WO2022135321A1 - Procédé, dispositif et système de transmission de paquets - Google Patents

Procédé, dispositif et système de transmission de paquets Download PDF

Info

Publication number
WO2022135321A1
WO2022135321A1 PCT/CN2021/139554 CN2021139554W WO2022135321A1 WO 2022135321 A1 WO2022135321 A1 WO 2022135321A1 CN 2021139554 W CN2021139554 W CN 2021139554W WO 2022135321 A1 WO2022135321 A1 WO 2022135321A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
identifier
path
message
identification
Prior art date
Application number
PCT/CN2021/139554
Other languages
English (en)
Chinese (zh)
Inventor
刘翔
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202110267901.7A external-priority patent/CN114726754A/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022135321A1 publication Critical patent/WO2022135321A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a message transmission method, device, and system.
  • a communication system usually includes a plurality of nodes, and the nodes can transmit packets along the path of the tunnel by using the tunneling technology.
  • the head node of the path needs to perform fault detection on the path.
  • node A may send a detection packet to node B along path 1.
  • node B After receiving the detection packet, node B will determine the shortest path (path 2) from node B to node A according to the Internet Protocol (Internet Protocol, IP) routing, and send the detection packet to node A along path 2. response message. If node A receives the response message within the time period threshold after sending the detection message, node A determines that path 1 is not faulty, and can continue to transmit messages on path 1 subsequently. If node A does not receive the response message within the duration threshold after sending the detection message, node A determines that path 1 is faulty, and will not transmit messages on path 1 subsequently.
  • IP Internet Protocol
  • the application provides a message transmission method, device and system, which can solve the problem of low accuracy of path fault detection.
  • the technical solution is as follows:
  • a message transmission method includes: after receiving a detection message, a first node obtains and sends a response message of the detection message.
  • the detection packet carries a first identification list, the first identification list is used to indicate the first path from the second node to the first node, and the first identification list includes: the first path the first identifier of the first intermediate node;
  • the response message carries a second identifier list, the second identifier list is obtained by the first node according to the first identifier list, and the second identifier list is used for A second path from the first node to the second node is indicated, and the second identification list includes the first identification.
  • both the first identifier list and the second identifier list include the first identifier of the first intermediate node
  • both the first path and the second path pass through the first intermediate node indicated by the first identifier
  • the first path and the second path pass through the first intermediate node indicated by the first identifier.
  • the head and tail nodes of the path are opposite, so the second path has a higher degree of consistency with the first path. Therefore, the transmission path of the response packet is highly consistent with the transmission path of the detection packet, the transmission status of the response packet is relatively consistent with the transmission status of the detection packet, and the transmission status of the response packet can reflect the failure of the first path. In this case, the accuracy of the second node determining whether the first path is faulty according to the response message is relatively high.
  • the second node since the second node has high accuracy in determining whether the first path is faulty, the probability of service interruption caused by the second node switching paths when the first path is not faulty is reduced, and user experience is improved.
  • the path in this embodiment of the present application may be a path of a tunnel, or may not be a path of a tunnel, which is not limited in this embodiment of the present application.
  • the tunnel can be any type of tunnel, for example, a segment routing policy (Segment Routing Internet Protocol version 6 policy, SRv6 policy) tunnel based on the sixth version of the Internet Protocol, a segment routing traffic engineering tunnel (Segment Routing Traffic Engineering Tunnel, SR-TE Tunnel), or segment routing (Segment Routing Best Effort policy, SR-BE), etc.
  • the first identification list may be a segment list.
  • the detection message carries: an operation code, and the operation code is used to instruct: to generate a response message carrying an identification list that is used to indicate that the first path is consistent with and opposite to the direction; the first node may When the detection message carries the operation code, the response message is generated. When the detection packet carries an operation code, the first node may generate a response packet according to the instruction of the operation code, so that the efficiency of generating the response packet after the first node receives the detection packet can be improved.
  • the detection message may also not carry an operation code, which is not limited in this application.
  • the first path is consistent with the second path, and the consistency here can be strict consistency.
  • the nodes traversed by the first path and the second path are exactly the same, and the consistency here can also be non-strict consistency. are consistent, for example, the nodes traversed by the first path and the second path are only partially the same.
  • the first identifier list includes: identifiers of multiple intermediate nodes on the first path; the second identifier list also includes: identifiers of the multiple intermediate nodes; The arrangement order of the identifiers in the second identifier list is opposite to the arrangement order of the identifiers of the plurality of intermediate nodes in the first identifier list.
  • the consistency between the first path and the second path is further improved, and the accuracy with which the second node determines whether the first path is faulty according to the response message is further improved.
  • the above-mentioned multiple intermediate nodes may be some or all of the intermediate nodes on the first path, which is not limited in this application.
  • the plurality of intermediate nodes include: other nodes in the first path except the first node and the second node. In this case, the degree of consistency between the first path and the second path is high.
  • the first node when the first node obtains the response message of the detection message, according to the identifiers of the multiple intermediate nodes included in the first identifier list, in the reverse order, obtain the second identifier list. , and then encapsulate the second identification list into the response message.
  • the first identifier includes: an identifier of a port or link where the first intermediate node receives the detection packet.
  • the first identifier may also be the node identifier of the first intermediate node, which is not limited in this application.
  • the first identification includes: when the first intermediate node receives the identification of the port or link of the detection packet, when the first intermediate node sends the response packet, the first intermediate node may The port or link in the system sends a response packet. In this way, it is ensured that the first intermediate node receives the detection packet and sends the response packet through the same port or link, thereby further improving the consistency of the transmission path of the detection packet and the transmission path of the response packet.
  • the identifier of the first intermediate node in the detection packet sent by the second node may be the same as the first identifier Differently, after receiving the detection packet, the first intermediate node needs to update the identifier of the first intermediate node in the detection packet to the above-mentioned first identifier.
  • the second identification list may further include the identification of the second node.
  • the identification of the second node may be obtained by the first node in any manner.
  • the detection message also carries the address of the second node, and before obtaining the response message, the first node may determine the identifier of the second node according to the address of the second node.
  • the first node may store a correspondence between the address of the node and the identifier, and the first node may determine the identifier of the second node corresponding to the address of the second node according to the correspondence.
  • the detection packet includes a first segment routing header (Segment Routing Header, SRH), the first SRH carries the first identification list; the response packet includes a second SRH, the The second SRH carries the second identification list.
  • the detection message includes a first load part, and the first load part carries the first identification list; the response message includes a second load part, and the second load part carries the first identification list. 2. List of identities.
  • the detection message is: a seamless bidirectional forwarding detection (Seamless Bidirectional Forwarding Detection, SBFD) message.
  • the detection message may also be other types of messages, which are not limited in this application.
  • a packet transmission method includes: a second node generates a detection packet, and sends the detection packet to the first node.
  • the detection packet carries a first identification list
  • the first identification list is used to indicate the first path from the second node to the first node
  • the first identification list includes: the first path The initial identification of the first intermediate node.
  • the detection packet is used to instruct the first node to obtain a response packet of the detection packet, and the response packet carries a second identification list; the second identification list is the basis of the first node. Obtained from the first identification list, the second identification list is used to indicate the second path from the first node to the second node, and the second identification list includes: an identification.
  • both the first identifier list and the second identifier list include the first identifier of the first intermediate node
  • both the first path and the second path pass through the first intermediate node indicated by the first identifier
  • the first path and the second path pass through the first intermediate node indicated by the first identifier.
  • the head and tail nodes of the path are opposite, so the second path has a higher degree of consistency with the first path. Therefore, the transmission path of the response packet is highly consistent with the transmission path of the detection packet, the transmission status of the response packet is relatively consistent with the transmission status of the detection packet, and the transmission status of the response packet can reflect the failure of the first path. In this case, the accuracy of the second node determining whether the first path is faulty according to the response message is relatively high.
  • the second node since the second node has high accuracy in determining whether the first path is faulty, the probability of service interruption caused by the second node switching paths when the first path is not faulty is reduced, and user experience is improved.
  • the detection message carries: an operation code; the operation code is used to instruct: to generate a response message carrying an identification list used to indicate that the first path is consistent and opposite in direction.
  • the detection packet carries an operation code
  • the first node can generate a response packet according to the instruction of the operation code, so that the efficiency of generating the response packet after the first node receives the detection packet can be improved.
  • the detection message may also not carry an operation code, which is not limited in this application.
  • the first identifier list includes: identifiers of multiple intermediate nodes on the first path; the second identifier list also includes: identifiers of the multiple intermediate nodes; The arrangement order of the identifiers in the second identifier list is opposite to the arrangement order of the identifiers of the plurality of intermediate nodes in the first identifier list.
  • the consistency between the first path and the second path is further improved, and the accuracy with which the second node determines whether the first path is faulty according to the response message is further improved.
  • the detection packet further carries: a first indication; the first indication is used to instruct the first intermediate node: when the detection packet carries the first indication, the The initial identification is updated to the first identification.
  • the first intermediate node may update the initial identification in the first identification list to the first identification of the first intermediate node when the detection packet carries the first indication.
  • the first intermediate node may not change the initial identification. In this way, the first intermediate node can determine whether the identifier in the message needs to be changed according to the first instruction, thereby preventing the first intermediate node from changing the identifier in each received packet, reducing the need for power consumption of the first intermediate node.
  • a flags (Flags) field in the packet header of the detection packet carries the first indication.
  • the detection packet includes a first SRH, and the first SRH carries the first identification list; or, the detection packet includes a first load part, and the first load part carries Describe the first identification list.
  • a third aspect provides a packet transmission method, the method is performed by a third node on a first path, where the first path is a path from the second node to the first node, the method includes: first, The third node receives the detection message.
  • the detection packet carries a first identification list, the first identification list is used to indicate the first path, and the first identification list includes the initial identification of the third node.
  • the third node updates the initial identification in the first identification list to the first identification of the third node, obtains the updated detection message, and analyzes the updated detection message to be processed.
  • the third node may be the first node on the first path, or may be the first intermediate node on the first path, where the first intermediate node is any intermediate node on the first path.
  • processing the updated detection message by the third node may include: the third node generates a response message according to the updated detection message.
  • processing the updated detection message by the third node may include: sending the updated detection message by the third node.
  • the second intermediate node in the response packet generated by the first node according to the detection packet The identifier list includes: the first identifier of the first intermediate node, and the first identifier is the identifier of the port or link where the first intermediate node receives the detection message. Therefore, when the first intermediate node sends the response message, the The port or link in the first intermediate node sends a response message. In this way, it is ensured that the first intermediate node receives the detection packet and sends the response packet through the same port or link, thereby further improving the consistency of the transmission path of the detection packet and the transmission path of the response packet.
  • the initial identification of the above-mentioned third node is different from the first identification.
  • the initial identification includes: the node identification of the third node, for example, the node identification may be a node segment identification (Node SID); the first identification
  • the identifier includes: an identifier of the port or link where the third node receives the detection message, for example, the first identifier may be a link segment identifier (End.X SID).
  • the detection packet further carries: a first indication
  • the third node may update the initial identification to the first identification when the detection packet carries the first indication.
  • the third node may not change the initial identification. In this way, the third node can determine whether the identifier in the message needs to be changed according to the first instruction, thereby preventing the third node from changing the identifier in each received message, reducing the Power consumption of three nodes.
  • processing the updated detection packet by the third node includes: sending the updated detection packet by the third node; the method further includes: After processing the updated detection packet, the third node receives a response packet of the detection packet, and sends the response packet.
  • the response message carries a second identification list, the second identification list is used to indicate the second path from the first node to the second node, and the second identification list includes the first identification list. logo.
  • a message transmission device belongs to the first node, and the message transmission device includes: a receiving module, an obtaining module, and a sending module.
  • the receiving module is configured to receive a detection packet, the detection packet carries a first identification list, and the first identification list is used to indicate the first path from the second node to the first node.
  • the identification list includes: the first identification of the first intermediate node on the first path; the obtaining module is used to obtain a response message of the detection message, the response message carries a second identification list, the second The identification list is obtained according to the first identification list, the second identification list is used to indicate the second path from the first node to the second node, and the second identification list includes the first identification ; The sending module is used to send the response message.
  • both the first identifier list and the second identifier list include the first identifier of the first intermediate node
  • both the first path and the second path pass through the first intermediate node indicated by the first identifier
  • the first path and the second path pass through the first intermediate node indicated by the first identifier.
  • the head and tail nodes of the path are opposite, so the second path has a higher degree of consistency with the first path. Therefore, the transmission path of the response packet is highly consistent with the transmission path of the detection packet, the transmission status of the response packet is relatively consistent with the transmission status of the detection packet, and the transmission status of the response packet can reflect the failure of the first path. In this case, the accuracy of the second node determining whether the first path is faulty according to the response message is relatively high.
  • the second node since the second node has high accuracy in determining whether the first path is faulty, the probability of service interruption caused by the second node switching paths when the first path is not faulty is reduced, and user experience is improved.
  • the detection message carries: an operation code, and the operation code is used to instruct: to generate a response message carrying an identification list that is used to indicate that the first path is consistent and in the opposite direction; the obtaining module It is used for: generating the response message when the detection message carries the operation code.
  • the detection packet carries an operation code
  • the first node may generate a response packet according to the instruction of the operation code, so that the efficiency of generating the response packet after the first node receives the detection packet can be improved.
  • the detection message may also not carry an operation code, which is not limited in this application.
  • the first identifier list includes: identifiers of multiple intermediate nodes on the first path; the second identifier list also includes: identifiers of the multiple intermediate nodes; The arrangement order of the identifiers in the second identifier list is opposite to the arrangement order of the identifiers of the plurality of intermediate nodes in the first identifier list.
  • the consistency between the first path and the second path is further improved, and the accuracy with which the second node determines whether the first path is faulty according to the response message is further improved.
  • the plurality of intermediate nodes include: other nodes in the first path except the first node and the second node.
  • the degree of consistency between the first path and the second path is high.
  • the obtaining module is configured to: obtain the second identification list in reverse order according to the identifications of the multiple intermediate nodes included in the first identification list; encapsulated into the response message.
  • the first identifier includes: an identifier of a port or link where the first intermediate node receives the detection packet.
  • the first identifier may also be the node identifier of the first intermediate node, which is not limited in this application.
  • the first identification includes: when the first intermediate node receives the identification of the port or link of the detection packet, when the first intermediate node sends the response packet, the first intermediate node may The port or link in the system sends a response packet. In this way, it is ensured that the first intermediate node receives the detection packet and sends the response packet through the same port or link, thereby further improving the consistency of the transmission path of the detection packet and the transmission path of the response packet.
  • the identifier of the first intermediate node in the detection packet sent by the second node may be the same as the first identifier Differently, after receiving the detection packet, the first intermediate node needs to update the identifier of the first intermediate node in the detection packet to the above-mentioned first identifier.
  • the second identification list may further include the identification of the second node.
  • the identification of the second node may be obtained by the first node in any manner.
  • the detection packet further carries the address of the second node
  • the packet transmission device further includes: a determining module, configured to, before obtaining the response packet, determine the address of the second node according to the address of the second node. , determine the identifier of the second node, and the response message includes: the identifier of the second node.
  • the first node may store a correspondence between the address of the node and the identifier, and the first node may determine the identifier of the second node corresponding to the address of the second node according to the correspondence.
  • the detection message includes a first SRH, and the first SRH carries the first identifier list; the response message includes a second SRH, and the second SRH carries the second identifier or, the detection packet includes a first load part, and the first load part carries the first identification list; the response packet includes a second load part, and the second load part carries Describe the second identification list.
  • the detection message is: an SBFD message.
  • the detection message may also be other types of messages, which are not limited in this application.
  • a message transmission device in a fifth aspect, is provided, the message transmission device belongs to the second node, and the message transmission device includes: a generating module and a sending module.
  • the generating module is configured to generate a detection packet, the detection packet carries a first identification list, and the first identification list is used to indicate a first path from the second node to the first node, and the first identification list
  • the identifier list includes: the initial identifier of the first intermediate node on the first path; the sending module is configured to send the detection message to the first node; the detection message is used to instruct the first node to obtain the The response message of the detection message, the response message carries a second identification list; the second identification list is obtained by the first node according to the first identification list, and the second identification list is used for A second path from the first node to the second node is indicated, and the second identification list includes: a first identification of the first intermediate node.
  • both the first identifier list and the second identifier list include the first identifier of the first intermediate node
  • both the first path and the second path pass through the first intermediate node indicated by the first identifier
  • the first path and the second path pass through the first intermediate node indicated by the first identifier.
  • the head and tail nodes of the path are opposite, so the second path has a higher degree of consistency with the first path. Therefore, the transmission path of the response packet is highly consistent with the transmission path of the detection packet, the transmission status of the response packet is relatively consistent with the transmission status of the detection packet, and the transmission status of the response packet can reflect the failure of the first path. In this case, the accuracy of the second node determining whether the first path is faulty according to the response message is relatively high.
  • the second node since the second node has high accuracy in determining whether the first path is faulty, the probability of service interruption caused by the second node switching paths when the first path is not faulty is reduced, and user experience is improved.
  • the detection message carries: an operation code; the operation code is used to instruct: to generate a response message carrying an identification list used to indicate that the first path is consistent and opposite in direction.
  • the detection packet carries an operation code
  • the first node may generate a response packet according to the instruction of the operation code, so that the efficiency of generating the response packet after the first node receives the detection packet can be improved.
  • the detection message may also not carry an operation code, which is not limited in this application.
  • the first identifier list includes: identifiers of multiple intermediate nodes on the first path; the second identifier list also includes: identifiers of the multiple intermediate nodes; The arrangement order of the identifiers in the second identifier list is opposite to the arrangement order of the identifiers of the plurality of intermediate nodes in the first identifier list.
  • the consistency between the first path and the second path is further improved, and the accuracy with which the second node determines whether the first path is faulty according to the response message is further improved.
  • the detection packet further carries: a first indication; the first indication is used to instruct the first intermediate node: when the detection packet carries the first indication, the The initial identification is updated to the first identification.
  • the first intermediate node may update the initial identification in the first identification list to the first identification of the first intermediate node when the detection packet carries the first indication.
  • the first intermediate node may not change the initial identification. In this way, the first intermediate node can determine whether the identifier in the message needs to be changed according to the first instruction, thereby preventing the first intermediate node from changing the identifier in each received packet, reducing the need for power consumption of the first intermediate node.
  • the flag field in the packet header of the detection packet carries the first indication.
  • the detection packet includes a first SRH, and the first SRH carries the first identification list; or, the detection packet includes a first load part, and the first load part carries Describe the first identification list.
  • a sixth aspect provides a message transmission device, the message transmission device belongs to a third node on a first path, the first path is a path from the second node to the first node, and the message transmission
  • the device includes: a first receiving module, an updating module and a processing module.
  • the first receiving module is configured to receive a detection packet; the detection packet carries a first identification list, the first identification list is used to indicate the first path, and the first identification list includes the first identification list.
  • the initial identification of the three nodes; the updating module is used to update the initial identification in the first identification list to the first identification of the third node to obtain the updated detection message; the processing module is used to update the The updated detection message is processed.
  • the third node may be the first node on the first path, or may be the first intermediate node on the first path, where the first intermediate node is any intermediate node on the first path.
  • processing the updated detection message by the third node may include: the third node generates a response message according to the updated detection message.
  • processing the updated detection message by the third node may include: sending the updated detection message by the third node.
  • the second intermediate node in the response packet generated by the first node according to the detection packet The identifier list includes: the first identifier of the first intermediate node, and the first identifier is the identifier of the port or link where the first intermediate node receives the detection message. Therefore, when the first intermediate node sends the response message, the The port or link in the first intermediate node sends a response message. In this way, it is ensured that the first intermediate node receives the detection packet and sends the response packet through the same port or link, thereby further improving the consistency of the transmission path of the detection packet and the transmission path of the response packet.
  • the initial identification of the third node is different from the first identification.
  • the initial identification includes: the node identification of the third node, for example, the node identification may be Node SID; the first identification includes: the The identifier of the port or link where the third node receives the detection message, for example, the first identifier may be End.X SID.
  • the detection message further carries: a first indication
  • the updating module is configured to: when the detection message carries the first indication, update the initial identifier to the first indication logo.
  • the third node can determine whether the identifier in the message needs to be changed according to the first instruction, thereby preventing the third node from changing the identifier in each received message, reducing the Power consumption of three nodes.
  • the message transmission device further includes: a second receiving module and a sending module.
  • the second receiving module is configured to receive a response message of the detection message after the processing module processes the updated detection message; the response message carries a second identification list, and the first The second identification list is used to indicate the second path from the first node to the second node, and the second identification list includes the first identification; the sending module is configured to send the response message.
  • a communication device comprising: a processor and a memory, where a program is stored in the memory; the processor is configured to call the program stored in the memory, so that the communication device Execute the message transmission method according to any one of the designs in the first aspect; or, the processor is configured to call a program stored in the memory, so that the communication device executes the method described in any one of the designs in the second aspect A message transmission method; or, the processor is configured to call a program stored in the memory, so that the communication device executes the message transmission method according to any design of the third aspect.
  • a communication system in an eighth aspect, includes a first node and a second node; the first node includes: the message transmission device according to any design of the fourth aspect; the second node Including: the message transmission device described in any one of the designs of the fifth aspect.
  • the communication system further includes: a first intermediate node; at least one of the first intermediate node and the second node is: the message transmission device described in any design of the sixth aspect the third node.
  • a computer storage medium is provided, and a computer program is stored in the storage medium;
  • the computer When the computer program runs on the computer, the computer causes the computer to execute the message transmission method described in any design of the first aspect; or, when the computer program runs on the computer, the computer causes the computer to execute the message transmission method described in any design of the third aspect.
  • a tenth aspect provides a computer program product containing instructions, when the computer program product runs on the message transmission device, the message transmission device is made to execute the message transmission method described in any design of the first aspect; or , when the computer program product runs on the message transmission device, causes the message transmission device to execute the message transmission method described in any design of the second aspect; or, when the computer program product runs on the message transmission device, causing the message transmission device to execute the message transmission method described in any design of the third aspect;
  • FIG. 1 is a schematic structural diagram of a communication system according to an embodiment of the present application.
  • FIG. 2 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a message transmission process according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of another message transmission process provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another message transmission process provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an SRH provided by an embodiment of the present application.
  • FIG. 8 is a flowchart of another message transmission method provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of another message transmission process provided by an embodiment of the present application.
  • FIG. 10 is a schematic diagram of another message transmission process provided by an embodiment of the present application.
  • FIG. 11 is a block diagram of a message transmission device provided by an embodiment of the present application.
  • FIG. 12 is a block diagram of another message transmission device provided by an embodiment of the present application.
  • FIG. 13 is a block diagram of still another message transmission device provided by an embodiment of the present application.
  • FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present application.
  • the communication system includes multiple nodes, such as nodes R1 , R2 , R3 , R4 and R5 in FIG. 1 .
  • the embodiment of the present application does not limit the number of nodes in the communication system.
  • the communication system includes five nodes as an example.
  • the number of nodes in the communication system may also be other values, such as 2, 10 , 100 or 1000, etc.
  • a node in a communication system may be a gateway, a router, an interface unit in a router, a server or a server cluster, and so on.
  • the nodes in the communication system are all communication devices, and the communication device may include: a processor; the processor is configured to couple with the memory, and after reading the instructions in the memory, execute the method executed by the communication device as described in the embodiments of the present application according to the instructions .
  • the number of processors may be multiple, and the memory coupled with the processors may be independent of the processor or independent of the communication device, and may also be within the processor or the network device.
  • the storage can be a physically independent unit, or a storage space on a cloud server or a network hard disk.
  • the memory may be one or more.
  • the number of memories is multiple, they can be located in the same or different positions, and can be used independently or in combination.
  • FIG. 2 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • the communication device 200 includes: a processor 202 and a memory 201, wherein the memory 201 is used for storing a program, and the processor 202 is used for calling the program stored in the memory 201, so that the communication device executes a corresponding method or function.
  • the communication device 200 may further include at least one communication interface 203 and at least one communication bus 204 .
  • An interface eg, communication interface 203 in this embodiment of the present application is also called a port.
  • the memory 201 , the processor 202 and the communication interface 203 are communicatively connected through a communication bus 204 .
  • the communication interface 203 is used to communicate with other devices under the control of the processor 202 , and the processor 202 can call the program stored in the memory 201 through the communication bus 204 .
  • the communication device provided by the embodiments of the present application may be used to perform operations performed by the first node, the second node, or the first intermediate node in the packet transmission methods provided by the subsequent embodiments of the present application.
  • each node in the communication system There is a connection relationship between each node in the communication system, for example, the nodes R1, R2, R3 and R4 in FIG. 1 are connected in sequence, and the node R1, the node R5 and the node R4 are connected in sequence.
  • a message transmission path can be deployed in the communication system, and the head node of the path can transmit the message along the path to the tail node of the path.
  • the path 1 deployed in the communication system shown in FIG. 1 may be: node R1 ⁇ node R2 ⁇ node R3 ⁇ node R4.
  • the head node R1 of the path can transmit the packet to the tail node R4 through the nodes R2 and R3 in sequence.
  • the path in this embodiment of the present application may be a path of a tunnel, or may not be a path of a tunnel, which is not limited in this embodiment of the present application.
  • the tunnel can be any type of tunnel, such as SRv6 policy tunnel, SR-TE tunnel, or SR-BE.
  • the head node of the path needs to perform fault detection on the path.
  • the head node R1 in FIG. 1 may send a detection packet to the tail node R4 along the path 1.
  • the tail node R4 After the tail node R4 receives the detection message, it will determine the shortest path 2 (node R4 ⁇ node R5 ⁇ node R1) from the tail node R4 to the head node R1 according to the IP route, and send the detection to the head node R1 along the path 2. message response message.
  • the head node R1 may determine whether a response packet of the detection packet is received within the time duration threshold after the detection packet is sent. If the head node R1 receives the response message within the duration threshold after sending the detection message, the head node R1 determines that the path 1 is not faulty, and can continue to transmit messages on the path 1 subsequently. If the head node R1 does not receive the response message within the duration threshold after sending the detection message, the head node R1 determines that the path 1 is faulty, and will not transmit the message on the path 1 subsequently.
  • the embodiment of the present application provides a message transmission method, and the method can be used in the communication system provided by the embodiment of the present application.
  • the message transmission method can transmit a response message along a second path with a high degree of consistency with the first path according to the first path transmitted by the detection message. In this way, the consistency of the transmission path of the response packet and the transmission path of the detection packet is high, so that the transmission of the response packet can reflect the failure of the first path.
  • the accuracy of fault detection is high.
  • FIG. 4 is a flowchart of a message transmission method provided by an embodiment of the present application.
  • the message transmission method includes:
  • the second node generates a detection packet, and the detection packet carries a first identification list, where the first identification list is used to indicate a first path from the second node to the first node, and the first identification list includes: the first identification list on the first path A first identification of an intermediate node.
  • This embodiment of the present application takes the path to be detected as the first path as an example, and the first path may be a path of a tunnel, or may not be a path of a tunnel, which is not limited in this embodiment of the present application.
  • the head node of the first path is the second node, and the tail node of the first path is the first node.
  • the head node (second node) of the first path needs to generate a detection packet for fault detection.
  • the detection packet carries a first identification list for indicating the first path.
  • the first identification list may be a segment routing list.
  • the identifier of the node in the embodiment of the present application may be any identifier of the node, including: a segment identifier (Segment Identifier, SID), such as a node segment identifier (Node SID), or, the port used to send the detection message in the node corresponds to The link segment identifier (End.X SID).
  • the first identification list may indicate the first path in any way.
  • the first identification list may include the identification of each node on the first path except the head node (or include the identification of each node on the first path. identifiers), and these identifiers are arranged in sequence according to the arrangement order of the nodes on the first path, so that the first identifier list indicates the first path.
  • the first path is path 1 shown in FIG. 1 (node R1 ⁇ node R2 ⁇ node R3 ⁇ node R4), node R1 is the second node, and node R4 is the first node.
  • the identification of the node R1 is 1::
  • the identification of the node R2 is 2::
  • the identification of the node R3 is 3::
  • the identification of the node R4 is 4:::.
  • the first identification list carried in the detection packet may include: 4::, 3::, 2::.
  • the first identification list may also include: 2::, 3::, 4::, which is not limited in this embodiment of the present application.
  • the first path includes at least one intermediate node located between the first node and the second node, and no matter how the first identification list indicates the first path, the first identification list may include: the first intermediate node on the first path
  • the first identifier of the first intermediate node may be any node in the at least one intermediate node.
  • the first path indicated by the first identification list passes through the node indicated by the node identification in the first identification list, the first identification list includes the first identification of the first intermediate node, and the first path passes through the first intermediate node.
  • the identifier of the node can be a node identifier (such as the address of the node, etc.) used to indicate the node, or an identifier used to indicate a component in the node (such as the identifier of a port or link in the node). ), as long as the node can be determined according to the identification of the node.
  • the identifier of the node is used as an example to indicate the node identifier of the node.
  • the detection packet generated by the second node may be a detection packet in any format.
  • the detection packet generated by the second node is an SBFD packet as an example.
  • SBFD is a simplified mechanism of Bidirectional Forwarding Detection (BFD). SBFD simplifies the state machine of BFD, shortens the negotiation time between nodes, improves the flexibility of the communication system, and can support segment The path of the segment routing (SR) tunnel is used for fault detection.
  • BFD Bidirectional Forwarding Detection
  • the second node sends a detection packet to the first node.
  • the second node may send the detection packet to the first node along the first path indicated by the first identification list.
  • the detection message passes through each intermediate node on the first path in turn.
  • the intermediate node can send the detection message according to the first identification list. message.
  • node R1 is the second node
  • node R4 is the first node
  • nodes R2 and R3 are both intermediate nodes.
  • the node R1 can send the message to the node R2 according to the first identification list
  • the node R2 can send the detection message to the node R3 according to the first identification list
  • the node R3 can send the detection message to the node R4 according to the first identification list.
  • the first node obtains a response message of the detection message, the response message carries a second identification list, the second identification list is obtained according to the first identification list, and the second identification list is used to indicate the first node to the second identification list
  • the second path of the node, the second identification list includes the first identification.
  • the detection message may be used to instruct the first node to obtain the response message. After receiving the detection packet, the first node can obtain a response packet of the detection packet.
  • the response packet carrying the second identification list Similar to the detection packet carrying the first identification list, the response packet carrying the second identification list.
  • the second identification list is obtained by the first node according to the first identification list carried in the detection message, the second identification list is used to indicate the second path from the first node to the second node, and the second identification list includes the first identification list.
  • a first identifier of the first intermediate node in the identifier list It can be seen that both the first identification list and the second identification list include the first identification of the first intermediate node.
  • the second path indicated by the second identifier list passes through the node indicated by the identifier in the second identifier list, and the second identifier list includes the first identifier of the first intermediate node. Therefore, the second path also passes through the first identifier in the first path. first intermediate node.
  • the first node sends a response message to the second node.
  • the first node may send the response message to the second node along the second path indicated by the second identifier list.
  • the detection message passes through each intermediate node on the second path in turn.
  • the intermediate node can send the detection message according to the second identification list. message.
  • node R4 can send the response message to node R3 according to the second identification list
  • node R3 can send the response message to node R2 according to the second identification list
  • node R2 can send the response message to node R1 according to the second identification list .
  • the intermediate nodes passed by the first path and the second path are the same as an example, and some intermediate nodes passed by the first path and the second path may be the same, but another part of the intermediate nodes are different.
  • the first path is path 1 in FIG. 5 (node R1 ⁇ node R2 ⁇ node R3 ⁇ node R4).
  • the second path may be: (node R4 ⁇ node R2 ⁇ node R1); or, if node R5 is connected to both node R2 and node R3, the second path may be: (node R4 ⁇ Node R3 ⁇ Node R5 ⁇ Node R2 ⁇ Node R1) and so on.
  • the second node may determine whether the first path is faulty according to the response packet of the detection packet. For example, if the second node receives the response message of the detection message within the duration threshold after sending the detection message, the second node can determine that the first path is not faulty; if the second node is sending the detection message If the response message is not received within the subsequent time duration threshold, the second node determines that the first path is faulty.
  • both the first identifier list and the second identifier list include the first identifier of the first intermediate node
  • both the first path and the second path pass through the first intermediate node indicated by the first identifier
  • the first path and the second path pass through the first intermediate node indicated by the first identifier.
  • the head and tail nodes of the path are opposite, so the second path has a higher degree of consistency with the first path. Therefore, the transmission path of the response packet is highly consistent with the transmission path of the detection packet, the transmission status of the response packet is relatively consistent with the transmission status of the detection packet, and the transmission status of the response packet can reflect the failure of the first path. In this case, the accuracy of the second node determining whether the first path is faulty according to the response message is relatively high.
  • the second node since the second node has high accuracy in determining whether the first path is faulty, the probability of service interruption caused by the second node switching paths when the first path is not faulty is reduced, and user experience is improved.
  • both the first identification list and the second identification list contain the first identification.
  • both the first identification list and the second identification list may also include: identifications of multiple intermediate nodes (including the first intermediate node) on the first path.
  • the order in which the identifiers of the plurality of intermediate nodes are arranged in the second identifier list is opposite to the order in which the identifiers of the plurality of intermediate nodes are arranged in the first identifier list. In this case, the consistency between the first path and the second path is further improved, and the accuracy with which the second node determines whether the first path is faulty according to the response message is further improved.
  • the first identification list includes: 3::, 2::, and the first path passes through nodes R1, R2, R3 and R4 in sequence;
  • the second identification list includes: 2: :, 3::, the second path passes through nodes R4, R3, R2 and R1 in sequence. At this time, the second path and the first path pass through the same node, and the degree of consistency between the first path and the second path is high.
  • the first path is consistent with the second path, and the consistency here can be strict consistency.
  • the nodes traversed by the first path and the second path are exactly the same, and the consistency here can also be non-strict consistency. are consistent, for example, the nodes traversed by the first path and the second path are only partially the same.
  • the multiple intermediate nodes may be some or all of the intermediate nodes on the first path, which is not limited in this embodiment of the present application.
  • the multiple intermediate nodes include: other nodes in the first path except the first node and the second node.
  • the degree of consistency between the first path and the second path is high.
  • the first node may obtain the second identification list in reverse order according to the identifications of the plurality of intermediate nodes in the first identification list, and encapsulate the second identification list into the response message.
  • the encapsulation can be completed according to an Operation Administration and Maintenance (OAM) instruction.
  • OAM Operation Administration and Maintenance
  • the first identification list and the second identification list include the identifications of the intermediate nodes.
  • the first identification list may further include the identification of the first node
  • the second identification list may further include the identification of the second node.
  • the identifiers of the nodes in the first identifier list may be sequentially arranged in the order of the nodes on the first path
  • the identifiers of the nodes in the second identifier list may be sequentially arranged in the order of the nodes on the second path.
  • the first path is path 1 in FIG. 5 (node R1 ⁇ node R2 ⁇ node R3 ⁇ node R4)
  • the second path is path 2 in FIG. 6 (node R4 ⁇ node R3 ⁇ node R2 ⁇ node R1)
  • the first identification list includes: 4::, 3::, 2::
  • the second identification list includes: 1::, 2:::, 3::.
  • the first identification list includes: the identification of the first node and the identification of each intermediate node on the first path
  • the second identification list includes: the identification of the second node and the identification of each intermediate node on the first path:
  • the first node may arrange the identifiers of multiple nodes in the first identifier list in reverse order, remove the identifier of the first node, and add the identifier of the second node to obtain the second identifier list.
  • the first node adds the identifier of the second node, if the identifiers of each node in the first identifier list are arranged in sequence according to the arrangement order of the nodes on the first path, the first node can remove the identifier of the first node After identification, the identification of the second node is added before the remaining identifications.
  • the first node can add the identifier of the second node after removing the identifier of the first node. After the rest of the logo.
  • the first node can first arrange these identifiers in reverse order to obtain 2: :, 3::, 4::. After that, the first node may remove the identifier 4:: of the first node (node R4) to obtain 2::, 3::. Finally, the first node can add the identifier 1:: of the second node (R1) before the remaining identifiers to obtain 1::, 2::, 3::.
  • the first node can first arrange these identifiers in reverse order to obtain 4 ::, 3::, 2::. After that, the first node may remove the identifier 4:: of the first node (node R4) to obtain 3::, 2::. Finally, the first node may add the identifier 1:: of the second node (R1) after the remaining identifiers to obtain 3::, 2::, 1::.
  • the identification of the second node may be obtained by the first node in any manner.
  • the detection packet sent by the second node also carries the address of the second node (not shown in FIG. 5 ), and the first node can determine the address of the second node according to the address of the second node carried in the detection packet. logo.
  • the first node may store a correspondence between the addresses of the nodes and the identifiers, and the first node may determine the identifier of the second node corresponding to the address of the second node according to the correspondence.
  • the above-mentioned first path may be a path of an SRv6 tunnel (also referred to as an SRv6 policy tunnel), the above-mentioned detection packet includes the first SRH, the first SRH carries the above-mentioned first identification list, and the above-mentioned response packet includes the second SRH. , the second SRH carries the above-mentioned second identifier list.
  • an SRv6 tunnel also referred to as an SRv6 policy tunnel
  • the above-mentioned detection packet includes the first SRH
  • the first SRH carries the above-mentioned first identification list
  • the above-mentioned response packet includes the second SRH.
  • the second SRH carries the above-mentioned second identifier list.
  • FIG. 7 is a schematic structural diagram of an SRH provided by an embodiment of the present application.
  • the SRH includes: a next header type (Next Header) field and a header length (Hdr Ext Len) field , Routing Type field, the number of remaining segments (Segments Left, SL) to the destination node, the last element index of the segment list (Last Entry) field, the flag field, the same group data identification (Tag) field, segment routing List field and optional content part (Optional Type Length Value Objects) field, and the optional content part field is variable.
  • the segment routing list field may carry the foregoing first identification list
  • the segment routing list field may carry the foregoing second identification list.
  • the above-mentioned first path may not be the path of the SRv6 tunnel, the above-mentioned detection packet includes the first load part, the first load part carries the first identification list, the above-mentioned response packet includes the second load part, and the second load part carries the first load part. 2. List of identities.
  • the detection packet generated by the second node carries the first identification list (or the first identification list and the address of the second node). Further, the detection packet also carries other contents, and the following will take the other four kinds of information carried by the detection packet as an example for description.
  • the detection message may also carry an operation code, which may be referred to as a first operation code.
  • the first operation code is used to instruct: to generate a response message carrying an identification list indicating the same and opposite directions as the first path.
  • the first node may generate a response message when the detection message carries the first operation code.
  • the first opcode may include: FE.
  • the first opcode may be carried in the SRH or other extension header of the detection packet.
  • the FE is used to instruct to generate a response packet carrying an identification list indicating the same and opposite directions as the first path.
  • the first opcode may be an identifier of the first node.
  • the identification of the first node as the first operation code may be the same or different from the identification of the first node in the first identification list.
  • the identifier of the first node as the first opcode in FIG. 5 is 4::FE
  • the identifier of the first node in the first identifier list is 4::.
  • the identifier of the first node can be used to instruct: to generate a response message carrying an identifier list used to indicate that the identifier is consistent with the first path and in the opposite direction.
  • the first opcode may be generated by the second node, or sent by the controller to the second node.
  • the detection packet may also carry the SL.
  • the first path may be divided into multiple path segments arranged in sequence, and the detection packet will be sequentially transmitted on the multiple path segments during the process of transmission on the first path.
  • SL is used to indicate the number of remaining segment indices to reach the destination node, and the number is equal to the number of path segments in the first path where the detection packet has not been transmitted.
  • path 1 (the first path) is divided into sequentially arranged: path segment 1 (node R1 ⁇ node R2), path segment 2 (node R2 ⁇ node R3), and path segment 3 (node R3) ⁇ Node R4), these three path segments are not marked in FIG. 5 .
  • node R2 can determine that the detection packet needs to be transmitted on path segment 2 and path segment 3 according to the first identifier list. Therefore, node R2 will determine the SL in the detection packet.
  • the detection packet may also carry a destination address (Destination Address, DA).
  • DA indicates the address of the next node to which the detection message needs to be transmitted in the first path.
  • the node R2 After receiving the detection packet sent by the node R1, the node R2 can determine that the detection packet needs to be transmitted to the node R3 according to the first identification list. If the identification of the node R3 is the address of the node R3, the node R2 will send the detection packet to the node R2.
  • the node R3 can determine that the detection packet needs to be transmitted to the node R4 according to the first identification list. If the identification of the node R4 is the address of the node R4, the node R3 will send the detection packet to the node R3.
  • the DA may be an Internet Protocol version 6 (Internet Protocol version 6, IPv6) DA.
  • the detection packet when the detection packet is an SBFD packet, the detection packet may carry an SBFD payload (payload).
  • the response message obtained by the first node carries the second identification list. Further, similar to the detection message, the response message also carries other contents, and the following will take the other four kinds of information carried by the response message as an example for description.
  • the response message may also carry an opcode, which is called a second opcode.
  • the second operation code is used to indicate: perform fault detection on the first path according to the response message.
  • the second operation code in the response message may include: FF.
  • the second opcode may be carried in the SRH or other extension headers of the detection packet. FF is used to instruct to perform fault detection on the first path according to the response packet.
  • the second opcode may be an identification of the second node.
  • the identification of the second node as the second operation code may be the same as or different from the identification of the second node in the second identification list.
  • the identifier of the second node as the second operation code in FIG. 6 is 1::FF
  • the identifier of the second node in the second identifier list is 1::.
  • the identifier of the second node may be used to indicate: perform fault detection on the first path according to the response message.
  • the second opcode may be generated by the first node, or sent by the controller to the first node.
  • the response message may also carry SL.
  • the second path may be divided into multiple path segments arranged in sequence, and the response packet will be transmitted on the multiple path segments in sequence during the process of transmission on the second path.
  • the SL is used to indicate the number of path segments in the second path for which the response packet has not been transmitted.
  • path 2 (second path) is divided into sequentially arranged: path segment 3 (node R3 ⁇ node R4), path segment 2 (node R2 ⁇ node R3), and path segment 1 (node R1) ⁇ Node R2), these three path segments are not marked in FIG. 6 .
  • node R3 can determine that the response message needs to be transmitted on path segment 2 and path segment 1 according to the second identification list. Therefore, node R3 will use the SL in the response message.
  • the response message may also carry DA.
  • the DA may be an Internet Protocol version 6 (Internet Protocol version 6, IPv6) DA.
  • the response packet is also an SBFD packet, and the response packet also carries an SBFD packet.
  • the detection message may carry the first operation code
  • the response message may carry the second operation code
  • the first operation code in the detection packet may be included in the first identification list, and the first operation code may be immediately followed by the identification of the first node.
  • the first operation code may be arranged after the identifier of the first node; when the identifier of the first node is the identifier ranked in the first identifier list In the case of the first flag, the first opcode may be ordered before the flag of the first node.
  • the first opcode (4::FE) in FIG. 5 is taken as an example outside the first identifier list.
  • the first opcode (4::FE) in FIG. 5 may also be included in the first identifier.
  • the first identification list may include: 4::FE, 4:::, 3::, 2::, or, 2::, 3::, 4::, 4::FE.
  • the second operation code in the response packet may also be included in the second identification list, and the second operation code may be followed by the identification of the second node.
  • the second operation code may be ranked after the identifier of the second node; when the identifier of the second node is the identifier ranked in the second identifier list
  • the second opcode may be queued before the identification of the second node when the first one is identified.
  • the second opcode (1::FF) in FIG. 6 is taken as an example outside the second identification list.
  • the second opcode (1::FF) in FIG. 6 may be included in the second identification list.
  • the second identification list may include: 1::FF, 1::, 2::, 3::, or, 3::, 2::, 1::, 1::FF.
  • the first identifier list includes the first opcode, the identifier of the first node, and the identifier of each intermediate node on the first path
  • the second identifier list includes the second opcode, the identifier of the second node, and the identifier of each intermediate node on the first path.
  • the first node may arrange the contents in the first identification list (including the first operation code and the identification of the node) in the reverse order, and remove the first operation code and the first operation code.
  • the identifier of the node, the identifier of the second node and the second operation code are added to obtain the second identifier list.
  • the first node may also send a first SBFD control packet to the second node, where the first SBFD control packet carries the SBFD description of the first node Discriminator and other information.
  • the second node may also send a second SBFD control packet to the first node, where the second SBFD control packet carries information such as the SBFD descriptor of the second node.
  • the SBFD descriptor of the node may be information such as the address of the node.
  • the first node may record the matching relationship between the SBFD descriptor of the first node and the SBFD descriptor of the second node.
  • the detection packet may carry the SBFD descriptor of the second node.
  • the first node may determine, according to the recorded matching relationship, that the SBFD descriptor of the second node carried in the detection packet is the same as that of the first node. Whether the SBFD descriptors match.
  • the first node performs the foregoing S403 only when the SBFD descriptor of the second node carried in the detection packet matches the SBFD descriptor of the first node, and the first node is in a working state.
  • the intermediate node in the first path does not adjust the first identification list when sending the detection packet as an example.
  • the intermediate node may further adjust the first identification list.
  • FIG. 8 is a flowchart of another message transmission method provided by an embodiment of the present application.
  • the message transmission method includes:
  • the second node generates a detection packet, where the detection packet carries a first identification list, where the first identification list is used to indicate a first path from the second node to the first node, and the first identification list includes: the first identification list on the first path An initial identification of an intermediate node.
  • the initial identification of the first intermediate node may be the node identification of the first intermediate node.
  • the second node sends a detection packet to the first intermediate node.
  • the first intermediate node updates the initial identifier in the first identifier list to the first identifier of the first intermediate node to obtain an updated detection message.
  • the initial identification and the first identification are two different identifications of the first intermediate node.
  • the identifier of the node is the SID of the node
  • the initial identifier and the first identifier are two different SIDs of the first intermediate node.
  • the initial identification includes: a node identification of the first intermediate node, where the node identification may be a Node SID, and the first identification includes: an identification of a port or link where the first intermediate node receives the detection packet, such as the first intermediate node.
  • the ID can be an End.X SID.
  • node R2 and node R3 are both the first intermediate nodes, and the first intermediate node in the detection packet sent by node R1 is the first
  • the identification list is the same as the first identification list in FIG. 5 , including 4::, 3::, and 2::.
  • the node R2 can update the initial identification of the node R2 in the first identification list (that is, the node identification 2:: of the node R2) is the identifier (2::1) of the port 1 in the node R2, and the first identifier list in the updated detection message includes: 4::, 3::, 2::1.
  • the node R3 can use the initial identification of the node R3 in the first identification list (that is, the node identification 3 of the node R3: ) is updated to the identifier (3::1) of port 1 in node R3, and the first identifier list in the updated detection message includes: 4::, 3::1, and 2::1.
  • the initial identifier may be the first End.X SID corresponding to the egress port through which the first intermediate node sends the detection packet
  • the first identifier may be the first SID corresponding to the ingress port through which the first intermediate node receives the detection packet. Two End.X SIDs.
  • node R2 and node R3 are both the first intermediate nodes
  • the first intermediate node in the detection packet sent by node R1 is the first
  • the list of identities includes 4::, 3::2, 2::2.
  • 2::2 represents the first End.X SID corresponding to the outgoing port 2 in the node R2 that sends the detection message
  • 3::2 represents the first End.X corresponding to the outbound port 2 in the node R3 that sends the detection message SID.
  • the node R2 can use the first End.X SID (eg 2::2) corresponding to the outbound port 2 of the node R2 in the first identification list to send the detection packet. ) is updated to the second End.X SID (2::1) corresponding to the ingress port 1 where the node R2 receives the detection message, and the first identifier list in the updated detection message includes: 4::, 3::2 , 2::1.
  • the node R3 can use the first End.X SID (such as 3::2) corresponding to the outbound port 2 of the node R3 in the first identification list to send the detection packet.
  • Update the second End.X SID (3::1) corresponding to the ingress port 1 where the node R3 receives the detection packet, and the first identifier list in the updated detection packet includes: 4::, 3::1, 2::1.
  • the first intermediate node sends the updated detection message to the first node.
  • the first intermediate node may send the updated detection packet according to the first identification list in the updated detection packet.
  • node R2 as the first intermediate node, can send the updated detection message to node R3 according to the first identification list in the updated detection message; node R3, as the first intermediate node, The updated detection message may be sent to the node R4 according to the first identification list in the updated detection message.
  • the first node obtains a response message of the detection message, the response message carries a second identification list, the second identification list is obtained according to the first identification list, and the second identification list is used to indicate the first node to the second identification list
  • the second path of the node, the second identification list includes the first identification.
  • the first node When the first node obtains the response message, it can obtain the second identification list according to the first identification list, and encapsulate the second identification list in the response message.
  • the detection packet received by the first node is the detection packet updated by the first intermediate node
  • the first identification list in the detection packet carries the first intermediate node
  • the first identifier is the identifier of the port or link of the first intermediate node. Therefore, the identifier of the first intermediate node in the second identifier list obtained by the first node is also the first identifier.
  • the node R4 is the first node, and the second identifier list in the response message generated by the node R4 includes: 1::, 2::1, and 3::1.
  • the first node sends a response message to the first intermediate node.
  • the first intermediate node sends a response message to the second node.
  • the second identifier list in this embodiment of the present application includes: the first identifier of the first intermediate node, and the first identifier is the identifier of the port or link through which the first intermediate node receives the detection packet, the first intermediate node is based on When the second identification list sends the response message, the response message may be sent from the port or link in the first intermediate node. In this way, it is ensured that the first intermediate node receives the detection packet and sends the response packet through the same port or link, thereby further improving the consistency of the transmission path of the detection packet and the transmission path of the response packet.
  • the second identification list in the response message in FIG. 10 includes: 1::, 2::1, 3::1, and nodes R2 and R3 are both first intermediate nodes.
  • the node R4 can send the response message to the node R3, and the node R3 can send the response message from the port 1 of the node R3 to the node R2 according to 3::1 in the second identification list.
  • the node R2 may send the response message from the port 1 of the node R2 to the node R1 according to 2::1 in the second identification list. It can be seen that the transmission path of the detection message is the same as the transmission path of the response message.
  • the first intermediate node may update the initial identification in the first identification list to the first identification of the first intermediate node when the detection packet carries the first indication in the above S803.
  • the first intermediate node may not change the initial identification. In this way, the first intermediate node can determine whether the identifier in the message needs to be changed according to the first instruction, thereby preventing the first intermediate node from changing the identifier in each received packet, reducing the need for power consumption of the first intermediate node.
  • the first indication may be carried at any position in the detection packet.
  • the flag field in the header of the detection packet may carry the first indication.
  • the flag field in FIG. 7 may include 8 bits from 0 to 7 (these bits are not shown in FIG. 7 ), wherein bit 7 may be used to carry the first indication. When the value of bit 7 is 1, bit 7 carries the first indication.
  • the first intermediate node can determine whether the detection packet carries the first indication according to the value of the bit 7, and then determines whether the identifier in the detection packet needs to be changed.
  • the identifier represented by the DA in the response packet is: the first identifier of the first intermediate node, such as the identifier of the port or link in the first intermediate node that receives the detection packet.
  • the first identifier list carried in the detection packet generated by the second node includes: the initial identifier of the first intermediate node. Since the first intermediate node updates the initial identification of the first intermediate node to the first identification, the first identification list carried in the detection packet received by the first node includes: the first identification of the first intermediate node. It can be seen that the initial identifier of the first intermediate node in the detection packet generated by the second node is different from the first identifier of the first intermediate node in the detection packet received by the first node.
  • the first identifier list carried in the detection packet generated by the second node includes: the first identifier of the first intermediate node.
  • the first identifier list carried in the detection packet received by the first node includes: the first identifier of the first intermediate node. It can be seen that the identifier of the first intermediate node in the detection packet generated by the second node is the same as the identifier of the first intermediate node in the detection packet received by the first node.
  • the first identifier generated by the second node is called the initial identifier
  • the first identifier generated by the second node is called the initial identifier
  • the first identifier generated by the second node The initial identifier of the first intermediate node in the detection packet is the same as the first identifier of the first intermediate node in the detection packet received by the first node.
  • the first intermediate node on the first path may update the detection packet.
  • the first node on the first path may also update the detection packet.
  • the detection message is updated.
  • both the first intermediate node and the first node on the first path may be called a third node
  • the third node can, after receiving the detection packet, convert the third node carried in the first identification list to the third node.
  • the initial identification of the node is updated to the first identification of the third node, and an updated detection packet is obtained, and then the updated detection packet is processed.
  • processing the updated detection message by the third node may include: the third node generates a response message according to the updated detection message.
  • processing the updated detection message by the third node may include: sending the updated detection message by the third node.
  • a node needs to include hardware and/or corresponding hardware for executing each function. software module.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different ways to implement the described functionality for each particular application in conjunction with the embodiments, but such implementations should not be considered beyond the scope of this application.
  • the corresponding device may be divided into functional modules according to the above method embodiments.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware. It should be noted that the division of modules in this embodiment is schematic, and specifically as a possible division manner of logical functions, there may be other division manners in actual implementation.
  • FIG. 11 is a block diagram of a message transmission device provided by an embodiment of the present application, and the message transmission device may belong to the first node in the foregoing embodiments, for example.
  • the message transmission device includes: a receiving module 1101, an obtaining module 1102 and a sending module 1103.
  • the receiving module 1101 is configured to receive a detection packet, the detection packet carries a first identification list, the first identification list is used to indicate the first path from the second node to the first node, and the first identification list includes: the first identification list on the first path.
  • a first identification of an intermediate node For operations performed by the receiving module 1101, reference may be made to the content related to the first node in the foregoing S402 and S804.
  • the obtaining module 1102 is used to obtain a response message of the detection message, the response message carries a second identification list, the second identification list is obtained according to the first identification list, and the second identification list is used to indicate the first node to the second identification list.
  • the second path of the node, the second identification list includes the first identification.
  • the sending module 1103 is configured to send a response message according to the second identification list.
  • the sending module 1103 reference may be made to the content related to the first node in the foregoing S404 and S805.
  • both the first identifier list and the second identifier list include the first identifier of the first intermediate node
  • both the first path and the second path pass through the first intermediate node indicated by the first identifier
  • the first path and the second path pass through the first intermediate node indicated by the first identifier.
  • the head and tail nodes of the path are opposite, so the second path has a higher degree of consistency with the first path. Therefore, the transmission path of the response packet is highly consistent with the transmission path of the detection packet, the transmission status of the response packet is relatively consistent with the transmission status of the detection packet, and the transmission status of the response packet can reflect the failure of the first path. In this case, the accuracy of the second node determining whether the first path is faulty according to the response message is relatively high.
  • the second node since the second node has high accuracy in determining whether the first path is faulty, the probability of service interruption caused by the second node switching paths when the first path is not faulty is reduced, and user experience is improved.
  • the detection message carries: an operation code, and the operation code is used to indicate: generate a response message carrying an identification list used to indicate that the first path is consistent and opposite to the direction; the obtaining module is used for: carrying in the detection message When there is an opcode, a response message is generated.
  • the detection packet carries an operation code
  • the first node may generate a response packet according to the instruction of the operation code, so that the efficiency of generating the response packet after the first node receives the detection packet can be improved.
  • the detection message may also not carry an operation code, which is not limited in this application.
  • the first identification list includes: identifications of multiple intermediate nodes on the first path; the second identification list also includes: identifications of multiple intermediate nodes; the order in which the identifications of multiple intermediate nodes are arranged in the second identification list , which is opposite to the order in which the identifiers of the multiple intermediate nodes are arranged in the first identifier list.
  • the consistency between the first path and the second path is further improved, and the accuracy with which the second node determines whether the first path is faulty according to the response message is further improved.
  • the plurality of intermediate nodes include: other nodes in the first path except the first node and the second node.
  • the degree of consistency between the first path and the second path is high.
  • the obtaining module is configured to: obtain the second identification list in reverse order according to the identifications of the plurality of intermediate nodes included in the first identification list; and encapsulate the second identification list into the response message.
  • the first identifier includes: an identifier of a port or link where the first intermediate node receives the detection packet.
  • the first identifier may also be the node identifier of the first intermediate node, which is not limited in this application.
  • the first identification includes: when the first intermediate node receives the identification of the port or link of the detection packet, when the first intermediate node sends the response packet according to the second identification list, the first intermediate node can send the response packet from the first intermediate node.
  • the port or link in the node sends a response packet. In this way, it is ensured that the first intermediate node receives the detection packet and sends the response packet through the same port or link, thereby further improving the consistency of the transmission path of the detection packet and the transmission path of the response packet.
  • the identifier of the first intermediate node in the detection packet sent by the second node may be the same as the first identifier Differently, after receiving the detection packet, the first intermediate node needs to update the identifier of the first intermediate node in the detection packet to the above-mentioned first identifier.
  • the second identification list may further include the identification of the second node.
  • the identification of the second node may be obtained by the first node in any manner.
  • the detection message also carries the address of the second node
  • the message transmission device further includes: a determination module (not shown in FIG. 11 ), configured to determine, according to the address of the second node, before obtaining the response message
  • the identifier of the second node, and the response message includes: the identifier of the second node.
  • the first node may store a correspondence between the addresses of the nodes and the identifiers, and the first node may determine the identifier of the second node corresponding to the address of the second node according to the correspondence.
  • the determining module reference may be made to the process of determining the identifier of the second node in the foregoing embodiments.
  • the detection packet includes a first SRH, and the first SRH carries a first identification list; the response packet includes a second SRH, and the second SRH carries a second identification list; or, the detection packet includes a first load part , the first load part carries the first identification list; the response message includes the second load part, and the second load part carries the second identification list.
  • the detection message is: SBFD message.
  • the detection message may also be other types of messages, which are not limited in this application.
  • FIG. 12 is a block diagram of another message transmission device provided by an embodiment of the present application.
  • the message transmission device may belong to the second node in the foregoing embodiments.
  • the message transmission device includes: a generating module 1201 and a sending module 1202 .
  • the generating module 1201 is configured to generate a detection packet, the detection packet carries a first identification list, the first identification list is used to indicate the first path from the second node to the first node, and the first identification list includes: the first identification list on the first path.
  • An initial identification of an intermediate node For the operations performed by the generation module 1201, reference may be made to the content related to the second node in the foregoing S401 and S801.
  • the sending module 1202 is used to send a detection message to the first node; the detection message is used to instruct the first node to obtain a response message of the detection message, and the response message carries a second identification list; the second identification list is the first The node is obtained according to the first identification list, the second identification list is used to indicate the second path from the first node to the second node, and the second identification list includes: the first identification of the first intermediate node.
  • the sending module 1202 reference may be made to the content related to the second node in the foregoing S402 and S802.
  • both the first identifier list and the second identifier list include the first identifier of the first intermediate node
  • both the first path and the second path pass through the first intermediate node indicated by the first identifier
  • the first path and the second path pass through the first intermediate node indicated by the first identifier.
  • the head and tail nodes of the path are opposite, so the second path has a higher degree of consistency with the first path. Therefore, the transmission path of the response packet is highly consistent with the transmission path of the detection packet, the transmission status of the response packet is relatively consistent with the transmission status of the detection packet, and the transmission status of the response packet can reflect the failure of the first path. In this case, the accuracy of the second node determining whether the first path is faulty according to the response message is relatively high.
  • the second node since the second node has high accuracy in determining whether the first path is faulty, the probability of service interruption caused by the second node switching paths when the first path is not faulty is reduced, and user experience is improved.
  • the detection message carries: an operation code; the operation code is used to instruct: to generate a response message carrying an identification list used to indicate that the first path is consistent and opposite in direction.
  • the detection packet carries an operation code
  • the first node may generate a response packet according to the instruction of the operation code, so that the efficiency of generating the response packet after the first node receives the detection packet can be improved.
  • the detection message may also not carry an operation code, which is not limited in this application.
  • the first identification list includes: identifications of multiple intermediate nodes on the first path; the second identification list also includes: identifications of multiple intermediate nodes; the order in which the identifications of multiple intermediate nodes are arranged in the second identification list , which is opposite to the order in which the identifiers of the multiple intermediate nodes are arranged in the first identifier list.
  • the consistency between the first path and the second path is further improved, and the accuracy with which the second node determines whether the first path is faulty according to the response message is further improved.
  • the detection packet further carries: a first indication; the first indication is used to instruct the first intermediate node: when the detection packet carries the first indication, the initial identification is updated to the first identification.
  • the first intermediate node may update the initial identification in the first identification list to the first identification of the first intermediate node when the detection packet carries the first indication.
  • the first intermediate node may not change the initial identification. In this way, the first intermediate node can determine whether the identifier in the message needs to be changed according to the first instruction, thereby preventing the first intermediate node from changing the identifier in each received packet, reducing the need for power consumption of the first intermediate node.
  • the flag field in the packet header of the detection packet carries the first indication.
  • the detection packet includes a first SRH, and the first SRH carries a first identification list; or, the detection packet includes a first load part, and the first load part carries the first identification list.
  • FIG. 13 is a block diagram of another message transmission device provided by an embodiment of the present application.
  • the message transmission device may belong to the third node on the first path in the embodiment shown in FIG. 8 , and the first path is the second node Path to the first node.
  • the message transmission device includes: a first receiving module 1301 , an updating module 1302 and a processing module 1303 .
  • the first receiving module 1301 is configured to receive a detection packet; the detection packet carries a first identification list, the first identification list is used to indicate the first path, and the first identification list includes the initial identification of the third node.
  • the first receiving module 1301 For operations performed by the first receiving module 1301, reference may be made to the content related to the first intermediate node in S802 above.
  • the updating module 1302 is configured to update the initial identifier in the first identifier list to the first identifier of the third node to obtain the updated detection message. For the operation performed by the update module 1302, reference may be made to the content related to the first intermediate node in the foregoing S803.
  • the processing module 1303 is configured to process the updated detection message. For operations performed by the processing module 1303, reference may be made to the content related to the first intermediate node in S804 above.
  • the third node may be the first node on the first path, or may be the first intermediate node on the first path.
  • the first intermediate node is any intermediate node on the first path.
  • the processing module 1303 is configured to generate a response message according to the updated detection message.
  • the processing module 1303 is configured to send the updated detection message.
  • the third node is the first intermediate node
  • the second intermediate node in the response packet generated by the first node according to the detection packet The identification list includes: the first identification of the first intermediate node, and the first identification is the identification of the port or link where the first intermediate node receives the detection message. Therefore, the first intermediate node sends the response message according to the second identification list. , a response message can be sent from the port or link in the first intermediate node. In this way, it is ensured that the first intermediate node receives the detection packet and sends the response packet through the same port or link, thereby further improving the consistency of the transmission path of the detection packet and the transmission path of the response packet.
  • the initial identification of the above-mentioned third node is different from the first identification.
  • the initial identification includes: the node identification of the third node, for example, the node identification may be the Node SID; the first identification includes: the third node receives the detection message.
  • the identifier of the port or link, such as the first identifier can be End.X SID.
  • the detection message further carries: a first indication
  • the updating module is configured to: when the detection message carries the first indication, update the initial identification to the first identification.
  • the third node can determine whether the identifier in the message needs to be changed according to the first instruction, thereby preventing the third node from changing the identifier in each received message, reducing the Power consumption of three nodes.
  • the message transmission device further includes: a second receiving module and a sending module (these two modules are not shown in FIG. 13 ).
  • the second receiving module is configured to receive a response message of the detection message after sending the updated detection message according to the first identification list; the response message carries a second identification list, and the second identification list is used to indicate The second path from the first node to the second node, the second identification list includes the first identification; the sending module is configured to send a response message according to the second identification list.
  • the operations performed by the second receiving module reference may be made to the content related to the first intermediate node in the above S806, and the operation performed by the sending module may refer to the content related to the first intermediate node in the above S807.
  • the message transmission device for the first node, the second node or the third node provided by the present application may include a processing module, a storage module and a communication module.
  • the processing module may be used to control and manage the actions of the message transmission device, for example, it may be used to support the message transmission device to perform the actions performed by the first node or the second node in the above S401 to S404, or it may use The actions performed by the first node, the second node or the first intermediate node in the foregoing S801 to S807 are performed on the device supporting message transmission.
  • the storage module can be used to support the message transmission device to execute stored program codes and data.
  • the communication module can be used for the communication between the message transmission device and other devices.
  • the processing module may be a processor or a controller. It may implement or execute the various exemplary logical blocks, modules and circuits described in connection with this disclosure.
  • the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of digital signal processing (DSP) and a microprocessor, and the like.
  • the storage module may be a memory.
  • the communication module may specifically be a device that interacts with other devices, such as a radio frequency circuit, a Bluetooth chip, and a Wi-Fi chip.
  • the processing module is a processor
  • the storage module is a memory
  • the communication module is a communication interface
  • the message transmission device involved in this embodiment may be a communication device having the structure shown in FIG. 2 .
  • the above-mentioned modules and the like included in the message transmission device may be computer programs stored in the memory and invoked by the processor to implement the corresponding execution functions of the modules.
  • the communication system includes: a first node and a second node.
  • the first node may include the message transmission device shown in FIG. 11
  • the second node may include the message transmission device shown in FIG. 12 .
  • the second node is configured to generate the detection packet and send the detection packet to the first node.
  • the detection packet generated by the second node carries a first identification list
  • the first identification list is used to indicate the first path from the second node to the first node
  • the first identification list includes: the first intermediate node on the first path initial identification.
  • the first node is used to: receive the detection packet, obtain a response packet of the detection packet, and send the response packet according to the second identification list carried in the response packet.
  • the detection packet received by the first node carries a first identification list, and the first identification list is used to indicate the first path from the second node to the first node, and the first identification list includes: the first identification list on the first path A first identifier of an intermediate node; the response message carries a second identifier list, the second identifier list is obtained by the first node according to the first identifier list, and the second identifier list is used to indicate the first node to the second node. Two paths, the second identifier list includes the first identifier.
  • the detection packet carries: an operation code, and the operation code is used to indicate: generate a response packet that carries an identification list that is consistent with the first path and in the opposite direction; the first node is used to carry in the detection packet When there is an opcode, a response message is generated.
  • the first identification list includes: identifications of multiple intermediate nodes on the first path; the second identification list also includes: identifications of multiple intermediate nodes; the order in which the identifications of multiple intermediate nodes are arranged in the second identification list , which is opposite to the order in which the identifiers of the multiple intermediate nodes are arranged in the first identifier list.
  • the plurality of intermediate nodes include: other nodes in the first path except the first node and the second node.
  • the first node is used to: obtain the second identification list in reverse order according to the identifications of multiple intermediate nodes included in the first identification list; and then encapsulate the second identification list into the response message .
  • the detection message also carries the address of the second node
  • the first node is further configured to: before obtaining the response message, determine the identifier of the second node according to the address of the second node, and the response message includes: The identifier of the second node.
  • the detection packet includes a first SRH, and the first SRH carries a first identification list; the response packet includes a second SRH, and the second SRH carries a second identification list; or, the detection packet includes a first load part , the first load part carries the first identification list; the response message includes the second load part, and the second load part carries the second identification list.
  • the detection message is: SBFD message.
  • the communication system provided in this embodiment of the present application further includes a first intermediate node on the above-mentioned first path.
  • the first intermediate node may include the message transmission device shown in FIG. 13 .
  • the first intermediate node is configured to: receive a detection packet, where the detection packet carries a first identification list, the first identification list is used to indicate the first path, and the first identification list includes the initial identification of the first intermediate node.
  • the first intermediate node is further configured to update the initial identification in the first identification list to the first identification of the first intermediate node after receiving the detection packet, obtain the updated detection packet, and send the updated detection packet according to the first identification list.
  • the updated detection message is configured to: receive a detection packet, where the detection packet carries a first identification list, the first identification list is used to indicate the first path, and the first identification list includes the initial identification of the first intermediate node.
  • the first intermediate node is further configured to update the initial identification in the first identification list to the first identification of the first intermediate node after receiving the detection packet, obtain the updated detection packet, and send the updated detection packet according to the first identification list.
  • the updated detection message is configured to: receive a detection packet, where the detection packet carries a first identification list, the first identification list is
  • the initial identification includes: a node identification of the first intermediate node; the first identification includes: an identification of a port or a link where the first intermediate node receives the detection message.
  • the detection packet further carries: a first indication
  • the first intermediate node is configured to: when the detection packet carries the first indication, update the initial identification to the first identification.
  • the first intermediate node is further configured to: after sending the updated detection message according to the first identification list, receive a response message of the detection message, and send the response message according to the second identification list carried in the response message. response message.
  • the response message carries a second identification list
  • the second identification list is used to indicate the second path from the first node to the second node
  • the second identification list includes the first identification.
  • the first intermediate node may update the detection packet, and optionally, the first node on the first path may also update the detection packet after receiving the detection packet.
  • the process of updating the detection message by the first node reference may be made to the above-mentioned process of updating the detection message by the first intermediate node, which is not repeated in this embodiment of the present application.
  • both the first intermediate node and the first node on the first path may be called a third node
  • the third node can, after receiving the detection packet, convert the third node carried in the first identification list to the third node.
  • the initial identification of the node is updated to the first identification of the third node, and an updated detection packet is obtained, and then the updated detection packet is processed.
  • processing the updated detection message by the third node may include: the third node generates a response message according to the updated detection message.
  • processing the updated detection message by the third node may include: sending the updated detection message by the third node.
  • At least one of the first intermediate node and the second node in the communication system is: the third node to which the message transmission device shown in FIG. 13 belongs.
  • the embodiments of the present application provide a computer storage medium, in which a computer program is stored; when the computer program runs on the computer, the computer program enables the computer to execute any of the message transmission methods provided by the embodiments of the present application.
  • the embodiment of the present application also provides a computer program product including instructions, when the computer program product runs on the message transmission device, the message transmission device is made to execute any of the message transmission methods provided by the embodiments of the present application.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product comprising one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer may be a general purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website, computer, server, or data
  • the center transmits to another website site, computer, server, or data center by wire (eg, coaxial cable, optical fiber, digital subscriber line) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that includes one or more available media integrated.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media, or semiconductor media (eg, solid state drives), and the like.
  • first and second etc. are used for descriptive purposes only and should not be construed to indicate or imply relative importance.
  • the term “at least one” refers to one or more, and “plurality” refers to two or more, unless expressly limited otherwise.
  • the disclosed systems, devices, etc. may be implemented by other structural manners.
  • the device embodiments described above are only illustrative.
  • the division of modules is only a logical function division. In actual implementation, there may be other division methods.
  • multiple modules may be combined or integrated into another A system, or some feature, can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or modules, and may be in electrical or other forms.
  • Units described as separate components may or may not be physically separated, and components described as units may or may not be physical units, and may be located in one place or distributed to multiple devices. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention se rapporte au domaine technique des communications et concerne un procédé, un dispositif et un système de transmission de paquets. Le procédé comprend les étapes suivantes : après avoir reçu un paquet de détection, un premier nœud obtient et envoie un paquet de réponse pour le paquet de détection. Le paquet de détection comporte une première liste d'identifiants permettant d'indiquer un premier trajet entre un second nœud et le premier nœud, la première liste d'identifiants comprenant un premier identifiant d'un premier nœud intermédiaire sur le premier trajet. Le paquet de réponse contient une seconde liste d'identifiants, la seconde liste d'identifiants servant à indiquer un second trajet entre le premier nœud et le second nœud, et la seconde liste d'identifiants comprenant le premier identifiant. La première liste d'identifiants et la seconde liste d'identifiants comprennent chacune le premier identifiant du premier nœud intermédiaire. Par conséquent, le premier trajet et le second trajet passent tous les deux par le premier nœud intermédiaire, la cohérence entre un trajet de transmission du paquet de réponse et un trajet de transmission du paquet de détection est relativement élevée, et la précision de la détection de défaut effectuée par un nœud de tête selon le paquet de réponse est relativement élevée.
PCT/CN2021/139554 2020-12-21 2021-12-20 Procédé, dispositif et système de transmission de paquets WO2022135321A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202011517278 2020-12-21
CN202011517278.8 2020-12-21
CN202110267901.7A CN114726754A (zh) 2020-12-21 2021-03-11 报文传输方法、设备及系统
CN202110267901.7 2021-03-11

Publications (1)

Publication Number Publication Date
WO2022135321A1 true WO2022135321A1 (fr) 2022-06-30

Family

ID=82157380

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/139554 WO2022135321A1 (fr) 2020-12-21 2021-12-20 Procédé, dispositif et système de transmission de paquets

Country Status (1)

Country Link
WO (1) WO2022135321A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102204169A (zh) * 2011-05-12 2011-09-28 华为技术有限公司 故障检测方法、路由节点及系统
CN102624609A (zh) * 2012-02-28 2012-08-01 华为技术有限公司 反向bfd报文发送、通知路径的方法及装置
US20130022046A1 (en) * 2011-07-22 2013-01-24 Cisco Technology, Inc. Diverse path forwarding through trial and error
CN108768788A (zh) * 2018-06-26 2018-11-06 新华三技术有限公司合肥分公司 路径故障检测方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102204169A (zh) * 2011-05-12 2011-09-28 华为技术有限公司 故障检测方法、路由节点及系统
US20130022046A1 (en) * 2011-07-22 2013-01-24 Cisco Technology, Inc. Diverse path forwarding through trial and error
CN102624609A (zh) * 2012-02-28 2012-08-01 华为技术有限公司 反向bfd报文发送、通知路径的方法及装置
CN108768788A (zh) * 2018-06-26 2018-11-06 新华三技术有限公司合肥分公司 路径故障检测方法及装置

Similar Documents

Publication Publication Date Title
US10757231B2 (en) Providing network efficiencies in forwarding packets among provider networks and applying segment routing policies
US11979322B2 (en) Method and apparatus for providing service for traffic flow
CN109873760B (zh) 处理路由的方法和装置、以及数据传输的方法和装置
US10237177B2 (en) Transfer device and transfer system
JP5345942B2 (ja) Pbtネットワークの中間ノードにおけるイーサネットoam
CN113300949B (zh) 转发报文的方法、发布路由信息的方法、装置及系统
TWI449380B (zh) 資料中心網路系統及其封包傳送方法
EP3742685B1 (fr) Procédé et dispositif de traitement de paquets
US10931530B1 (en) Managing routing resources of a network
JP2020520612A (ja) パケット伝送方法、エッジデバイス及び機械可読記憶媒体
WO2021088433A1 (fr) Procédé, dispositif et système de traitement de message
WO2022042503A1 (fr) Procédé, appareil et système de transmission de messages
US20230067091A1 (en) Method and device for segment routing service processing, routing equipment, and storage medium
US11356372B2 (en) Data traffic processing method, device, and system
US20240048479A1 (en) Packet Forwarding Method and Apparatus, Network Device, and Storage Medium
WO2022057810A1 (fr) Procédé de transfert de paquet de services, procédé d'envoi de politique sr, dispositif et système
JP2023529639A (ja) パケット処理方法、デバイス、およびシステム
WO2022135321A1 (fr) Procédé, dispositif et système de transmission de paquets
JP2024506089A (ja) パケット転送方法、装置、およびシステム
CN111447131B (zh) 报文解封装方法及装置、报文封装方法及装置
WO2023078031A1 (fr) Procédé et appareil d'envoi de messages
WO2024001701A1 (fr) Procédé, appareil et système de traitement de données
CN114726754A (zh) 报文传输方法、设备及系统
WO2023078144A1 (fr) Procédé, appareil et système de traitement de message
CN113497794B (zh) 一种切换路由的方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21909317

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21909317

Country of ref document: EP

Kind code of ref document: A1