WO2023071318A1 - Procédé et appareil de détection de boucle - Google Patents

Procédé et appareil de détection de boucle Download PDF

Info

Publication number
WO2023071318A1
WO2023071318A1 PCT/CN2022/107088 CN2022107088W WO2023071318A1 WO 2023071318 A1 WO2023071318 A1 WO 2023071318A1 CN 2022107088 W CN2022107088 W CN 2022107088W WO 2023071318 A1 WO2023071318 A1 WO 2023071318A1
Authority
WO
WIPO (PCT)
Prior art keywords
port
loop
upf
network
detection
Prior art date
Application number
PCT/CN2022/107088
Other languages
English (en)
Chinese (zh)
Inventor
韩文勇
谢春生
刁文波
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023071318A1 publication Critical patent/WO2023071318A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update

Definitions

  • the present application relates to the field of communication technologies, and in particular to a loop detection method and device.
  • a user plane function (user plane function, UPF) network element supports a Layer 2 broadcast flooding capability. If UPF receives unicast data packets, multicast data packets, or unicast data packets with unknown destination addresses, UPF will flood the received data packets to the entire network. If there is a loop in the network, the devices in the network will receive a large number of useless data packets in a short period of time. How to detect whether there is a loop in the network is a problem to be solved in this application.
  • the present application provides a loop detection method and device to detect whether there is a loop in the network.
  • a loop detection method including: UPF receives a data packet at a first port, and the data packet is a broadcast data packet, a multicast data packet or unicast data with an unknown MAC address of the destination media access control packet; in the MAC address table, if the port information corresponding to the source MAC address of the data packet reaches a preset number of times in the first preset duration, the UPF constructs a detection packet, which is a broadcast data packet Or a multicast data packet, the MAC address table records the correspondence between the source MAC address of the data packet received by the user plane function UPF and the port information receiving the data packet; the UPF sends the detection to the first port A packet, the detection packet is used to detect whether there is a loop in the network, and the first port is a port in the UPF.
  • UPF when UPF detects that the destination MAC address corresponding to a data packet changes frequently in a short period of time, UPF has reason to believe that the data packet is frequently forwarded in a short period of time, and there is a loop in the network.
  • UPF can construct a detection Packets to detect whether there is a loop in the network, so as to avoid the continuous forwarding of data packets caused by loops in the network and reduce the consumption of network resources.
  • the UPF after the UPF sends the detection packet to the first port, it further includes: if the detection packet is received at the first port or other ports of the UPF within a second preset time period, packet, the UPF determines that there is a loop in the network; otherwise, it determines that there is no loop in the network.
  • the UPF After the UPF sends the detection packet on the first port, if it receives the detection packet at this port or other ports within a certain period of time, the UPF can clearly determine that there is a loop in the network; otherwise, the UPF It can be determined that there are no loops in the network.
  • the UPF sends the detection packet to the second port, and the port information corresponding to the second port is recorded in the MAC address table, previously received through the first port There is port information corresponding to the source MAC address of the data packet, and the second port is a port in the UPF.
  • it also includes: when the UPF determines that there is a loop in the network, reporting a port loop event to the session management function SMF, where the port loop event includes an indication for indicating the first port Information; the UPF receives an N4 session modification message from the SMF, and the N4 session modification message indicates that the UPF stops forwarding data packets through the first port, and/or instructs the UPF to perform a loop recovery event; according to N4 session modification message, stop the data forwarding function of the first port, and/or execute the loop recovery event.
  • the UPF when the UPF determines that there is a loop in the network, it can report the port loop event to the SMF.
  • the SMF receives the above-mentioned port loop event, it can first alarm the OAM, and at this time, the loop in the network can be restored through manual intervention or other intelligent methods.
  • the SMF sends an N4 session modification message to the UPF, which is used to instruct the UPF to stop the data forwarding function of the port, and perform loop recovery events, etc., stop the data forwarding function of the loop port, and reduce the consumption of network resources.
  • the port loop event includes indication information for indicating the first port, specifically: the first port is an access port, and one Ethernet protocol data unit PDU session corresponds to one interface
  • the port loop event carries the identifier of the Ethernet PDU session corresponding to the first port; or, when the first port is an N6 port and one network instance corresponds to one N6 port, the port The loop event carries the identifier of the network instance corresponding to the first port; or, when the first port is an N19 port and the N19 port is an interface between UPFs, the port loop event carries The Internet Protocol IP address of the peer UPF.
  • the execution of the loop recovery event includes: UPF constructing a detection packet again, the detection packet is a broadcast packet or a multicast packet, and the UPF sends the detection packet to the first port; if Within the third preset time period, if the detection packet is not received at the first port or other ports of the UPF, it means that there is no loop in the network, the network returns to normal, and the loop recovery is reported to the SMF event; otherwise, continue to execute the step of sending the detection packet to the first port.
  • UPF can detect whether the loop in the network returns to normal by constructing a detection packet. If the loop in the network returns to normal, the loop recovery event can be reported to the SMF to restore the data forwarding function of the port.
  • the method further includes: if the loop still exists in the network within the fourth preset time period, the UPF stops the loop detection and closes the data forwarding function of the first port.
  • UPF can perform loop detection periodically. If the loop in the network has not been eliminated for a long time, UPF can no longer perform loop detection, and close the data of the first port where the port forms a loop. Forward function. At this time, manual intervention may be required to restore the data forwarding function of the first port, thereby reducing the energy consumption of the UPF.
  • the UPF after reporting the loop recovery event to the SMF, it further includes: the UPF receives an N4 session modification message from the SMF, and the N4 session modification message includes resuming the first port data packet forwarding Function indication information; according to the N4 session modification message, restore the data packet forwarding function of the first port.
  • the SMF instructs the UPF to restore the forwarding function of the data packets of the first port as an example.
  • the UPF determines that the network is back to normal, it can actively restore the data forwarding function of the first port without waiting for an instruction from the SMF, so that the first port can return to normal as soon as possible.
  • the method further includes: receiving an N4 session establishment message from the SMF, and the N4 session establishment message includes an execution
  • the instruction information of the access port loop detection either includes the instruction information of executing the loop detection of the N6 port, or includes the instruction information of executing the loop detection of the N19 port.
  • the SMF when the SMF sends the N4 session establishment message to the UPF, it can directly instruct the UPF whether to perform loop detection on the corresponding port.
  • the UPF executes the method of the present application to perform the loop detection; otherwise, the UPF does not perform the loop detection.
  • This application has better compatibility with existing schemes.
  • the second aspect provides a loop detection method, which is the SMF side corresponding to the first aspect above, and the beneficial effect may be as described in the first aspect above, and will not be described again.
  • the method includes: the SMF receives from the user plane function UPF.
  • a port loop event the port loop event includes indication information for indicating the first port;
  • the indication information indicating the first port the first port is a port in the UPF.
  • the port loop event includes indication information of the first port, specifically: when the first port is an access port, and one Ethernet protocol data unit PDU session corresponds to one access port, the The port loop event carries the identifier of the Ethernet PDU session corresponding to the first port; or, when the first port is an N6 port and one network instance corresponds to one N6 port, the port loop event carries There is an identifier of the network instance corresponding to the first port; or, when the first port is an N19 port and the N19 port is an interface between UPFs, the port loop event carries the Internet of the peer UPF Protocol IP address.
  • the first port is an access port, and further includes: the SMF sends to the terminal instruction information for releasing the PDU session corresponding to the first port, and the instruction information carries information for releasing the Ethernet PUD session
  • the cause is the indication information of network looping; or, the SMF sends an N4 session modification message to the UPF, and the N4 session modification message instructs the UPF to stop forwarding data packets through the access port, and/or instructs the UPF to Perform a loop recovery event.
  • the first port is an N6 port or an N19 port
  • the SMF sends an N4 session modification message to the UPF
  • the N4 session modification message instructs the UPF to stop passing through the N6 port or the N19 port.
  • Port forwarding packets, and/or instructing the UPF to perform a loop recovery event.
  • the SMF receives the loop recovery event from the UPF; the SMF sends a recovery alarm to the OAM, and the recovery alarm is used to indicate that there is no loop in the network and the network returns to normal;
  • the UPF sends an N4 session modification message, where the N4 session modification message includes indication information for restoring the data packet forwarding function of the first port.
  • the method further includes: the SMF sends an N4 session establishment message to the UPF, and the N4 session establishment message includes an execution interface The instruction information of the loop detection on the ingress port, or the instruction information of executing the loop detection of the N6 port, or the instruction information of executing the loop detection of the N19 port.
  • a communication device which includes a one-to-one unit or module for performing the methods/operations/steps/actions described in the first aspect above, and the unit or module can be a hardware circuit or software, It can also be implemented by combining hardware circuits with software.
  • a communication device includes a processor and a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled to the memory; when the processor executes the computer programs or instructions, the device is made to execute the method of the first aspect above.
  • a communication device which includes a one-to-one unit or module for performing the methods/operations/steps/actions described in the second aspect.
  • the unit or module can be a hardware circuit, software, or It can be implemented by combining hardware circuits with software.
  • a communication device includes a processor and a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled to the memory; when the processor executes the computer programs or instructions, the device is made to execute the method of the second aspect above.
  • a computer-readable storage medium stores computer programs or instructions, and when the computer programs or instructions are executed by the device, the device executes the above-mentioned first aspect or the second aspect Methods.
  • a computer program product includes a computer program or an instruction, and when the computer program or instruction is executed by a device, the device executes the method of the first aspect or the second aspect above.
  • a ninth aspect provides a communication system, including the above-mentioned third aspect or the fourth aspect, and the device of the fifth aspect or the sixth aspect.
  • Figure 1 is a schematic diagram of the network architecture provided by the present application.
  • Fig. 2 is the schematic diagram of the PDU connection that this application provides;
  • Fig. 3 is the schematic diagram of the Ethernet PDU conversation that the application provides
  • Fig. 4 is the exchange schematic diagram of the Ethernet PDU session provided by the present application.
  • FIG. 5 is a schematic diagram of a UPF port provided by the present application.
  • 6 to 11 are schematic diagrams of network looping provided by the present application.
  • FIG. 12 is a flow chart of the loop detection method provided by the present application.
  • FIG. 13 is a schematic diagram of an access port loop provided by the present application.
  • Fig. 14 is the schematic diagram of the N6 port loop provided by the present application.
  • Figure 15 is a schematic diagram of the N19 port loop provided by the present application.
  • FIG. 16 and FIG. 17 are schematic diagrams of communication devices provided by the present application.
  • a network architecture applicable to this application including an access network, a core network, and terminals.
  • the access network is used to implement functions related to wireless access
  • the access network device is a device that provides access for the terminal.
  • the access network device may also be called a radio access network (radio access network, RAN) device.
  • the RAN device is mainly responsible for radio resource management, quality of service (QoS) management, data compression and security processing on the air interface side.
  • the RAN equipment may include various forms of base stations. For example, a macro base station, a micro base station (small cell), a relay station or an access point, etc.
  • RAN equipment includes but is not limited to: the next-generation base station (generation nodeB, gNB) in the fifth generation (5 th generation, 5G), the evolved node B (evolved node B, eNB), the radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB) , baseband unit (baseband unit, BBU), transceiver point (transmitting and receiving point, TRP), transmitting point (transmitting point, TP), mobile switching center, etc.
  • the RAN device may also be a wireless controller, a centralized unit (centralized unit, CU), and/or a distributed unit (distributed unit, DU) in a cloud radio access network (cloud radio access network, CRAN) scenario, or the RAN device may For relay stations, access points, vehicle-mounted equipment, terminals, wearable devices, and access network equipment in the future sixth generation (6th generation, 6G) network or future evolution of public land mobile network (PLMN) ) access network equipment in the network, etc.
  • 6G sixth generation
  • PLMN public land mobile network
  • a base station is used as an example of a RAN device for description below.
  • the core network equipment may include one or more of the following network elements: access and mobility management function (access and mobility management function, AMF), session management function (session management function, SMF), user plane function (user plane function, UPF), policy control function (policy control function, PCF), application function (application function, AF), unified data management (unified data management, UDM), authentication server function (authentication server function, AUSF), network slice selection function ( network slice selection function, NSSF).
  • access and mobility management function access and mobility management function
  • AMF access and mobility management function
  • SMF session management function
  • user plane function user plane function, UPF
  • policy control function policy control function
  • PCF policy control function
  • application function application function, AF
  • UDM authentication server function
  • authentication server function authentication server function
  • AUSF authentication server function
  • network slice selection function network slice selection function
  • AMF Mainly responsible for mobility management in the mobile network, such as user location update, user registration network, user switching, etc.
  • SMF It is mainly responsible for session management in mobile networks, such as session establishment, modification, and release. Specific functions such as assigning Internet protocol (internet protocol, IP) addresses to users, selecting UPF that provides message forwarding functions, etc.
  • UPF It is mainly responsible for the forwarding and receiving of user data. In downlink transmission, UPF can receive user data from the data network (DN) and transmit it to the terminal through the access network device; in uplink transmission, UPF can receive user data from the terminal through the access network device and forward it to the DN the User Data.
  • the transmission resources and scheduling functions for providing services to terminals in the UPF can be managed and controlled by the SMF.
  • PCF It mainly supports the provision of a unified policy framework to control network behavior, provides policy rules to the network functions of the control layer, and is responsible for obtaining user subscription information related to policy decisions.
  • AF It mainly supports interaction with the 3GPP core network to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side.
  • UDM is mainly used to generate authentication credentials, user identification processing (such as storing and managing user permanent identities, etc.), access authorization control, and contract data management.
  • AUSF is mainly used to perform authentication when the terminal accesses the network, including receiving the authentication request sent by the security anchor function (SEAF), selecting the authentication method, and submitting to the authentication repository and processing function (authentication repository and processing function, ARPF) request authentication vector, etc.
  • SEAF security anchor function
  • NSSF is mainly used to select network slice instances for terminals, determine allowed network slice selection assistance information (network slice selection assistance information, NSSAI), configure NSSAI, and determine the AMF set of service terminals.
  • the above network elements in the core network may have different names.
  • the fifth generation mobile communication system is taken as an example for illustration, which is not intended to limit the present application.
  • the network elements of the core network in FIG. 1 are only for schematic illustration, and are not intended to limit the present application.
  • the core network elements may also include: network exposure function (network exposure function, NEF), network storage function (network repository function, NRF), or service control point (service control point) , one or more network elements in SCP), etc.
  • a terminal may also be called terminal equipment, user equipment (user equipment, UE), mobile station, mobile terminal, and so on.
  • Terminals can be widely used in various scenarios, such as device-to-device (D2D), vehicle-to-everything (V2X) communication, machine-type communication (MTC), Internet of Things ( Internet of things, IoT), virtual reality, augmented reality, industrial control, autonomous driving, telemedicine, smart grid, smart furniture, smart office, smart wearables, smart transportation, smart city, etc.
  • Terminals can be mobile phones, tablet computers, computers with wireless transceiver functions, wearable devices, vehicles, drones, helicopters, airplanes, ships, robots, robotic arms, smart home devices, etc. This application does not limit the specific technology and specific equipment form adopted by the terminal.
  • a UE or a personal computer personal computer, PC is used as an example of a terminal for description below.
  • the DN may be a service network that provides data service for users.
  • the DN may be an IP multimedia service (IP multi-media service) network or the Internet (internet).
  • the terminal can establish a protocol data unit (protocol data unit, PDU) session from the terminal to the DN to access the DN.
  • protocol data unit protocol data unit
  • the functions of the base station may also be performed by modules (such as chips) in the base station, or may be performed by a control subsystem including the functions of the base station.
  • the control subsystem including base station functions here may be the control center in the above application scenarios such as smart grid, industrial control, intelligent transportation, and smart city.
  • the functions of the terminal may be performed by a module (such as a chip or a modem) in the terminal, or may be performed by a device including the terminal function.
  • the functions of the core network element (such as UPF or SMF, etc.) can also be performed by modules (such as chips) in the core network element, or can be performed by the control subsystem including the core network element.
  • data exchange service is provided for UE and DN network, which is called PDU connection service.
  • the UE obtains the PDU connection service by initiating a PDU session establishment request to the mobile network.
  • the network side provides the PDU connection service by maintaining the PDU session for the UE.
  • the bold dashed line indicates the service data exchange path between the UE and the DN network. This path is the data service path of the UE in the mobile network, which may be referred to as the data plane path for short.
  • the bold solid line indicates the signaling exchange path between the UE and the DN, which is the signaling service data of the UE in the mobile network, which may be referred to as signaling plane signaling for short.
  • the UE In order to realize the data exchange between the UE and the DN network, the UE needs to use the PDU connection service provided by the mobile network to establish a PDU session based on the data network name (DNN).
  • the establishment of a PDU session includes two basic processes: the UE registers with the mobile network to access the network, and the UE requests the network to establish a PDU session. These two processes belong to the signaling plane interaction process between the UE and the mobile network.
  • the network elements involved in the bold solid line in Figure 2 are the main network elements involved in the establishment of the PDU session.
  • the general user registration and network access process may include: the UE sends a registration request to the AMF through the base station, and the AMF obtains subscription data from a specific UDM according to the user identifier.
  • the AMF can also initiate a user policy control establishment request (UE policy control cteate) and an access management policy control establishment request (AM policy control creat) to the PCF, which are used to obtain UE policies and access control policies respectively.
  • the PCF returns the access control policy to the AMF during this process.
  • the AMF responds to the UE's registration request, and sends relevant policy information to the UE, and the UE completes network registration and camping.
  • the AMF on the network side maintains the registration information of the UE and performs mobility management on the UE.
  • the general PDU session establishment process may include: the UE sends a PDU session establishment request to the AMF through the base station, and the AMF selects the SMF to provide session services for the UE, saves the correspondence between the SMF and the PDU session, and sends the session establishment request to the SMF. Select the corresponding UPF and establish a user plane transmission path, and assign an IP address to it.
  • the SMF will also initiate a policy control session establishment request to the PCF for establishing a policy control session between the SMF and the PCF.
  • the SMF will save the correspondence between the policy control session and the PDU session .
  • IP-type PDU sessions (referred to as IP sessions for short), including IPV4 sessions and IPV6 sessions, and Ethernet-type PDU sessions (referred to as Ethernet sessions for short).
  • IP sessions for short IP-type PDU sessions
  • Ethernet sessions for short Ethernet sessions for short
  • FIG. 3 an architecture diagram of an Ethernet PDU session is provided, including: a terminal side, a 3GPP channel, and a DN side. Ethernet is used on the end side, and PC1 is a PC in the Ethernet.
  • the customer premise equipment (CPE) mainly plays the role of bridging. The left port of the CPE is connected to the Ethernet, and the right port is connected to the 3GPP network.
  • CPE customer premise equipment
  • FIG. 3 is only a schematic diagram, and is not intended to limit the present application.
  • a layer 2 switch layer 2 switch, L2SW may also be set between the PC1 and the CPE.
  • UPF supports local exchange (the local exchange refers to the data exchange of different PC1 under the same UPF, for example, PC1 and PC2 exchange), inter-network exchange (the inter-network exchange Refers to the exchange between the end-side terminal and the DN-side terminal, such as the exchange between PC1 and PC4) and cross-UPF exchange (the cross-UPF exchange refers to the data exchange between PCs under different UPFs, such as the exchange between PC2 and PC3).
  • the above exchange refers to data transmission between different PCs.
  • UPF supports layer two broadcast flooding capability, and said layer two refers to the media access control (media access control, MAC) layer, that is, if UPF receives broadcast, multicast or data packets with unknown destination MAC address, Then, except the source end, UPF needs to send the data packet to all terminals in the entire local area network (local area network, LAN).
  • the data packet with an unknown destination MAC refers to a data packet whose destination MAC address has not been learned by the UPF, that is, the corresponding relationship between the destination MAC address and the port is not recorded in the MAC address table.
  • the N3/N9 interface is the access port, and the UPF is connected to the CPE through the access port.
  • One Ethernet PDU session corresponds to one access port;
  • the N6 interface is the N6 port, and the UPF is connected to the DN through the N6 port.
  • a network instance corresponds to an N6 port;
  • the N19 interface is an N19 port, and the UPF is connected to other UPFs through the N19 port, and a group session + a peer UPF corresponds to an N19 port.
  • all the above ports may belong to the same network instance.
  • the port can be an access port, N6 port or N19 port, etc., it can first learn the correspondence between the source MAC address of the data packet and the receiving port, and The learned corresponding relationship is stored in the MAC address table, and then the data packet is forwarded according to the destination MAC address of the data packet.
  • UPF1 may query the port corresponding to the destination MAC address of the data packet in the MAC address table. For example, if the port found in the MAC address is the N19 port, the UPF can send the data packet through the N19 port.
  • UPF when UPF receives a multicast packet, a broadcast packet, or a unicast packet with an unknown destination MAC address, it will flood to all access ports, N6 port and N19 port except the source port. If there is a loop in the network, the devices in the network will receive a large number of useless duplicate packets in a short time, wasting network resources. It should be noted that in the above description of this application, UPF is used as an example to describe flooding. In essence, all devices or ports in the Ethernet session receive broadcast, multicast or unicast with unknown destination MAC address. Flooding operation will be performed when the data packet is received.
  • LSW1, CPE1, CPE2, and UPF form a loop. If device 1 initiates a multicast packet, broadcast packet, or unicast packet with an unknown destination MAC address, LSW1 forwards the data packet to CPE1 and CPE2 when receiving the data packet. CPE1 and CPE2 forward the data packet to the UPF. When the UPF receives the data packet of CPE1, it forwards the data packet to device 3, CPE2 and device 2. CPE2 continues to forward the data packet to LSW1, which causes device 2 and device 3 to receive a large number of repeated useless data packets within a short period of time.
  • UPF1, UPF2, CPE2, LSW, and CPE1 form a loop. If device 1 initiates a multicast packet, broadcast packet, or unicast packet with an unknown destination MAC address, the data packet will be continuously forwarded in the loop and flooded to other places in the network. A large number of repeated useless data packets will be received within a period of time.
  • a loop is formed between LSW1 and CPE1. If device 1 initiates a multicast packet, broadcast packet, or unicast packet with an unknown destination MAC address, the data packet will be continuously forwarded in the loop and flooded to other places in the network, and device 2 and device 3 will In a short period of time, a large number of repeated useless data packets are received.
  • Scenario 4 Self-loop on the DN side
  • the DN SW and VXLAN SW on the DN side form a loop. If device 3 initiates a multicast packet, broadcast packet, or unicast packet with an unknown destination MAC address, the data packet will be continuously forwarded in the loop and flooded to other places in the network. A large number of repeated useless data packets will be received.
  • a loop is formed between UPF1, VXLAN SW1, DNS SW, VLAN SW2, and UPF2. If device 3 initiates a multicast packet, broadcast packet, or unicast packet with an unknown destination MAC address, the data packet will be continuously forwarded in the loop and flooded to other places in the network. A large number of repeated useless packets will be received within a period of time.
  • a loop is formed between UPF, VXLAN SW, and CPE2. If device 1 initiates a multicast packet, broadcast packet, or unicast packet with an unknown destination MAC address, the data packet will be continuously forwarded in the loop and flooded to other places in the network, and device 2 will Received a lot of useless packets.
  • This application provides a loop detection method, which can be used to detect whether there is a loop in the network, and if there is a loop in the network, the relevant loop-breaking operations can be performed in time, thereby preventing the device from receiving a large number of repeated useless loops in a short period of time. packets, reducing the waste of network resources.
  • the method at least includes the following steps:
  • Step 1201 The UPF receives a data packet at the first port, and the data packet is a broadcast data packet, a multicast data packet or a unicast data packet with an unknown destination MAC address.
  • the above-mentioned first port may be an access port (that is, an N3/N9 port), an N6 port or an N19 port.
  • Step 1202 In the MAC address table, if the port corresponding to the source MAC address of the data packet has changed the number of times within the first preset time length to a preset number of times, the UPF constructs a detection packet, and the detection packet is a broadcast data packet or multicast packets.
  • the MAC address table records the correspondence between the source MAC address of the data packet received by the UPF and the port information that received the data.
  • the UPF learns the source MAC address of the data packet, and records the corresponding relationship between the source MAC address of the data packet and the receiving port in the MAC address table.
  • the data packet is forwarded through a corresponding port.
  • the UPF receives data packet 1 through port 1, and the source MAC address of the data packet 1 is MAC address A.
  • the UPF can learn the MAC address A, and record the correspondence between the MAC address A and port 1.
  • the UPF may send the data packet 2 to the port 1.
  • the UPF may construct a detection packet to detect whether there is a loop in the network. If the UPF receives the detection packet at the sending port of the detection packet or other ports within the second preset time period, the UPF determines that there is a loop in the network; otherwise, the UPF determines that there is no loop in the network.
  • Step 1203 The UPF sends the detection packet to the first port, and the detection packet is used to detect whether there is a loop in the network.
  • the above-mentioned first port is a port for receiving the data packet.
  • the UPF may also send the detection packet to the second port, and the port information corresponding to the second port is recorded in the MAC address table, previously and through the There is port information corresponding to the source MAC address of the data packet received by the first port. Assuming that the UPF receives a data packet at the first port, the data packet may be called a target data packet.
  • UPF finds that the port information corresponding to the source MAC address of the target data packet changes frequently through the MAC address table, UPF may suspect that there is a loop in the network, causing the data packet to be forwarded between different devices, making UPF The target packet is repeatedly received within the time. At this time, UPF can construct a detection packet to detect whether there is a loop in the network.
  • the UPF may send the detection packet through the first port receiving the target data packet.
  • the UPF may also query the MAC address table for a port corresponding to the source MAC address of the target data packet recorded in the MAC address table, which may be referred to as a second port. In addition to the first port, the UPF may also send the detection packet through the second port. If the UPF receives the detection packet again through the port that sent the detection packet or other ports within the second preset time period, the UPF may determine that there is a loop in the network. Otherwise, it is determined that there are no loops in the network.
  • the UPF may report a port loop event to the SMF network element, and the port loop event includes indication information for indicating the first port.
  • the SMF receives the above-mentioned port loop event, it can send alarm information to the operation management and maintenance system (operation administration and maintenance, OAM), the alarm information is used to indicate that there is a loop in the network, and the alarm information includes Indication information indicating the first port, where the first port belongs to the network.
  • OAM operation administration and maintenance
  • the OAM may remove the loop in the network manually or in other ways.
  • the UPF reports the access port loop event to the SMF. Since one PDU session corresponds to one access port, the access port loop event may carry the identifier of the Ethernet PDU session corresponding to the first port.
  • the SMF receives the above access port loop event, it can perform at least one of the following operations:
  • the SMF actively releases the Ethernet PDU session corresponding to the access port, and sends instruction information for releasing the Ethernet PDU session corresponding to the access port to the UE.
  • the SMF may send a non-access stratum (non-access stratum, NAS) message for releasing the Ethernet PDU session to the UE, where the NAS message carries the reason for releasing the Ethernet PDU session that the network is looped.
  • NAS non-access stratum
  • the SMF sends an N4 session modification message to the UPF, in which the N4 session modification message instructs the UPF to stop forwarding data packets through the access port, and/or instructs the UPF to execute the access port loop recovery event.
  • the UPF reports the N6 port loop event to the SMF.
  • One network implementation corresponds to one N6 port, and the above-mentioned N6 port loop event carries the identifier of the network instance corresponding to the N6 port.
  • the SMF receives the alarm of the above-mentioned N6 port loop event, the following operations can be performed: the SMF sends an N4 session modification message to the UPF, and the N4 session message instructs the UPF to stop forwarding data packets through the N6 port, and/or indicates the The above UPF executes the N6 port loop recovery event, etc.
  • the SMF may set all relevant Ethernet PUD session settings under the network implementation corresponding to the N6 port to stop forwarding data packets to the N6 port.
  • the UPF reports the N19 port loop event to the SMF.
  • Port N19 is the interface between UPFs.
  • each N19 port under each UPF corresponds to each peer UPF under a 5G LAN group.
  • the above-mentioned N19 port loop event carries the IP address of the peer UPF.
  • the SMF receives the N19 port loop event, it can send an N4 session modification message to the UPF, the N4 session modification message carries the UPF to stop forwarding data packets through the N19 port, and/or instruct the UPF to perform N19 loop recovery events etc.
  • the SMF instructs the UPF to stop forwarding data packets through the first port, or instructs the UPF to execute the loop recovery event as an example. It can be understood that when the UPF determines that there is a loop in the current network, it can stop forwarding data packets through the port by itself, and/or perform loop recovery events, etc., without waiting for an instruction from the SMF.
  • the process of the UPF executing the loop recovery event may include: the UPF forms a detection packet, and the detection packet may also be a broadcast packet or a multicast packet.
  • the UPF sends the detection packet to the first port. If within the third preset time length, the first port or other ports of the UPF do not receive the detection packet, it means that there is no loop in the network, the network returns to normal, and the loop recovery event is reported to the SMF; otherwise, Continue the above process, construct a detection packet, and send the detection packet to the first port.
  • the UPF may start a timer, periodically form a detection packet, and send the detection packet from the first port to perform loop detection.
  • the timing duration of the timer may be 2 minutes, and the UPF may perform loop detection every 2 minutes.
  • the process of each loop detection may include: the UPF constructs a detection packet, and sends the detection packet through the first port. If within the preset duration, of course, the preset duration should be shorter than the loop detection period mentioned above, and the UPF receives the detection packet at the first port or other ports, it means that there is still a loop in the network, and the loop continues detection.
  • the SMF may send an N4 session modification message to the UPF, where the N4 session modification message includes indication information for restoring the data forwarding function of the first port.
  • the N4 session modification message may carry a packet detection rule (packet detection rule, PDR), a forwarding action rule (forwarding action rule, FAR), etc.
  • PDR packet detection rule
  • FAR forwarding action rule
  • the UPF starts a timer to perform loop detection at regular intervals. If the loop in the network still exists after a certain period of time, such as the fourth preset period of time, the UPF may stop loop detection and close the data forwarding function of the first port.
  • manual intervention may be required to restore the data forwarding function of the first port, such as manually triggering a CPE reset, or issuing a local operation maintenance (OM) to restore the data forwarding function, etc.
  • OM local operation maintenance
  • the SMF sends an N4 session establishment message to the UPF, the above-mentioned first port is an access port, and the N4 session establishment message includes instruction information for performing loop detection on the access port; Or, the first port is an N6 port, and the above-mentioned N4 session establishment message includes an instruction to perform loop detection on the N6 port; or, the first port is an N19 port, and the above-mentioned N4 session establishment message includes an instruction to perform loop detection on the N19 port information.
  • multicast packets, broadcast packets, or unicast packets with unknown destination addresses are forwarded in a flooding manner. If there is a loop in the network, data packets will be continuously forwarded in the network, consuming network resources.
  • UPF can perform loop detection on each interface defined in 3GPP, and after an alarm, can detect whether the loop in the network is recovered again to ensure the stable operation of the network.
  • the present application is described by taking the loop detection and breaking of the access port as an example.
  • UPF receives a data packet through the access port, that is, N3/N9, and the source MAC address of the data packet changes frequently in a short period of time, at least including the following process:
  • the SMF requests the UPF to perform an access port loop detection event in the N4 session establishment message.
  • UPF When UPF receives an uplink data packet from the access port, when recording the source MAC address of the uplink data packet in the MAC address table, if the source MAC address of the data packet changes frequently in a short period of time, UPF Construct a detection packet and deliver it from the access port for loop detection. If the UPF receives the detection packet on the access port or other ports within a short period of time, the UPF considers that the network connected to the access port forms a loop; the UPF reports the access port loop event to the SMF.
  • the SMF When the SMF receives the above-mentioned access port loop event, it first sends an alarm to the OAM, and then can perform any of the following operations.
  • the specific operations to be performed can be determined by the local configuration of the SMF:
  • the SMF actively releases the Ethernet PDU session corresponding to the access port, and sends NAS signaling to the UE to release the Ethernet PDU session.
  • the NAS signaling includes that the reason for releasing the Ethernet PDU session is network looping.
  • the UE cannot establish the Ethernet PDU session again within a short period of time, so as to avoid triggering the access port loop event again.
  • the SMF sends an N4 session modification message to the UPF, and the N4 session modification message requires the UPF to stop forwarding data packets, and requires the UPF to perform an access port loop recovery event.
  • the UPF When the UPF receives the N4 session modification message in the above-mentioned scheme B, it starts a timer, constructs a detection packet regularly, and sends it from the access port to perform loop detection.
  • the UPF does not receive the detection packet from the access port or other ports within a short period of time, the UPF reports the access port loop recovery event to the SMF. Or, if the UPF receives the detection packet again at the above-mentioned access port or other ports within a short event, the UPF continues to perform detection according to the period of the above-mentioned timer. If the network does not recover for a long time, the UPF will terminate the data forwarding capability of the access port. At this time, manual intervention may be required to restore the data forwarding capability of the access port.
  • the SMF When the SMF receives the loop recovery event reported by the UPF, it first reports the recovery alarm to the OAM, and then sends an N4 session modification message to the UPF, which contains a request for the UPF to restore the data forwarding function of the access port. Instructions.
  • the present application is described by taking the loop detection and breaking of the N6 port as an example.
  • the UPF receives a data packet through the N6 port.
  • the source MAC address of the data packet changes frequently in a short period of time, at least including the following process:
  • SMF When CPE establishes an Ethernet PDU session, SMF requires UPF to perform N6 port loop detection event in the N4 session establishment message, and requires UPF to stop forwarding data to N6 port when a loop event occurs, until the N6 port loop is restored .
  • the UPF When the UPF receives a downlink data packet from the N6 interface, if the source MAC address of the recorded data packet is found to change frequently in a short period of time, the UPF can form a detection packet and send it from the N6 port. Loop detection. If within a short period of time, UPF receives the detection packet from the N6 port or other ports, the UPF considers that the network connected to the N6 port forms a loop, and reports the N6 port loop event to the SMF, which carries the network information corresponding to the N6 port. instance. UPF automatically stops forwarding packets to N6 port.
  • the SMF When the SMF receives the above-mentioned N6 port loop event, it sends an alarm to the OAM.
  • the SMF may set all relevant Ethernet PDU sessions under the network instance corresponding to the N6 port to stop forwarding data packets to the N6 port.
  • the UPF starts a timer, constructs a detection packet regularly, and sends it from the N6 port for loop detection.
  • the UPF does not receive the detection packet from the N6 port or other ports within a short period of time, the UPF reports the N6 port loop recovery event to the SMF.
  • the SMF may further perform corresponding operations, such as reporting a recovery alarm to the OAM.
  • the UPF receives the detection packet from the N6 port or other ports within a short period of time, the UPF will continue to perform loop detection periodically according to the timing of the timer. If the loop in the network does not recover for a long time, UPF will terminate the data forwarding function of the N6 port, and manual intervention may be required to restore the data forwarding function of the N6 port.
  • the loop detection and breaking of the N19 port is taken as an example.
  • UPF1 receives a data packet through the N19 port.
  • the source MAC address of the data packet, in the record in the MAC address table, changes frequently in a short period of time, and at least includes the following process:
  • the SMF finds that a forwarding channel needs to be established between different UPFs, the SMF requests the UPF to perform the N19 port loop detection event in the N4 session establishment message.
  • UPF When UPF receives a data packet at the N19 port and records the MAC address, if it finds that the source MAC address of the data packet changes frequently in a short period of time, the UPF constructs a detection packet and sends it from the N19 port for loop detection. If within a short period of time, UPF receives the detection packet on the N19 port or other ports, UPF considers that the network connected to the N19 port forms a loop; UPF reports the N19 port loop event to the SMF, and the N19 port loop event carries There is IP correspondence of the opposite side UPF. For example, the IP address of UPF2 in Figure 15.
  • the SMF When the SMF receives the N19 port loop event, it first reports to the OAM, and then sends the N4 session modification message to the UPF.
  • the N4 session modification message may include instructions to request the UPF to stop forwarding data packets to UPF2, and request the UPF to execute Instructions for loop recovery events on the N19 port.
  • the UPF When the UPF receives the above-mentioned N4 session modification message, it first starts a timer, and regularly constructs a detection packet to be sent from the N19 port for loop detection.
  • the UPF does not receive the detection packet from the local N19 port or other ports within a short period of time, the UPF reports the N19 port loop recovery event to the SMF, and the N19 port loop recovery event carries the IP address of the peer UPF. If the UPF receives the detection packet at the N19 port or other ports within a short period of time, the UPF will continue to construct the detection packet for loop detection according to the timing period of the timer. If the network has not returned to normal for a long time and there is a loop in the network, the UPF terminates the data forwarding function of the N19 port, and manual intervention is required to restore the data forwarding function of the N19 port.
  • the SMF When the SMF receives the N19 port loop recovery event, it first sends a recovery alarm to the OAM, and sends an N4 session modification message to the UPF, requesting the UPF to resume forwarding data packets to UPF2. The UPF forwards the data packet according to the requirements of the new PDR and FRA carried in the N4 session modification message.
  • the UPF and the SMF include hardware structures and/or software modules corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software with reference to the units and method steps of each example described in the embodiments disclosed in the present application. Whether a certain function is executed by hardware or computer software drives the hardware depends on the specific application scenario and design constraints of the technical solution.
  • FIG. 16 and FIG. 17 are schematic structural diagrams of possible communication devices provided in this application. These communication devices can be used to implement the functions of the UPF or SMF in the above method embodiments, and therefore can also achieve the beneficial effects of the above method embodiments.
  • the communication device may be a UPF or an SMF as shown in FIG. 1 , and may also be a module (such as a chip) applied to the UPF or the SMF.
  • a communication device 1600 includes a processing unit 1610 and a transceiver unit 1620 .
  • the communication device 1600 is configured to implement the functions of the UPF or the SMF in the foregoing method embodiments.
  • the transceiver unit 1620 is used to receive a data packet at the first port, and the data packet is a broadcast data packet, a multicast data packet or an unknown destination MAC address A unicast data packet; a processing unit 1610 configured to construct a detection packet in the MAC address table if the port information corresponding to the source MAC address of the data packet reaches a preset number of times within the first preset duration , the detection packet is a broadcast data packet or a multicast data packet, and the MAC address table records the correspondence between the source MAC address of the data packet received by the UPF network element and the port information receiving the data packet; the transceiver unit 1620, It is also used to send the detection packet to the first port, where the detection packet is used to detect whether there is a loop in the network.
  • the transceiver unit 1620 is used to receive a port loop event from a UPF network element, and the port loop event includes an indication for indicating the first port information; the processing unit 1610 is configured to generate alarm information; the transceiver unit 1620 is also configured to: send alarm information to OAM, the alarm information is used to indicate that there is a loop in the network, and the alarm information includes the Indication information of the first port, where the first port is a port in the UPF.
  • processing unit 1610 and the transceiver unit 1620 can be obtained according to the relevant description in the above method embodiment, and details are not repeated here.
  • a communication device 1700 includes a processor 1710 and an interface circuit 1720 .
  • the processor 1710 and the interface circuit 1720 are coupled to each other.
  • the interface circuit 1720 may be a transceiver or an input-output interface.
  • the communication device 1700 may further include a memory 1730 for storing instructions executed by the processor 1710 or storing input data required by the processor 1710 to execute the instructions or storing data generated by the processor 1710 after executing the instructions.
  • the processor 1710 is used to implement the functions of the processing unit 1610
  • the interface circuit 1720 is used to implement the functions of the transceiver unit 1620 .
  • the UPF module realizes the function of UPF in the above method embodiment.
  • the UPF module receives information from other modules in the UPF (such as a radio frequency module or an antenna), and the information is sent to the UPF by the SMF; or, the UPF module sends information to other modules in the UPF (such as a radio frequency module or an antenna).
  • the information is sent by the terminal to the UPF.
  • the UPF module here can be a UPF chip or other modules.
  • the SMF module realizes the function of the SMF in the above-mentioned method embodiment.
  • the SMF module receives information from other modules in the SMF (such as a radio frequency module or an antenna), and the information is sent to the SMF by the UPF; or, the SMF module sends information to other modules in the SMF (such as a radio frequency module or an antenna). Information is sent by SMF to UPF.
  • the SMF module here can be an SMF chip or other modules.
  • processor in this application can be a central processing unit (central processing unit, CPU), and can also be other general processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits (application specific integrated circuit, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
  • CPU central processing unit
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor can be a microprocessor, or any conventional processor.
  • the method steps in the embodiments of the present application may be implemented by means of hardware, or may be implemented by means of a processor executing software instructions.
  • Software instructions can be composed of corresponding software modules, and software modules can be stored in random access memory, flash memory, read-only memory, programmable read-only memory, erasable programmable read-only memory, electrically erasable programmable read-only Memory, registers, hard disk, removable hard disk, CD-ROM or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium.
  • the storage medium may also be a component of the processor.
  • the processor and storage medium can be located in the ASIC.
  • the ASIC can be located in the base station or the terminal.
  • the processor and the storage medium may also exist in the base station or the terminal as discrete components.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer programs or instructions. When the computer program or instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are executed in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
  • the computer program or instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program or instructions may be downloaded from a website, computer, A server or data center transmits to another website site, computer, server or data center by wired or wireless means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrating one or more available media.
  • the available medium may be a magnetic medium, such as a floppy disk, a hard disk, or a magnetic tape; it may also be an optical medium, such as a digital video disk; and it may also be a semiconductor medium, such as a solid state disk.
  • the computer readable storage medium may be a volatile or a nonvolatile storage medium, or may include both volatile and nonvolatile types of storage media.
  • “at least one” means one or more, and “multiple” means two or more.
  • “And/or” describes the association relationship of associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean: A exists alone, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the contextual objects are an “or” relationship; in the formulas of this application, the character “/” indicates that the contextual objects are a “division” Relationship.
  • “Including at least one of A, B and C” may mean: including A; including B; including C; including A and B; including A and C; including B and C; including A, B and C.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un procédé et un appareil de détection de boucle. Le procédé comprend les étapes suivantes : une UPF reçoit un paquet de données au niveau d'un premier port ; dans une table d'adresses MAC, si le nombre de fois où des informations de port correspondant à une adresse MAC source du paquet de données changent à l'intérieur d'une première durée prédéfinie atteint un nombre prédéfini de fois, l'UPF construit un paquet de détection, le paquet de détection étant un paquet de données de diffusion ou un paquet de données de multidiffusion ; et l'UPF envoie le paquet de détection au premier port, le paquet de détection étant utilisé pour détecter s'il existe une boucle dans un réseau. Au moyen du procédé et de l'appareil de la présente invention, il peut être détecté s'il existe une boucle dans un réseau, de sorte que, lorsqu'il existe une boucle dans le réseau, un dispositif dans la boucle soit empêché de transmettre constamment un paquet de données, ce qui permet de réduire la consommation de ressources de réseau.
PCT/CN2022/107088 2021-10-29 2022-07-21 Procédé et appareil de détection de boucle WO2023071318A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111268099.XA CN116074239A (zh) 2021-10-29 2021-10-29 一种环路检测方法及装置
CN202111268099.X 2021-10-29

Publications (1)

Publication Number Publication Date
WO2023071318A1 true WO2023071318A1 (fr) 2023-05-04

Family

ID=86159009

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/107088 WO2023071318A1 (fr) 2021-10-29 2022-07-21 Procédé et appareil de détection de boucle

Country Status (2)

Country Link
CN (1) CN116074239A (fr)
WO (1) WO2023071318A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117042014A (zh) * 2023-10-10 2023-11-10 北京航空航天大学 一种兼顾速率和安全的无人机自组网多路径传输方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090296727A1 (en) * 2008-06-03 2009-12-03 Shriram Srinivasan Method and Apparatus to Count MAC Moves at Line Rate
CN102055525A (zh) * 2010-12-17 2011-05-11 北京格林伟迪科技有限公司 环路检测和控制方法
CN102347865A (zh) * 2011-11-04 2012-02-08 华为技术有限公司 一种以太网环路定位方法、交换设备及系统
CN103125100A (zh) * 2011-12-09 2013-05-29 华为技术有限公司 一种二层网络环路处理的方法、装置及网络设备
WO2020188464A1 (fr) * 2019-03-15 2020-09-24 Telefonaktiebolaget Lm Ericsson (Publ) Filtrage d'adresses de source de dispositif ethernet pour évitement de boucle
CN111901234A (zh) * 2020-08-12 2020-11-06 深圳市信锐网科技术有限公司 网络环路处理方法、系统及相关设备
CN112312510A (zh) * 2019-07-30 2021-02-02 华为技术有限公司 一种数据转发方法、装置及系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090296727A1 (en) * 2008-06-03 2009-12-03 Shriram Srinivasan Method and Apparatus to Count MAC Moves at Line Rate
CN102055525A (zh) * 2010-12-17 2011-05-11 北京格林伟迪科技有限公司 环路检测和控制方法
CN102347865A (zh) * 2011-11-04 2012-02-08 华为技术有限公司 一种以太网环路定位方法、交换设备及系统
CN103125100A (zh) * 2011-12-09 2013-05-29 华为技术有限公司 一种二层网络环路处理的方法、装置及网络设备
WO2020188464A1 (fr) * 2019-03-15 2020-09-24 Telefonaktiebolaget Lm Ericsson (Publ) Filtrage d'adresses de source de dispositif ethernet pour évitement de boucle
CN112312510A (zh) * 2019-07-30 2021-02-02 华为技术有限公司 一种数据转发方法、装置及系统
CN111901234A (zh) * 2020-08-12 2020-11-06 深圳市信锐网科技术有限公司 网络环路处理方法、系统及相关设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Ethernet support clarification", 3GPP TSG-SA WG2 MEETING #133, S2-1905041, 7 May 2019 (2019-05-07), XP051720559 *
JUNIPER: "Integrating Fixed Network IP/E-VPN Solutions with 5G-VN", 3GPP TSG-SA WG2 MEETING #136-AH, S2-2000142, 7 January 2020 (2020-01-07), XP051842247 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117042014A (zh) * 2023-10-10 2023-11-10 北京航空航天大学 一种兼顾速率和安全的无人机自组网多路径传输方法
CN117042014B (zh) * 2023-10-10 2023-12-22 北京航空航天大学 一种兼顾速率和安全的无人机自组网多路径传输方法

Also Published As

Publication number Publication date
CN116074239A (zh) 2023-05-05

Similar Documents

Publication Publication Date Title
US20210274375A1 (en) Time-Sensitive Networking Communication Method and Apparatus
WO2020103842A1 (fr) Procédé et appareil de communication
WO2020001572A1 (fr) Appareil et procédé de communication
KR20240036599A (ko) 통신 방법 및 장치
WO2021051420A1 (fr) Procédé et appareil de détermination d'un enregistrement de cache dns
WO2022016948A1 (fr) Procédé et appareil de communication
WO2022012468A1 (fr) Procédé et appareil de configuration de routage
WO2022143697A1 (fr) Procédé et appareil permettant d'éviter une boucle
WO2022206252A1 (fr) Procédé et appareil de traitement d'attaque de réseau, dispositif, support de stockage lisible par ordinateur, et produit-programme d'ordinateur
WO2022017527A1 (fr) Procédé, appareil, et système de transmission de données
WO2022017285A1 (fr) Procédé, appareil et système d'acheminement de paquets
WO2022082724A1 (fr) Procédé et appareil pour une prise en charge de service de multidiffusion dans un réseau sensible au temps
WO2023071318A1 (fr) Procédé et appareil de détection de boucle
US11882033B2 (en) Filtering ethernet device source addresses for loop avoidance
US20230371098A1 (en) Communication method, apparatus, and system
WO2022160211A1 (fr) Procédé et appareil permettant d'éviter une boucle
EP4138508A1 (fr) Procédé, dispositif et système de communication
CN114830606B (zh) 组播通信方法及其装置
US20240080931A1 (en) Communication method and apparatus
WO2023125211A1 (fr) Procédé et appareil de communication
WO2023061207A1 (fr) Procédé de communication, appareil de communication et système de communication
JP7472279B2 (ja) 通信方法、装置、およびシステム
WO2023185062A1 (fr) Procédé de sauvegarde, dispositif de communication et système de communication
WO2023273355A1 (fr) Procédé, appareil et système de communication de service de multidiffusion
WO2023213177A1 (fr) Procédé et appareil de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22885220

Country of ref document: EP

Kind code of ref document: A1