WO2022247689A1 - 流量报文转发方法、客户端、控制器及存储介质 - Google Patents
流量报文转发方法、客户端、控制器及存储介质 Download PDFInfo
- Publication number
- WO2022247689A1 WO2022247689A1 PCT/CN2022/093301 CN2022093301W WO2022247689A1 WO 2022247689 A1 WO2022247689 A1 WO 2022247689A1 CN 2022093301 W CN2022093301 W CN 2022093301W WO 2022247689 A1 WO2022247689 A1 WO 2022247689A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- traffic
- block resource
- forwarding
- identifier
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 98
- 238000001914 filtration Methods 0.000 claims abstract description 61
- 238000012545 processing Methods 0.000 claims abstract description 6
- 230000015654 memory Effects 0.000 claims description 30
- 238000013507 mapping Methods 0.000 claims description 29
- 230000009471 action Effects 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 15
- 238000005457 optimization Methods 0.000 description 8
- 230000002457 bidirectional effect Effects 0.000 description 6
- 238000007726 management method Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 238000005538 encapsulation Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 101100064323 Arabidopsis thaliana DTX47 gene Proteins 0.000 description 1
- 101100256916 Caenorhabditis elegans sid-1 gene Proteins 0.000 description 1
- 101100256918 Caenorhabditis elegans sid-2 gene Proteins 0.000 description 1
- 101150026676 SID1 gene Proteins 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- HRULVFRXEOZUMJ-UHFFFAOYSA-K potassium;disodium;2-(4-chloro-2-methylphenoxy)propanoate;methyl-dioxido-oxo-$l^{5}-arsane Chemical compound [Na+].[Na+].[K+].C[As]([O-])([O-])=O.[O-]C(=O)C(C)OC1=CC=C(Cl)C=C1C HRULVFRXEOZUMJ-UHFFFAOYSA-K 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/34—Source routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/64—Routing or path finding of packets in data switching networks using an overlay routing layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Definitions
- the embodiments of the present application relate to but are not limited to the field of communications, and in particular, relate to a method for forwarding traffic packets, a client, a controller, and a storage medium.
- Routing entries only contain prefix mask information for destination address matching and traffic outbound interface information.
- the complexity of the network increases.
- the requirements for routing It is getting higher and higher, and the information supporting the traffic policy is usually added to the routing table entry, that is, the data flow in the forwarding routing table item is subdivided, but the routing of the information supporting the traffic policy belongs to the local behavior, which needs to be performed on each device.
- Configuration, manual configuration requires a lot of work and requires high requirements for operation and maintenance personnel.
- 5G network applications there are requirements for flexible scheduling and massive connections.
- Existing routing technologies cannot meet customers' needs for traffic path adjustment and optimization.
- the embodiment of the present application proposes a flow packet forwarding method, a client, a controller, and a storage medium.
- the embodiment of the present application provides a flow message forwarding method, including: receiving the flow message; when the flow message includes a block resource identifier, according to the block resource identifier and the filtering rule The information determines the target block resource, and the filtering rule information is obtained by sending the border gateway controller; the target block resource is used to forward the traffic message.
- the embodiment of the present application also provides a border gateway client, including: a memory, a processor, and a computer program stored on the memory and operable on the processor.
- a border gateway client including: a memory, a processor, and a computer program stored on the memory and operable on the processor.
- the processor executes the computer program, the first In one aspect, the traffic message forwarding method.
- the embodiment of the present application also provides a traffic packet forwarding method, including: sending filtering rule information carrying block resource identifiers to the border gateway client, so that the border gateway client The information determines the target block resource of the flow message, and forwards the flow message according to the target block resource, and the flow message is received by the border gateway client.
- the embodiment of the present application also provides a border gateway controller, including: a memory, a processor, and a computer program stored in the memory and operable on the processor, when the processor executes the computer program Realize the traffic packet forwarding method described in the third aspect.
- a computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to execute the traffic packet forwarding method described in the first aspect, or to execute the method described in the third aspect. Traffic packet forwarding method.
- FIG. 1 is a schematic diagram of a system architecture for performing a traffic packet forwarding method provided by an embodiment of the present application
- FIG. 2 is a flow chart of a method for forwarding traffic packets on the border gateway client side provided by an embodiment of the present application
- Fig. 3 is a schematic diagram of the encapsulation format of the slicing BGP Flowspc Component type in the flow message forwarding method on the border gateway client side provided by an embodiment of the present application;
- Fig. 4 is a schematic diagram of the community attribute format of the slice identifier in the flow packet forwarding method on the client side of the border gateway provided by an embodiment of the present application;
- FIG. 5 is a schematic diagram of the SUB-TLV format of the community attribute format in the flow packet forwarding method on the client side of the border gateway provided by an embodiment of the present application;
- Fig. 6 is a schematic diagram of the community attribute format of the slice identifier in the flow packet forwarding method on the client side of the border gateway provided by an embodiment of the present application;
- FIG. 7 is a flow chart of forwarding processing of a method for forwarding traffic packets on the border gateway client side provided by an embodiment of the present application
- FIG. 8 is a flow chart of a flow message forwarding method on the border gateway controller side provided by an embodiment of the present application.
- FIG. 9 is a schematic diagram of a traffic packet forwarding network provided by an embodiment of the present application.
- FIG. 10 is a flow chart of a flow packet forwarding method provided by an embodiment of the present application.
- FIG. 11 is a schematic diagram of a traffic packet forwarding network redirected to slices provided by an embodiment of the present application.
- FIG. 12 is a flowchart of a method for forwarding traffic packets redirected to slices provided by an embodiment of the present application
- FIG. 13 is a schematic diagram of a traffic packet forwarding network redirected to slices provided by another embodiment of the present application.
- FIG. 14 is a flowchart of a method for forwarding traffic packets redirected to slices according to another embodiment of the present application.
- Fig. 15 is a schematic diagram of a traffic packet forwarding network redirected to slices provided by another embodiment of the present application.
- FIG. 16 is a flowchart of a method for forwarding traffic packets redirected to slices according to another embodiment of the present application.
- Fig. 17 is a flow chart of a method for forwarding traffic packets redirected to an application provided by another embodiment of the present application.
- the embodiment of the present application provides a flow message forwarding method, a client, a controller, and a storage medium.
- the flow message forwarding method includes but is not limited to the following steps: receiving a flow message; including a block resource identifier in the flow message
- the target block resource is determined according to the block resource identifier and filtering rule information, and the filtering rule information is sent by the border gateway controller; the target block resource is used to forward the traffic message.
- the border gateway client when the border gateway client receives the traffic message carrying the block resource identifier, it can determine the target block according to the block resource identifier and the filtering rule information sent by the border gateway controller resources, and then use the target block resource to forward the traffic message; the block resource identifier can be used to flexibly segment network resources, so the target block resource determined by the block resource identifier can forward the traffic message, which can Meet customers' needs for traffic path adjustment and optimization.
- FIG. 1 is a schematic diagram of a system architecture platform 100 for implementing a traffic packet forwarding method provided by an embodiment of the present application.
- the system architecture platform 100 is provided with a processor 110 and a memory 120 , wherein the processor 110 and the memory 120 may be connected via a bus or in other ways.
- connection via a bus is taken as an example.
- the memory 120 can be used to store non-transitory software programs and non-transitory computer-executable programs.
- the memory 120 may include a high-speed random access memory, and may also include a non-transitory memory, such as at least one magnetic disk storage device, a flash memory device, or other non-transitory solid-state storage devices.
- the memory 120 may include memories that are remotely located relative to the processor 110, and these remote memories may be connected to the system architecture platform through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
- system architecture platform can be applied to a communication network system and a subsequent evolved mobile communication network system, etc., which is not specifically limited in this embodiment.
- FIG. 1 does not constitute a limitation to the embodiment of the present application, and may include more or less components than those shown in the illustration, or combine some components, or have different Part placement.
- the processor 110 can call a service flow management program stored in the memory 120 to execute the flow packet forwarding method.
- Figure 2 is a flowchart of a flow message forwarding method provided by an embodiment of the present application, the flow message forwarding method is applied to a border gateway client, and the flow message forwarding method includes but is not limited to Step S100, step S200, step S300.
- Step S100 receiving traffic packets.
- Step S200 in the case that the traffic message includes a block resource identifier, determine the target block resource according to the block resource identifier and filtering rule information, and the filtering rule information is obtained from the border gateway controller.
- Step S300 using the target block resource to forward the traffic message.
- the border gateway client when the border gateway client receives the traffic packet carrying the block resource identifier, it can determine the target block resource according to the block resource identifier and the filtering rule information sent by the border gateway controller, and then use the target block resource Block resources forward and process traffic packets; network resources can be flexibly segmented by using block resource identifiers. Therefore, the target block resources determined by block resource identifiers forward traffic packets, which can satisfy customers' adjustment of traffic paths. Tuning needs.
- the border gateway client can be applied to the Border Gateway Protocol Flow Specification (BGP Flowspc) of the 5G network.
- BGP Flowspc Border Gateway Protocol Flow Specification
- the border network management flow protocol can be Optimization, expand the filter rule information in the border network management flow protocol, add block resource identifiers in the filter rules, that is, the border gateway controller sends the filter rule information carrying the block resource identifier to the border gateway client, and the border gateway client After the terminal receives the filtering rule information carrying the block resource identifier, it installs the filtering rule information into the local mapping information.
- the border gateway client When the border gateway client receives the traffic message carrying the block resource identifier, the border gateway client can Determine the target block resource according to the block resource identifier of the traffic message and the local mapping information installed with the filtering rule information, and then use the target block resource to forward the traffic message; using the block resource identifier can flexibly manage network resources Segmentation, so the target block resource determined by the block resource identifier forwards the traffic message, which can meet the customer's needs for traffic path adjustment and optimization.
- block resource identifier may be a slice identifier or an application identifier, which is not specifically limited in this example.
- the filtering rule information includes matching condition information and execution action information, wherein the matching condition information is carried in the Network Layer Reachability Information (NLRI for short) of the filtering rule, and the execution action information is the traffic matching information. Execution action, the execution action information is carried by the extended community attribute in the filter rule.
- NLRI Network Layer Reachability Information
- block resource identifier is carried by matching condition information or execution action information, which is not specifically limited in this embodiment.
- the matching condition information can use the existing defined flow specification component type information, and the flow specification component type information can be understood as the source address/destination address/differentiated services code point (Differentiated Services Code Point, referred to as DSCP) to match the traffic, or by expanding the information of the border network management flow protocol component type, so that it carries a slice identifier/application identifier, which is used to support slice/application filtering.
- DSCP Differentiated services code point
- a slice identifier list or an application identifier list can be set, and the matching can be performed for multiple slice sources or multiple Each application source can be matched without sending multiple traffic rules (matching condition information), which can save memory overhead.
- SR-Policy Segment Routing Policy
- SR-TE Segmental Routing-Traffic Engineering
- SR-TP Segment Routing Transport Profile-Traffic Engineering
- the community attribute information of the new redirection extension mainly carries the slice identifier/application identifier, and the specific identifier of a certain path.
- the identifiers of SR-TE tunnels and SR-TP tunnels are tunnel identifiers (Tunnel-Identity Document, Tunnel-ID for short), the identification of SR-policy is a triplet, and the triplet includes destination address, color attribute, and prefix unique identity number (Security Identifiers, SID for short).
- the BGP Flowspc client can receive the Flowspc routing information carrying the extended community attribute information, and then save the content of the flow filtering rule in the Flowspc routing information.
- the BGP Flowspc client searches for the forwarding entries in the local mapping information through the slice identifier/application identifier (for the scenario that does not specify a certain path), which can be realized through the existing redirection to the next hop action; the BGP Flowspc client also The corresponding forwarding entry can be directly found and forwarded through a certain path in the slice identifier/application identifier.
- the forwarding entries in the local mapping information of the BGP Flowspc client can be established through routing protocols between autonomous systems, Interior Gateway Protocols (Interior Gateway Protocols, IGP for short), Label Distribution Protocol (Label Distribution Protocol, LDP for short) , Segmental Routing (SR for short), Resource Reservation Protocol (RSVP for short) and other models are established.
- IGP Interior Gateway Protocols
- LDP Label Distribution Protocol
- SR Segmental Routing
- RSVP Resource Reservation Protocol
- the slice identifier may be a slice identifier, a multi-topology identifier, a Flexible-Algorithm (Flex-Algo for short) identifier or a virtual topology identifier.
- the extended redirection extends community attribute information, and the community attribute information is used to carry specific action attributes.
- the types of slice identifiers in the community attribute information are as follows.
- SUB-TYPE in SUB-TLV may include as follows.
- RSVP-TE tunnel ID or triplet tunnel ID or triplet (tunnel ID, head node router identifier (RouterID), tail node router ID).
- the SUB-TYPE in the SUB-TLV can be SR-Policy or SR- TE tunnel or SR-TP tunnel or RSVP-TE tunnel; Value can correspond to the keyword identifier of a specific SR-Policy/SR-TE tunnel/SR-TP tunnel/RSVP-TE tunnel.
- the format of the SUB-TLV in the extended community attribute information of the application identifier is consistent with the format of the SUB-TLV in the extended community attribute information of the slice identifier.
- step S300 includes but is not limited to step S710, step S720 and step S730.
- a forwarding entry is determined from local mapping information according to the target block resource, and the local mapping information includes resource information corresponding to the target block resource and forwarding entries corresponding to the resource information.
- Step S720 perform forwarding processing on the traffic message according to the forwarding entry.
- the border gateway client can determine the forwarding entry from the local mapping information according to the target block resource, and then forward the traffic packet according to the forwarding entry, where the local mapping information includes the resource information corresponding to the target block resource and the resource information corresponding to Forwarding entries, network resources can be flexibly segmented by using block resource identifiers. Therefore, the target block resources determined by block resource identifiers can forward traffic packets, which can meet customers' needs for traffic path adjustment and optimization.
- the border gateway client when the traffic packet includes community attribute information, can determine the forwarding entry from the local mapping information according to the target block resource and the community attribute information, and then forward the traffic packet according to the forwarding entry,
- the local mapping information includes the resource information corresponding to the target block resource and the forwarding entry corresponding to the resource information.
- the network resource can be flexibly segmented by using the block resource identifier. Forwarding files can meet customers' needs for traffic path adjustment and optimization.
- FIG. 8 is a flowchart of a flow message forwarding method provided by an embodiment of the present application.
- the flow message forwarding method is applied to a border gateway controller, and the flow message forwarding method includes but is not limited to Step S810.
- Step S810 sending filtering rule information carrying block resource identifiers to the border gateway client, so that the border gateway client determines the target block resource of the traffic message according to the filter rule information, and processes the traffic message according to the target block resource For forwarding processing, traffic packets are received by the border gateway client.
- the border gateway controller can send the filtering rule information carrying the block resource identifier to the border gateway client, so that the border gateway client installs the filtering rule into the local mapping information.
- the target block resources of the traffic packets can be determined according to the filtering rule information and the block resource identifiers, and then the traffic packets can be forwarded according to the target block resources.
- the block resource identifiers can Network resources are segmented flexibly. Therefore, traffic packets are forwarded through target block resources identified by block resource identifiers, which can meet customers' needs for traffic path adjustment and optimization.
- block resource identifier may be a slice identifier or an application identifier, which is not specifically limited in this example.
- the filtering rule information includes matching condition information and execution action information, wherein the matching condition information is carried in the Network Layer Reachability Information (NLRI for short) of the filtering rule, and the execution action information is the traffic matching information. Execution action, the execution action information is carried by the extended community attribute in the filter rule.
- NLRI Network Layer Reachability Information
- block resource identifier is carried by matching condition information or execution action information, which is not specifically limited in this embodiment.
- FIG. 9 is a schematic diagram of a flow message forwarding network provided by an embodiment of the present application, the network includes a BGP Flowspc controller (equivalent to a border gateway controller) and node A (equivalent to a border network management client) , wherein node A can transmit traffic packets to node B through the IP/MPLS network.
- FIG. 9 is a flow chart of a traffic packet forwarding method provided by an embodiment of the present application, which is applied to the system in FIG. 9 , and the traffic packet forwarding method includes but is not limited to steps S1010, S1020, and S1030.
- Step S1010 the BGP Flowspc controller sends the Flowspc routing information carrying the flow filtering rules identified by the block resource.
- block resource identifier is consistent with that in the foregoing embodiments, and details are not described here.
- Step S1020 the BGP Flowspc client receives the Flowspc routing information carrying the flow filtering rules of the community attribute, and saves the content of the flow filtering rules.
- the flow filtering rule includes two parts: matching condition information and execution action information.
- the execution action information is carried in the extended community attribute information.
- Step S1030 the BGP Flowspc client searches for forwarding entries of the local device according to the flow filtering rules.
- the BGP Flowspc client looks up the forwarding entries in the local mapping table through the list of slice identifiers/application identifiers/or both, or directly forwards through specific paths in the extended community attribute information.
- the forwarding entries of the local mapping information of the BGP Flowspc client can be established through models such as BGP, IGP, LDP, SR, RSVP, and YANG models.
- FIG. 11 a schematic diagram of a flow message forwarding network redirected to slices provided by an embodiment of the present application
- nodes and controllers in the network all have the BGP Flowspc function, and the network is set
- the network is set
- Each slice has a corresponding forwarding path, and the head node S (equivalent to a border network management client) can transmit traffic packets to node D through slice 1 and/or slice 2.
- FIG. 12 is a flowchart of a traffic packet forwarding method provided by an embodiment of the present application, which is applied to the network in FIG. 11 , and the traffic packet forwarding method includes but is not limited to steps S1210, S1220, and S1230.
- step S1210 the controller sends BGP Flowspc routing information carrying slice identifier filtering rules to the head node.
- the delivered BGP Flowspc route carrying algorithm identification filtering rules is:
- NLRI Carries matching conditions, which can be defined in RFC5575, such as the destination IP address of the traffic (the IP address of the D node), or can be based on the slice identifier as the matching condition.
- the matching condition information carries the slice 1 identifier as an example.
- the community attribute information redirected to the slice carries the execution action after the traffic is matched.
- it carries the identifier of the slice 1, which is used to indicate the corresponding path for sending the traffic packet to the slice 1 after the traffic is matched.
- Step S1220 the head node receives the BGP Flowspc routing information carrying the slice identifier filtering rules, and installs the filtering rules into local mapping information.
- Step S1230 when the head node receives the data message carrying the slice 1 identifier, the head node searches the filtering rules in the local mapping information to obtain a forwarding entry, and forwards the traffic message to the forwarding entry corresponding to slice 1.
- the head node queries the local mapping information of the slice according to the filtering rules, finds the forwarding entry corresponding to the corresponding slice 1, that is, finds the corresponding SR path corresponding to the slice 1 plane.
- FIG. 13 another embodiment of the present application provides a schematic diagram of a flow message forwarding network redirected to slices.
- Nodes and controllers in the network all have the BGP Flowspc function.
- the slice filtering rules include: matching condition information and execution action information after traffic matching.
- the matching condition information uses the slice identifier as the matching condition, that is, defines the slice BGP Flowspc Component type in the new NLRI, and the execution action information uses the existing execution action, which can redirect the tunnel, or redirect to the tunnel ID, Binding SID , in Figure 13, Bingding SID1 identifies the S-A-D path, and Binding SID identifies the S-C-D path.
- FIG. 14 is a flowchart of a traffic packet forwarding method provided by an embodiment of the present application, which is applied to the network in FIG. 13 , and the traffic packet forwarding method includes but is not limited to steps S1410, S1420, and S1430.
- Step 1410 the controller sends the BGP Flowspc routing information carrying slice identification filtering rules to the head node.
- the filter rule in this embodiment includes using the slice identifier as the matching condition information, which can be defined as the slice BGP Flowspc Component type in the new NLRI; the matched execution action information can use the existing execution action information, that is, the execution action information It can indicate that the path is determined by redirecting the tunnel, and it can be indicated that the path is determined by redirecting to the Tunnel ID and Binding SID.
- the matching condition information can be defined as the slice BGP Flowspc Component type in the new NLRI
- the matched execution action information can use the existing execution action information, that is, the execution action information It can indicate that the path is determined by redirecting the tunnel, and it can be indicated that the path is determined by redirecting to the Tunnel ID and Binding SID.
- Step 1420 the head node receives the BGP Flowspc routing information carrying the slice identifier filtering rule, and installs the filtering rule into the local mapping information.
- Step 1430 when the head node receives the data packet carrying the identifier of slice 1, the head node looks up the filtering rules in the local mapping information to obtain the forwarding entry, and forwards the traffic packet according to the forwarding entry corresponding to slice 1.
- the head node queries the local mapping information of the slice according to the filtering rules, and determines the forwarding entry corresponding to the slice 1, that is, the corresponding SR path corresponding to the plane of the slice 1 can be found.
- FIG. 15 another embodiment of the present application provides a schematic diagram of a flow packet forwarding network redirected to slices.
- nodes and controllers in the network all have the BGP Flowspc function.
- there are two Flex-Algo planes in the network where the Algorithm value corresponding to the Flex-Algo 128 plane is 128, and the Algorithm value corresponding to the Flex-Algo 129 plane is 129.
- the Flex-Algo 128 plane includes nodes S, A, B, D and bidirectional links between these nodes.
- the Flex-Algo 129 plane includes nodes S, B, C, D and the bidirectional links between these nodes, and each Flex-Algo plane has a corresponding SR path.
- FIG. 16 is a flowchart of a traffic packet forwarding method provided by an embodiment of the present application, which is applied to the network in FIG. 15 , and the traffic packet forwarding method includes but is not limited to steps S1610, S1620, and S1630.
- step S1610 the controller sends BGP Flowspc routing information carrying algorithm identification filtering rules to the head node.
- the BGP Flowspc routing information carrying algorithm identifiers (implicit slice identifiers) filtering rules issued by the controller is as follows.
- the NLRI carries matching condition information.
- it may be the destination IP address of the traffic (the IP address of the D node) or an identifier based on a flexible algorithm as the matching condition information.
- the community attribute information redirected to the flexible algorithm carries the execution action information after traffic matching.
- Flex-algo128 is carried to indicate that after the traffic is matched, the traffic packet is sent to the SR path corresponding to the Flex-algo128 plane. superior.
- Step S1620 the head node receives the BGP Flowspc routing information carrying the algorithm identification filter rule, and installs the filter rule into the local mapping information.
- Step S1630 when the head node receives the flow message carrying the IP address of the D node, the head node searches the filtering rules in the local mapping information to obtain the forwarding entry, and forwards the flow message according to the forwarding entry corresponding to the Flex-algo128 plane Forward.
- the head node queries the local mapping information of the Flex-algo according to the filtering rules, and determines the forwarding entry corresponding to the corresponding Flex-algo128, that is, the SR path corresponding to the corresponding Flex-algo128 plane can be found.
- Fig. 17 is a flow chart of a flow packet forwarding method redirected to an application provided by an embodiment of the present application.
- the network is set There are two applications, namely application 1 and application 2, and the above-mentioned applications may be App-related applications.
- the flow packet forwarding method includes but is not limited to step S1710, step S1720 and step S1730.
- Step 1710 the controller sends the BGP Flowspc route carrying the application identification filtering rule to the head node.
- the BGP Flowspc routing information delivered by the controller carrying application identification filtering rule information is as follows.
- the matching condition information carried by the NLRI may be the matching condition information defined in RFC5575, such as the destination IP address of the traffic packet (the IP address of the D node), or it may be based on the application identifier as the matching condition information.
- the matching condition carries the application 1 identifier as an example.
- the community attribute information redirected to application 1 carries the execution action after the traffic is matched.
- the application 1 identifier is used to indicate that after the traffic is matched, the report The text traffic is forwarded through the forwarding entry corresponding to application 1.
- Step 1720 the head node receives the BGP Flowspc routing information carrying the application identification filtering rule, and installs the filtering rule into the local mapping information.
- Step 1730 when the head node receives the traffic packet carrying application 1, the head node searches the filtering rules in the local mapping information to obtain forwarding entries, and forwards the traffic packets according to the forwarding entries corresponding to application 1.
- the head node queries the local mapping information of application 1 according to the filtering rules, and determines the forwarding entry corresponding to application 1, that is, the SR path corresponding to the corresponding application 1 plane can be found.
- an embodiment of the present application provides a border gateway client, which includes: a memory, a processor, and a computer program stored in the memory and operable on the processor.
- the processor and memory can be connected by a bus or other means.
- the terminal in this embodiment may correspond to include the memory and the processor in the embodiment shown in Figure 1, which can constitute a part of the system architecture platform in the embodiment shown in Figure 1, and both belong to the same Therefore, both have the same realization principle and beneficial effect, and will not be described in detail here.
- the non-transitory software programs and instructions required to realize the traffic packet forwarding method on the terminal side of the above-mentioned embodiments are stored in the memory, and when executed by the processor, the traffic packet forwarding method of the above-mentioned embodiment is executed, for example, the above Described method steps S100 to S300 in Fig. 2, method steps S710 to S720 in Fig. 7, method steps S1020 and step S1030 in Fig. 10, method steps S1220 and step S1230 in Fig. 12, method steps in Fig. 14 S1420 and step S1430, method step S1620 and step S1630 in FIG. 16 , method step S1720 and step S1730 in FIG. 17 .
- an embodiment of the present application provides a border gateway controller, which includes: a memory, a processor, and a computer program stored in the memory and operable on the processor.
- the processor and memory can be connected by a bus or other means.
- border gateway controller in this embodiment may correspond to include the memory and the processor in the embodiment shown in FIG. 1, which can constitute a part of the system architecture platform in the embodiment shown in FIG. 1. Both belong to the same inventive concept, so both have the same realization principle and beneficial effect, and will not be described in detail here.
- the non-transitory software programs and instructions required to realize the traffic packet forwarding method on the border gateway controller side of the above-mentioned embodiment are stored in the memory, and when executed by the processor, the traffic packet forwarding method of the above-mentioned embodiment is executed, for example , execute method step S810 in Fig. 8 described above, method step S1010 in Fig. 10 , method step S1210 in Fig. 12 , method step S1410 in Fig. 14 , method step S1610 in Fig. 16 , method in Fig. 17 Step S1710.
- an embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are used to execute the traffic packet on the client side of the border gateway
- the forwarding method for example, executes method steps S100 to S300 in FIG. 2 described above, method steps S710 to S720 in FIG. 7 , method steps S1020 and step S1030 in FIG. 10 , method steps S1220 and step S1230 in FIG. 12 , method step S1420 and step S1430 in FIG. 14 , method step S1620 and step S1630 in FIG. 16 , method step S1720 and step S1730 in FIG. 17 .
- the computer-executable instructions when used to execute the traffic packet forwarding method on the side of the border gateway controller, for example, execute the method step S810 in FIG. 8 described above, the method step S1010 in FIG. 10 , and FIG. Method step S1210 in FIG. 12 , method step S1410 in FIG. 14 , method step S1610 in FIG. 16 , method step S1710 in FIG. 17 .
- the embodiment of the present application includes: receiving a flow message; in the case that the flow message includes a block resource identifier, determining the target block resource according to the block resource identifier and filtering rule information, and the filtering rule information is determined by the boundary
- the gateway controller sends and obtains; and uses the target block resource to forward and process the traffic message.
- the border gateway client when the border gateway client receives the traffic message carrying the block resource identifier, it can determine the target block according to the block resource identifier and the filtering rule information sent by the border gateway controller resources, and then use the target block resource to forward the traffic message; the block resource identifier can be used to flexibly segment network resources, so the target block resource determined by the block resource identifier can forward the traffic message, which can Meet customers' needs for traffic path adjustment and optimization.
- Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, tape, magnetic disk storage or other magnetic storage devices, or can Any other medium used to store desired information and which can be accessed by a computer.
- communication media typically embody computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
匹配条件信息 | 转发条目 |
切片1 | Binding SID 1 |
切片2 | Binding SID 2 |
Claims (11)
- 一种流量报文转发方法,包括:接收流量报文;在所述流量报文包括分块资源标识的情况下,根据所述分块资源标识和过滤规则信息确定目标分块资源,所述过滤规则信息由边界网关控制器发送得到;采用所述目标分块资源对所述流量报文进行转发处理。
- 根据权利要求1所述的流量报文转发方法,其中,所述采用所述目标分块资源对所述流量报文进行转发处理包括:根据所述目标分块资源从本地映射信息确定转发条目,所述本地映射信息包括所述目标分块资源对应的资源信息和所述资源信息对应的转发条目;根据所述转发条目对所述流量报文进行转发处理。
- 根据权利要求2所述的流量报文转发方法,其中,所述流量报文包括团体属性信息,所述根据所述目标分块资源从本地映射信息确定转发条目包括:根据所述目标分块资源和所述团体属性信息从本地映射信息确定转发条目。
- 根据权利要求1至3任意一项所述的流量报文转发方法,其中,所述过滤规则信息包括匹配条件信息和执行动作信息,所述分块资源标识由所述匹配条件信息携带或者由所述执行动作信息携带。
- 根据权利要求1至3任意一项所述的流量报文转发方法,其中,所述分块资源标识为切片标识或者应用标识。
- 一种边界网关客户端,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如权利要求1至5中任意一项所述的流量报文转发方法。
- 一种流量报文转发方法,包括:向边界网关客户端发送携带分块资源标识的过滤规则信息,以使所述边界网关客户端根据所述过滤规则信息确定流量报文的目标分块资源,并根据所述目标分块资源将所述流量报文进行转发处理,所述流量报文为所述边界网关客户端接收所得。
- 根据权利要求7所述的流量报文转发方法,其中,所述过滤规则信息包括匹配条件信息和执行动作信息,所述分块资源标识由所述匹配条件信息携带或者由所述执行动作信息携带。
- 根据权利要求7所述的流量报文转发方法,其中,所述分块资源标识为切片标识或者应用标识。
- 一种边界网关控制器,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如权利要求7至9任意一项所述的流量报文转发方法。
- 一种计算机可读存储介质,存储有计算机可执行指令,其中,所述计算机可执行指令用于执行权利要求1至5中任意一项所述的流量报文转发方法,或者用于执行权利要求7至9任意一项所述的流量报文转发方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22810416.2A EP4311311A1 (en) | 2021-05-24 | 2022-05-17 | Traffic message forwarding method, and client, controller and storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110564009.5A CN115473812A (zh) | 2021-05-24 | 2021-05-24 | 流量报文转发方法、客户端、控制器及存储介质 |
CN202110564009.5 | 2021-05-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022247689A1 true WO2022247689A1 (zh) | 2022-12-01 |
Family
ID=84228423
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/093301 WO2022247689A1 (zh) | 2021-05-24 | 2022-05-17 | 流量报文转发方法、客户端、控制器及存储介质 |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4311311A1 (zh) |
CN (1) | CN115473812A (zh) |
WO (1) | WO2022247689A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11870690B2 (en) * | 2020-03-17 | 2024-01-09 | Huawei Technologies Co., Ltd. | Packet processing method and apparatus, device, and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110149734A1 (en) * | 2009-12-21 | 2011-06-23 | Electronics And Telecommunications Research Institute | Smart border router and method for transmitting flow using the same |
CN107222449A (zh) * | 2016-03-21 | 2017-09-29 | 华为技术有限公司 | 基于流规则协议的通信方法、设备和系统 |
CN107517488A (zh) * | 2016-06-15 | 2017-12-26 | 华为技术有限公司 | 报文处理的方法及设备 |
CN108347376A (zh) * | 2017-01-24 | 2018-07-31 | 华为技术有限公司 | 一种调整转发路径的方法、装置及系统 |
CN109218201A (zh) * | 2017-06-30 | 2019-01-15 | 华为技术有限公司 | 一种生成转发表项的方法、控制器和网络设备 |
-
2021
- 2021-05-24 CN CN202110564009.5A patent/CN115473812A/zh active Pending
-
2022
- 2022-05-17 WO PCT/CN2022/093301 patent/WO2022247689A1/zh active Application Filing
- 2022-05-17 EP EP22810416.2A patent/EP4311311A1/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110149734A1 (en) * | 2009-12-21 | 2011-06-23 | Electronics And Telecommunications Research Institute | Smart border router and method for transmitting flow using the same |
CN107222449A (zh) * | 2016-03-21 | 2017-09-29 | 华为技术有限公司 | 基于流规则协议的通信方法、设备和系统 |
CN111865898A (zh) * | 2016-03-21 | 2020-10-30 | 华为技术有限公司 | 基于流规则协议的通信方法、设备和系统 |
CN107517488A (zh) * | 2016-06-15 | 2017-12-26 | 华为技术有限公司 | 报文处理的方法及设备 |
CN112165725A (zh) * | 2016-06-15 | 2021-01-01 | 华为技术有限公司 | 报文处理的方法及设备 |
CN108347376A (zh) * | 2017-01-24 | 2018-07-31 | 华为技术有限公司 | 一种调整转发路径的方法、装置及系统 |
CN109218201A (zh) * | 2017-06-30 | 2019-01-15 | 华为技术有限公司 | 一种生成转发表项的方法、控制器和网络设备 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11870690B2 (en) * | 2020-03-17 | 2024-01-09 | Huawei Technologies Co., Ltd. | Packet processing method and apparatus, device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
EP4311311A1 (en) | 2024-01-24 |
CN115473812A (zh) | 2022-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3817446B1 (en) | Method and apparatus for creating network slices | |
CN111385206B (zh) | 报文转发的方法、网络系统、相关设备及计算机存储介质 | |
US11689452B2 (en) | Method for forwarding service data, network device, and network system | |
US9391885B1 (en) | MPLS label usage in Ethernet virtual private networks | |
US9178816B1 (en) | Control plane messaging in all-active multi-homed ethernet virtual private networks | |
CN113259238B (zh) | 分段标识的处理方法及设备 | |
US11743166B2 (en) | Provisioning non-colored segment routing label switched paths via segment routing policies in border gateway protocol | |
US9007941B1 (en) | Self-organizing and scalable MPLS VPN transport for LTE | |
WO2017107814A1 (zh) | 一种传播QoS策略的方法、装置及系统 | |
EP2541847B1 (en) | Method and system for establishing an associated bidirectional label-switched path | |
CN112511418A (zh) | 报文指示方法、装置、设备和存储介质 | |
US11240063B2 (en) | Methods, nodes and computer readable media for tunnel establishment per slice | |
CN114500369A (zh) | 控制路由迭代的方法、设备和系统 | |
US9350654B1 (en) | Microloop protection for multi-protocol label switching paths | |
US20200314016A1 (en) | Tunneling inter-domain stateless internet protocol multicast packets | |
WO2021088561A1 (zh) | 位索引显式复制网络中负载分担的方法、装置及设备 | |
WO2023274083A1 (zh) | 路由发布和转发报文的方法、装置、设备和存储介质 | |
US20230308391A1 (en) | Communication of policy changes in lisp-based software defined networks | |
WO2022247689A1 (zh) | 流量报文转发方法、客户端、控制器及存储介质 | |
WO2022222750A1 (zh) | 报文转发方法、装置、网络设备及存储介质 | |
US9781030B1 (en) | Fast re-route protection using GRE over MPLS | |
WO2020114083A1 (zh) | 一种ioam信息的处理方法和装置 | |
WO2018095438A1 (zh) | 等价多路径ecmp处理方法及装置 | |
WO2022062956A1 (zh) | 一种流量处理方法、装置和网络设备 | |
CN107888501B (zh) | 路由更新消息的发送方法、rr、网络设备和网络系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22810416 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022810416 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18555925 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2022810416 Country of ref document: EP Effective date: 20231017 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |