or 5 to the isis 2 process (corresponding to areas A10 and A20), using the BFR-id Range sub-TLV.
- the above information published by R1 to the isis 2 process uses the IP address 2001:1:1:1::20 of loopback2 as the BFR-prefix.
- R2 publishes BFR-ids 11, 12, 13, 21, 22, and 23 to the isis 1 process (corresponding to area A1), using the BFR-id Range sub-TLV.
- the above information published by R2 to the isis 1 process uses the IP address 2001:2:2:2:10 of loopback1 as the BFR-prefix.
- R2 publishes information with BFR-ids 3, 4 and 5 to the isis 2 process (corresponding to areas A10 and A20), using the BFR-id Range sub-TLV.
- the above information published by R2 to the isis 2 process uses the IP address 2001:2:2:2::20 of loopback2 as the BFR-prefix.
- the packet format used by R2 may be the packet format shown in FIG. 4 , which will not be repeated here.
- the fourth embodiment describes that the next hop included in the BIRR and BIFT of a certain BFR-id is determined by configuring the adv-admin-tag and according to the size of the adv-admin-tag in multiple messages.
- the configuration of the fourth embodiment will be described below with reference to the scenario shown in FIG. 1 .
- R1 publishes BFR-ids 11, 12, 13, 21, 22 and 23 to the isis 1 process (corresponding to area A1), and carries an administrative-tag with a value of 1, using the BFR-id Range sub -TLV.
- the above information published by R1 to the isis 1 process uses the IP address 2001:1:1:1:10 of loopback1 as the BFR-prefix.
- Figure 5 is an example of an IS-IS message sent by R1 carrying an administrative-tag and a BFR-id Range sub-TLV.
- the above parameters are used as ISIS Prefix TLVs (TLV types are 135, 235, 236 and 237) A) sub-TLVs exist.
- the administrative-tag value is used as the preferred distinction of the BFR-id contained in the BFR-id Range sub-TLV.
- the BFR-id Range sub-TLV contains the BFR-id of 11, 12, 13, 21, 22 and 23, the Administrative-tag value is 1.
- the BFR-id range sub-TLV may be a pair of BIER proxy range sub-TLVs as defined in draft-ietf-bier-prefix-redistribute-00.
- FIG. 5 is another example of an IS-IS message sent by an R1 carrying an administrative-tag and a BFR-id Range sub-TLV.
- the BFR-id Range sub-TLV exists as a sub-TLV of the ISIS Prefix TLV (TLV type is one of 135, 235, 236 and 237), and the administrative-tag value is defined in the BFR-id Range sub-TLV middle.
- TLV type is one of 135, 235, 236 and 23
- the administrative-tag value is defined in the BFR-id Range sub-TLV middle.
- the BFR-id Range sub-TLV contains BFR-id ranges of 11, 12, 13, 21, 22, and 23, and the Administrative-tag value is 1.
- One of the ISIS Prefix TLVs contains two BFR-id Range sub-TLVs.
- Each BFR-id Range sub-TLV contains an administrative Tag and a (BFR-id, BFR-id range) tuple.
- the BFR-id range sub-TLV can be modified from the BIER proxy range sub-TLV defined in draft-ietf-bier-prefix-redistribute-00.
- R1 publishes information with a BFR-id of 3, 4 or 5 to the isis 2 process (corresponding to areas A10 and A20) and carries an administrative-tag with a value of 1, using the BFR-id Range sub-TLV.
- the above information published by R1 to the isis 2 process uses the IP address 2001:1:1:1::20 of loopback2 as the BFR-prefix.
- R2 is published to the isis 1 process (corresponding to area A1) as 11, 12, 13, 21, 22, and 23, and carries an administrative-tag with a value of 2, using the BFR-id Range sub-TLV.
- the above information published by R2 to the isis 1 process uses the IP address 2001:2:2:2:10 of loopback1 as the BFR-prefix.
- R2 publishes information with BFR-ids 3, 4, and 5 to the isis 2 process (corresponding to areas A10 and A20) and carries an administrative-tag with a value of 2, using the BFR-id Range sub-TLV.
- the above information published by R2 to the isis 2 process uses the IP address 2001:2:2:2::20 of loopback2 as the BFR-prefix.
- R2 may also use the message format of FIG. 5 or FIG. 6 to publish the second BIER information and the attributes of R2, which will not be repeated here.
- the routers in the area A0 establish next-hop routing and forwarding information to the BFR-ids 11, 12, 13, 21, 22, and 23. For details, refer to the corresponding content in Embodiment 1 or Embodiment 2, which will not be repeated here.
- Embodiment 5 By configuring anycast BFR-prefix and configuring the same BIER encapsulation related information, the BIRT and BIFT of a certain BFR-id are determined according to the route to the BFR-prefix. In this embodiment, neither R1 nor R2 is configured with a valid BFR-id value (the BFR-id value filled in the BIER info sub-TLV is an invalid value of 0). The configuration method will be described below with reference to the scenario shown in FIG. 1 .
- Interface loopback1 2001:1:1:1::AAAA anycast indicates that the configured IPv6 address is an anycast address, which is used as the BFR-prefix for BIER information release.
- Interface loopback2 2001:1:1:1::BBBB anycast indicates that the configured IPv6 address is an anycast address, which is used as the BFR-prefix for BIER information release.
- end-bier sid 2001:1:1:1::AB37 anycast indicates that the encapsulation information used to forward BIER packets is an Anycast information.
- end-bier is a BIER packet used for BIERv6 encapsulation. package information.
- anycast indicates that the encapsulation information used for forwarding BIER packets is an Anycast information.
- the bift-id in this example is a BIER packet encapsulation information used for BIERv6/BIER-MPLS encapsulation.
- the bift-id value is an MPLS label. To support the Anycast method in this solution, it is necessary to manually configure R1 and R2 to use the same MPLS label, that is, configure the same bift-id value.
- bift-id When used in Non-MPLS encapsulation or BIERv6 encapsulation, bift-id can be a value automatically generated according to BIER's Sub-domain-id, BitStringLength ID(BSL), Set Identifier(SI), R1 and R2 according to The same rule generates the same value, so no additional configuration is required.
- anycast-flag indicates that the anycast flag is carried when publishing BIER information.
- Figure 7 is an example of an IS-IS message sent by an R1 carrying an Anycast flag and a BFR-id Range sub-TLV, all of which are used as ISIS Prefix TLVs (TLV types are one of 135, 235, 236 and 237). Sub-TLVs exist, as shown in Figure 7.
- anycast flag bit (the 4th bit of the flag bit field of the sub-TLV) defined by draft-ietf-lsr-isis-srv6-extensions-11 based on the Prefix Attribute Flags sub-TLV of RFC7794 bit), the flag bit is used in this scheme as a method for publishing BIER information and establishing BIER routing and BIER forwarding information accordingly.
- R2 publishes BFR-id 11, 12, 13, 21, 22 and 23 to the isis 1 process (corresponding to area A1), and carries the anycast flag, using BFR-id Range sub-TLV; R2 will also send
- R3, R4 and R5 receive the information released by R1 and R2 above.
- FIG. 8 is an apparatus for determining a next hop provided by an embodiment of the present application.
- the device 800 may be disposed on the edge BFR, such as R3 , R4 or R5 , of the region A1 except for R1 and R2 in any one of the first to fifth embodiments above.
- the first device mentioned in this application as an example may be R1 in any one of the foregoing Embodiments 1 to 5, and the second device may be R2 in any of the foregoing Embodiments 1 to 5.
- the apparatus 800 is configured to forward and route the BIER domain based on the bit index, and includes: an acquisition unit 801 and a determination unit 802 .
- the obtaining unit 801 is configured to obtain first BIER information of a first device, attributes of the first device, second BIER information of a second device, and attributes of the second device, where the first BIER information includes The bit-forwarding router identification BFR-id of the edge bit-forwarding router BFR in the sub-domain, and the second BIER information includes the BFR-id of the edge BFR in the sub-domain.
- the determining unit 802 is configured to determine, according to the first BIER information, the second BIER information, the attribute of the first device and the attribute of the second device, the lower part of the edge BFR that reaches the subdomain. One hop.
- the attribute of the first device and the attribute of the second device include a first identifier, where the first identifier is used to identify the BFR prefix of anycast
- the apparatus further includes: an identification unit .
- the identification unit is configured to perform a determination of the arrival of the subdomain when the first BIER information and the second BIER information are the same, and the attribute of the first device and the attribute of the second device include the first identifier. The next hop of the BFR.
- the attribute of the first device or the attribute of the second device includes a first identifier
- the first identifier is used to identify the BFR prefix of anycast
- the determining unit 802 is specifically configured to When the first BIER information and the second BIER information are the same, a device whose attribute includes the first identifier is determined as the next hop.
- the apparatus further includes: an output unit.
- the output unit is configured to output an alarm when the first BFR information and the second BIER information are the same, and neither the attribute of the first device nor the attribute of the second device includes the first identifier.
- the attribute of the first device further includes a node identifier of the first device
- the attribute of the second device includes a node identifier of the second device.
- the determining unit 802 specifically For: when the first BIER information is the same as the second BIER information, based on the first policy, the node identifier of the first device and the node identifier of the second device, determine the first device and the second device. One of the second devices is used as the next hop, and the first strategy includes using a device with a larger node identification as the next hop or a device with a smaller node identification as the next hop.
- the attribute of the first device further includes a second identifier
- the attribute of the second device further includes a third identifier
- the second identifier is used to identify the priority of the first device level
- the third identifier is used to identify the priority of the second device
- the determining unit 802 is specifically configured to: when the first BIER information is the same as the second BIER information, based on the second policy, The second identifier and the third identifier determine one of the first device and the second device as the next hop, and the second strategy includes using the device with a higher priority as the next hop Or take the device with lower priority as the next hop.
- the attribute of the first device includes a BFR prefix of the first device
- the attribute of the second device includes a BFR prefix of the second device
- the BFR prefix of the first device The prefix is different from the BFR prefix of the second device
- the determining unit 802 is specifically configured to: when the first BIER information and the second BIER information are the same, according to the third policy, the overhead cost of the first link value and the cost value of the second link, determine one of the first device and the second device as the next hop
- the third strategy includes using the device on the opposite end of the link with a smaller cost value as the next hop
- One hop or the device on the opposite end of the link with a larger cost value is used as the next hop
- the first link is the link from the third device to the first device
- the second link is the The link from the third device to the second device.
- the attribute of the first device includes a BFR prefix of the first device
- the attribute of the second device includes a BFR prefix of the second device
- the BFR prefix of the first device The prefix is different from the BFR prefix of the second device
- the determining unit 802 is specifically configured to: when the first BIER information and the second BIER information are the same, according to the fourth policy, the BFR of the first device prefix and the BFR prefix of the second device, determine one of the first device and the second device as the next hop, and the fourth policy includes using the device with the smaller BFR prefix as the next hop or Use the device with a larger BFR prefix as the next hop.
- the attribute of the first device includes the BFR prefix of the first device and the node identifier of the first device
- the attribute of the second device includes the BFR of the second device prefix and the node identifier of the second device
- the BFR prefix of the first device is different from the BFR prefix of the second device
- the determining unit 802 is specifically configured to: in the first BIER information and the second device When the two BIER information are the same, according to the first policy, the node identifier of the first device and the node identifier of the second node, determine one of the first device and the second device as the next hop, and the first device and the second device are determined as the next hop.
- the strategy includes taking the device with the larger node identification as the next hop or the device with the smaller node identification as the next hop.
- the attribute of the first device includes a BFR prefix and a second identifier of the first device
- the attribute of the second device includes a BFR prefix and a third identifier of the second device
- the second identifier is used to identify the priority of the first device
- the third identifier is used to identify the priority of the second device
- the BFR prefix of the first device is the same as that of the second device.
- the determining unit 802 is specifically configured to: when the first BIER information and the second BIER information are the same, determine the first BIER according to the second policy, the second identifier and the third identifier One of the device and the second device is used as the next hop, and the second strategy includes using a device with a higher priority as the next hop or a device with a lower priority as the next hop.
- FIG. 9 is a schematic structural diagram of an apparatus for determining a next hop according to an embodiment of the present application.
- the apparatus 900 for determining the next hop provided in the embodiment corresponding to FIG. 10 may be the apparatus 800 for determining the next hop provided in the embodiment corresponding to FIG. 8 .
- the apparatus 900 for determining the next hop provided by the embodiment corresponding to FIG. 9 is described from the perspective of hardware structure.
- the apparatus 900 for determining the next hop includes a processor 901 , a memory 902 , a communication bus 904 and a communication interface 903 .
- the processor 901 , the memory 902 and the communication interface 903 are connected through a communication bus 904 .
- the memory 902 is used to store programs.
- the processor 901 executes the above implementation according to the executable instructions included in the program read from the memory 902 The method performed by any one of Embodiments R3 or R4 in Embodiments 1 to 5.
- An embodiment of the present application provides a system, where the system includes an apparatus 800 for determining a next hop.
- the apparatus 800 for determining the next hop may be configured to perform the method performed by R3 or R4 mentioned in any one of Embodiments 1 to 5.
- An embodiment of the present application provides a chip.
- the chip may include the memory 901 and the processor 901 shown in FIG. 9 .
- the memory 902 is used to store computer instructions.
- the processor 901 is configured to call and execute the computer instructions from the memory 902 to execute the method executed by R3 or R4 mentioned in any one of Embodiments 1 to 5.
- the chip provided by the embodiment of the present application may be disposed on the forwarding hardware, or the forwarding circuit included in the forwarding hardware may be integrated with the chip provided by the embodiment of the present application.
- At least one item (piece) refers to one or more, and “multiple” refers to two or more.
- At least one item(s) below” or similar expressions thereof refer to any combination of these items, including any combination of single item(s) or plural items(s).
- at least one item (a) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c may be single or multiple .
- “A and/or B” is considered to include A alone, B alone, and A+B.
- the disclosed system, apparatus and method may be implemented in other manners.
- the apparatus embodiments described above are only illustrative.
- the division of the units is only a logical module division.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be acquired according to actual needs to achieve the purpose of the solution in this embodiment.
- each module unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit may be implemented in the form of hardware, or may be implemented in the form of software module units.
- the integrated unit if implemented in the form of a software module unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium.
- the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes .
- the functions described in the present invention may be implemented in hardware, software, firmware, or any combination thereof.
- the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
- Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
- a storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (25)
- 一种确定下一跳的方法,其特征在于,所述方法应用于基于位索引转发路由BIER域,包括:第三设备获取第一设备的第一BIER信息、所述第一设备的属性、第二设备的第二BIER信息和所述第二设备的属性,所述第一BIER信息包括子域中的边缘位转发路由器BFR的位转发路由器标识BFR-id,所述第二BIER信息包括所述子域中的所述边缘BFR的所述BFR-id;所述第三设备根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳。
- 根据权利要求1所述的方法,其特征在于,所述第一设备的属性和所述第二设备的属性包括第一标识,所述第一标识用于标识anycast的BFR前缀,所述方法还包括:所述第三设备在所述第一BIER信息和所述第二BIER信息相同,且所述第一设备的属性和所述第二设备的属性包括第一标识时,执行确定到达所述子域中所述边缘BFR的下一跳。
- 根据权利要求1所述的方法,其特征在于,所述第一设备的属性或所述第二设备的属性包括第一标识,所述第一标识用于标识anycast的BFR前缀,所述第三设备根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳包括:所述第三设备在所述第一BIER信息和所述第二BIER信息相同时,将属性包括所述第一标识的设备确定为下一跳。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述第三设备在所述第一BFR信息和所述第二BIER信息相同,所述第一设备的属性和所述第二设备的属性均不包括第一标识时,输出告警,所述第一标识用于标识anycast的BFR前缀。
- 根据权利要求2所述的方法,其特征在于,所述第一设备的属性还包括所述第一设备的节点标识,所述第二设备的属性包括所述第二设备的节点标识,所述第三设备根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳包括:所述第三设备在所述第一BIER信息与所述第二BIER信息相同时,基于第一策略、所述第一设备的节点标识和所述第二设备的节点标识,确定所述第一设备和第二设备中的一个设备作为下一跳,所述第一策略包括将节点标识较大的设备作为下一跳或者将节点标识较小的设备作为下一跳。
- 根据权利要求2所述的方法,其特征在于,所述第一设备的属性还包括第二标识,所述第二设备的属性还包括第三标识,所述第二标识用于标识所述第一设备的优先级,所述第三标识用于标识所述第二设备的优先级,所述第三设备根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳包括:所述第三设备在所述第一BIER信息与所述第二BIER信息相同时,基于第二策略、所述第二标识和所述第三标识,确定所述第一设备和所述第二设备中的一个设备作为下一跳,所述第二策略包括将优先级较大的设备作为下一跳或者将优先级较小的设备作为下一跳。
- 根据权利要求1所述的方法,其特征在于,所述第一设备的属性包括所述第一设备的BFR前缀,所述第二设备的属性包括所述第二设备的BFR前缀,所述第一设备的BFR前缀与所述第二设备的BFR前缀不同,所述第三设备根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳包括:所述第三设备在所述第一BIER信息和所述第二BIER信息相同时,根据第三策略、第一链路的开销cost值和第二链路的cost值,确定所述第一设备和所述第二设备中的一个设备作为下一跳,所述第三策略包括将cost值较小的链路对端的设备作为下一跳或者将cost值较大的链路对端的设备作为下一跳,所述第一链路为所述第三设备到达所述第一设备的链路,所述第二链路为所述第三设备到达所述第二设备的链路。
- 根据权利要求1所述的方法,其特征在于,所述第一设备的属性包括所述第一设备的BFR前缀,所述第二设备的属性包括所述第二设备的BFR前缀,所述第一设备的BFR前缀与所述第二设备的BFR前缀不同,所述第三设备根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳包括:所述第三设备在所述第一BIER信息和所述第二BIER信息相同时,根据第四策略、所述第一设备的BFR前缀和所述第二设备的BFR前缀,确定所述第一设备和所述第二设备中的一个设备作为下一跳,所述第四策略包括将BFR前缀较小的设备作为下一跳或者将BFR前缀较大的设备作为下一跳。
- 根据权利要求1所述的方法,其特征在于,所述第一设备的属性包括所述第一设备的BFR前缀和所述第一设备的节点标识,所述第二设备的属性包括所述第二设备的BFR前缀和所述第二设备的节点标识,所述第一设备的BFR前缀与所述第二设备的BFR前缀不同,所述第三设备根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳包括:所述第三设备在所述第一BIER信息和所述第二BIER信息相同时,根据第一策略、所述第一设备的节点标识和所述第二节点的节点标识,确定第一设备和第二设备中的一个设备作为下一跳,所述第一策略包括将节点标识较大的设备作为下一跳或者将节点标识较小的设备作为下一跳。
- 根据权利要求1所述的方法,其特征在于,所述第一设备的属性包括所述第一设备的BFR前缀和第二标识,所述第二设备的属性包括所述第二设备的BFR前缀和第三标识,所述第二标识用于标识所述第一设备的优先级,所述第三标识用于标识所述第二设备的优先级,所述第一设备的BFR前缀与所述第二设备的BFR前缀不同,所述第三设备根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳包括:所述第三设备在所述第一BIER信息和所述第二BIER信息相同时,根据第二策略、所述第二标识和所述第三标识,确定第一设备和第二设备中的一个设备作为下一跳,所述第二策略包括将优先级较大的设备作为下一跳或者将优先级较小的设备作为下一跳。
- 一种确定下一跳的装置,其特征在于,所述装置设于基于位索引转发路由BIER域,包括:获取单元,用于获取第一设备的第一BIER信息、所述第一设备的属性、第二设备的第二BIER信息和所述第二设备的属性,所述第一BIER信息包括子域中的边缘位转发路由器 BFR的位转发路由器标识BFR-id,所述第二BIER信息包括所述子域中的所述边缘BFR的所述BFR-id;确定单元,用于根据所述第一BIER信息、所述第二BIER信息、所述第一设备的属性和所述第二设备的属性,确定到达所述子域中的所述边缘BFR的下一跳。
- 根据权利要求11所述的装置,其特征在于,所述第一设备的属性和所述第二设备的属性包括第一标识,所述第一标识用于标识anycast的BFR前缀,所述装置还包括:识别单元,用于在所述第一BIER信息和所述第二BIER信息相同,且所述第一设备的属性和所述第二设备的属性包括第一标识时,执行确定到达所述子域的所述BFR的下一跳。
- 根据权利要求11所述的装置,其特征在于,所述第一设备的属性或所述第二设备的属性包括第一标识,所述第一标识用于标识anycast的BFR前缀,所述确定单元具体用于:在所述第一BIER信息和所述第二BIER信息相同时,将属性包括所述第一标识的设备确定为下一跳。
- 根据权利要求11所述的装置,其特征在于,所述装置还包括:输出单元,用于确在所述第一BFR信息和所述第二BIER信息相同,所述第一设备的属性和所述第二设备的属性均不包括第一标识时,输出告警。
- 根据权利要求12所述的装置,其特征在于,所述第一设备的属性还包括所述第一设备的节点标识,所述第二设备的属性包括所述第二设备的节点标识,所述确定单元具体用于:在所述第一BIER信息与所述第二BIER信息相同时,基于第一策略、所述第一设备的节点标识和所述第二设备的节点标识,确定所述第一设备和第二设备中的一个设备作为下一跳,所述第一策略包括将节点标识较大的设备作为下一跳或者将节点标识较小的设备作为下一跳。
- 根据权利要求12所述的装置,其特征在于,所述第一设备的属性还包括第二标识,所述第二设备的属性还包括第三标识,所述第二标识用于标识所述第一设备的优先级,所述第三标识用于标识所述第二设备的优先级,所述确定单元具体用于:在所述第一BIER信息与所述第二BIER信息相同时,基于第二策略、所述第二标识和所述第三标识,确定所述第一设备和所述第二设备中的一个设备作为下一跳,所述第二策略包括将优先级较大的设备作为下一跳或者将优先级较小的设备作为下一跳。
- 根据权利要求11所述的装置,其特征在于,所述第一设备的属性包括所述第一设备的BFR前缀,所述第二设备的属性包括所述第二设备的BFR前缀,所述第一设备的BFR前缀与所述第二设备的BFR前缀不同,所述确定单元具体用于:在所述第一BIER信息和所述第二BIER信息相同时,根据第三策略、第一链路的开销cost值和第二链路的cost值,确定所述第一设备和所述第二设备中的一个设备作为下一跳,所述第三策略包括将cost值较小的链路对端的设备作为下一跳或者将cost值较大的链路对端的设备作为下一跳,所述第一链路为所述第三设备到达所述第一设备的链路,所述第二链路为所述第三设备到达所述第二设备的链路。
- 根据权利要求11所述的装置,其特征在于,所述第一设备的属性包括所述第一设备的BFR前缀,所述第二设备的属性包括所述第二设备的BFR前缀,所述第一设备的BFR前缀与所述第二设备的BFR前缀不同,所述确定单元具体用于:在所述第一BIER信息和所述第二BIER信息相同时,根据第四策略、所述第一设备的BFR前缀和所述第二设备的BFR前缀,确定所述第一设备和所述第二设备中的一个设备作为下一跳,所述第四策略包括将BFR前缀较小的设备作为下一跳或者将BFR前缀较大的设备 作为下一跳。
- 根据权利要求11所述的装置,其特征在于,所述第一设备的属性包括所述第一设备的BFR前缀和所述第一设备的节点标识,所述第二设备的属性包括所述第二设备的BFR前缀和所述第二设备的节点标识,所述第一设备的BFR前缀与所述第二设备的BFR前缀不同,所述确定单元具体用于:在所述第一BIER信息和所述第二BIER信息相同时,根据第一策略、所述第一设备的节点标识和所述第二节点的节点标识,确定第一设备和第二设备中的一个设备作为下一跳,所述第一策略包括将节点标识较大的设备作为下一跳或者将节点标识较小的设备作为下一跳。
- 根据权利要求1所述的方法,其特征在于,所述第一设备的属性包括所述第一设备的BFR前缀和第二标识,所述第二设备的属性包括所述第二设备的BFR前缀和第三标识,所述第二标识用于标识所述第一设备的优先级,所述第三标识用于标识所述第二设备的优先级,所述第一设备的BFR前缀与所述第二设备的BFR前缀不同,所述确定单元具体用于:在所述第一BIER信息和所述第二BIER信息相同时,根据第二策略、所述第二标识和所述第三标识,确定第一设备和第二设备中的一个设备作为下一跳,所述第二策略包括将优先级较大的设备作为下一跳或者将优先级较小的设备作为下一跳。
- 一种系统,其特征在于,所述系统包括如权利要求11至20任一所述的确定下一跳的装置。
- 一种芯片,其特征在于,所述芯片包括存储器和处理器,所述存储器用于存储计算机指令,所述处理器用于从所述存储器中调用并运行所述计算机指令,以执行权利要求1至10任一所述的确定下一跳的方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品包括一个或多个计算机程序指令,当所述计算机程序指令被计算机加载并执行时,使得所述计算机执行权利要求1至10任一所述的确定下一跳的方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储指令,所述指令中包括用于执行权利要求1至10任一所述的确定下一跳的方法所设计的程序。
- 一种确定下一跳的装置,其特征在于,所述发送组播报文的装置包括处理器和存储供所述处理器执行的程序指令的非瞬时性计算机可读存储介质,所述程序指令指示所述处理器执行权利要求1至10任一所述的确定下一跳的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023526335A JP2023547485A (ja) | 2020-10-30 | 2021-09-02 | 次ホップ決定方法および装置 |
EP21884698.8A EP4224817A4 (en) | 2020-10-30 | 2021-09-02 | METHOD AND DEVICE FOR DETERMINING THE NEXT JUMP |
KR1020237017030A KR20230088494A (ko) | 2020-10-30 | 2021-09-02 | 다음 홉을 결정하기 위한 방법 및 장치 |
US18/309,532 US20230269165A1 (en) | 2020-10-30 | 2023-04-28 | Next Hop Determining Method and Apparatus |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011193045 | 2020-10-30 | ||
CN202011193045.7 | 2020-10-30 | ||
CN202110184092.3 | 2021-02-10 | ||
CN202110184092.3A CN114531391A (zh) | 2020-10-30 | 2021-02-10 | 确定下一跳的方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/309,532 Continuation US20230269165A1 (en) | 2020-10-30 | 2023-04-28 | Next Hop Determining Method and Apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022088967A1 true WO2022088967A1 (zh) | 2022-05-05 |
Family
ID=81381835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/116119 WO2022088967A1 (zh) | 2020-10-30 | 2021-09-02 | 确定下一跳的方法及装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230269165A1 (zh) |
EP (1) | EP4224817A4 (zh) |
JP (1) | JP2023547485A (zh) |
KR (1) | KR20230088494A (zh) |
WO (1) | WO2022088967A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12040978B2 (en) * | 2021-04-02 | 2024-07-16 | Microsoft Technology Licensing, Llc | Anycast routing technique for a content delivery network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209629A (zh) * | 2014-11-06 | 2016-12-07 | 瞻博网络公司 | 确定性的且优化的比特索引显式复制(bier)转发 |
CN106506367A (zh) * | 2016-11-30 | 2017-03-15 | 杭州华三通信技术有限公司 | 一种下一跳确定方法及装置 |
CN106656524A (zh) * | 2015-10-30 | 2017-05-10 | 中兴通讯股份有限公司 | 一种bier控制信息的传输方法、装置和系统 |
CN110784411A (zh) * | 2019-09-30 | 2020-02-11 | 华为技术有限公司 | 建立bier转发表项的方法、装置和系统 |
-
2021
- 2021-09-02 KR KR1020237017030A patent/KR20230088494A/ko active Search and Examination
- 2021-09-02 WO PCT/CN2021/116119 patent/WO2022088967A1/zh active Application Filing
- 2021-09-02 EP EP21884698.8A patent/EP4224817A4/en active Pending
- 2021-09-02 JP JP2023526335A patent/JP2023547485A/ja active Pending
-
2023
- 2023-04-28 US US18/309,532 patent/US20230269165A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209629A (zh) * | 2014-11-06 | 2016-12-07 | 瞻博网络公司 | 确定性的且优化的比特索引显式复制(bier)转发 |
CN106656524A (zh) * | 2015-10-30 | 2017-05-10 | 中兴通讯股份有限公司 | 一种bier控制信息的传输方法、装置和系统 |
CN106506367A (zh) * | 2016-11-30 | 2017-03-15 | 杭州华三通信技术有限公司 | 一种下一跳确定方法及装置 |
CN110784411A (zh) * | 2019-09-30 | 2020-02-11 | 华为技术有限公司 | 建立bier转发表项的方法、装置和系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4224817A4 |
Also Published As
Publication number | Publication date |
---|---|
US20230269165A1 (en) | 2023-08-24 |
EP4224817A4 (en) | 2024-04-03 |
JP2023547485A (ja) | 2023-11-10 |
EP4224817A1 (en) | 2023-08-09 |
KR20230088494A (ko) | 2023-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7419510B2 (ja) | Bier転送項目構築方法、装置、およびシステム | |
EP2869512B1 (en) | Dynamic area filtering for link-state routing protocols | |
US9319312B2 (en) | Segment routing mapping server for LDP/SR interoperability | |
CN106572023B (zh) | 一种实现比特位索引显示复制的方法及比特位转发路由器 | |
US10637687B2 (en) | EVPN implicit aliasing | |
US8121032B2 (en) | Efficient convergence of grouped VPN prefixes | |
WO2021189993A1 (zh) | 路由方法、路由装置及计算机可读存储介质 | |
JP7479489B2 (ja) | パケット送信方法、デバイス、およびシステム | |
US11671352B2 (en) | Message sending method, binding relationship advertising method, apparatus, and storage medium | |
WO2016198022A1 (zh) | 一种实现虚拟化网络叠加的方法与网络虚拟化边缘节点 | |
CN111837368B (zh) | 使用内部网关协议通告和编程优选路径路由 | |
US20220286383A1 (en) | Method and Apparatus for Processing Forwarding Entry | |
US20230269165A1 (en) | Next Hop Determining Method and Apparatus | |
WO2018177273A1 (zh) | 一种基于bier信息的处理及装置 | |
US12058027B2 (en) | Packet transmission method, correspondence obtaining method, apparatus, and system | |
US7525949B1 (en) | Forwarding for network devices | |
WO2023016550A1 (zh) | 一种路由发送方法及设备 | |
JP7273125B2 (ja) | BIERv6パケットを送信するための方法および第1のネットワークデバイス | |
Le Faucheur et al. | Advertising IPv4 Network Layer Reachability Information with an IPv6 Next Hop | |
CN114531391A (zh) | 确定下一跳的方法及装置 | |
WO2022188488A1 (zh) | 路径建立方法及其装置、节点、计算机可读存储介质 | |
WO2024061184A1 (zh) | 对应关系的获取方法、参数通告方法、装置、设备及介质 | |
US12028249B2 (en) | Resource aware forwarding in the network with abstract destination address and semantic addressing | |
WO2024179107A1 (zh) | 一种路由通告的方法以及相关装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 202327029771 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023526335 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 2021884698 Country of ref document: EP Effective date: 20230503 |
|
ENP | Entry into the national phase |
Ref document number: 20237017030 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |