WO2022166543A1 - 故障保护方法及装置、存储介质、电子装置 - Google Patents

故障保护方法及装置、存储介质、电子装置 Download PDF

Info

Publication number
WO2022166543A1
WO2022166543A1 PCT/CN2022/071398 CN2022071398W WO2022166543A1 WO 2022166543 A1 WO2022166543 A1 WO 2022166543A1 CN 2022071398 W CN2022071398 W CN 2022071398W WO 2022166543 A1 WO2022166543 A1 WO 2022166543A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
sid
standby
protection
network programming
Prior art date
Application number
PCT/CN2022/071398
Other languages
English (en)
French (fr)
Inventor
刘尧
王玉保
彭少富
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US18/276,230 priority Critical patent/US20240121178A1/en
Publication of WO2022166543A1 publication Critical patent/WO2022166543A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/34Source routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4675Dynamic sharing of VLAN information amongst network nodes

Definitions

  • the present disclosure mainly relates to the field of communications, and in particular, to a fault protection method and device, a storage medium, and an electronic device.
  • the proxy node can forward proxy to all and some of its neighbor nodes.
  • the proxy node maintains proxy forwarding entries locally.
  • the proxy node receives a packet containing the SID of the protected node from the upstream node, it can look up the proxy table. items are forwarded.
  • the proxy node needs to advertise its SR proxy capability externally through IGP (Interior Gateway Protocol), and the upstream device must also be able to support receiving new notification messages;
  • IGP Interior Gateway Protocol
  • the main exit node is the designated exit node of the SRv6 path, and has a corresponding SID in the SRH (Segment Routing Header, abbreviated as SRheader, representing segment routing header) to indicate the main exit node, Called the primary exit node SID.
  • SRheader Segment Routing Header
  • PLR Point of Local Repair
  • a new type of mirrored SID is defined.
  • the standby node and the local protection node (PLR) need to support this new type of SID and related IGP (Interior Gateway Protocol) extensions. Therefore, it is not very friendly to old devices. ;
  • Embodiments of the present disclosure provide a fault protection method and device, a storage medium, and an electronic device, so as to at least solve the problem that in the process of fault protection, different technologies are generally used for intermediate node protection and tail node protection, which leads to difficulties in equipment deployment, etc. question.
  • An embodiment of the present disclosure provides a fault protection method, including: configuring a protection relationship on a standby node, where the protection relationship is used to indicate an object to be protected by the standby node; receiving segment identification SID information advertised by the master node, wherein, The segment identification SID information at least includes: SID network programming function type, SID value; Match the SID network programming function type with the SID network programming function type possessed by the standby node, and compare the SID value with the protection relationship.
  • a protection table entry is generated;
  • the standby node forwards the received message according to the protection entry, wherein, in the case where the primary node and the link connected to the primary node are not faulty
  • other nodes send the message directly to the standby node, The other nodes are other nodes except the master node and the backup node.
  • a fault protection device including: a configuration module configured to configure a protection relationship on a standby node, wherein the protection relationship is used to indicate an object that needs to be protected on the standby node; receiving The module is configured to receive the segment identification SID information advertised by the master node, wherein the segment identification SID information at least includes: SID network programming function type, SID value; a matching module, set to the SID network programming function type and the standby node The SID network programming function type possessed is matched, and the SID value and the protection relationship are matched.
  • the SID network programming function type and the SID network programming function type possessed by the standby node and the SID value and the protection relationship are both In the case of successful matching, a protection table entry is generated; the forwarding module is set to in the case that the master node or the link connected to the master node fails, wherein the master node and the link connected to the master node are set to In the case of no failure, other nodes send the message to the master node, and in the case of failure of the master node and the link connected to the master node, other nodes directly send the message to the master node.
  • the standby node and the other nodes are other nodes except the primary node and the standby node.
  • a computer-readable storage medium is also provided, where a computer program is stored in the storage medium, wherein the computer program is configured to execute any one of the above method embodiments when running steps in .
  • an electronic device comprising a memory and a processor, wherein the memory stores a computer program, the processor is configured to run the computer program to execute any of the above Steps in Method Examples.
  • a protection relationship is configured on the standby node, wherein the protection relationship is used to indicate the object to be protected by the standby node; the segment identifier SID information advertised by the master node is received, wherein the segment identifier SID information includes at least: SID network programming function type, SID value; match the SID network programming function type with the SID network programming function type possessed by the standby node, match the SID value with the protection relationship, and set the SID network programming function in the SID network programming function type.
  • a protection table entry is generated; in the case of failure of the master node or the link connected to the master node under the protection table entry, the standby node forwards the received message, wherein, in the case that the primary node and the link connected to the primary node are not faulty, other nodes forward the message It is sent to the master node.
  • other nodes In the case of failure of the master node and the link connected to the master node, other nodes directly send the message to the standby node, and the other nodes are in addition to the master node.
  • Node and other nodes other than the standby node that is, by configuring the protection relationship on the standby node, and the SID network programming function type and the SID network programming function type possessed by the standby node, and the SID value and the protection
  • a protection table entry is generated, and then in the event of failure of the master node or the link connected to the master node, the standby node forwards the received message according to the protection table entry, using the above technical solution , solves the problem of related fault protection technology, in the process of fault protection, the intermediate node protection and tail node protection generally use different technologies, which leads to difficulties in equipment deployment, etc.
  • the technical solution of the present disclosure is applicable to both intermediate and exit nodes.
  • the failover path can provide the same function as the original path.
  • FIG. 1 is a block diagram of a hardware structure of a computer terminal of a fault protection method according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a fault protection method according to an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of an intermediate node protection networking according to a fault protection method according to an optional embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of a service chain protection scenario of a fault protection method according to an optional embodiment of the present disclosure
  • FIG. 5 is a schematic diagram of a tail node/link fault protection network of a fault protection method according to an optional embodiment of the present disclosure
  • FIG. 6 is a structural block diagram of a fault protection device according to an embodiment of the present disclosure.
  • FIG. 1 is a hardware structural block diagram of a computer terminal according to a fault protection method according to an embodiment of the present disclosure.
  • the computer terminal may include one or more (only one is shown in FIG. 1 ) processor 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.) and a memory 104 for storing data, optionally, the above-mentioned computer terminal may further include a transmission device 106 and an input and output device 108 for communication functions.
  • FIG. 1 is only a schematic diagram, which does not limit the structure of the above-mentioned computer terminal.
  • the computer terminal may also include more or fewer components than those shown in FIG. 1 , or have a different configuration with equivalent or more functions than those shown in FIG. 1 .
  • the memory 104 can be used to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the fault protection methods in the embodiments of the present disclosure. A functional application and data processing are implemented, that is, to implement the above method.
  • Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, memory 104 may further include memory located remotely from processor 102, which may be connected to a computer terminal through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof. Transmission means 106 are used to receive or transmit data via a network. The specific example of the above-mentioned network may include a wireless network provided by the communication provider of the computer terminal.
  • the transmission device 106 includes a network adapter (Network Interface Controller, NIC for short), which can be connected to other network devices through a base station so as to communicate with the Internet.
  • the transmission device 106 may be a radio frequency (Radio Frequency, RF for short) module, which is used to communicate with the Internet in a wireless manner.
  • NIC Network Interface Controller
  • FIG. 2 is a flowchart of the fault protection method according to the embodiment of the present disclosure, as shown in FIG. 2 , including:
  • Step S202 configure a protection relationship on the standby node, wherein the protection relationship is used to indicate the object that the standby node needs to protect;
  • Step S204 receiving segment identification SID information advertised by the master node, wherein the segment identification SID information at least includes: SID network programming function type, SID value;
  • Step S206 the SID network programming function type is matched with the SID network programming function type possessed by the standby node, the SID value is matched with the protection relationship, and the SID network programming function type is matched with the SID network programming function type possessed by the standby node.
  • the SID does not explicitly describe the network programming function type, and there is a default network programming function type END, it is also considered that the SID information contains the network programming function type information.
  • Step S208 In the case where the primary node fails or the link connected to the primary node occurs, the secondary node forwards the received message according to the protection entry, wherein the primary node and the link with the primary node are forwarded.
  • the link connected to the master node does not fail, other nodes send the message to the master node, and when the master node and the link connected to the master node fail, other nodes send all The message is directly sent to the standby node, and the other nodes are nodes other than the master node and the standby node.
  • a protection relationship is configured on the standby node, wherein the protection relationship is used to indicate the object to be protected by the standby node; the segment identifier SID information advertised by the master node is received, wherein the segment identifier SID information includes at least: SID network programming function type, SID value; match the SID network programming function type with the SID network programming function type possessed by the standby node, match the SID value with the protection relationship, and set the SID network programming function in the SID network programming function type.
  • a protection table entry is generated; in the case of failure of the master node or the link connected to the master node , the standby node forwards the received message according to the protection entry, wherein, in the case that the primary node and the link connected to the primary node are not faulty, other nodes send the message To the master node, in the case of failure of the master node and the link connected to the master node, other nodes send the message directly to the standby node, and the other nodes are not the master node.
  • the standby node forwards the received message according to the protection table entry.
  • the intermediate node protection and the tail node protection generally use different technologies respectively, which leads to problems such as difficulty in equipment deployment.
  • the technical solution of the present disclosure is applicable to both intermediate and exit nodes/chains The fault protection of the path, the path switched after the failure can provide the same function as the original path.
  • the solution of the present disclosure is only applicable to the networking in which both the active and standby nodes support SRv6, excluding the situation of SR-MPLS (Segment Routing Multi-Protocol Label Switching, segment routing based on multi-protocol label switching).
  • SR-MPLS Segment Routing Multi-Protocol Label Switching, segment routing based on multi-protocol label switching
  • the network Other nodes in the SRv6 are not required to support SRv6.
  • the protection relationship is configured on the standby node, if the SID information advertised by the master node received by the standby node is within the protection range, but the standby node does not have the protection capability, it can discard packets and generate alarms.
  • the behavior can be the default. , it can also be configured according to requirements.
  • step S208 because the standby node floods the prefix of the primary node with a priority lower than that of the primary node, other nodes will The message is sent to the master node, and when the master node and the link connected to the master node fail, other nodes send the message directly to the standby node.
  • the prefix of the master node when configuring the protection relationship on the standby node, you can configure the prefix of the master node to be protected on the standby node, and the prefix can cover the SID of the required master node.
  • the prefix can be one or more prefixes. For example, if the prefix of the primary node is LOC2, the prefix LOC2 that needs to be protected can be configured on the standby node; the primary node that needs to be protected can also be configured on the standby node; Configure the SID value of the segment identifier of the master node to be protected. In addition, you can also configure the SID network programming function type of the master node to be protected on the standby node.
  • the SID type of the master node is END, and then you can
  • the SID of the END type that needs to be protected is configured on the backup node, and the present disclosure does not limit the SID information, the prefix of the master node, and the like.
  • the standby node is instructed to The prefix of the node is flooded externally with a low priority, wherein the low priority is lower than the priority when the master node itself is flooded.
  • the master node advertises the segment identification SID information on the master node, wherein the notification method may be IGP (Interior Gateway Protocol), BGP (Border Gateway Protocol, Border Gateway Protocol) and other methods. This is not limited.
  • the notification message includes: the segment identifier SID value and the type of segment identifier SID information.
  • the standby node sends the master node
  • the prefix is flooded out with a priority lower than the master node itself, wherein the flooding mode may be an IGP (Interior Gateway Protocol) mode, which is not limited in this embodiment of the present disclosure, so that the message is sent to the master node first.
  • the node in the case of the master node sending failure, forwards the message to the standby node again.
  • the standby node after instructing the standby node to flood the prefix of the primary node with a low priority, the standby node no longer has the ability to protect the prefix on the primary node, the primary node, and the prefix on the primary node.
  • the standby node revokes the externally flooded prefix of the master node, and the standby node no longer has a protection relationship.
  • the SID information advertised by the master node also carries service function information
  • the SID network programming function type is the segment routing SR proxy function
  • the SID provided by the standby node is used.
  • the network programming function type is matched with the segment routing SR proxy function; in the case that the SID network programming function type possessed by the standby node matches the segment routing SR proxy function, the service provided by the standby node SR proxy is used.
  • the function information is matched with the service function information corresponding to the segment routing SR proxy function of the primary node; the service function information possessed by the SR proxy on the standby node corresponds to the segment routing SR proxy function of the primary node.
  • the segment routing SR proxy function is matched first. If the standby node also has the SR proxy function, the matching is successful. Furthermore, it is necessary to match the service function information corresponding to the SR proxy function. If the standby node also has the service function information corresponding to the SR proxy function, if the matching is successful, a protection entry can be generated. If one of the SR proxy functions and the service function information corresponding to the SR proxy functions do not match, neither protection entry can be generated. After the corresponding protection entry is generated, the prefix corresponding to the master node is flooded out with low priority by means of IGP (interior gateway protocol). For example, if the service function information corresponding to the segment routing SR proxy is a firewall, the standby node will further match the firewall type with the service function information possessed by the standby node, and if all match, generate corresponding protection entries.
  • IGP interior gateway protocol
  • the firewall node represents a device that does not support SRv6
  • the master node and the standby node have the proxy function, that is, they can replace the firewall to process packets.
  • the proxy encapsulates the message header and continues to forward it.
  • the method further includes: receiving, at the standby node, the virtual private network encapsulated by the master node After VPN routing, the SID network programming function type in the VPN route is matched with the SID network programming function type possessed by the standby node; the SID network programming function type in the VPN routing is matched with the SID network programming function type possessed by the standby node.
  • the VPN service information possessed by the SID network programming function of the standby node is matched with the VPN service information corresponding to the SID network programming function type in the VPN route of the master node;
  • the protection entry is generated when the VPN service information provided by the SID network programming function of the standby node matches the VPN service information corresponding to the SID network programming function type in the VPN route of the master node.
  • the standby node After the standby node receives the virtual private network VPN route sent by the master node, the standby node performs the longest matching according to the VPN SID information in the VPN route and the prefix address in the protection relationship, and the VPN service provided by the standby node. When the information matches the VPN service information in the VPN route, the protection entry is generated, and the forwarding behavior is to forward the traffic to the target object. When the node fails, it forwards the packets of the master node.
  • the standby node matches the SID network programming function type with the SID network programming function type possessed by the standby node;
  • the link information is matched with the link information possessed by the standby node; If the link information matches successfully, a protection entry is generated.
  • the standby node After the standby node receives the link information in the SID information sent by the master node, the standby node matches the SID network programming function type possessed by the standby node according to the SID network programming function type, and matches the link information with the SID network programming function type of the standby node.
  • the link information of the standby node is matched, and in the case of successful matching, the protection table entry is generated, and the instruction message is sent to the target object along the link.
  • the standby node when the primary node does not fail, but the link on which the VPN network to which the primary node is connected is located fails to transmit, the standby node receives the packet sent by the primary node and encapsulated in a preset manner.
  • a target message wherein the target message includes: the VPN SID allocated by the master node for the VPN network; in the case that the VPN SID matches the protection table entry, according to the protection table entry
  • the standby node forwards the received message, wherein, under the condition that the primary node and the link connected to the primary node are not faulty, other nodes send the message to the primary node, where In the case of failure of the master node and the link connected to the master node, other nodes send the message directly to the backup node, and the other nodes are the ones other than the master node and the backup node. other nodes.
  • the standby node After the standby node receives the traffic, it hits the protection table entry of the VPN SID of the active node, and the action of the protection table entry is: if the link of the standby node is valid, it forwards the traffic to the target object; if the link of the standby node is also faulty, it will Packets are discarded.
  • the above encapsulation method may be: matching the tunnel through the tunnel policy configured on the master node or through the preset conditions in the BGP route, encapsulating the VPN SID in the innermost layer of the tunnel for forwarding, and when the forwarding tunnel is an SR path, The VPN SID is added to the last one in the SID List for forwarding; or forwarding is performed by means of IP in IP, the IP of the outer IP header is filled with the PE3 BGP link building address, and the destination IP of the inner IP is filled with the local VPN SID.
  • the embodiment does not limit the encapsulation mode of the VPN SID.
  • SR is a source address-based routing method. It uses the packet headers in the existing Multi-Protocol Label Switching (MPLS) network or the Internet Protocol Version 6 (Internet Protocol Version 6, IPv6) packets.
  • MPLS Multi-Protocol Label Switching
  • IPv6 Internet Protocol Version 6, IPv6
  • the segment routing header (Segment Routing Header, SRheader) is carried in the header, and a series of indication operations (also called segment operations) are carried in the SRH for data routing and transmission in the network.
  • An SRv6 Segment is a 128-bit number, which is also commonly referred to as an SRv6 SID or SID.
  • SRv6 SID a kind of network instruction (Instruction), which consists of Locator, Function and optional Argument part. Locator is mainly responsible for the routing function, so it must be unique in the SR domain. Function Any function of the device can be marked, such as a certain forwarding behavior, or a certain service.
  • the structure of the SRv6 SID is more conducive to programming the network.
  • SRv6 VPN (virtual private network based on SRv6) mainly refers to the transmission of VPN data based on SRv6 tunnel.
  • SRv6 tunnels include SRv6 BE and SRv6-TE tunnels.
  • SRv6 Service SID refers to a SID on the PE with specific service behavior, such as finding a specific VRF, forwarding to a specific next hop, etc.
  • FIG. 3 is a schematic diagram of an intermediate node protection network according to a fault protection method according to an optional embodiment of the present disclosure.
  • the intermediate node P2 is the master node
  • P3 is the standby node
  • the prefix on P2 is LOC2, which is assigned to P2
  • An END-type segment identifier SID21 is assigned
  • an END.X-type SID22 is assigned to the link P2-PE4.
  • the prefix on P3 is LOC3
  • an END-type SID31 is assigned to P3
  • an END-type SID31 is assigned to the link P3- PE4 allocates a SID32 of type END.X, and configures the protection relationship on P3.
  • the configuration method includes at least one of the following:
  • Method 1 Configure by prefix
  • P3 needs to protect the segment identifier SID on P2.
  • the prefix that needs to be protected is configured on P3, and the prefix covers the SID that needs to be protected.
  • the number of the prefixes is not limited and can be one or more prefixes.
  • the prefix of P2 is LOC2. Therefore, configure the prefix on P3.
  • the protection relationship is the prefix LOC2 of P2; after the protection relationship of SID is configured on P3, LOC2 is flooded out with low priority through IGP (interior gateway protocol), BGP, etc., forming anycast fast rerouting on P ( Anycast FRR), that is, the master node is P2, and the standby node is P3; the SID information on P2 will be advertised through IGP (Interior Gateway Protocol) and other methods, and the notification message includes the Locator prefix corresponding to the SID (Locator prefix), and SID type, etc.
  • the corresponding Remote SID entry is generated according to the type of the P2 SID. For example, for SID21 of the END type, a Remote END SID entry is generated; for the SID22 of the END.X type, PE3 finds that SID22 is allocated for the link PE2-PE4, and PE3, as the protection node of PE2, also has a link to PE4 , so the Remote END.X SID entry is generated, and the action is to send the message to PE4.
  • the protection relationship is configured, if the SID advertised by the master node is within the protection range, but the backup node does not have the protection capability, you can use behaviors such as discarding packets and generating alarms.
  • the behavior may be the default. May also be configurable.
  • Method 2 Configure by node.
  • P3 needs to protect the SID on P2, and a node that needs to be protected is configured on P3, which is P2 in this embodiment;
  • the protection of the SID network programming function type in the embodiment for example, only protects the SID of the END type, etc.;
  • the SID information on the P2 will be advertised by means such as IGP (interior gateway protocol), and the notification message contains the Locator prefix corresponding to the SID. , and information such as the function type of the SID.
  • P receives two advertisement messages.
  • the entry with the higher priority is the destination address LOC2 and the next hop is P2; the entry with the lower priority is the destination address LOC2 and the next hop P3.
  • the standby node when it does not have the ability to protect a specific node, prefix, or SID, it can choose to revoke the information that has been advertised.
  • the routing prefix corresponding to the SID advertised by P2 has a higher priority.
  • the corresponding segment list is ⁇ SID-PE1, SID-P, SID21, SID-PE4>.
  • P2 fails When the packet arrives at P, the destination address is SID21, and it hits the lower-priority prefix entry, and will be sent to P3. The packet hits the Remote END SID entry and continues to forward. If the corresponding segment list segment list (partial list) is ⁇ SID-PE1, SID-P, SID22, SID-PE4>, the packet hits the Remote END.X SID entry, continues to forward, and sends the packet to along the link P3-PE4 is sent to PE4.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • FIG. 4 is a schematic diagram of a service chain protection scenario of a fault protection method according to an optional embodiment of the present disclosure.
  • the transmission from CE1 to CE2 needs to be filtered by a firewall, and the normal service flow is CE1->PE1-> P->P2->FW->P2->PE4->CE2, where the firewall FW is a device that does not support SRv6, and P2 and P3 have the SRv6 proxy function (such as END.AS), which can replace the FW to process SRv6 packets.
  • the SRv6 packet header is stripped.
  • the proxy encapsulates the SRv6 packet header and continues to forward it.
  • the protection relationship is configured on P3.
  • the SID (segment identifier) on P2 needs to be protected on P3, the node P2 that needs to be protected is configured on P3, and only the SID of the static proxy type is specified to be protected; the service on P2
  • the SID of the chain agent type will advertise the SID information in some way, such as IGP (Interior Gateway Protocol) ⁇ BGP (Border Gateway Protocol), etc.
  • the notification message contains the function type of the SID, and may also include the corresponding SR agent.
  • the service function is a firewall.
  • P3 learns the SID information advertised by P2, at the same time, P2 is the node that needs to be protected, and the SID of the static proxy type is the type that needs to be protected. If the notification message also carries the service function information corresponding to the SR agent as a firewall, P3 will further match the service function information with the service function information possessed by P3. If all the above information matches, the corresponding Remote END.AS will be generated. SID entry, and then flood the Locator prefix corresponding to the P2 SID with low priority through IGP (Interior Gateway Protocol) and other methods.
  • IGP Interior Gateway Protocol
  • FIG. 5 is a schematic diagram of a tail node/link fault protection network of a fault protection method according to an optional embodiment of the present disclosure.
  • the prefixes on PE1, PE2, and PE3 are LOC1, PE2, and PE3, respectively.
  • VPN neighbors in the form of IPv6 are deployed between PE1-PE2, PE1-PE3, and PE2-PE3.
  • VPN instance VPN1 is configured on PE2 and PE3.
  • the VPN instance carries RT (remote) parameters, and SRv6 VPN SID is configured at the same time.
  • the VPN SIDs on PE2 and PE3 are allocated as SID2 and SID3; after PE2 receives the private network route advertised by CE2, it encapsulates it into a VPN route and sends it to PE3.
  • the route carries the VPN SID, RT, RD and possible constraints.
  • CE1 sends traffic to CE2 through PE1, P, and PE2 in sequence along the specified SR-TE tunnel.
  • a protection relationship is configured on PE3.
  • PE3 needs to protect the SID on PE2.
  • the priority is flooded out, forming Anycast FRR on P, the master node is PE2, and the standby node is PE3; after PE3 receives the VPN route from PE2, it crosses to VPN1 according to RT, and PE3 uses the VPN SID information and SID protection of the remote route.
  • the prefix address in the configuration is matched for the longest time.
  • the announcement message contains the Locator prefix corresponding to the SID, and the function type of the SID and other information.
  • the corresponding Remote SID entry is generated according to the PE2 SID type. For example, if there is an END-type SID on PE2, the Remote SRv6 END SID entry is generated locally with the END SID within the PE2 Locator range, and the fuction (function) is of the END type.
  • the traffic path is CE1-PE1-P-PE2-CE2
  • the P detects that the next hop of PE2 is unreachable, switches to the FRR path, and forwards the traffic to PE3.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • PE1 forwards the traffic sent from CE1 to CE2 according to the SR-BE tunnel; the traffic is forwarded according to the SR-BE tunnel, the destination address of the packets sent by PE1 is directly the VPN SID (SID2), and the nodes along the way are forwarded according to IPv6 After the PE2 fails, the traffic is forwarded to the PE3 node, and the SID2 directly matches the Remote SRv6 VPN SID, thereby forwarding the traffic to CE2.
  • SID2 VPN SID2
  • Embodiment 5 is a diagrammatic representation of Embodiment 5:
  • PE3 After PE3 receives the private network route from PE2, it crosses over to VPN1 according to the RT to form a PE-protected direct-connected fast rerouting FRR entry, in which the primary next hop is CE2, and the standby next hop is PE2, which carries the PE2 VPN SID.
  • PE2 After PE2 receives the private network route, it crosses over to VPN1 according to the RT to form a PE-protected direct connection fast rerouting FRR entry.
  • the primary next hop is CE2, and the standby next hop is PE3, which carries the PE3 VPN SID.
  • the traffic forwarded from P is first sent to PE2, PE2 senses the link failure, triggers the PE to protect the CE FRR switch, and uses the SID advertised by PE3 to forward the traffic to PE3; After PE3 receives the traffic, it also detects the local link failure and sends the packet back to PE2, causing the traffic to loop. Therefore, in the scheme of link failure protection of the tail node, it is necessary to consider preventing the occurrence of loops.
  • This embodiment is mainly based on the master node sensing the link failure, after triggering the master node to protect the CE FRR switch, the master node's own SID is used to forward the traffic to the standby node, and after receiving the SID, the standby node matches the Remote SID protection entry , if the Remote SID entry is valid, continue forwarding according to the entry, and if the Remote SID entry is invalid, the packet is directly discarded.
  • PE3 configures the protection relationship on PE3 and generates a Remote VPN SID entry; PE2 will receive the private network route from CE2, and PE3 will encapsulate the private network route from CE2 and send it as a VPN route.
  • PE2 after receiving the route from PE3, PE2 crosses it to VPN1 according to the RT, thereby forming a PE-protected direct connection FRR entry, in which the primary next hop is CE2, and the standby next hop is PE3, which carries the local VPN SID2.
  • the VPN SID uses the VPN SID2 locally allocated by PE2; when PE2 forwards traffic to PE3, in order to ensure that the traffic will not be sent back to PE2 by other nodes during the forwarding process, the packets sent by PE2 cannot be directly used.
  • the destination address is VPN SID2 for forwarding.
  • the VPN SID can be encapsulated in the innermost layer of the tunnel for forwarding through the tunnel policy configured on PE2 or the color matching in the BGP route, or forwarded through IP in IP.
  • the IP of the layer IP header is filled with the PE3 BGP link building address, and the destination IP of the inner IP is filled with the local VPN SID, that is, the additional encapsulation and forwarding information is responsible for sending the message to PE3, and the inner VPN SID is responsible for preventing loops; PE3 receives the message After that, VPN SID2 hits the local Remote VPN SID entry. If the link between PE3 and CE2 is valid, the traffic is forwarded to CE2. If the link between PE3 and CE2 is also faulty, the packet is discarded.
  • the first node after the first node (standby node) receives the SID information advertised by the second node (master node), if the SID information matches the protection information, a corresponding remote SID protection table entry is generated, and the remote SID protection
  • the entry provides the same functions as the original SID, such as END, END.X, END.DT4, END.AS, etc.; the first node needs to flood the SID covering the second node through protocols such as IGP (interior gateway protocol). prefix, the priority is lower than the priority of the second node itself when it is flooded; so that the upstream protection node can switch in case of failure when it only has the basic IPv6 routing and forwarding function, and the backup path can provide The same function as the path.
  • IGP internal gateway protocol
  • the master node receives the VPN route advertised by the CE and the backup node, and generates an FRR entry, where the master next hop is CE, the standby next hop is the standby node, which carries the VPN SID of the master node; after the main link fails, the master node additionally encapsulates and forwards information and is responsible for sending packets to the standby node, carrying its own VPN SID for loop prevention; the standby node receives After the packet arrives, the VPN SID matches the remote SID entry, and if the backup link is also faulty, the packet is discarded to prevent loops.
  • a fault protection device is also provided, and the device is used to implement the above-mentioned embodiments and preferred implementations, and the descriptions that have been described will not be repeated.
  • the term "module” may be a combination of software and/or hardware that implements a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, implementations in hardware, or a combination of software and hardware, are also possible and contemplated.
  • FIG. 6 is a structural block diagram of a fault protection device according to an embodiment of the present disclosure. As shown in FIG. 6 , the device includes:
  • the configuration module 62 is configured to configure a protection relationship on the standby node, wherein the protection relationship is used to indicate the object that the standby node needs to protect;
  • the receiving module 64 is configured to receive segment identification SID information advertised by the master node, wherein the segment identification SID information at least includes: SID network programming function type, SID value;
  • the SID does not explicitly describe the network programming function type, and there is a default network programming function type END, it is also considered that the SID information contains the network programming function type information.
  • the matching module 66 is configured to match the SID network programming function type with the SID network programming function type possessed by the standby node, and match the SID value with the protection relationship.
  • the SID network programming function type is possessed by the standby node.
  • the forwarding module 68 is configured to forward the received message according to the protection table entry by the standby node in the event of failure of the primary node or the link connected to the primary node, wherein, in the primary node When the node and the link connected to the master node do not fail, other nodes send the message to the master node, and when the master node and the link connected to the master node fail, other nodes The node directly sends the message to the standby node, and the other nodes are other nodes except the master node and the standby node.
  • a protection relationship is configured on the standby node, wherein the protection relationship is used to indicate the object to be protected by the standby node; the segment identifier SID information advertised by the master node is received, wherein the segment identifier SID information includes at least: SID network programming function type, SID value; match the SID network programming function type with the SID network programming function type possessed by the standby node, match the SID value with the protection relationship, and set the SID network programming function in the SID network programming function type.
  • a protection table entry is generated; in the case of failure of the master node or the link connected to the master node under the protection table entry, the standby node forwards the received message, wherein, in the case that the primary node and the link connected to the primary node are not faulty, other nodes forward the message It is sent to the master node.
  • other nodes In the case of failure of the master node and the link connected to the master node, other nodes directly send the message to the standby node, and the other nodes are in addition to the master node.
  • Node and other nodes other than the standby node that is, by configuring the protection relationship on the standby node, and the SID network programming function type and the SID network programming function type possessed by the standby node, and the SID value and the protection
  • a protection table entry is generated, and then in the event of failure of the master node or the link connected to the master node, the standby node forwards the received message according to the protection table entry, using the above technical solution , solves the problem of related fault protection technology, in the process of fault protection, the intermediate node protection and tail node protection generally use different technologies, which leads to difficulties in equipment deployment, etc.
  • the technical solution of the present disclosure is applicable to both intermediate and exit nodes.
  • the failover path can provide the same function as the original path.
  • the solution of the present disclosure is only applicable to the networking in which both the active and standby nodes support SRv6, excluding the situation of SR-MPLS, and other nodes in the network do not have to support SRv6.
  • the protection relationship is configured on the standby node, if the SID information advertised by the master node received by the standby node is within the protection range, but the standby node does not have the protection capability, it can discard packets and generate alarms.
  • the behavior can be the default. , it can also be configured according to requirements.
  • the configuration module is further configured to configure the prefix on the master node to be protected on the standby node; configure the master node to be protected on the standby node; configure the segment identifier on the master node to be protected on the standby node SID value; configure the protection relationship on the standby node by configuring the SID network programming function type on the master node to be protected on the standby node.
  • the prefix of the master node when configuring the protection relationship on the standby node, you can configure the prefix of the master node to be protected on the standby node, and the prefix can cover the SID of the required master node.
  • the prefix can be one or more prefixes. For example, if the prefix of the primary node is LOC2, the prefix LOC2 that needs to be protected can be configured on the standby node; the primary node that needs to be protected can also be configured on the standby node; Configure the SID value of the segment identifier of the master node to be protected. In addition, you can also configure the SID network programming function type of the master node to be protected on the standby node.
  • the SID type of the master node is END, and then you can
  • the SID of the END type that needs to be protected is configured on the backup node, and the present disclosure does not limit the SID information, the prefix of the master node, and the like.
  • the above-mentioned apparatus further includes: a flooding module, which instructs the standby node to flood the prefix of the master node with a low priority, wherein the low priority is lower than that of the master node itself. Pan-time priority.
  • the master node advertises the segment identification SID information on the master node, wherein the notification method may be an IGP (interior gateway protocol) or other method, which is not limited in this embodiment of the present disclosure, and the notification message includes: The segment identifier SID value and the type of segment identifier SID information.
  • the standby node assigns the prefix of the master node to a priority lower than that of the master node itself.
  • the flooding mode may be an IGP (Interior Gateway Protocol) or a BGP mode, which is not limited in this embodiment of the present disclosure, so that the traffic is sent to the master node first, and in the case of the master node sending failure , and forward the traffic to the standby node again.
  • IGP Interior Gateway Protocol
  • the above-mentioned device also includes a revocation module, configured to instruct the standby node to flood the prefix of the primary node with a low priority, after the standby node no longer has the prefix to protect the primary node, all In the case of the master node, the segment identifier SID value on the master node, or the SID network programming function type on the master node, the standby node revokes the externally flooded prefix of the master node, and then the standby node no longer has Protect the relationship.
  • the matching module is further configured to, in the case that the SID information advertised by the master node also carries service function information, and in the case that the SID network programming function type is the segment routing SR proxy function, through all The SID network programming function type possessed by the standby node is matched with the segment routing SR proxy function; under the condition that the SID network programming function type possessed by the standby node matches the segment routing SR proxy function, the The service function information possessed by the node SR proxy is matched with the service function information corresponding to the segment routing SR proxy function of the primary node; the service function information possessed by the SR proxy at the standby node is matched with the segment routing SR proxy function of the primary node.
  • the protection entry is generated.
  • the segment routing SR proxy function is matched first. If the standby node also has the SR proxy function, the matching is successful. Furthermore, it is necessary to match the service function information corresponding to the SR proxy function. If the standby node also has the service function information corresponding to the SR proxy function, if the matching is successful, a protection entry can be generated. If one of the SR proxy functions and the service function information corresponding to the SR proxy functions do not match, neither protection entry can be generated. After the corresponding protection entry is generated, the prefix corresponding to the master node is flooded out with a low priority by means of IGP (interior gateway protocol).
  • IGP interior gateway protocol
  • the standby node will further match the firewall type with the service function information possessed by the standby node. If all of them match, a corresponding protection entry will be generated.
  • the firewall node represents a device that does not support SRv6
  • the master node and the standby node have the proxy function, that is, they can replace the firewall to process packets. After the packet is sent back to the proxy, the proxy encapsulates the packet header and continues to forward it.
  • the matching module is further configured to, in the case that the SID information advertised by the primary node also carries VPN service information, the method further includes: when the standby node receives the primary node After the virtual private network VPN route encapsulated by the node, the network programming function type in the VPN route is matched with the SID network programming function type possessed by the standby node; the network programming function type in the VPN route is the same as the network programming function type in the VPN route.
  • the SID network programming function type of the standby node matches, the VPN service information provided by the SID network programming function of the standby node is matched with the VPN service information corresponding to the SID network programming function type in the VPN route of the master node. generating the protection entry when the VPN service information provided by the SID network programming function of the standby node matches the VPN service information corresponding to the SID network programming function type in the VPN route of the master node.
  • the standby node After the standby node receives the virtual private network VPN route sent by the master node, the standby node performs the longest matching according to the VPN SID information in the VPN route and the prefix address in the protection relationship, and the VPN service provided by the standby node. When the information matches the VPN service information in the VPN route, the protection table entry is generated, and the forwarding behavior is to forward the traffic to the target object.
  • the matching module is further configured to, in the case that the SID information advertised by the master node also carries link information, the standby node combines the SID network programming function type with the SID network programming that the standby node possesses.
  • the function type is matched; in the case that the SID network programming function type is successfully matched with the SID network programming function type possessed by the standby node, the link information is matched with the link information possessed by the standby node; In the case that the link information of the standby node is successfully matched with the link information of the standby node, a protection entry is generated.
  • the standby node After the standby node receives the link information in the SID information sent by the master node, the standby node matches the SID network programming function type possessed by the standby node according to the SID network programming function type, and matches the link information with the SID network programming function type of the standby node.
  • the link information of the standby node is matched, and in the case of successful matching, the protection table entry is generated, and the instruction message is sent to the target object along the link.
  • the forwarding module is further configured to, in the case that the master node does not fail, but the transmission link of the VPN network to which the master node is connected fails, the backup node receives the push button sent by the master node.
  • the master node in the case of failure of the master node and the link connected to the master node, other nodes send the message directly to the standby node, and the other nodes are all nodes except the master node and all other nodes. Nodes other than the standby node.
  • the standby node After the standby node receives the traffic, it hits the protection table entry of the VPN SID of the active node, and the action of the protection table entry is: if the link of the standby node is valid, it forwards the traffic to the target object; if the link of the standby node is also faulty, it will Packets are discarded.
  • the above encapsulation method can be: through the tunnel policy configured on the master node or through the Yushu condition in the BGP route to match the tunnel, encapsulate the VPN SID in the innermost layer of the tunnel for forwarding; or forward through IP in IP , the IP of the outer IP header is filled with the PE3 BGP link establishment address, and the destination IP of the inner IP is filled with the local VPN SID.
  • the embodiment of the present disclosure does not limit the encapsulation mode of the VPN SID.
  • the above modules can be implemented by software or hardware, and the latter can be implemented in the following ways, but not limited to this: the above modules are all located in the same processor; or, the above modules can be combined in any combination The forms are located in different processors.
  • An embodiment of the present disclosure further provides a storage medium, where a computer program is stored in the storage medium, wherein the computer program is configured to execute the steps in any of the above method embodiments when running.
  • the above-mentioned storage medium may be configured to store a computer program for executing the following steps:
  • S1 configure a protection relationship on the standby node, wherein the protection relationship is used to indicate the object that the standby node needs to protect;
  • segment identification SID information advertised by the master node, wherein the segment identification SID information at least includes: SID network programming function type, SID value;
  • the backup node forwards the received message according to the protection entry, wherein the master node and the master node are connected to the master node.
  • the connected link does not fail, other nodes send the message to the master node, and when the master node and the link connected to the master node fail, other nodes send the message to the master node.
  • the text is directly sent to the standby node, and the other nodes are other nodes except the master node and the standby node.
  • the above-mentioned storage medium may include but is not limited to: a USB flash drive, a read-only memory (Read-Only Memory, referred to as ROM), a random access memory (Random Access Memory, referred to as RAM), Various media that can store computer programs, such as removable hard disks, magnetic disks, or optical disks.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • An embodiment of the present disclosure also provides an electronic device, including a memory and a processor, where a computer program is stored in the memory, and the processor is configured to run the computer program to execute the steps in any one of the above method embodiments.
  • the above-mentioned electronic device may further include a transmission device and an input-output device, wherein the transmission device is connected to the above-mentioned processor, and the input-output device is connected to the above-mentioned processor.
  • the above-mentioned processor may be configured to execute the following steps through a computer program:
  • S1 configure a protection relationship on the standby node, wherein the protection relationship is used to indicate the object that the standby node needs to protect;
  • segment identification SID information advertised by the master node, wherein the segment identification SID information at least includes: SID network programming function type, SID value;
  • the backup node forwards the received message according to the protection entry, wherein the master node and the master node are connected to the master node.
  • the connected link does not fail, other nodes send the message to the master node, and when the master node and the link connected to the master node fail, other nodes send the message to the master node.
  • the text is directly sent to the standby node, and the other nodes are other nodes except the master node and the standby node.
  • the above-mentioned storage medium may include but is not limited to: a USB flash drive, a read-only memory (Read-Only Memory, referred to as ROM), a random access memory (Random Access Memory, referred to as RAM), Various media that can store program codes, such as removable hard disks, magnetic disks, or optical disks.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • modules or steps of the present disclosure can be implemented by a general-purpose computing device, and they can be centralized on a single computing device or distributed in a network composed of multiple computing devices Alternatively, they may be implemented in program code executable by a computing device, such that they may be stored in a storage device and executed by the computing device, and in some cases, in a different order than here
  • the steps shown or described are performed either by fabricating them separately into individual integrated circuit modules, or by fabricating multiple modules or steps of them into a single integrated circuit module.
  • the present disclosure is not limited to any particular combination of hardware and software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本公开提供了一种故障保护方法及装置、存储介质、电子装置,上述方法包括:在备节点上配置保护关系,其中,保护关系用于指示备节点需要保护的对象;接收主节点通告的段标识SID信息,其中,段标识SID信息至少包括:SID网络编程功能类型、SID值;将SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将SID值与保护关系进行匹配,在SID网络编程功能类型与备节点具备的SID网络编程功能类型以及SID值与保护关系均匹配成功的情况下,生成保护表项;在主节点或与主节点连接的链路发生故障的情况下,根据保护表项备节点对接收到的报文进行转发。

Description

故障保护方法及装置、存储介质、电子装置
本公开要求于2021年02月05日提交中国专利局、申请号为202110163438.1、发明名称“故障保护方法及装置、存储介质、电子装置”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。
技术领域
本公开主要涉及通信领域,具体而言,涉及一种故障保护方法及装置、存储介质、电子装置。
背景技术
随着科技的不断发展,网络的规模越来越大,网络故障的发生会导致业务传输中断以及数据的丢失等,进而造成严重的后果,但是在实际生活中,由于各方面的原因,网络故障是不可避免的,因此故障保护业务传输变得十分重要。
现有技术中,关于SR(Segment Routing,段路由)/SRv6(Segment Routing Internet Protocol Version 6,基于互联网协议第6版平面转发的段路由)网络中的故障保护方案,主要包括以下方案:
1)draft-chen-rtgwg-srv6-midpoint-protection,该方案主要是在节点故障后,跳过故障的节点继续转发,这种方法主要是保护了整个链路的可达性,但是不能保证备份路径可以提供相同的功能;
2)draft-hu-spring-segment-routing-proxy-forwarding,该方案介绍了一种采用代理节点对中间节点进行故障保护的方法。通过引入代理节点,代理节点可以对全部和部分邻居节点进行代理转发,代理节点本地维护代理转发表项,当收到上游节点发来的包含被保护节点的SID的报文时,可以查找代理表项进行转发。该方案中,代理节点需要通过IGP(Interior Gateway Protocol,内部网关协议)对外通告自己的SR代理能力,上游设备也要能够支持接收新的通告消息;
3)draft-ietf-rtgwg-srv6-egress-protection,该方案介绍了一种采用镜像SID进行出口保护的方法。在双归尾节点场景下存在两个尾节点能够提供相同的VPN(Virtual Private Network,虚拟专用网)转发服务,这一对尾节点可以配置成镜像组,并通过IGP(内部网关协议)把镜像关系在网络里扩散。当镜像组内的某个节点故障的时候,可以通过FRR(Fast Reroute,快速重路由)到达镜像组内的其他节点,以达到快速收敛的目的。在SRv6尾节点保护方法中,主出口节点是SRv6路径的指定出口节点,在SRH(Segment Routing Header,简写为SRheader,代表段路由报文头)中具有相应的SID用于指示该主出口节点,称为主出口节点SID。同时有存在备出口节点,和主出口节点上一跳的本地保护节点(PLR,Point of Local Repair),为主出口节点提供保护支持。该方案中,定义了一种新类型的镜像SID,备节点以及本地保护节点(PLR)需要支持该新类型的SID,以及相关的IGP(内部网关协议)扩展,因此,对于老设备不是很友好;
4)draft-hegde-rtgwg-egress-protection-sr-networks,该方案介绍了一种出口保护方法。在双归尾节点场景下存在两个尾节点能够提供相同的VPN转发服务,对于同一个服务 分配相同的VPN SID,SID对应的前缀通告为任播anycast前缀,形成任播快速重路由anycast frr保护。该方法缺点在于需要静态指定VPN SID,因为需要保证两个PE的VPN SID一致,因此不利于实际部署。
针对相关技术中,在故障保护的过程中,中间节点保护和尾节点保护一般分别采用不同的技术,进而导致设备部署困难等问题,尚未提出有效的技术方案。
发明内容
本公开实施例提供了一种故障保护方法及装置、存储介质、电子装置,以至少解决在故障保护的过程中,中间节点保护和尾节点保护一般分别采用不同的技术,进而导致设备部署困难等问题。
本公开实施例提供了一种故障保护方法,包括:在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;在所述主节点或与主节点连接的链路发生故障的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
根据本公开的另一个实施例,还提供了一种故障保护装置,包括:配置模块,设置为在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;接收模块,设置为接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;匹配模块,设置为将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;转发模块,设置为在所述主节点或与主节点连接的链路发生故障的情况下,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
根据本公开的又一个实施例,还提供了一种计算机可读的存储介质,所述存储介质中存储有计算机程序,其中,所述计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。
根据本公开的又一个实施例,还提供了一种电子装置,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为运行所述计算机程序以执行上述任一项方法实施例中的步骤。
通过上述技术方案,在备节点上配置保护关系,其中,所述保护关系用于指示备节点需 要保护的对象;接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;在所述主节点或与主节点连接的链路发生故障的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点,即通过在备节点上配置保护关系,以及在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项,进而在主节点或与主节点连接的链路发生故障的情况下,备节点根据保护表项对接收到的报文进行转发,采用上述技术方案,解决了相关故障保护技术中,在故障保护的过程中,中间节点保护和尾节点保护一般分别采用不同的技术,进而导致设备部署困难等问题,本公开的技术方案同时适用于中间和出口节点的故障保护,故障后切换的路径可以提供与原路径相同的功能。
附图说明
此处所说明的附图用来提供对本公开的进一步理解,构成本申请的一部分,本公开的示意性实施例及其说明用于解释本公开,并不构成对本公开的不当限定。在附图中:
图1是本公开实施例的一种故障保护方法的计算机终端的硬件结构框图;
图2是根据本公开实施例的故障保护方法的流程图;
图3是根据本公开可选实施例的故障保护方法的中间节点保护组网示意图;
图4是根据本公开可选实施例的故障保护方法的业务链保护场景示意图;
图5是根据本公开可选实施例的故障保护方法的尾节点/链路故障保护组网示意图;
图6是根据本公开实施例的故障保护装置的结构框图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本公开。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
需要说明的是,本公开的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
本申请实施例所提供的方法可以在移动终端、计算机终端或者类似的运算装置中执行。以运行在计算机终端上为例,图1是本公开实施例的一种故障保护方法的计算机终端的硬件结构框图。如图1所示,计算机终端可以包括一个或多个(图1中仅示出一个)处理器102(处理器102可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)和用 于存储数据的存储器104,可选地,上述计算机终端还可以包括用于通信功能的传输设备106以及输入输出设备108。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述计算机终端的结构造成限定。例如,计算机终端还可包括比图1中所示更多或者更少的组件,或者具有与图1所示等同功能或比图1所示功能更多的不同的配置。存储器104可用于存储计算机程序,例如,应用软件的软件程序以及模块,如本公开实施例中的故障保护方法对应的计算机程序,处理器102通过运行存储在存储器104内的计算机程序,从而执行各种功能应用以及数据处理,即实现上述的方法。存储器104可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器104可进一步包括相对于处理器102远程设置的存储器,这些远程存储器可以通过网络连接至计算机终端。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。传输装置106用于经由一个网络接收或者发送数据。上述的网络具体实例可包括计算机终端的通信供应商提供的无线网络。在一个实例中,传输装置106包括一个网络适配器(Network Interface Controller,简称为NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置106可以为射频(Radio Frequency,简称为RF)模块,其用于通过无线方式与互联网进行通讯。
根据本公开的一个实施例,提供了一种故障保护方法,应用于上述计算机终端,图2是根据本公开实施例的故障保护方法的流程图,如图2所示,包括:
步骤S202,在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;
步骤S204,接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;
步骤S206,将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;
需要说明的是,如果SID没有显式的说明网络编程功能类型,存在默认的网络编程功能类型END,此时也认为SID信息中包含了网络编程功能类型信息。
步骤S208:在所述主节点发生故障或主节点连接的链路发生的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
通过上述技术方案,在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;在所述主节点或主节点连接的链路发生故障的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发 生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点,即通过在备节点上配置保护关系,以及在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项,进而在主节点或主节点连接的链路发生故障的情况下,备节点根据保护表项对接收到的报文进行转发,采用上述技术方案,解决了相关故障保护技术中,在故障保护的过程中,中间节点保护和尾节点保护一般分别采用不同的技术,进而导致设备部署困难等问题,本公开的技术方案同时适用于中间和出口节点/链路的故障保护,故障后切换的路径可以提供与原路径相同的功能。
需要说明的是,本公开的方案只适用于主备节点都支持SRv6的组网的情况,排除SR-MPLS(Segment Routing Multi-Protocol Label Switching,基于多协议标签交换的段路由)情况,另外网络中的其他节点不必须支持SRv6。而且在备节点上配置保护关系后,如果备节点收到的主节点通告的SID信息在保护范围内,但备节点不具备保护能力,可以进行丢弃报文、生成告警等行为,行为可以是默认的,也可以是根据需求进行配置的。
步骤S208中,因为备节点将所述主节点的前缀以低于主节点的优先级对外洪泛,所以在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点。
可选地,可以通过在备节点上配置需要保护的主节点上的前缀;在备节点上配置需要保护的主节点;在备节点上配置需要保护的主节点上的段标识SID值;在备节点上配置需要保护的主节点上的SID网络编程功能类型等方式在备节点上配置保护关系。
也就是说,在备节点上配置保护关系时,可以在备节点上配置需要保护的主节点的前缀,前缀可以覆盖需要的主节点的SID,其中,在备节点上配置需要保护的主节点的前缀可以是一个或者多个前缀,例如,主节点的前缀为LOC2,则可以在备节点上配置需要保护的前缀LOC2;还可以通过在备节点上配置需要保护的主节点;还可以通过备节点上配置需要保护的主节点的段标识SID值,另外,还可以在备节点上配置需要保护的主节点上的SID网络编程功能类型,例如,主节点的SID类型为END,进而可以在备节点上备节点上配置需要保护的END类型的SID,本公开对于SID信息、主节点的前缀等不做限定。
在一个示例性实施例中,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功之后,指示所述备节点将所述主节点的前缀以低优先级对外洪泛,其中,所述低优先级低于主节点自身洪泛时的优先级。
也就是说,主节点将主节点上的段标识SID信息进行通告,其中,所述通告方式可以是IGP(内部网关协议)、BGP(Border Gateway Protocol,边界网关协议)等方式,本公开实施例对此不做限定,通告消息中包括:段标识SID值以及段标识SID信息的类型,当主节点通告的段标识SID信息与所述备节点保存的所述保护关系匹配之后,备节点将主节点的前缀以低于主节点本身的优先级洪泛出去,其中所述洪泛方式可以为IGP(内部网关协议)方式,本公开实施例对此不做限定,以使将报文先发送至主节点,在主节点发送故障的情况下,再次将报文转发至备节点。
进一步的,指示所述备节点将所述主节点的前缀以低优先级对外洪泛之后,在备节点不 再具备保护所述主节点上的前缀、所述主节点、所述主节点上的段标识SID值或所述主节点上的SID网络编程功能类型的情况下,备节点撤销对外洪泛的所述主节点的前缀,进而备节点不再具备保护关系。
可选地,在所述主节点通告的SID信息中还携带了业务功能信息的情况下,在所述SID网络编程功能类型为段路由SR代理功能的情况下,通过所述备节点具备的SID网络编程功能类型与所述段路由SR代理功能进行匹配;在所述备节点具备的SID网络编程功能类型与所述段路由SR代理功能匹配的情况下,通过所述备节点SR代理具备的业务功能信息与所述主节点的段路由SR代理功能对应的所述业务功能信息进行匹配;在所述备节点SR代理具备的业务功能信息与所述主节点的段路由SR代理功能对应的所述业务功能信息匹配成功的情况下,生成所述保护表项。
具体的,如果通告消息中还携带了SID网络编程功能类型为段路由SR代理功能的情况下,先对段路由SR代理功能进行匹配,在备节点也具备SR代理功能的情况下,匹配成功,进而还需要对SR代理功能对应的业务功能信息进行匹配,在备节点也具备SR代理功能对应的业务功能信息的情况下,匹配成功,则可以生成保护表项,需要说明的是,只要主节点的SR代理功能和SR代理功能对应的业务功能信息其中之一不匹配的情况下,均不可生成保护表项。生成相应的保护表项后,然后通过IGP(内部网关协议)等方式将主节点对应的前缀以低优先级洪泛出去。举例来说,段路由SR代理对应的业务功能信息为防火墙,则备节点还会进一步将防火墙类型和备节点具备的业务功能信息进行匹配,如果全部匹配,生成相应的保护表项。
进一步的,如果防火墙节点代表的是不支持SRv6的设备,主节点和备节点具备代理功能,即可以替代防火墙处理报文,在报文发给防火墙前,剥离报文头,在防火墙处理完报文发回给代理后,代理再将报文头封装后继续转发。
在一个示例性实施例中,在所述主节点通告的SID信息中还携带了VPN业务信息的情况下,所述方法还包括:在所述备节点接收到所述主节点封装的虚拟私人网络VPN路由后,根据所述VPN路由中的SID网络编程功能类型与所述备节点具备的SID网络编程功能类型进行匹配;在所述VPN路由中的SID网络编程功能类型与所述备节点具备的SID网络编程功能类型匹配的情况下,通过所述备节点SID网络编程功能具备的VPN业务信息与所述主节点的VPN路由中的SID网络编程功能类型对应的VPN业务信息进行匹配;在所述备节点SID网络编程功能具备的VPN业务信息与所述主节点的VPN路由中的SID网络编程功能类型对应的VPN业务信息匹配的情况下,生成所述保护表项。
具体的,备节点收到主节点发送的虚拟私人网络VPN路由之后,备节点根据VPN路由中的VPN SID信息和保护关系中的前缀地址进行最长匹配,以及在所述备节点具备的VPN业务信息与所述VPN路由中的VPN业务信息匹配的情况下,生成所述保护表项,转发行为为将流量转发至目标对象,如果不能完成匹配,则不生成保护表项,也不会在主节点发生故障的时候,对主节点的报文进行转发。
可选地,在所述主节点通告的SID信息中还携带了链路信息的情况下,所述备节点将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配;在所述SID网络 编程功能类型与备节点具备的SID网络编程功能类型匹配成功的情况下,将所述链路信息与备节点具备的链路信息进行匹配;在所述链路信息与备节点具备的链路信息匹配成功的情况下,生成保护表项。
具体的,备节点收到主节点发送SID信息中还携带了链路信息之后,备节点根据SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,以及将所述链路信息与备节点具备的链路信息进行匹配,在均匹配成功的情况下,生成所述保护表项,指示报文沿链路发送给目标对象。
在一个示例性实施例中,在所述主节点没有发生故障,但所述主节点连接的VPN网络所在的链路发送故障的情况下,备节点接收主节点发送的按预设方式进行封装的目标报文,其中,所述目标报文包括:所述主节点为所述VPN网络分配的VPN SID;在所述VPN SID与所述保护表项匹配的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
可以理解为,为了防止环路的发生,在主节点的链路发生故障的情况下,流量转发至主节点后,发现主节点链路发生故障,主节点携带为转发所述报文分配的VPN SID将报文转发至备节点,主节点将报文转发给备节点时,为了保证报文在转发过程中,不会被其它节点将报文再发回主节点,主节点发出的报文不能直接采用VPN SID进行转发,通过额外封装的路径或者隧道将携带VPN SID的报文发送至备节点。备节点收到流量后,命中主节点VPN SID的保护表项,保护表项动作为,如果备节点的链路有效,则将流量转发给目标对象,如果备节点的链路同样故障,则将报文丢弃。
具体的,上述封装方式可以为:通过主节点上配置的隧道策略或者通过BGP路由中的预设条件匹配上隧道,将VPN SID封装在隧道最内层进行转发,当转发隧道为SR路径时,将VPN SID添加到SID List中最后一个进行转发;或者通过IP in IP的方式进行转发,外层IP头目的IP填充为PE3 BGP建链地址,内层IP目的IP填充为本地VPN SID,本公开实施例对VPN SID的封装方式不做限定。
为了更好理解上述故障保护方法的过程,以下结合可选实施例对上述技术方案进行解释说明,但不用于限定本公开实施例的技术方案。
以下对本公开可选实施例的名词进行解释,以便更好的理解本公开可选实施例的方案。
SR是一种基于源地址的路由的方法,通过在现有的多协议标签交换(Multi-Protocol Label Switching,MPLS)网络的报文头或者互联网协议第6版(Internet Protocol Version 6,IPv6)报文头中携带段路由报文头(Segment Routing Header,SRheader),在SRH中携带有一系列的指示操作(也称为段操作)用于数据在网络中的路由和传输。
SRv6 Segment是一个128位数,通常也可以称为SRv6 SID或者SID。SRv6网络编程(network programming)思想是,将SRv6 SID看作一种网络指令(Instruction),它由Locator和Function以及可选的Argument部分组成,Locator主要承担路由功能,所以要在SR域内唯一,Function可以标示设备的任何功能,比如某个转发行为,或者某种业务等。SRv6 SID 的结构更有利于对网络进行编程。
SRv6 VPN(基于SRv6的虚拟专用网)主要指基于SRv6隧道传递VPN数据。SRv6隧道包括SRv6 BE和SRv6-TE隧道。SRv6 Service SID指的是PE上的一个有特定业务行为的SID,例如查找特定VRF,转发到特定下一跳等。
以下结合几个可选实施例对上述故障保护方法的流程进行解释说明,但不用于限定本公开实施例的技术方案。
实施例一:
图3是根据本公开可选实施例的故障保护方法的中间节点保护组网示意图,如图3所示,中间节点P2为主节点,P3为备节点,P2上的前缀为LOC2,为P2分配了一个END类型的段标识SID21,为链路P2-PE4分配了一个END.X类型的SID22,类似的,P3上的前缀为LOC3,为P3分配了一个END类型的SID31,为链路P3-PE4分配了一个END.X类型的SID32,在P3上配置保护关系。
P3作为P2的备节点,进行保护关系的配置,配置方式包括以下至少之一:
方式一:按前缀配置;
具体的,本公开可选实施例中,P3需要保护P2上的段标识SID。在P3上配置需要保护的前缀,前缀覆盖需要保护的SID,其中,所述前缀的数量不做限定,可以是一个或者多个前缀,本实施例中P2的前缀为LOC2,因此,在P3配置的保护关系是P2的前缀LOC2;P3上配置完SID的保护关系之后,通过IGP(内部网关协议)、BGP等方式将LOC2以低优先级洪泛出去,在P上形成任播快速重路由(Anycast FRR),即主节点为P2,备节点为P3;P2上的SID信息会通过IGP(内部网关协议)等方式进行通告,通告消息中包含SID对应的Locator prefix(定位器前缀),以及SID的类型等信息。当P3上发现学习到P2Locator Prefix(定位器前缀)与本地配置的SID保护前缀相同或者被包含在内时,根据P2 SID的类型生成相应的Remote SID表项。例如,对于END类型的SID21,生成Remote END SID表项;对于END.X类型的SID22,PE3发现SID22是为链路PE2-PE4分配,而PE3作为PE2的保护节点,也存在到PE4的链路,因此生成Remote END.X SID表项,动作为将报文发送给PE4。
需要说明的是,在配置保护关系后,如果收到的主节点通告的SID在保护范围内,但备节点不具备保护能力,可以采用丢弃报文、生成告警等行为,行为可能是默认的,也可能是可配置的。
方式二:按节点配置。
具体的,本公开可选实施例中,P3需要保护P2上的SID,在P3上配置需要保护的节点,本实施例中为P2;可选的,还可以添加对于特定类型SID(相当于上述实施例中的SID网络编程功能类型)的保护,例如只保护END类型的SID等;P2上的SID信息,会通过IGP(内部网关协议)等方式进行通告,通告消息中包含SID对应的Locator prefix,以及SID的function类型等信息。当P3学习到了P2 Locator prefix之后,同时P2为需要保护的节点,并该类型的SID为需要保护的类型,则根据P2的SID类型生成相应的Remote SID表项,然后通过IGP(内部网关协议)将PE2 Locator prefix以低优先级洪泛出去。
对于同一个前缀LOC2,P收到了两条通告消息,优先级高的表项为目的地址LOC2,下一跳P2;优先级低的表项为目的地址LOC2,下一跳P3。
相应的,当备节点不具备保护特定节点、前缀、SID的能力后,可以选择将已经通告的 信息进行撤销。
正常情况下,CE1发送流量给CE2,P2通告的SID对应的路由前缀优先级较高,如对应的部分列表segment list为<SID-PE1,SID-P,SID21,SID-PE4>,当P2故障时,报文到达P后,目的地址为SID21,命中了优先级较低的前缀表项,将发送给P3,报文命中Remote END SID表项,继续转发。如果对应的部分列表segment list(部分列表)为<SID-PE1,SID-P,SID22,SID-PE4>,报文命中Remote END.X SID表项,继续转发,将报文发送给沿链路P3-PE4发送给PE4。
以上的SID类型只是举例说明,并不只限于保护END和END.X这两种类型的功能。
实施例二:
图4是根据本公开可选实施例的故障保护方法的业务链保护场景示意图,如图4所示,CE1发送给CE2需要经过防火墙过滤,正常情况下的业务流向为,CE1->PE1->P->P2->FW->P2->PE4->CE2,其中防火墙FW为不支持SRv6的设备,P2和P3具备SRv6代理功能(如END.AS),即可以替代FW处理SRv6报文,在报文发给FW前,剥离SRv6报文头,在FW处理完报文发回给代理后,代理再将SRv6报文头封装后继续转发。
在P3上配置保护关系,在实施例二中,在P3需要保护P2上的SID(段标识),在P3上配置需要保护的节点P2,并且指定只保护静态代理类型的SID;P2上的业务链代理类型的SID,会通过某种方式等方式将SID信息进行通告,如IGP(内部网关协议)\BGP(边界网关协议)等,通告消息中包含SID的功能类型,还可能包含SR代理对应的业务功能信息,本实施例中业务功能为防火墙。当P3学习到了P2通告的SID信息,同时P2为需要保护的节点,且静态代理类型的SID为需要保护的类型。如果通告消息中还携带了SR代理对应的业务功能信息为防火墙,则P3还会进一步将业务功能信息和P3具备的业务功能信息进行匹配,如果以上信息全部匹配,则生成相应的Remote END.AS SID表项,然后通过IGP(内部网关协议)等方式将P2 SID对应的Locator prefix以低优先级洪泛出去。
实施例三:
图5是根据本公开可选实施例的故障保护方法的尾节点/链路故障保护组网示意图,如图5所示,需要说明的是,PE1、PE2和PE3上的前缀,分别是LOC1、LOC2和LOC3;PE1-PE2、PE1-PE3、PE2-PE3之间均部署IPv6形式的VPN邻居,PE2和PE3上配置VPN实例VPN1,VPN实例中携带RT(远端)参数,同时配置SRv6 VPN SID,PE2和PE3上的VPN SID分配为SID2和SID3;PE2收到CE2发布的私网路由之后,封装成VPN路由,发给PE3,路由携带VPN SID、RT、RD和可能的约束条件。
SR-TE场景下,CE1沿指定的SR-TE隧道依次经过PE1,P,PE2发送流量给CE2,PE1发出报文可能的形式为:DA=SID-P,SRH<SID-PE1,SID-P,SID-PE2,SID2;SL=3>,其中SID-PE1,SID-P,SID-PE2分别对应为PE1,P和PE2上的SID。
在PE3上配置保护关系,在实施例三中,PE3需要保护PE2上的SID。在PE3上配置需要保护的前缀,前缀覆盖需要保护的SID,可以是一个或者多个前缀,本实施例中为LOC2;PE3上配置完SID保护之后,通过IGP(内部网关协议)将LOC2以低优先级洪泛出去,在P上形成Anycast FRR,主节点为PE2,备节点为PE3;PE3从PE2收到VPN路由之后,根据RT交叉到VPN1,PE3使用远端路由的VPN SID信息和SID保护配置中的前缀地址进行最长匹配,如 果匹配上则生成Remote SRv6 VPN SID表项,转发行为为将流量转发至CE2;PE2上的除VPN SID以外的SID,会通过IGP(内部网关协议)进行通告,通告消息中包含SID对应的Locator prefix,以及SID的function类型等信息。当PE3上发现学习到PE2 Locator prefix与本地配置的SID保护前缀相同时,根据PE2SID的类型生成相应的Remote SID表项。例如,如果PE2上存在END类型的SID,则将PE2 Locator范围内的END SID在本地生成Remote SRv6 END SID表项,fuction(功能)为END类型。
在备节点上配置完成保护关系之后,正常情况下,流量路径为CE1-PE1-P-PE2-CE2,PE1发出的报文为DA=SID-P,SRH<SID-P,SID-PE2,SID2;SL=2>;当PE2节点故障时,P上感知PE2下一跳不可达,切换为FRR路径,将流量转发至PE3,此时P发出的报文为DA=SID-PE2,SRH<SID-PE1,SID-P,SID-PE2,SID2;SL=1>;PE3读取报文,解析到SID-PE2匹配上Remote SRv6 END SID,先执行END操作,下一个待处理SID为SID2,与Remote SRv6 VPN SID匹配,从而将流量转发至CE2。
实施例四:
在SR-BE场景下,PE1将CE1发给CE2的流量按SR-BE隧道转发;流量按照SR-BE隧道转发,PE1发出报文的目的地址直接是VPN SID(SID2),沿途节点按IPv6转发表进行转发,PE2故障后,流量转到PE3节点,SID2直接命中Remote SRv6 VPN SID匹配,从而将流量转发至CE2。
实施例五:
PE3从PE2收到私网路由之后,根据RT交叉到VPN1,形成PE保护直连快速重路由FRR表项,其中主下一跳为CE2,备下一跳为PE2,携带PE2 VPN SID。PE2收到私网路由之后,根据RT交叉到VPN1,形成PE保护直连快速重路由FRR表项,主下一跳为CE2,备下一跳为PE3,携带PE3 VPN SID。当PE2-CE2、PE3-CE2链路同时故障时,从P转发过来的流量先发送到PE2,PE2感知到链路故障,触发PE保护CE FRR切换,使用PE3通告的SID将流量转发至PE3;PE3收到流量后,同样也检测本地链路故障,将报文发送回PE2,导致流量成环。因此尾节点链路故障保护的方案,需要考虑防止环路的发生。
本实施例主要是基于主节点感知到链路故障,触发主节点保护CE FRR切换后,使用主节点自身的SID将流量转发至备节点,备节点收到该SID后,匹配Remote SID保护表项,在Remote SID表项有效的情况下,按表项继续转发,在Remote SID表项无效的情况下,则直接丢弃报文。
PE3作为PE2的保护节点,在PE3上进行保护关系的配置,并生成Remote VPN SID表项;PE2会从CE2收到私网路由,此外PE3从CE2收到私网路由后,封装成VPN路由发送给PE2,PE2从PE3收到路由之后,根据RT交叉到VPN1,从而形成PE保护直连FRR表项,其中主下一跳为CE2,备下一跳为PE3,携带本地VPN SID2。
在PE2-CE2链路发生故障的情况下,流量转发至PE2后,发现FRR表项主链路故障,将流量转发至PE3。转发时VPN SID使用PE2本地分配的VPN SID2;PE2将流量转发给PE3时,为了保证流量在转发过程中,不会被其它节点将报文再发回PE2,因此PE2发出的报文不能直接采用目的地址为VPN SID2进行转发,可以通过在PE2上配置的隧道策略或者通过BGP路由中的color匹配上隧道,将VPN SID封装在隧道最内层进行转发或者通过IP in IP的方式进行转发,外层IP头目的IP填充为PE3 BGP建链地址,内层IP目的IP填充为本地VPN SID, 即额外封装转发信息负责将报文发送至PE3,内层VPN SID负责防环;PE3收到报文后,VPN SID2命中本地Remote VPN SID表项,如果PE3与CE2链路有效,则将流量转发给CE2,如果PE3与CE2链路同样故障,则将报文丢弃。
通过上述实施例,第一节点(备节点)收到第二节点(主节点)通告的SID信息后,如果SID信息和保护信息匹配,则生成对应的远端SID保护表项,远端SID保护表项提供和原SID相同的功能,如END,END.X,END.DT4,END.AS等等;第一节点需要通过IGP(内部网关协议)等协议对外洪泛该覆盖第二节点SID的前缀,优先级低于第二节点自身洪泛时的优先级;从而使上游的保护节点在只具备基本的IPv6路由转发功能的情况下,可以在故障时进行切换,且备份路径能够提供与主路径相同的功能。特别的,在以上可选实施例的方法用于SRv6 VPN场景下尾节点链路的故障保护时,主节点收到CE和备节点通告的VPN路由,生成FRR表项,其中主下一跳为CE,备下一跳为备节点,携带主节点自身的VPN SID;主链路故障后,主节点额外封装转发信息负责将报文发送至备节点,携带自身VPN SID负责防环;备节点收到报文后,VPN SID命中远端SID表项,如果备链路同样故障,则将报文丢弃,从而达到防止环路的目的。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本公开各个实施例所述的方法。
在本实施例中还提供了一种故障保护装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图6是根据本公开实施例的故障保护装置的结构框图,如图6所示,该装置包括:
配置模块62,设置为在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;
接收模块64,设置为接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;
需要说明的是,如果SID没有显式的说明网络编程功能类型,存在默认的网络编程功能类型END,此时也认为SID信息中包含了网络编程功能类型信息。
匹配模块66,设置为将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;
转发模块68,设置为在所述主节点或与主节点连接的链路发生故障的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为 除所述主节点和所述备节点之外的其他节点。
通过上述技术方案,在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;在所述主节点或与主节点连接的链路发生故障的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点,即通过在备节点上配置保护关系,以及在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项,进而在主节点或与主节点连接的链路发生故障的情况下,备节点根据保护表项对接收到的报文进行转发,采用上述技术方案,解决了相关故障保护技术中,在故障保护的过程中,中间节点保护和尾节点保护一般分别采用不同的技术,进而导致设备部署困难等问题,本公开的技术方案同时适用于中间和出口节点的故障保护,故障后切换的路径可以提供与原路径相同的功能。
需要说明的是,本公开的方案只适用于主备节点都支持SRv6的组网的情况,排除SR-MPLS情况,另外网络中的其他节点不必须支持SRv6。而且在备节点上配置保护关系后,如果备节点收到的主节点通告的SID信息在保护范围内,但备节点不具备保护能力,可以进行丢弃报文、生成告警等行为,行为可以是默认的,也可以是根据需求进行配置的。
可选地,配置模块,还设置为通过在备节点上配置需要保护的主节点上的前缀;在备节点上配置需要保护的主节点;在备节点上配置需要保护的主节点上的段标识SID值;在备节点上配置需要保护的主节点上的SID网络编程功能类型等方式在备节点上配置保护关系。
也就是说,在备节点上配置保护关系时,可以在备节点上配置需要保护的主节点的前缀,前缀可以覆盖需要的主节点的SID,其中,在备节点上配置需要保护的主节点的前缀可以是一个或者多个前缀,例如,主节点的前缀为LOC2,则可以在备节点上配置需要保护的前缀LOC2;还可以通过在备节点上配置需要保护的主节点;还可以通过备节点上配置需要保护的主节点的段标识SID值,另外,还可以在备节点上配置需要保护的主节点上的SID网络编程功能类型,例如,主节点的SID类型为END,进而可以在备节点上备节点上配置需要保护的END类型的SID,本公开对于SID信息、主节点的前缀等不做限定。
在一个示例性实施例中,上述装置还包括:洪泛模块,指示所述备节点将所述主节点的前缀以低优先级对外洪泛,其中,所述低优先级低于主节点自身洪泛时的优先级。
也就是说,主节点将主节点上的段标识SID信息进行通告,其中,所述通告方式可以是IGP(内部网关协议)等方式,本公开实施例对此不做限定,通告消息中包括:段标识SID值以及段标识SID信息的类型,当主节点通告的段标识SID信息与所述备节点保存的所述保护关系匹配之后,备节点将主节点的前缀以低于主节点本身的优先级洪泛出去,其中所述洪泛方式可以为IGP(内部网关协议)、BGP方式,本公开实施例对此不做限定,以使将流量先发 送至主节点,在主节点发送故障的情况下,再次将流量转发至备节点。
进一步的,上述装置还包括,撤销模块,设置为指示所述备节点将所述主节点的前缀以低优先级对外洪泛之后,在备节点不再具备保护所述主节点上的前缀、所述主节点、所述主节点上的段标识SID值或所述主节点上的SID网络编程功能类型的情况下,备节点撤销对外洪泛的所述主节点的前缀,进而备节点不再具备保护关系。
可选地,匹配模块,还设置为在所述主节点通告的SID信息中还携带了业务功能信息的情况下,在所述SID网络编程功能类型为段路由SR代理功能的情况下,通过所述备节点具备的SID网络编程功能类型与所述段路由SR代理功能进行匹配;在所述备节点具备的SID网络编程功能类型与所述段路由SR代理功能匹配的情况下,通过所述备节点SR代理具备的业务功能信息与所述主节点的段路由SR代理功能对应的所述业务功能信息进行匹配;在所述备节点SR代理具备的业务功能信息与所述主节点的段路由SR代理功能对应的所述业务功能信息匹配成功的情况下,生成所述保护表项。
具体的,如果通告消息中还携带了SID网络编程功能类型为段路由SR代理功能的情况下,先对段路由SR代理功能进行匹配,在备节点也具备SR代理功能的情况下,匹配成功,进而还需要对SR代理功能对应的业务功能信息进行匹配,在备节点也具备SR代理功能对应的业务功能信息的情况下,匹配成功,则可以生成保护表项,需要说明的是,只要主节点的SR代理功能和SR代理功能对应的业务功能信息其中之一不匹配的情况下,均不可生成保护表项。生成相应的保护表项后,然后通过IGP(内部网关协议)等方式将主节点对应的前缀以低优先级洪泛出去。举例来说,段路由SR代理对应的业务功能信息为防火墙,则备节点还会进一步将防火墙类型和备节点具备的业务功能信息进行匹配,如果全部匹配,生成相应的保护表项。
进一步的,如果防火墙节点代表的是不支持SRv6的设备,主节点和备节点具备代理功能,即可以替代防火墙处理报文,在报文发给防火墙节点前,剥离报文头,在防火墙处理完报文发回给代理后,代理再将报文头封装后继续转发。
在一个示例性实施例中,匹配模块,还设置为在所述主节点通告的SID信息中还携带了VPN业务信息的情况下,所述方法还包括:在所述备节点接收到所述主节点封装的虚拟私人网络VPN路由后,根据所述VPN路由中的网络编程功能类型与所述备节点具备的SID网络编程功能类型进行匹配;在所述VPN路由中的网络编程功能类型与所述备节点具备的SID网络编程功能类型匹配的情况下,通过所述备节点SID网络编程功能具备的VPN业务信息与所述主节点的VPN路由中的SID网络编程功能类型对应的VPN业务信息进行匹配;在所述备节点SID网络编程功能具备的VPN业务信息与所述主节点的VPN路由中的SID网络编程功能类型对应的VPN业务信息匹配的情况下,生成所述保护表项。
具体的,备节点收到主节点发送的虚拟私人网络VPN路由之后,备节点根据VPN路由中的VPN SID信息和保护关系中的前缀地址进行最长匹配,以及在所述备节点具备的VPN业务信息与所述VPN路由中的VPN业务信息匹配的情况下,生成所述保护表项,转发行为为将流量转发至目标对象。
可选地,匹配模块,还设置为在所述主节点通告的SID信息中还携带了链路信息的情况下,所述备节点将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配;在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型匹配成功的情况下,将所述链路信息与备节点具备的链路信息进行匹配;在所述链路信息与备节点具备的链路信息匹配成功的情况下,生成保护表项。
具体的,备节点收到主节点发送SID信息中还携带了链路信息之后,备节点根据SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,以及将所述链路信息与备节点具备的链路信息进行匹配,在均匹配成功的情况下,生成所述保护表项,指示报文沿链路发送给目标对象。
在一个示例性实施例中,转发模块,还设置为在所述主节点没有发生故障,但所述主节点连接的VPN网络所在的链路发送故障的情况下,备节点接收主节点发送的按预设方式进行封装的目标报文,其中,所述目标报文包括:所述主节点为所述VPN网络分配的VPN SID;在所述VPN SID与所述保护表项匹配的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
可以理解为,为了防止环路的发生,在主节点的链路发生故障的情况下,流量转发至主节点后,发现主节点链路发生故障,主节点携带为转发所述报文分配的VPN SID将报文转发至备节点,主节点将报文转发给备节点时,为了保证报文在转发过程中,不会被其它节点将报文再发回主节点,主节点发出的报文不能直接采用VPN SID进行转发,通过额外封装的路径或者隧道将携带VPN SID的报文发送至备节点。备节点收到流量后,命中主节点VPN SID的保护表项,保护表项动作为,如果备节点的链路有效,则将流量转发给目标对象,如果备节点的链路同样故障,则将报文丢弃。
具体的,上述封装方式可以为:通过主节点上配置的隧道策略或者通过BGP路由中的玉树条件匹配上隧道,将VPN SID封装在隧道最内层进行转发;或者通过IP in IP的方式进行转发,外层IP头目的IP填充为PE3 BGP建链地址,内层IP目的IP填充为本地VPN SID,本公开实施例对VPN SID的封装方式不做限定。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述各个模块以任意组合的形式分别位于不同的处理器中。
本公开的实施例还提供了一种存储介质,该存储介质中存储有计算机程序,其中,该计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。
可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的计算机程序:
S1,在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;
S2,接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;
S3,将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;
S4,在所述主节点或主节点连接的链路发生故障的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储计算机程序的介质。
本公开的实施例还提供了一种电子装置,包括存储器和处理器,该存储器中存储有计算机程序,该处理器被设置为运行计算机程序以执行上述任一项方法实施例中的步骤。
可选地,上述电子装置还可以包括传输设备以及输入输出设备,其中,该传输设备和上述处理器连接,该输入输出设备和上述处理器连接。
可选地,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:
S1,在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;
S2,接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;
S3,将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;
S4,在所述主节点或主节点连接的链路发生故障的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。
显然,本领域的技术人员应该明白,上述的本公开的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本公开不限制于任何特定的硬件和软件结合。
以上所述仅为本公开的优选实施例而已,并不用于限制本公开,对于本领域的技术人员 来说,本公开可以有各种更改和变化。凡在本公开的原则之内,所作的任何修改、等同替换、改进等,均应包含在本公开的保护范围之内。

Claims (11)

  1. 一种故障保护方法,包括:
    在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象;
    接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;
    将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;
    在所述主节点或与主节点连接的链路发生故障的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
  2. 根据权利要求1所述的方法,其中,在备节点上配置保护关系,至少包括以下之一:
    在备节点上配置需要保护的主节点上的前缀;
    在备节点上配置需要保护的主节点;
    在备节点上配置需要保护的主节点上的段标识SID值;
    在备节点上配置需要保护的主节点上的SID网络编程功能类型。
  3. 根据权利要求1所述的方法,其中,在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功之后,所述方法还包括:
    指示所述备节点将所述主节点的前缀以低优先级对外洪泛,其中,所述低优先级低于主节点自身洪泛时的优先级。
  4. 根据权利要求3所述的方法,其中,指示所述备节点将所述主节点的前缀以低优先级对外洪泛之后,所述方法还包括:
    在备节点不再具备保护所述主节点上的前缀、所述主节点、所述主节点上的段标识SID值或所述主节点上的SID网络编程功能类型的情况下,备节点撤销对外洪泛的所述主节点的前缀。
  5. 根据权利要求1所述的方法,其中,在所述主节点通告的SID信息中还携带了业务功能信息的情况下,所述方法还包括:
    在所述SID网络编程功能类型为段路由SR代理功能的情况下,通过所述备节点具备的SID网络编程功能类型与所述段路由SR代理功能进行匹配;
    在所述备节点具备的SID网络编程功能类型与所述段路由SR代理功能匹配的情况下,通过所述备节点SR代理具备的业务功能信息与所述主节点段路由SR代理功能对应的所述业务 功能信息进行匹配;
    在所述备节点SR代理具备的业务功能信息与所述主节点段路由SR代理功能对应的所述业务功能信息匹配成功的情况下,生成所述保护表项。
  6. 根据权利要求1所述的方法,其中,在所述主节点通告的SID信息中还携带了VPN业务信息的情况下,所述方法还包括:
    在所述备节点接收到所述主节点封装的虚拟私人网络VPN路由后,根据所述VPN路由中的SID网络编程功能类型与所述备节点具备的SID网络编程功能类型进行匹配;
    在所述VPN路由中的SID网络编程功能类型与所述备节点具备的SID网络编程功能类型匹配的情况下,通过所述备节点SID网络编程功能具备的VPN业务信息与所述主节点的VPN路由中的SID网络编程功能类型对应的VPN业务信息进行匹配;
    在所述备节点SID网络编程功能具备的VPN业务信息与所述主节点的VPN路由中的SID网络编程功能类型对应的VPN业务信息匹配的情况下,生成所述保护表项。
  7. 根据权利要求1所述的方法,其中,在所述主节点通告的SID信息中还携带了链路信息的情况下,所述方法还包括:
    所述备节点将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配;
    在所述SID网络编程功能类型与备节点具备的SID网络编程功能类型匹配成功的情况下,所述备节点将所述链路信息与备节点具备的链路信息进行匹配;
    在所述链路信息与备节点具备的链路信息匹配成功的情况下,生成保护表项。
  8. 根据权利要求6所述的方法,其中,在所述主节点没有发生故障,但所述主节点连接的VPN网络所在的链路发送故障的情况下,所述方法还包括:
    备节点接收主节点发送的按预设方式进行封装的目标报文,其中,所述目标报文包括:所述主节点为所述VPN网络分配的VPN SID;
    在所述VPN SID与所述保护表项匹配的情况下,根据所述保护表项所述备节点对接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
  9. 一种故障保护装置,包括:
    配置模块,设置为在备节点上配置保护关系,其中,所述保护关系用于指示备节点需要保护的对象用于在备节点上配置保护关系,其中,所述保护关系用于指示在所述主节点发生故障的情况下,所述备节点对所述主节点接收到的报文进行转发;
    接收模块,设置为接收主节点通告的段标识SID信息,其中,所述段标识SID信息至少包括:SID网络编程功能类型、SID值;
    匹配模块,设置为将所述SID网络编程功能类型与备节点具备的SID网络编程功能类型进行匹配,将所述SID值与所述保护关系进行匹配所述SID网络编程功能类型与备节点具备的SID网络编程功能类型以及所述SID值与所述保护关系均匹配成功的情况下,生成保护表项;
    转发模块,设置为在所述主节点或与主节点连接的链路发生故障的情况下,指示所述备节点根据所述保护表项对所述接收到的报文进行转发,其中,在所述主节点和与主节点连接的链路没有发生故障的情况下,其他节点将所述报文发送至所述主节点,在所述主节点和与主节点连接的链路发生故障的情况下,其他节点将所述报文直接发送至所述备节点,所述其他节点为除所述主节点和所述备节点之外的其他节点。
  10. 一种计算机可读的存储介质,所述存储介质中存储有计算机程序,其中,所述计算机程序被设置为运行时执行所述权利要求1至8任一项中所述的方法。
  11. 一种电子装置,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为运行所述计算机程序以执行所述权利要求1至8任一项中所述的方法。
PCT/CN2022/071398 2021-02-05 2022-01-11 故障保护方法及装置、存储介质、电子装置 WO2022166543A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/276,230 US20240121178A1 (en) 2021-02-05 2022-01-11 Failure protection Method and Apparatus, Storage Medium, and Electronic Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110163438.1 2021-02-05
CN202110163438.1A CN112822100A (zh) 2021-02-05 2021-02-05 故障保护方法及装置、存储介质、电子装置

Publications (1)

Publication Number Publication Date
WO2022166543A1 true WO2022166543A1 (zh) 2022-08-11

Family

ID=75861915

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/071398 WO2022166543A1 (zh) 2021-02-05 2022-01-11 故障保护方法及装置、存储介质、电子装置

Country Status (3)

Country Link
US (1) US20240121178A1 (zh)
CN (1) CN112822100A (zh)
WO (1) WO2022166543A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113364677B (zh) * 2021-06-07 2022-06-07 北京工业大学 一种SRv6 Endpoint故障保护方法
CN113411256B (zh) * 2021-07-30 2021-12-21 广东省新一代通信与网络创新研究院 业务更新方法、装置及分段路由网络编程系统
CN114143380B (zh) * 2022-01-04 2023-06-09 烽火通信科技股份有限公司 解决SRv6尾节点掉电场景OAM和业务不一致的方法和系统
CN116471220A (zh) * 2022-01-11 2023-07-21 华为技术有限公司 一种信息上报方法、信息处理方法及装置
CN115174469B (zh) * 2022-06-30 2023-10-13 烽火通信科技股份有限公司 Srv6节点保护方法、系统、设备及可读存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3641240A1 (en) * 2018-10-17 2020-04-22 Juniper Networks, Inc. Node protection for bum traffic for multi-homed node failure
CN111224870A (zh) * 2018-11-26 2020-06-02 中兴通讯股份有限公司 一种SR-MPLS Anycast场景下的故障修复方法、设备和存储介质
CN111682996A (zh) * 2019-03-11 2020-09-18 华为技术有限公司 网络中报文转发的方法、网络节点、网络系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3641240A1 (en) * 2018-10-17 2020-04-22 Juniper Networks, Inc. Node protection for bum traffic for multi-homed node failure
CN111224870A (zh) * 2018-11-26 2020-06-02 中兴通讯股份有限公司 一种SR-MPLS Anycast场景下的故障修复方法、设备和存储介质
CN111682996A (zh) * 2019-03-11 2020-09-18 华为技术有限公司 网络中报文转发的方法、网络节点、网络系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HEDGE S., W. LIN: "Egress Protection for Segment Routing (SR) networks draft-hegde-rtgwg-egress-protection-sr-networks-00", IETF, 8 March 2020 (2020-03-08), XP055955239, Retrieved from the Internet <URL:https://datatracker.ietf.org/doc/pdf/draft-hegde-rtgwg-egress-protection-sr-networks-00> *

Also Published As

Publication number Publication date
US20240121178A1 (en) 2024-04-11
CN112822100A (zh) 2021-05-18

Similar Documents

Publication Publication Date Title
WO2022166543A1 (zh) 故障保护方法及装置、存储介质、电子装置
CN109873760B (zh) 处理路由的方法和装置、以及数据传输的方法和装置
JP7039707B2 (ja) ネットワークにおけるパケット伝送のための方法及びノード
CA3080526C (en) Ip mpls pop virtualization and fault tolerant virtual router
EP3148127A1 (en) Egress protection for bum traffic with link failures in evpn
EP1111860B1 (en) Automatic protection switching using link-level redundancy supporting multi-protocol label switching
US7551551B2 (en) Fast reroute (FRR) protection at the edge of a RFC 2547 network
KR101248040B1 (ko) 소프트라우터 분리 제어 네트워크
EP3151485A1 (en) Egress node protection in evpn all-active topology
US10326692B2 (en) Apparatus and method for establishing a repair path
US11349749B2 (en) Node protection for bum traffic for multi-homed node failure
US10439880B2 (en) Loop-free convergence in communication networks
US10924332B2 (en) Node protection for bum traffic for multi-homed node failure
EP3641240B1 (en) Node protection for bum traffic for multi-homed node failure
CN111064659B (zh) 多宿主节点故障的bum流量的节点保护
US20230126279A1 (en) Fast reroute for bum traffic in ethernet virtual private networks
CN112491706A (zh) 数据报文的处理方法及装置、存储介质、电子装置
CN113366804A (zh) 防止网络拓扑改变期间的微环路的方法和系统
WO2022017225A1 (zh) 报文发送方法、设备及系统
WO2022222884A1 (zh) 转发路径的故障感知方法、装置及系统
CN115499369A (zh) 路径保护方法及装置
KR20230093015A (ko) 정보 처리 방법, 노드 및 컴퓨터 판독 가능한 저장 매체

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22748822

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 18276230

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 13/12/2023 )