WO2024113867A1 - 一种通信方法及装置 - Google Patents

一种通信方法及装置 Download PDF

Info

Publication number
WO2024113867A1
WO2024113867A1 PCT/CN2023/105747 CN2023105747W WO2024113867A1 WO 2024113867 A1 WO2024113867 A1 WO 2024113867A1 CN 2023105747 W CN2023105747 W CN 2023105747W WO 2024113867 A1 WO2024113867 A1 WO 2024113867A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication device
overlay tunnel
overlay
information
protocol message
Prior art date
Application number
PCT/CN2023/105747
Other languages
English (en)
French (fr)
Inventor
庞东磊
盛成
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024113867A1 publication Critical patent/WO2024113867A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/825Involving tunnels, e.g. MPLS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history
    • H04L41/0853Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2592Translation of Internet protocol [IP] addresses using tunnelling or encapsulation

Definitions

  • the present invention relates to the field of communication technology, and in particular to a communication method and device.
  • a global backbone network can be established in many ways. For example, a global backbone network can be established by building a dedicated line or renting a dedicated line from an operator. However, some regional dedicated line resources for establishing a global backbone network are difficult to obtain or extremely expensive. In addition, the quality of many regional dedicated lines is unstable and there are frequent flash disconnections, which requires the laying of equipment lines, such as Internet dedicated lines. Normally, overlay tunnels can be statically created one by one between the communication devices at both ends of the Internet dedicated line, or point-to-point virtual connections can be statically configured. The information of the virtual connection is published through the interior gateway protocol (IGP) or the border gateway protocol (BGP), and the user forwards the user data.
  • IGP interior gateway protocol
  • BGP border gateway protocol
  • the information of the virtual connection can be the ID and type of the TE tunnel.
  • statically creating overlay tunnels one by one or statically configuring point-to-point virtual connections is cumbersome to configure, with a large workload, and low data plane encapsulation efficiency.
  • the present application proposes a communication method and device, which can solve the technical problems of statically creating overlay tunnels one by one or statically configuring point-to-point virtual connections, publishing virtual connection information through IGP or BGP, cumbersome configuration, large workload, and low data plane encapsulation efficiency.
  • the present application proposes a communication method.
  • the method comprises:
  • the first communication device acquires first upper layer overlay tunnel information, where the first overlay tunnel information is associated with a first overlay tunnel created by the first communication device;
  • the first communication device sends a first protocol message to the second communication device, where the first protocol message includes identification information of the first communication device and first overlay tunnel information.
  • the present application publishes the identification information and overlay tunnel information of a communication device before the communication device through a protocol message without manual configuration, thereby reducing the workload, so that a multi-hop communication device can obtain overlay topology information based on the identification information and overlay tunnel information published by other communication devices, and calculate the overlay route to any communication device based on the overlay topology information.
  • the above-mentioned protocol may be an IGP protocol, other existing protocols, or a user-defined protocol.
  • the first protocol message may be a first IGP message.
  • the first protocol message may also be a first user-defined protocol message.
  • the method further includes:
  • the first communication device automatically runs the protocol process
  • the first communication device generates a logical interface
  • the first communication device dynamically enables the protocol based on the logical interface.
  • the first communication device automatically runs an IGP process; the first communication device generates a logical interface; and the first communication device dynamically enables the IGP based on the logical interface.
  • the present application automatically runs the IGP process, automatically generates a logical interface, and automatically enables the IGP to transmit the identification information of the first communication device and the first overlay tunnel information based on the logical interface.
  • the whole process is completed automatically without manual configuration, which reduces the workload and improves the global backbone network deployment and operation and maintenance efficiency.
  • the present application can also manually configure the IGP process.
  • the first communication device runs a data communication network (DCN) component, calls an IGP interface through a DCN protocol, and runs an IGP process;
  • DCN data communication network
  • the first communication device generates a logical interface
  • the first communication device dynamically enables the IGP based on the logical interface.
  • the address of the logical interface is the same as the Internet Protocol (IP) address of the local transport network port (TNP) of the first overlay tunnel.
  • IP Internet Protocol
  • the first overlay tunnel information includes a local transport network port TNP of the first overlay tunnel.
  • the IP address and the IP address of the peer transmission network port TNP may be an IPv6 address or an IPv4 address.
  • the first overlay tunnel information also includes a first overlay tunnel segment identifier (segment ID, SID) allocated to the first overlay tunnel in the location Locator of the first communication device.
  • SID first overlay tunnel segment identifier
  • the first overlay tunnel SID is End.X SID, which is used to identify the first overlay tunnel.
  • the method further includes:
  • the first communication device obtains the Locator from an Internet service provider (ISP) through a dynamic host configuration protocol (DHCP).
  • ISP Internet service provider
  • DHCP dynamic host configuration protocol
  • the Locator is used to identify the first communication device.
  • the method further includes:
  • the first communication device receives a second protocol message sent by the second communication device, where the second protocol message includes identification information of the second communication device and second overlay tunnel information, where the second overlay tunnel information is associated with a second overlay tunnel created by the second communication device.
  • the first communication device in the present application implements receiving the identification information of the second communication device and the second overlay tunnel information transmitted by the second communication device through the second protocol message.
  • the second protocol message may be a second IGP message. In another possible implementation, the second protocol message may also be a second user-defined protocol message.
  • the second overlay tunnel information includes an IP address of a local transport network port TNP and an IP address of a peer transport network port TNP of the second overlay tunnel.
  • the second overlay tunnel information further includes a second overlay tunnel SID allocated to the second overlay tunnel in a Locator of the second communication device.
  • the method further includes: the first communication device acquiring overlay topology information according to the first overlay tunnel information and the second overlay tunnel information.
  • the method further includes: the first communication device calculating an overlay route to the second communication device according to the overlay topology information.
  • the present application can distribute the calculation of the overlay route from the first communication device to the second communication device, thereby enhancing the reliability of the network.
  • the overlay routing is software-defined wide-area network (SD-WAN) overlay routing.
  • SD-WAN software-defined wide-area network
  • the first overlay tunnel is an SD-WAN overlay tunnel.
  • the method further includes:
  • the first communication device sends a third protocol message to the third communication device, where the third protocol message includes identification information of the first communication device and first overlay tunnel information.
  • the first communication device of the present application realizes the transmission of the identification information and the first overlay tunnel information of the first communication device to any communication device through a protocol message. That is to say, the first communication device can automatically spread its identification information and the first overlay tunnel information to the multi-hop communication device through the protocol message, without manual configuration, reducing the workload, so that the multi-hop communication device can obtain the topology information based on the identification information and the first overlay tunnel information of the first communication device, and calculate the overlay route to any communication device based on the topology information.
  • the third protocol message may be a third IGP message. In another possible implementation, the third protocol message may also be a third custom protocol message.
  • the method further includes:
  • the first communication device receives a fourth protocol message sent by a third communication device, where the fourth protocol message includes identification information of the third communication device and third overlay tunnel information, where the third overlay tunnel information is associated with a third overlay tunnel created by the third communication device.
  • the fourth protocol message may be a fourth IGP message. In another possible implementation, the fourth protocol message may also be a fourth user-defined protocol message.
  • the communication devices of the present application can realize data transmission between each other by running the same protocol process.
  • the communication device in the present application automatically runs the protocol process, automatically generates the logical interface, and automatically enables the protocol based on the logical interface dynamically, such as IGP to transmit its identification information and overlay tunnel information to other communication devices.
  • the whole process is completed automatically without manual configuration, which reduces the workload and improves the global backbone network deployment and operation and maintenance efficiency.
  • the present application can also manually configure the protocol process, such as the IGP process.
  • the present application further proposes a communication method, the method comprising:
  • the second communication device receives a first protocol message sent by the first communication device, wherein the first protocol message includes identification information of the first communication device. information and first overlay tunnel information, wherein the first overlay tunnel information is associated with a first overlay tunnel created by the first communication device;
  • the second communication device obtains the first overlay tunnel information according to the first protocol message.
  • the second communication device in the present application can receive the identification information of the first communication device and the first overlay tunnel information transmitted by the first communication device through a protocol message.
  • the method further includes:
  • the second communication device obtains overlay topology information according to the first overlay tunnel information and the second overlay tunnel information, where the second overlay tunnel information is associated with a second overlay tunnel created by the second communication device.
  • the method further includes: the second communication device calculating an overlay route to the first communication device according to the overlay topology information.
  • the present application can distribute the calculation of the overlay route from the second communication device to the first communication device, thereby enhancing the reliability of the network.
  • the second overlay tunnel is an SD-WAN overlay tunnel.
  • the method further includes:
  • the second communication device sends a second protocol message to the first communication device, where the second protocol message includes identification information of the second communication device and the second overlay tunnel information.
  • the method further includes:
  • the second communication device sends a fifth protocol message to the third communication device, where the fifth protocol message includes identification information of the second communication device and second overlay tunnel information.
  • the second communication device transmits identification information of the second communication device and second overlay tunnel information to the first communication device and the third communication device through a protocol message.
  • the method further includes:
  • the second communication device receives a sixth protocol message sent by the third communication device, where the sixth protocol message includes identification information of the third communication device and third overlay tunnel information, where the third overlay tunnel information is associated with a third overlay tunnel created by the third communication device.
  • the beneficial effects of a communication method provided in the second aspect refer to the beneficial effects of a communication method provided in the first aspect, which will not be repeated here.
  • the present application proposes a communication device, comprising at least one processor, wherein the processor is configured to execute a program stored in a memory, and when the program is executed, the communication device executes:
  • the communication device further includes the above-mentioned memory.
  • the processor and the memory may be integrated together.
  • the memory is disposed outside the communication device.
  • the present application proposes a computer program product comprising instructions, which, when executed on a processor, enables the method in the first aspect and its various possible implementations to be executed by the computer; or enables the method in the second aspect and its various possible implementations to be executed by the computer.
  • the present application proposes a computer-readable storage medium having a computer program stored thereon.
  • the computer program is executed by a processor, the method in the first aspect and its various possible implementations is executed; or the method in the second aspect and its various possible implementations is executed.
  • the present application proposes a communication system, comprising a first communication device for implementing the communication method described in the first aspect and a second communication device for implementing the communication method described in the second aspect.
  • the aforementioned communication system further includes the third communication device described in the communication method described in the first aspect and/or the third communication device described in the communication method described in the second aspect.
  • FIG1 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • FIG2 is a flow chart of a communication method 200 provided in an embodiment of the present application.
  • FIG3 is a flow chart of a communication method 300 provided in an embodiment of the present application.
  • FIG4 is a flow chart of a communication method 400 provided in an embodiment of the present application.
  • FIG5 is another flow chart of a communication method 500 provided in an embodiment of the present application.
  • FIG6 is another flow chart of a communication method 600 provided in an embodiment of the present application.
  • FIG. 7 is another flow chart of a communication method 700 provided in an embodiment of the present application.
  • FIG8 is a schematic diagram of calculating a low-latency TE path from node R1 to node R5 according to an embodiment of the present application;
  • FIG. 9 is a schematic diagram of the structure of a communication device 900 provided in an embodiment of the present application.
  • Segment routing is a protocol designed based on the source routing concept to forward data packets on the network. SR divides the network path into segments and assigns segment identifiers IDs to these segments and forwarding nodes in the network. By arranging the segments and network nodes in order, a segment list of a forwarding path is obtained. SR encodes the segment sequence representing the forwarding path in the header of the data packet and transmits it with the data packet. After receiving the data packet, the receiving end parses the segment sequence. If the top segment identifier of the segment sequence is the current node, the identifier is popped up and the next step is processed; if it is not the current node, the conventional routing forwarding method is used to forward the data packet to the next node.
  • SR Segment routing
  • SRv6 is a method designed based on the source routing concept to forward IPv6 data packets on the network. Based on the IPv6 forwarding plane, SR inserts a routing extension header (segment routing header, SRH) into the IPv6 message, pushes an explicit IPv6 address stack into the SRH, and continuously updates the destination address and offset address stack through the intermediate nodes to complete hop-by-hop forwarding.
  • SRv6 technology uses the existing IPv6 forwarding technology to achieve network programmability through flexible IPv6 extension headers. SRv6 defines some IPv6 addresses as instantiated SIDs (Segment IDs).
  • Each SID has its own explicit role and function. Through different SID operations, simplified virtual private networks (VPNs) and flexible path planning are achieved.
  • the SRv6 message carries an SRH, which includes multiple Segment Lists. Usually, each Segment List includes a Locator, a Function, and an Argument. Among them, the Locator is used to identify the routing information to reach the node, and the Function and Argument represent the network functions and supporting parameters that need to be executed at the node.
  • the Locator, Function, and Argument parts do not have a fixed length, but the total length of these three parts is less than 128 bits.
  • Locator which identifies the locator of the SR node. Each node has at least one globally unique Locator value, which serves as the shared prefix of the local SID. Other nodes access the local node SID through the Locator route.
  • the Locator value can be a numeric value or an IPv6 address.
  • SD-WAN Software Defined WAN
  • SDN software defined networking
  • SD-WAN achieves the independence of SD-WAN and underlay transmission network by establishing an end-to-end overlay tunnel between the Edge sites of two sites.
  • the underlay network link can be a multiprotocol label switching (MPLS) dedicated line, or it can be a public Internet or a long-term evolution (LTE) network of general mobile communication technology.
  • MPLS multiprotocol label switching
  • LTE long-term evolution
  • SD-WAN usually identifies enterprise traffic through application identification technologies such as deep packet inspection (DPI), and then performs classification statistics, quality detection and path control based on the application dimension. For example, high-value application traffic is preferentially designated to be transmitted on MPLS and other paths with high line quality but high cost, while low-value application traffic is designated to be transmitted on low-line quality paths such as the Internet. But it is also transmitted on a low-cost path.
  • DPI deep packet inspection
  • Centralized network monitoring and visualization enable centralized management, improving the end-to-end management and operation efficiency of the WAN.
  • Underlay network and Overlay network can be a traditional IT infrastructure network, which is composed of switches, routers and other devices. It is driven by Ethernet protocol, routing protocol and VLAN protocol. It is also the underlying network of Overlay network, providing data communication services for Overlay network.
  • Overlay network is a virtual network built on top of Underlay network. Overlay network cannot appear independently. The network that Overlay relies on is Underlay network.
  • the forwarding of SD-WAN services can be controlled by the protocol of the RR control component of the management plane.
  • the SD-WAN forwarding device builds an overlay virtual network on different underlay physical networks through overlay IP tunnel technology.
  • the source/destination IP of the overlay tunnel in the overlay virtual network is the WAN interface IP of the edge Edge device.
  • the intermediate transmission network only needs to publish the route of the link directly connected to the Edge device in this network, and the tunnel message can be routed and forwarded in the underlay transmission network until it reaches the Edge device at the destination.
  • the embodiment of the present application proposes a communication method.
  • the communication method is applicable to the application scenario shown in Figure 1.
  • nodes R1, R2, R3, R4, and R5 form a global backbone network as point of presence (POP) network elements, and establish BGP SD-WAN neighbors with route reflectors (RR) respectively.
  • An overlay tunnel is created between nodes R3 and R4, and other nodes are connected by dedicated lines.
  • Figure 2 shows a flow diagram of a communication method 200 proposed in an embodiment of the present application. The flow diagram includes: S201-S204.
  • the aforementioned communication method is implemented by the following steps:
  • communication device A obtains overlay tunnel information A.
  • the overlay tunnel information A is associated with the overlay tunnel A created by the communication device A.
  • the communication device A may be the node R3 in the application scenario shown in FIG1. Accordingly, the overlay tunnel A may be an overlay tunnel created by the node R3 to the node R4.
  • the overlay tunnel A is an SD-WAN overlay tunnel.
  • the overlay tunnel A is a traffic engineering (TE) tunnel.
  • the overlay tunnel information A includes the IP address of the local transmission network port TNP of the overlay tunnel A and the IP address of the peer transmission network port TNP. Exemplarily, the IP address may be an IPv6 address or an IPv4 address.
  • the overlay tunnel information A may also include the overlay tunnel A segment identifier SID allocated to the overlay tunnel A in the location Locator of the communication device A.
  • the communication device A is connected to the internet, and the Locator of the communication device A may be obtained from the ISP via DHCP.
  • the node R3 is connected to the internet, and it may obtain its Locator from the ISP via DHCP.
  • the Locator of the communication device A may also be obtained through global planning allocation.
  • the overlay tunnel A segment identifier SID may be End.X SID.
  • nodes R1, R2, R3, and R4 as shown in FIG. 1 have created overlay tunnels pointing to the next node, respectively.
  • Nodes R1, R2, R3, and R4 respectively assign the End.X SIDs of the overlay tunnels they create in their Locators as IP1_SID, IP2_SID, IP3_SID, and IP4_SID.
  • Node R5 assigns the End.DT SIDs of one or more VPNs it accesses in its Locator.
  • node R5 accesses a VPN
  • the assigned End.DT SID is R5_VPN_SID.
  • the End.X SID can be mapped to the corresponding transport network port TNP.
  • IP1_SID, IP2_SID, IP3_SID, and IP4_SID are respectively mapped to port IP1, port IP2-3, port IPx, and port IP4-1.
  • the process of communication device A creating overlay tunnel A is shown in the flowchart diagram shown in Fig. 3.
  • the flowchart diagram shown in Fig. 3 see the following content.
  • the protocol may be an IGP or a custom protocol.
  • Communication device A notifies the local protocol process, such as an IGP process, of the overlay tunnel information A associated with the overlay tunnel A it created and the identification information of communication device A.
  • IGP is published to the outside world through a link state packet (LSP) or a link state advertisement (LSA). That is to say, communication device A transmits overlay tunnel information A and identification information of communication device A to communication device B based on a protocol such as IGP.
  • LSP link state packet
  • LSA link state advertisement
  • communication device A transmits overlay tunnel information A and identification information of communication device A to communication device B based on a protocol such as IGP.
  • communication device A enables the ISIS protocol through a logical interface to establish a session with the logical interface of communication device B, and publishes the overlay tunnel information A and identification information of communication device A through ISIS.
  • communication device A sends protocol message A to communication device B.
  • protocol message A may be IGP message A.
  • the protocol message A includes identification information of communication device A and overlay tunnel information A.
  • the identification information of communication device A may be a unique identification of communication device A.
  • communication device A may also receive protocol message B sent by communication device B.
  • the protocol message B may be an IGP message B.
  • the protocol message B includes identification information of the communication device B and overlay tunnel information B.
  • the overlay tunnel information B is associated with the overlay tunnel B created by the communication device B.
  • the overlay tunnel B is an SD-WAN overlay tunnel.
  • the identification information of the communication device B may be a unique identifier of the communication device B.
  • the overlay tunnel information B includes an address pair of a local transmission network port TNP and a peer transmission network port TNP of the overlay tunnel B.
  • the overlay tunnel information B may also include an overlay tunnel B segment identifier SID allocated to the overlay tunnel B in the location Locator of the communication device B.
  • the Locator of the communication device B may be obtained from the ISP via DHCP, or may be obtained through global planning allocation.
  • the overlay tunnel B segment identifier SID may be an End.X SID.
  • the communication device A can also send a protocol message C to the communication device C.
  • the protocol message C can be an IGP message C.
  • the communication device C can be the node R2 in the application scenario shown in FIG1.
  • the communication device A can also receive a protocol message D sent by the communication device C.
  • the protocol message D can be an IGP message D.
  • the protocol message D includes identification information of the communication device C and overlay tunnel information C.
  • the overlay tunnel information C is associated with the overlay tunnel C created by the communication device C.
  • the overlay tunnel C is an SD-WAN overlay tunnel.
  • the identification information of the communication device C can be a unique identifier of the communication device C.
  • the overlay tunnel information C includes the IP address of the local transmission network port TNP of the overlay tunnel C and the IP address of the peer transmission network port TNP. It should be noted that the overlay tunnel information C can also include the overlay tunnel C segment identifier SID allocated to the overlay tunnel C in the location Locator of the communication device C. Among them, the Locator of the communication device C can be obtained from the ISP through DHCP, and can also be obtained through global planning allocation.
  • the overlay tunnel C segment identifier SID can be End.X SID.
  • communication device A can send protocol messages to other communication devices, and can also receive protocol messages sent by other communication devices, such as receiving protocol message B sent by communication device B, and receiving protocol message D sent by communication device C.
  • communication device A realizes the transmission of identification information and the first overlay tunnel information of communication device A to any communication device through protocol messages.
  • communication device A can automatically spread its identification information and the first overlay tunnel information to multi-hop communication devices through protocol messages, without manual configuration, reducing the workload, so that the multi-hop communication device can obtain topology information based on the identification information and the first overlay tunnel information of communication device A, and calculate the overlay route to any communication device based on the topology information.
  • each node in the application scenario shown in Figure 1 can send protocol messages to other nodes.
  • communication device A, communication device B, and communication device C can be complete equipment such as routers and switches, or can be network cards, line cards, chips, etc.
  • communication device A, communication device B, and communication device C are not specifically limited, and the above is only an exemplary description.
  • any communication device can obtain the topology information of the entire network.
  • communication device A can calculate the overlay route to communication device B based on the overlay topology information.
  • the overlay route can be an SD-WAN overlay route. It is understandable that communication device A can calculate its route to the Locator of any destination communication device according to the shortest path first (SPF) algorithm. Therefore, the embodiment of the present application can achieve a communication device to be reachable to any communication device in the entire network. As shown in Figure 1, the route to the Locator of node R5 can be calculated on node R1, including the Locator of node R5, the outgoing interface is IP1, and the next hop is the IPv6 address of the IP2-1 interface of node R2.
  • Communication device B receives protocol message A sent by communication device A.
  • communication device B receives protocol message A sent by communication device A.
  • communication device B may also send protocol message B to communication device A.
  • the communication device B may also send a protocol message E to the communication device C. Accordingly, the communication device B may receive the protocol message F sent by the communication device C.
  • communication device B can send protocol messages to other communication devices, and can also receive protocol messages from other communication devices, such as receiving protocol message A sent by communication device A, and receiving protocol message F sent by communication device C.
  • Communication device B obtains overlay tunnel information A according to protocol message A.
  • the communication device B obtains overlay tunnel information A according to the protocol message A.
  • the communication device B may obtain the overlay topology information according to the overlay tunnel information A in the protocol message A and the overlay tunnel information B in the protocol message B.
  • communication device B may calculate an overlay route to communication device A according to overlay topology information.
  • the embodiment of the present application provides a communication method 300, which implements the creation of the overlay tunnel A through the steps in the flowchart shown in FIG3.
  • the flowchart shown in FIG3 includes S301-S302, and the specific implementation process is as follows:
  • communication device A obtains tunnel creation information A.
  • communication device A obtains tunnel creation information A.
  • the tunnel creation information A includes information and topology intent of the local transport network port TNP published by the opposite end communication device of the overlay tunnel A to be created.
  • the information of the local transport network port TNP includes the IP address, operator identifier and routing domain of the local transport network port TNP.
  • the backbone POP network deploys RR.
  • the RR is responsible for SD-WAN route reflection between the communication device A accessing the backbone POP network and other communication devices. If the communication device A publishes the information and topology intent of its local transmission network port TNP, the information and topology intent of the local transmission network port TNP can reach other communication devices after being reflected by RR. Correspondingly, the information and topology intent of the local transmission network port TNP published by other communication devices can also reach the communication device A after being reflected by RR. In other words, any communication device can obtain the information and topology intent of its local transmission network port TNP published by other communication devices.
  • topology intents through the controller, which are divided into the following types: point-to-point (P2P) Link, point-to-multipoint (P2MP) Link, and Full Mesh Link.
  • the administrator can associate the corresponding topology intent with the transmission network port TNP of the communication device.
  • Communication device A deploys BGP SD-WAN neighbors with RR and publishes the above topology intent to other communication devices.
  • Topology intent includes link type and link ID.
  • the link types are P2P, P2MP, and Full mesh
  • the corresponding link IDs are Link ID, Hub Site ID, and Link ID.
  • node R3 creates an overlay tunnel pointing to node R4.
  • Each node deploys a BGPSD-WAN neighbor with the RR, and publishes its own topological intent and information about the local transport network port TNP to other nodes. Any node can obtain the information and topological intent of its local transport network port TNP published by other nodes through RR.
  • the local transport network port TNP of node R3, i.e. IPx has a matching link adjacency topology definition relationship with the local transport network port TNP of node R4, i.e. IPy, that is, the link types of the two nodes are both P2P, and the link IDs match. Therefore, an overlay tunnel can be established between node R3 and node R4.
  • the communication device A creates an overlay tunnel A according to the information and topology intent of its local transmission network port TNP and the tunnel creation information A.
  • the communication device A is physically connected to the opposite communication device of the overlay tunnel A to be created in order to create the overlay tunnel A to the opposite communication device.
  • the communication device A first determines whether the IP address of its local transmission network port TNP is routeable to the IP address of the local transmission network port TNP of the opposite communication device. If so, it creates an overlay tunnel A between it and the opposite communication device according to its topology intent and the topology intent published by the opposite communication device.
  • the topology intent may include at least one link ID and its corresponding link type.
  • the communication device A can create an overlay tunnel A to the opposite communication device. It can be understood that the link ID can be used as the ID of the overlay tunnel A.
  • node R3 after node R3 obtains the information and topology intent of its local transmission network port TNP published by node R4 through RR, it first determines whether its local transmission network port TNP, that is, the IP address of IPx to the local transmission network port TNP of node R4, that is, the IP address of IPy is reachable by route. If so, it creates an overlay tunnel between it and node R4 based on its topology intent and the topology intent published by node R4.
  • the embodiment of the present application provides a communication method 400, whose flowchart includes S401-S403, and its specific implementation process is as follows:
  • the communication device A automatically runs the IGP process.
  • the communication device A automatically runs the IGP process.
  • the communication device A uses a reserved IGP process number. It is understandable that if the communication devices want to forward messages, they need to have the same IGP process number.
  • communication device A automatically runs an intermediate system to intermediate system (ISIS) process, using a reserved ISIS process number, such as 65534.
  • ISIS intermediate system to intermediate system
  • the node R3 and the node R4 shown in FIG. 1 need to both run IGP and have the same IGP process number in order to forward messages to each other.
  • the communication device A generates a logical interface.
  • the communication device A generates a logical interface.
  • an application is made on communication device A for overlay tunnel A to create a logical interface, and the name of the logical interface is named by SD-WAN.
  • SD-WAN checks whether the IP address of the local network transmission port TNP of the opposite communication device of overlay tunnel A is reachable by route. If it is reachable, the state of the logical interface is set to UP, and the information of the logical interface, such as the name, address, and state UP of the logical interface, is used to apply to the interface file manager (IFM) for the creation of the logical interface.
  • IAM interface file manager
  • the aforementioned logical interface may be a generic routing encapsulation (GRE) type interface.
  • the address of the logical interface may borrow the IP address of the local transmission network port TNP of the communication device A.
  • an application is made on node R3 for overlay tunnel A to create a GRE type logical interface, and the name of the logical interface is named GRE1 by SD-WAN.
  • the address of the GRE1 logical interface borrows the local network transmission port TNP of node R3, that is, the IP address of IPx.
  • SD-WAN checks whether the address of the local network transmission port TNP, that is, IPy, of the peer node R4 of overlay tunnel A is reachable by route.
  • the state of the GRE1 logical interface is set to UP, and the information of the GRE1 logical interface, such as the name of the logical interface GRE1, the address of the logical interface, the state of the logical interface UP, etc., is used to apply to IFM for the creation of the GRE1 logical interface.
  • the communication device A dynamically enables the IGP based on the logical interface.
  • the communication device A dynamically enables IGP based on a logical interface.
  • the communication device A enables an open shortest path first (OSPF) protocol or an ISIS protocol based on a logical interface.
  • OSPF open shortest path first
  • ISIS ISIS protocol
  • the node R3 enables IGP based on the logical interface GRE1.
  • the technical solution provided by the embodiment of the present application can automatically run IGP, automatically generate a corresponding logical interface based on the overlay tunnel, and automatically enable IGP based on the logical interface.
  • the entire process is automated, which improves the global backbone network deployment and operation and maintenance efficiency.
  • the embodiment of the present application also provides a communication method 500.
  • the method 500 can be used in the application scenario shown in FIG1 to specifically implement the above method 100.
  • the first communication device can be, for example, the node R3 shown in FIG1
  • the second communication device can be, for example, the node R4 shown in FIG1.
  • the flow chart of the communication method 500 is shown in FIG5.
  • the flow chart includes: S501-S502, and its specific implementation process is as follows:
  • S501 A first communication device obtains first overlay tunnel information.
  • the first communication device may be communication device A in method 100
  • the first overlay tunnel information may be overlay tunnel information A in method 100.
  • the specific implementation process of S501 is similar to S201 and will not be repeated here.
  • the first communication device sends a first protocol message to the second communication device.
  • the second communication device may be the communication device B in the method 200
  • the first protocol message may be the protocol message A in the method 200.
  • the specific implementation process of S502 is similar to that of S202, and will not be described in detail herein.
  • the first protocol message is a first IGP message, and before executing S502, the following steps need to be performed:
  • the first communication device automatically runs the IGP process, and its specific implementation process is similar to S401 and will not be repeated here.
  • the first communication device generates a logical interface, and its specific implementation process is similar to S402 and will not be repeated here.
  • the first communication device dynamically enables the IGP based on the logical interface.
  • the specific implementation process is similar to S403 and will not be repeated here.
  • the first communication device receives a second protocol message sent by the second communication device.
  • the second protocol message may be the protocol message B in method 200.
  • the second protocol message includes identification information of the second communication device and second overlay tunnel information, and the second overlay tunnel information is associated with a second overlay tunnel created by the second communication device.
  • the second overlay tunnel information may be the overlay tunnel information B in method 200, and the second overlay tunnel may be the overlay tunnel B in method 200.
  • the first communication device sends a third protocol message to the third communication device.
  • the third protocol message may be the protocol message C in the method 200.
  • the third communication device may be the communication device C in the method 200.
  • the first communication device receives a fourth protocol message sent by the third communication device.
  • the fourth protocol message may be the protocol message D in method 200.
  • the fourth protocol message includes identification information of the third communication device and third overlay tunnel information, and the third overlay tunnel information is associated with a third overlay tunnel created by the third communication device.
  • the third overlay tunnel information may be the overlay tunnel information C in method 200, and the third overlay tunnel may be the overlay tunnel C in method 200.
  • Method 600 can be used in the application scenario shown in Figure 1 to specifically implement the above method 100.
  • the first communication device can be, for example, the node R3 shown in Figure 1
  • the second communication device can be, for example, the node R4 shown in Figure 1.
  • the flow chart of the communication method 600 is shown in Figure 6.
  • the flow chart includes: S601-S602, and its specific implementation process is as follows:
  • a second communication device receives a first protocol message sent by a first communication device.
  • the second communication device obtains first overlay tunnel information according to the first protocol message.
  • the second communication device sends a second protocol message to the first communication device.
  • the second communication device sends a fifth protocol message to the third communication device.
  • the fifth protocol message may be the protocol message E in the method 200.
  • the second communication device receives a sixth protocol message sent by the third communication device.
  • the sixth protocol message may be the protocol message F in the method 200.
  • the embodiment of the present application further provides a communication method 700.
  • the method 700 can be used in the application scenario shown in FIG1.
  • the first communication device can be, for example, the node R3 shown in FIG1.
  • the flow chart of the method 700 is shown in FIG7.
  • the flow chart includes: S701, and its specific implementation process is as follows:
  • the first communication device sends a message.
  • the first communication device sends a message.
  • the message includes the IP address of the local transmission network port TNP of the first overlay tunnel created by the first communication device and the IP address of the peer transmission network port TNP, a general routing encapsulation GRE header, an IP header, a user host destination IP address and user data, wherein the GRE header is used to indicate the type of the encapsulated IP header.
  • the IP header may be an IPv6 header or an IPv4 header.
  • the first communication device forwards the user data based on the IP address of the local transmission network port TNP of the first overlay tunnel and the IP address of the peer transmission network port TNP.
  • Node R3 According to the destination IP being IPy, the outer overlay tunnel IP header, GRE header, IP header, user host destination IP address and user data are encapsulated.
  • the outer overlay tunnel IP header includes the IP address of the local transmission network port TNP of the overlay tunnel and the IP address of the peer transmission network port TNP.
  • SA IPv6 address of port IPx
  • DA IPv6 address of port IPy).
  • the GRE header indicates the type of the encapsulated IP header, such as encapsulating an IPv6 header or an IPv4 header.
  • SID List IP2_SID, IP3_SID, IP4_SID, R5_VPN_SID).
  • Node R5 According to the SRH SID List, the last SID is offset to the VPN SID to which the node R5 accesses, namely End.DT SID (R5_VPN_SID), to find the corresponding private network forwarding table, and the corresponding private network forwarding table route is found according to the address of the inner private network IP header to forward the service message.
  • the SID List is decapsulated. It can be seen that compared to statically creating overlay tunnels one by one or statically configuring point-to-point virtual connections, the embodiment of the present application only needs to perform SRv6 path orchestration SID List encapsulation on node R1 and decapsulate the SID List on node R5, which improves the data plane encapsulation efficiency.
  • the present application also provides a communication device 900 for implementing the functions of the first communication device and/or the second communication device in the above method.
  • the communication device 900 may be a chip system. In the present application, the chip system may be composed of a chip or may include a plurality of chips.
  • the communication device 900 includes at least one processor 910, which is used to implement the functions of the first communication device and/or the second communication device in the method provided in the embodiment of the present application.
  • the communication device 900 may also include a communication interface 920.
  • the communication interface 920 may be a transceiver, a circuit, a bus, a module, or other types of communication interfaces, which are used to communicate with other devices through a transmission medium.
  • the processor 910 is used to obtain first upper-layer overlay tunnel information, where the first overlay tunnel information is associated with a first overlay tunnel created by the first communication device; the communication interface 920 is used to send a first protocol message to the second communication device, where the first protocol message includes identification information of the first communication device and the first overlay tunnel information.
  • the communication interface 920 is used to receive a first protocol message sent by the first communication device, the first protocol message includes identification information of the first communication device and first upper layer overlay tunnel information, and the first overlay tunnel information is associated with a first overlay tunnel created by the first communication device; the processor 910 is used to obtain the first overlay tunnel information according to the first protocol message.
  • the communication interface 920 is also used to perform other receiving or sending steps or operations involved in the method of the first communication device and/or the second communication device in the above method embodiment.
  • the processor 910 can also be used to perform other corresponding steps or operations in addition to sending and receiving in the above method embodiment, which will not be repeated here.
  • the communication device 900 may also include at least one memory 930 for storing program instructions and/or data.
  • the memory 930 is coupled to the processor 910.
  • the coupling in the embodiment of the present application is an indirect coupling or communication connection between devices, units or modules, which may be electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • the processor 920 may operate in conjunction with the memory 930.
  • the processor 910 may execute program instructions stored in the memory 930.
  • at least one of the at least one memory may be integrated with the processor.
  • the memory 930 is located outside the communication device 900.
  • connection medium between the communication interface 920, the processor 910 and the memory 930 is not limited in the embodiment of the present application.
  • the memory 930, the processor 910 and the communication interface 920 are connected through a bus 940.
  • the bus is represented by a bold line in FIG. 9 .
  • the connection mode between other components is only for schematic illustration and is not limited thereto.
  • the bus can be divided into an address bus, a data bus, a control bus, etc. For ease of representation, only one bold line is used in FIG. 9 , but it does not mean that there is only one bus or one type of bus.
  • the processor 910 may be one or more central processing units (CPUs).
  • CPUs central processing units
  • the processor 910 may be a single-core CPU or a multi-core CPU.
  • the processor 910 may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the methods, steps, and logic block diagrams disclosed in the embodiments of the present application.
  • a general-purpose processor may be a microprocessor or any conventional processor, etc.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed by a hardware processor, or may be executed by a combination of hardware and software modules in the processor.
  • the memory 930 may include, but is not limited to, non-volatile memories such as a hard disk drive (HDD) or a solid-state drive (SSD), random access memory (RAM), erasable programmable read-only memory (EPROM), read-only memory (ROM) or portable read-only memory (CD-ROM), etc.
  • the memory is any other medium that can be used to carry or store the desired program code in the form of instructions or data structures and can be accessed by a computer, but is not limited thereto.
  • the memory in the embodiment of the present application can also be a circuit or any other device that can realize a storage function, used to store program instructions and/or data.
  • the embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored.
  • a computer program is stored.
  • the computer program is executed by a processor, some or all of the corresponding steps as shown in Figures 2-7 are executed.
  • the embodiment of the present application also provides a computer program product including instructions, when the computer program product runs on a computer, the computer executes part or all of the steps corresponding to Figures 2-7.
  • the embodiment of the present application also provides a communication system, including the first communication device and the second communication device in method 200.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请提供了一种通信方法,由第一通信装置执行。该通信方法包括:获取第一overlay隧道信息,所述第一overlay隧道信息与第一通信装置创建的第一overlay隧道关联;向第二通信装置发送第一协议报文,所述第一协议报文包括第一通信装置的标识信息和第一overlay隧道信息。本申请第一通信装置实现了通过协议报文向第二通信装置传递第一通信装置的标识信息和第一overlay隧道信息。

Description

一种通信方法及装置
本申请要求于2022年11月30日提交中国国家知识产权局、申请号为202211545216.7、申请名称为“一种通信方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信技术领域,尤其涉及一种通信方法及装置。
背景技术
目前,可以通过多种方式组建全球骨干网。例如,自建专线或者租用运营商专线组建全球骨干网。然而,组建全球骨干网的一些区域专线资源难以获得,或者成本极其高昂。此外,很多区域专线质量不稳定,存在频繁闪断现象,需要铺设备份线路,如互联网internet专线。通常情况下,可以在internet专线两端的通信装置之间逐条静态创建overlay隧道或者静态配置点到点虚连接,通过内部网关协议(interior gateway protocol,IGP)或边界网关协议(border gateway protocol,BGP)发布虚连接的信息,用户转发用户数据。若前述虚连接为点到点流量工程(traffic engineering,TE)隧道,则虚连接的信息可以为TE隧道的ID和类型。然而逐条静态创建overlay隧道或者静态配置点到点虚连接,配置繁琐,工作量大,且数据面封装效率低。
发明内容
本申请提出一种通信方法及装置,能够解决逐条静态创建overlay隧道或者静态配置点到点虚连接,通过IGP或BGP发布虚连接的信息,配置繁琐,工作量大,且数据面封装效率低的技术问题。
第一方面,本申请提出一种通信方法。该方法包括:
第一通信装置获取第一上层overlay隧道信息,所述第一overlay隧道信息与第一通信装置创建的第一overlay隧道关联;
第一通信装置向第二通信装置发送第一协议报文,所述第一协议报文包括第一通信装置的标识信息和第一overlay隧道信息。
本申请通过协议报文在通信装置之前发布通信装置的标识信息和overlay隧道信息无需人工配置,减小了工作量,从而使得多跳通信装置可以基于其它通信装置发布的标识信息和overlay隧道信息,获取overlay拓扑信息,并基于overlay拓扑信息计算到任意一个通信装置的overlay路由。
在一种可能的实现中,上述协议可以为IGP协议,可以是其它现有协议,也可以为自定义协议。也即是说,所述第一协议报文可以为第一IGP报文。在另一种可能的实现中,第一协议报文还可以为第一自定义协议报文。
在一种可能的实现中,所述方法还包括:
第一通信装置自动运行协议进程;
第一通信装置生成逻辑接口;
第一通信装置基于逻辑接口动态使能所述协议。
示例性的,第一通信装置自动运行IGP进程;第一通信装置生成逻辑接口;第一通信装置基于逻辑接口动态使能所述IGP。
本申请在一种可能的实现中自动运行IGP进程、自动生成逻辑接口、自动基于逻辑接口动态使能IGP传递第一通信装置的标识信息和第一overlay隧道信息,全流程自动化完成,无需人工配置,减少了工作量,提高了全球骨干网组网部署和运维效率。本申请在另一种可能的实现中也可以通过人工配置IGP进程。
在另一种可能的实现中,第一通信装置运行数据通信网络(data communication network,DCN)组件,通过DCN协议调用IGP接口,运行IGP进程;
第一通信装置生成逻辑接口;
第一通信装置基于逻辑接口动态使能IGP。
在一种可能的实现中,所述逻辑接口的地址与所述第一overlay隧道的本地传输网络端口(transport network port,TNP)的互联网协议(internet protocol,IP)地址相同。
在一种可能的实现中,所述第一overlay隧道信息包括第一overlay隧道的本地传输网络端口TNP的 IP地址和对端传输网络端口TNP的IP地址。示例性的,IP地址可以为IPv6地址或IPv4地址。
在一种可能的实现中,所述第一overlay隧道信息还包括在第一通信装置的位置Locator中为第一overlay隧道分配的第一overlay隧道段标识(segment ID,SID)。
在一种可能的实现中,所述第一overlay隧道SID为End.X SID,用于标识第一overlay隧道。
在一种可能的实现中,所述方法还包括:
第一通信装置通过动态主机配置协议(dynamic host configuration protocol,DHCP)从互联网服务提供商(internet service provider,ISP)获取所述Locator。所述Locator用于标识第一通信装置。
在一种可能的实现中,所述方法还包括:
第一通信装置接收第二通信装置发送的第二协议报文,所述第二协议报文包括第二通信装置的标识信息和第二overlay隧道信息,所述第二overlay隧道信息与第二通信装置创建的第二overlay隧道关联。
本申请中的第一通信装置实现了接收第二通信装置通过第二协议报文传递的第二通信装置的标识信息和第二overlay隧道信息。
在一种可能的实现中,所述第二协议报文可以为第二IGP报文。在另一种可能的实现中,第二协议报文还可以为第二自定义协议报文。
在一种可能的实现中,所述第二overlay隧道信息包括第二overlay隧道的本地传输网络端口TNP的IP地址和对端传输网络端口TNP的IP地址。
在一种可能的实现中,所述第二overlay隧道信息还包括在第二通信装置的Locator中为第二overlay隧道分配的第二overlay隧道SID。
在一种可能的实现中,所述方法还包括:第一通信装置根据第一overlay隧道信息和第二overlay隧道信息,获取overlay拓扑信息。
在一种可能的实现中,所述方法还包括:第一通信装置根据overlay拓扑信息,计算到达第二通信装置的overlay路由。
本申请可以分布式计算第一通信装置到第二通信装置的overlay路由,增强了网络的可靠性。
在一种可能的实现中,所述overlay路由为软件定义广域网(software-defined wide-area network,SD-WAN)overlay路由。
在一种可能的实现中,所述第一overlay隧道为SD-WAN overlay隧道。
在一种可能的实现中,所述方法还包括:
第一通信装置向第三通信装置发送第三协议报文,所述第三协议报文包括第一通信装置的标识信息和第一overlay隧道信息。
本申请第一通信装置实现了通过协议报文向任意通信装置传递第一通信装置的标识信息和第一overlay隧道信息。也即是说,第一通信装置可以通过协议报文向多跳通信装置自动扩散其标识信息和第一overlay隧道信息,无需人工配置,减小了工作量,从而使得多跳通信装置可以基于第一通信装置的标识信息和第一overlay隧道信息,获取拓扑信息,并基于拓扑信息计算到任意一个通信装置的overlay路由。
在一种可能的实现中,所述第三协议报文可以为第三IGP报文。在另一种可能的实现中,第三协议报文还可以为第三自定义协议报文。
在一种可能的实现中,所述方法还包括:
第一通信装置接收第三通信装置发送的第四协议报文,所述第四协议报文包括第三通信装置的标识信息和第三overlay隧道信息,所述第三overlay隧道信息与所述第三通信装置创建的第三overlay隧道关联。
在一种可能的实现中,所述第四协议报文可以为第四IGP报文。在另一种可能的实现中,第四协议报文还可以为第四自定义协议报文。
本申请的通信装置可以通过运行相同的协议进程,实现相互之间传输数据。在一种可能的实现中,本申请中的通信装置自动运行协议进程、自动生成逻辑接口、自动基于逻辑接口动态使能协议,如IGP向其它通信装置传递其标识信息和overlay隧道信息,全流程自动化完成,无需人工配置,减少了工作量,提高了全球骨干网组网部署和运维效率。在另一种可能的实现中,本申请也可以通过人工配置协议进程,如IGP进程。
第二方面,本申请还提出一种通信方法,该方法包括:
第二通信装置接收第一通信装置发送的第一协议报文,所述第一协议报文包括第一通信装置的标识信 息和第一overlay隧道信息,所述第一overlay隧道信息与所述第一通信装置创建的第一overlay隧道关联;
第二通信装置根据第一协议报文,获取第一overlay隧道信息。
本申请中的第二通信装置可以接收第一通信装置通过协议报文传递的第一通信装置的标识信息和第一overlay隧道信息。
在一种可能的实现中,所述方法还包括:
第二通信装置根据第一overlay隧道信息和第二overlay隧道信息,获取overlay拓扑信息,所述第二overlay隧道信息与第二通信装置创建的第二overlay隧道关联。
在一种可能的实现中,所述方法还包括:第二通信装置根据overlay拓扑信息,计算到达第一通信装置的overlay路由。
本申请可以分布式计算第二通信装置到第一通信装置的overlay路由,增强了网络的可靠性。
在一种可能的实现中,所述第二overlay隧道为SD-WAN overlay隧道。
在一种可能的实现中,所述方法还包括:
第二通信装置向第一通信装置发送第二协议报文,所述第二协议报文包括第二通信装置的标识信息和所述第二overlay隧道信息。
在一种可能的实现中,所述方法还包括:
第二通信装置向第三通信装置发送第五协议报文,所述第五协议报文包括第二通信装置的标识信息和第二overlay隧道信息。
本申请第二通信装置通过协议报文向第一通信装置和第三通信装置传递第二通信装置的标识信息和第二overlay隧道信息。
在一种可能的实现中,所述方法还包括:
第二通信装置接收第三通信装置发送的第六协议报文,所述第六协议报文包括第三通信装置的标识信息和第三overlay隧道信息,所述第三overlay隧道信息与第三通信装置创建的第三overlay隧道关联。
第二方面提供的一种通信方法的有益效果参见第一方面提供的一种通信方法的有益效果,在此不再赘述。
第三方面,本申请提出一种通信装置,包括至少一个处理器,所述处理器用于执行存储器中存储的程序,当所述程序被执行时,使得所述通信装置执行:
如第一方面及其各种可能的实现中的方法;或
如第二方面及各种可能的实现中的方法。
在一种可能的实现中,该通信装置还包括上述存储器。可选的,处理器和存储器可以集成在一起。
在另一种可能的实现中,上述存储器设置在该通信装置之外。
第四方面,本申请提出一种包含指令的计算机程序产品,当该计算机程序产品在处理器上运行时,使得如第一方面及其各种可能的实现中的方法被该计算机执行;或者如第二方面及其各种可能的实现中的方法被该计算机执行。
第五方面,本申请提出一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时,如第一方面及其各种可能的实现中的方法被执行;或者如第二方面及其各种可能的实现中的方法被执行。
第六方面,本申请提出一种通信系统,包括用于实现第一方面所述的通信方法的第一通信装置和用于实现第二方面所述的通信方法的第二通信装置。
在一种可能的实现中,前述通信系统还包括第一方面所述的通信方法中所述的第三通信装置和/或第二方面所述的通信方法中所述的第三通信装置。
附图说明
图1为本申请实施例提供的一种应用场景的示意图;
图2为本申请实施例提供的一种通信方法200的流程示意图;
图3为本申请实施例提供的一种通信方法300的流程示意图;
图4为本申请实施例提供的一种通信方法400的流程示意图;
图5为本申请实施例提供的一种通信方法500的另一流程示意图;
图6为本申请实施例提供的一种通信方法600的另一流程示意图;
图7为本申请实施例提供的一种通信方法700的另一流程示意图;
图8为本申请实施例提供的以在节点R1上计算到节点R5上的低时延TE路径的示意图;
图9为本申请实施例提供的一种通信装置900的结构示意图。
具体实施方式
为了使本申请实施例的目的、技术方案和优点更加清楚,下面结合附图对本申请实施例具体实施方式做详细描述。
需要说明的是,本申请中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。本申请实施例的说明书和权利要求书中的术语“第一”和“第二”等是用于区别不同的对象,而不是用于描述对象的特定顺序。例如,第一通信装置和第二通信装置等是用于区别不同的通信装置,而不是用于描述目标对象的特定顺序。在本申请实施例中,“示例性的”、“举例来说”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”、“举例来说”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。在本申请实施例的描述中,除非另有说明,“多个”的含义是指两个或两个以上。
在介绍本方案之前,首先对本方案中涉及的技术术语进行解释。
1、分段路由(segment routing,SR),SR是基于源路由理念而设计的在网络上转发数据包的一种协议。SR将网络路径分成一个个段,并且为这些段和网络中的转发节点分配段标识ID。通过对段和网络节点进行有序排列,得到一条转发路径的段序列(segment list)。SR将代表转发路径的段序列编码在数据包头部,随数据包传输。接收端收到数据包后,对段序列进行解析,如果段序列的顶部段标识是本节点时,则弹出该标识,然后进行下一步处理;如果不是本节点,则使用常规的路由转发方式将数据包转发到下一节点。
2、基于IPv6分段路由(segment routing over IPv6,SRv6),SRv6是基于源路由理念而设计的在网络上转发IPv6数据包的一种方法。基于IPv6转发面的SR,通过在IPv6报文中插入一个路由扩展头(segment routing header,SRH),在SRH中压入一个显式的IPv6地址栈,通过中间节点不断的进行更新目的地址和偏移地址栈的操作来完成逐跳转发。SRv6技术就是采用现有的IPv6转发技术,通过灵活的IPv6扩展头,实现网络可编程。SRv6将一些IPv6地址定义成实例化的SID(Segment ID),每个SID有着自己显式的作用和功能,通过不同的SID操作,实现简化的虚拟私有网络(virtual private network,VPN),以及灵活的路径规划。SRv6报文携带有SRH,SRH中包括多个Segment List,通常,每一个Segment List包括Locator、Function和Argument。其中,Locator用来标识达到该节点的路由信息,Function和Argument表示在该节点需要执行的网络功能和配套参数。Locator、Function、Argument这三部分没有固定的长度,但是这三部分的总的长度是小于128bit的。
3、Locator,标识SR节点的定位器,每个节点至少有一个全局唯一的Locator值,作为本地SID的共享前缀,其他节点通过Locator路由访问本节点SID。其中,Locator值可以是数值也可以是IPv6地址。
4、软件定义广域网(software defined WAN,SD-WAN),SD-WAN是软件定义网络(software defined networking,SDN)的重要实践。通过引入网络控制器,融合网络、安全和广域优化等技术,实现企业WAN网络配置和业务的自动化发放,对外提供一种简易、灵活和高品质的企业WAN互联能力。其中,SD-WAN通常具备以下特征:
(1)基于混合WAN链路,实现灵活的IP overlay组网。
SD-WAN通过采用在两个站点Edge间建立端到端Overlay隧道的方法,实现SD-WAN和underlay传输网络的独立性,underlay网络链路可以是多协议标签交换(multiprotocol label switching,MPLS)专线,也可以是公共Internet或通用移动通信技术的长期演进(long term evolution,LTE)网络等。
(2)智能应用选路,保障应用体验。
企业应用种类繁多,常见的有生产类、协同类、云化、娱乐类等各类应用。不同类型应用对带宽和链路质量要求各不相同。SD-WAN通常通过深度包检测(deep packet inspection,DPI)等应用识别技术,对企业流量进行识别,然后基于应用纬度进行分类统计、质量检测和路径控制。如高价值应用流量优先指定在MPLS等有高线路品质但是成本较高的路径上传输,低价值的应用流量指定在Internet等低线路品质 但也是成本低的路径上传输。
(3)集中管控和可视化,简单易运维。
通过集中的网络监控和可视化,实现了集中的管理,提升了WAN端到端的管理和运维效率。
5、Underlay网络与Overlay网络,Underlay网络例如可以是传统IT基础设施网络,由交换机和路由器等设备组成,借助以太网协议、路由协议和VLAN协议等驱动,它还是Overlay网络的底层网络,为Overlay网络提供数据通信服务。Overlay网络是建立在一个Underlay网络之上的虚拟网络,Overlay网络不能独立出现,Overlay底层依赖的网络就是Underlay网络。
SD-WAN业务的转发可以通过管控平面的RR控制组件的协议控制。SD-WAN转发设备通过overlay IP隧道技术在不同的underlay物理网络上构建一个overlay虚拟网络。其中,overlay虚拟网络中的overlay隧道的源/目的IP是边缘Edge设备的WAN接口IP,中间传输网络只需要把和Edge设备直连的链路的路由在本网络内发布,隧道报文就可以在underlay传输网络中路由转发,直到到达目的端的Edge设备。
为了解决逐条静态创建overlay隧道或者静态配置点到点虚连接,通过IGP或BGP发布虚连接的信息,配置繁琐,工作量大,且数据面封装效率低的技术问题,本申请实施例提出一种通信方法。该通信方法适用于如图1所示的应用场景。在如1所示的应用场景中,节点R1、节点R2、节点R3、节点R4和节点R5作为全球骨干网入网点(point of presence,POP)网元组建了全球骨干网,且分别与路由反射器(route reflectors,RR)建立BGP SD-WAN邻居。节点R3和节点R4之间创建了overlay隧道,其它节点之间通过专线连接。示例性的,图2示出了本申请实施例提出的一种通信方法200的流程示意图。该流程示意图包括:S201-S204。
在一种可能的实现中,通过以下步骤实现前述通信方法:
S201,通信装置A获取overlay隧道信息A。
所述overlay隧道信息A与通信装置A创建的overlay隧道A关联。在一个例子中,通信装置A可以为如图1所示的应用场景中的节点R3。相应地,overlay隧道A可以为节点R3创建的到节点R4的overlay隧道。在一种可能的实现中,overlay隧道A为SD-WAN overlay隧道。在另一种可能的实现中,overlay隧道A为流量工程(traffic engineering,TE)隧道。所述overlay隧道信息A包括overlay隧道A的本地传输网络端口TNP的IP地址和对端传输网络端口TNP的IP地址。示例性的,IP地址可以为IPv6地址或IPv4地址。需要说明的是,所述overlay隧道信息A还可以包括在通信装置A的位置Locator中为overlay隧道A分配的overlay隧道A段标识SID。在一种可能的实现中,通信装置A接入internet,则通信装置A的Locator可以通过DHCP从ISP获取。在一个例子中,如图1所示,节点R3接入了internet,则其可以通过DHCP从ISP获取其Locator。在另一种可能的实现中,通信装置A的Locator还可以通过全局规划分配获得。overlay隧道A段标识SID可以为End.X SID。
在一个例子中,假设如图1所示的节点R1、节点R2、节点R3、节点R4分别创建了指向下一节点的overlay隧道。节点R1、节点R2、节点R3、节点R4分别在其Locator中分配其创建的overlay隧道的End.X SID为IP1_SID、IP2_SID、IP3_SID、IP4_SID。节点R5在其Locator中分配其接入的一个或多个VPN的End.DT SID。在本申请实施例中,假设节点R5接入一个VPN,分配的End.DT SID为R5_VPN_SID。可以理解的是,End.X SID可以映射到相应的传输网络端口TNP。例如,IP1_SID、IP2_SID、IP3_SID、IP4_SID分别映射到端口IP1、端口IP2-3、端口IPx、端口IP4-1。
在一种可能的实现中,通信装置A创建overlay隧道A的过程参见图3所示的流程示意图。对图3所示的流程示意图的详细描述参见下文内容。
S202,通信装置A向通信装置B发送协议报文A。
在本申请实施例中,协议可以为IGP,也可以为自定义协议。通信装置A将其创建的overlay隧道A关联的overlay隧道信息A和通信装置A的标识信息通知本机协议进程,如IGP进程。IGP通过链路状态报文(link state packet,LSP)或者链路状态公告(link state advertisement,LSA)对外发布。也即是说,通信装置A基于协议,如IGP向通信装置B传递overlay隧道信息A和通信装置A的标识信息。在一种可能的实现中,通信装置A通过逻辑接口使能ISIS协议建立同通信装置B逻辑接口的会话,通过ISIS发布overlay隧道信息A和通信装置A的标识信息。
具体地,在本申请实施例中,通信装置A向通信装置B发送协议报文A。示例性的,协议报文A可以为IGP报文A。所述协议报文A包括通信装置A的标识信息和overlay隧道信息A。在一种可能的实现中,通信装置A的标识信息可以为通信装置A的唯一标识。
可以理解的是,在一种可能的实现中,通信装置A也可以接收通信装置B发送的协议报文B。示例性 的,协议报文B可以为IGP报文B。所述协议报文B包括通信装置B的标识信息和overlay隧道信息B。所述overlay隧道信息B与通信装置B创建的overlay隧道B关联。在一种可能的实现中,overlay隧道B为SD-WAN overlay隧道。通信装置B的标识信息可以为通信装置B的唯一标识。所述overlay隧道信息B包括overlay隧道B的本地传输网络端口TNP和对端传输网络端口TNP的地址对。需要说明的是,所述overlay隧道信息B还可以包括在通信装置B的位置Locator中为overlay隧道B分配的overlay隧道B段标识SID。其中,通信装置B的Locator可以通过DHCP从ISP获取,还可以通过全局规划分配获得。overlay隧道B段标识SID可以为End.X SID。
还可以理解的是,在一种可能的实现中,通信装置A还可以向通信装置C发送协议报文C。示例性的,协议报文C可以为IGP报文C。通信装置C可以为如图1所示的应用场景中的节点R2。相应地,通信装置A也可以接收通信装置C发送的协议报文D。示例性的,协议报文D可以IGP报文D。所述协议报文D包括通信装置C的标识信息和overlay隧道信息C。所述overlay隧道信息C与通信装置C创建的overlay隧道C关联。在一种可能的实现中,overlay隧道C为SD-WAN overlay隧道。通信装置C的标识信息可以为通信装置C的唯一标识。所述overlay隧道信息C包括overlay隧道C的本地传输网络端口TNP的IP地址和对端传输网络端口TNP的IP地址。需要说明的是,所述overlay隧道信息C还可以包括在通信装置C的位置Locator中为overlay隧道C分配的overlay隧道C段标识SID。其中,通信装置C的Locator可以通过DHCP从ISP获取,还可以通过全局规划分配获得。overlay隧道C段标识SID可以为End.X SID。
综上所述,通信装置A可以向其它通信装置发送协议报文,也可以接收其它通信装置发送的协议报文,如接收通信装置B发送的协议报文B,接收通信装置C发送的协议报文D。也即是说,本申请中通信装置A实现了通过协议报文向任意通信装置传递通信装置A的标识信息和第一overlay隧道信息。也即是说,通信装置A可以通过协议报文向多跳通信装置自动扩散其标识信息和第一overlay隧道信息,无需人工配置,减小了工作量,从而使得多跳通信装置可以基于通信装置A的标识信息和第一overlay隧道信息,获取拓扑信息,并基于拓扑信息计算到任意一个通信装置的overlay路由。示例性的,如图1所示的应用场景中的每个节点可以向其它节点发送协议报文。
可以理解的是,通信装置A、通信装置B、通信装置C可以为路由器、交换机等整机设备,也可以为网卡、线卡、芯片等,在本申请实施例中,对通信装置A、通信装置B、通信装置C的具体形式不做具体限定,以上仅为示例性说明。
在此需要说明的是,通信装置B创建overlay隧道B的过程、通信装置C创建overlay隧道C的过程与通信装置A创建overlay隧道A的过程类似,在此不再赘述。
在一种可能的实现中,通信装置A向通信装置B发送协议报文A之前需要进行如图4所示的流程示意图中的各个步骤。对如4所示的流程示意图的详细描述参见下文内容。
还需要说明的是,在一种可能的实现中,通信装置A获取到overlay隧道信息A和overlay隧道信息B后,可以根据其获取overlay拓扑信息。可以理解的是,经协议,如IGP扩散各个通信装置的overlay隧道信息,任意一个通信装置可以获得整网的拓扑信息。
在一种可能的实现中,通信装置A可以根据overlay拓扑信息,计算到达通信装置B的overlay路由。在一个例子中,overlay路由可以为SD-WAN overlay路由。可以理解的是,通信装置A可以按最短路径优先(shortest path first,SPF)算法计算其到任一目的通信装置的Locator的路由。因此,本申请实施例可以实现一个通信装置到整网任意通信装置可达。如图1所示,节点R1上可以计算到节点R5的Locator的路由,包括节点R5的Locator、出接口为IP1,下一跳为节点R2的IP2-1接口的IPv6地址。
S203,通信装置B接收通信装置A发送的协议报文A。
在本申请实施例中,通信装置B接收通信装置A发送的协议报文A。
在一种可能的实现中,通信装置B还可以向通信装置A发送协议报文B。
在一种可能的实现中,通信装置B还可以向通信装置C发送协议报文E。相应地,通信装置B可以接收通信装置C发送的协议报文F。
综上所述,通信装置B可以向其它通信装置发送协议报文,也可以接收其它通信装置发送协议报文,如接收通信装置A发送的协议报文A,接收通信装置C发送的协议报文F。
S204,通信装置B根据协议报文A,获取overlay隧道信息A。
在本申请实施例中,通信装置B根据协议报文A,获取overlay隧道信息A。
在一种可能的实现中,通信装置B可以根据协议报文A中的overlay隧道信息A和协议报文B中的overlay隧道信息B,获取overlay拓扑信息。
在一种可能的实现中,通信装置B可以根据overlay拓扑信息,计算到达通信装置A的overlay路由。
接下来,对通信装置A创建overlay隧道A的过程进行详细说明。在一种可能的实现中,本申请实施例提供一种通信方法300,通过图3所示的流程示意图中的各个步骤实现overlay隧道A的创建。如图3所示的流程示意图包括S301-S302,其具体实现过程如下:
S301,通信装置A获取隧道创建信息A。
在本申请实施例中,通信装置A获取隧道创建信息A。所述隧道创建信息A包括待创建的overlay隧道A的对端通信装置发布的其本地传输网络端口TNP的信息和拓扑意图。在一种可能的实现中,本地传输网络端口TNP的信息包括本地传输网络端口TNP的IP地址、运营商标识和路由域。
在一种可能的实现中,骨干POP网部署RR。该RR负责接入骨干POP网的通信装置A和其它通信装置之间的SD-WAN路由反射。若通信装置A发布其本地传输网络端口TNP的信息和拓扑意图,则该本地传输网络端口TNP的信息和拓扑意图经过RR反射后,可以到达其它通信装置。相应地,其它通信装置发布的其本地传输网络端口TNP的信息和拓扑意图经过RR反射后,也可以到达通信装置A。也即是说,任意一个通信装置可以获取到其它通信装置发布的其本地传输网络端口TNP的信息和拓扑意图。
需要说明的是,管理员可以通过控制器创建拓扑意图,分为以下几种类型:点对点(point-to-point,P2P)Link、点到多点(point-to-multipoint,P2MP)Link和全网状Full Mesh Link等。管理员可以将相应的拓扑意图关联到通信装置的传输网络端口TNP。通信装置A通过与RR间部署BGP SD-WAN邻居,携带上述拓扑意图向其它通信装置发布。拓扑意图包括链路类型和链路ID。示例性的,链路类型分别为P2P、P2MP、全网状Full mesh,其对应的链路ID为Link ID、Hub Site ID、Link ID。
在一个例子中,如图1所示,节点R3创建了指向节点R4的overlay隧道。每个节点通过与RR间部署BGPSD-WAN邻居,携带自身的拓扑意图和本地传输网络端口TNP的信息向其它节点发布。任意一个节点通过RR可以获取到其它节点发布的其本地传输网络端口TNP的信息和拓扑意图。示例性的,节点R3的本地传输网络端口TNP,即IPx同节点R4的本地传输网络端口TNP,即IPy具有匹配的链路邻接拓扑定义关系,即两个节点的链路类型均为P2P,链路ID相匹配,因此,节点R3和节点R4之间可以建立overlay隧道。
S302,通信装置A根据其本地传输网络端口TNP的信息和拓扑意图以及隧道创建信息A,创建overlay隧道A。
在本申请实施例中,首先需要说明的是,通信装置A与待创建的overlay隧道A的对端通信装置物理连接,才能创建其到对端通信装置的overlay隧道A。
在一种可能的实现中,通信装置A先确定其本地传输网络端口TNP的IP地址到对端通信装置的本地传输网络端口TNP的IP地址是否路由可达,若可达,则根据其拓扑意图以及对端通信装置发布的拓扑意图,创建其与对端通信装置之间的overlay隧道A。需要说明的是,拓扑意图可以包括至少一个链路ID和其对应的链路类型。在通信装置A的拓扑意图中的某一链路ID和其对应的链路类型与对端通信装置发布的拓扑意图中的某一链路ID和其对应的链路类型一致的情况下,通信装置A可以创建到该对端通信装置的overlay隧道A。可以理解的是,链路ID可以作为overlay隧道A的ID。
在一个例子中,如图1所示,节点R3通过RR获取到节点R4发布的其本地传输网络端口TNP的信息和拓扑意图后,先确定其本地传输网络端口TNP,即IPx的IP地址到节点R4的本地传输网络端口TNP,即IPy的IP地址是否路由可达,若可达,则根据其拓扑意图以及节点R4发布的拓扑意图,创建其与节点R4之间的overlay隧道。
接下来,对通信装置A发送协议报文A之前需要进行的步骤进行详细说明。以协议为IGP为例,本申请实施例提供了一种通信方法400,其流程示意图包括S401-S403,其具体实现过程如下:
S401,通信装置A自动运行IGP进程。
在本申请实施例中,通信装置A自动运行IGP进程。在一种可能的实现中,通信装置A采用预留的IGP进程号。可以理解的是,通信装置之间如果要转发报文,需要具有相同的IGP进程号。
在一种可能的实现中,通信装置A自动运行中间系统-中间系统(intermediate system to intermediate system,ISIS)进程,采用预留的ISIS进程号,如65534。
在一个例子中,如图1所示的节点R3和节点R4需要均运行IGP,具有相同的IGP进程号,才能相互之间转发报文。
S402,通信装置A生成逻辑接口。
在本申请实施例中,通信装置A生成逻辑接口。
在一种可能的实现中,在通信装置A上针对overlay隧道A申请创建逻辑接口,由SD-WAN命名逻辑接口的名称。SD-WAN检查overlay隧道A的对端通信装置的本地网络传输端口TNP的IP地址是否路由可达,若可达,则将逻辑接口状态置为UP,并用逻辑接口的信息,如逻辑接口的名称、地址,状态UP等,向接口文件管理器(interfaces file manager,IFM)申请逻辑接口的创建。
在一种可能的实现中,前述逻辑接口可以为通用路由封装(generic routing encapsulation,GRE)类型的接口。该逻辑接口的地址可以借用通信装置A的本地传输网络端口TNP的IP地址。
在一个例子中,如图1所示,在节点R3上针对overlay隧道A申请创建GRE类型的逻辑接口,由SD-WAN命名逻辑接口的名称为GRE1。GRE1逻辑接口的地址借用节点R3的本地网络传输端口TNP,即IPx的IP地址。SD-WAN检查overlay隧道A的对端节点R4的本地网络传输端口TNP,即IPy的地址是否路由可达,如果可达,则将GRE1逻辑接口状态置为UP,并用GRE1逻辑接口的信息,如逻辑接口的名称GRE1,逻辑接口的地址,逻辑接口状态UP等,向IFM申请GRE1逻辑接口的创建。
S403,通信装置A基于逻辑接口动态使能IGP。
在本申请实施例中,通信装置A基于逻辑接口动态使能IGP。示例性的,通信装置A基于逻辑接口,使能开放式最短路径优先(open shortest path first,OSPF)协议或者ISIS协议。
在一个例子中,如图1所示,节点R3基于逻辑接口GRE1,使能IGP。
本申请实施例提供的技术方案可以自动运行IGP,自动基于overlay隧道生成与其对应的逻辑接口,自动基于逻辑接口使能IGP。整个流程自动化实现,提升了全球骨干网组网部署和运维效率。
基于与上述方法实施例相同构思,本申请实施例还提供了一种通信方法500。方法500可以用于图1所示的应用场景中,具体实现上述的方法100。当方法500用于图1所示的应用场景时,第一通信装置例如可以是图1所示的节点R3,第二通信装置例如可以是图1所示的节点R4。通信方法500的流程示意图如图5所示。该流程示意图包括:S501-S502,其具体实现过程如下:
S501,第一通信装置获取第一overlay隧道信息。
当方法500具体用于实现方法100时,在本申请实施例中,第一通信装置可以为方法100中的通信装置A,第一overlay隧道信息可以为方法100中的overlay隧道信息A。S501的具体实现过程与S201类似,在此不再赘述。
S502,第一通信装置向第二通信装置发送第一协议报文。
在本申请实施例中,第二通信装置可以为方法200中的的通信装置B,第一协议报文可以为方法200中的协议报文A。S502的具体实现过程与S202类似,在此不再赘述。
需要说明的是,在一种可能的实现中,第一协议报文为第一IGP报文,在执行S502之前,需要执行以下步骤:
首先,第一通信装置自动运行IGP进程,其具体实现过程与S401类似,在此不再赘述。
然后,第一通信装置生成逻辑接口,其具体实现过程与S402类似,在此不再赘述。
最后,第一通信装置基于逻辑接口动态使能IGP,其具体实现过程与S403类似,在此不再赘述。
在一种可能的实现中,第一通信装置接收第二通信装置发送的第二协议报文。第二协议报文可以为方法200中的协议报文B。所述第二协议报文包括第二通信装置的标识信息和第二overlay隧道信息,所述第二overlay隧道信息与第二通信装置创建的第二overlay隧道关联。所述第二overlay隧道信息可以为方法200中的overlay隧道信息B,第二overlay隧道可以为方法200中的overlay隧道B。
在一种可能的实现中,第一通信装置向第三通信装置发送第三协议报文。第三协议报文可以为方法200中的协议报文C。第三通信装置可以为方法200中的通信装置C。
在一种可能的实现中,第一通信装置接收第三通信装置发送的第四协议报文。第四协议报文可以为方法200中的协议报文D。所述第四协议报文包括第三通信装置的标识信息和第三overlay隧道信息,所述第三overlay隧道信息与所述第三通信装置创建的第三overlay隧道关联。所述第三overlay隧道信息可以为方法200中的overlay隧道信息C,所述第三overlay隧道可以为方法200中的overlay隧道C。
基于与上述方法实施例相同构思,本申请实施例还提供了一种通信方法600。方法600可以用于图1所示的应用场景中,具体实现上述的方法100。当方法600用于图1所示的应用场景时,第一通信装置例如可以是图1所示的节点R3,第二通信装置例如可以是图1所示的节点R4。通信方法600的流程示意图如图6所示。该流程示意图包括:S601-S602,其具体实现过程如下:
S601,第二通信装置接收第一通信装置发送的第一协议报文。
在本申请实施例中,S601的具体实现过程与S203的具体实现过程类似,在此不再赘述。
S602,第二通信装置根据第一协议报文,获取第一overlay隧道信息。
在本申请实施例中,S602的具体实现过程与S204的具体实现过程类似,在此不再赘述。
在一种可能的实现中,第二通信装置向第一通信装置发送第二协议报文。
在一种可能的实现中,第二通信装置向第三通信装置发送第五协议报文。第五协议报文可以为方法200中的协议报文E。
在一种可能的实现中,第二通信装置接收第三通信装置发送的第六协议报文。第六协议报文可以为方法200中的协议报文F。
基于与上述方法实施例相同构思,本申请实施例还提供了一种通信方法700。方法700可以用于图1所示的应用场景中。当方法700用于图1所示的应用场景时,第一通信装置例如可以是图1所示的节点R3。方法700的流程示意图如图7所示。该流程示意图包括:S701,其具体实现过程如下:
S701,第一通信装置发送报文。
在本申请实施例中,第一通信装置发送报文。所述报文包括第一通信装置创建的第一overlay隧道的本地传输网络端口TNP的IP地址和对端传输网络端口TNP的IP地址、通用路由封装GRE头、IP头、用户主机目的IP地址和用户数据,所述GRE头用于指示封装的IP头的类型。
在一种可能的实现中,所述IP头可以为IPv6头,还可以为IPv4头。
也即是说,第一通信装置基于第一overlay隧道的本地传输网络端口TNP的IP地址和对端传输网络端口TNP的IP地址,转发用户数据。
需要说明的是,通过创建overlay隧道来保障服务等级协议(service level agreement,SLA),分布式计算满足业务对网络差异化服务诉求的TE路径,增强了网络的可靠性。
下面详细介绍通过overlay基于IPv6的段路由(segment routing over IPv6,SRv6)TE转发报文的详细过程。以在节点R1上计算到节点R5上的低时延TE路径为例进行说明,其示意图参见图8。
节点R1:作为全球骨干网组网的overlay SRv6 TE转发的入口设备,数据包查私网路由表,迭代SRv6 TE POLICY路径,对数据报文私网IP头进行SRv6路径编排SID List封装。其中,SID List(IP2_SID,IP3_SID,IP4_SID,R5_VPN_SID),IPv6(SA=端口IP1的End.X SID,DA=端口IP2-3的End.X SID),即IPv6(SA=IP1_SID,DA=IP2_SID)。
节点R2:SID List(IP2_SID,IP3_SID,IP4_SID,R5_VPN_SID),根据SRH SID List偏移修改IPv6头的目的IP为端口IPx的End.X SID,即IPv6(SA=端口IP1的End.X SID,DA=端口IPx的End.X SID),即IPv6(SA=IP1_SID,DA=IP3_SID)。
节点R3:根据目的IP为IPy指示封装外层overlay隧道IP头、GRE头、IP头、用户主机目的IP地址和用户数据。外层overlay隧道IP头包括overlay隧道的本地传输网络端口TNP的IP地址和对端传输网络端口TNP的IP地址。示例性的,IP地址可以为IPv6地址。也即是说,封装的overlay隧道IP头(SA=端口IPx的IPv6地址,DA=端口IPy的IPv6地址)。GRE头指示封装的IP头的类型,如封装IPv6头或IPv4头。根据SRH SID List偏移修改IPv6头的目的IP为端口IP4-1的End.X SID,即IPv6(SA=端口IP1的End.X SID,DA=端口IP4-1的End.X SID),即IPv6(SA=IP1_SID,DA=IP4_SID)。SID List(IP2_SID,IP3_SID,IP4_SID,R5_VPN_SID)。
节点R4:SID List(IP2_SID,IP3_SID,IP4_SID,R5_VPN_SID),根据SRH SID List偏移修改IPv6头的目的IP为节点R5接入的VPN的End.DT SID,即IPv6(SA=端口IP1的End.X SID,DA=节点R5接入的VPN的End.DT SID),即IPv6(SA=IP1_SID,DA=R5_VPN_SID)。
节点R5:根据SRH SID List偏移至最后一个SID即节点R5接入的VPN SID,即End.DT SID(R5_VPN_SID)查找到对应的私网转发表,根据内层私网IP头目的地址查对应的私网转发表路由进行业务报文转发。同时,对SID List进行解封装。由此可见,相比于逐条静态创建overlay隧道或者静态配置点到点虚连接,本申请实施例只需要在节点R1上进行SRv6路径编排SID List封装,在节点R5上进行SID List解封装,提高了数据面封装效率。
参见图9,本申请实施例还提供了一种通信装置900,用于实现上述方法中第一通信装置和/或第二通信装置的功能。该通信装置900可以为芯片系统。本申请实施例中,芯片系统可以由芯片构成,也可以包 含芯片和其他分立器件。通信装置900包括至少一个处理器910,用于实现本申请实施例提供的方法中第一通信装置和/或第二通信装置的功能。通信装置900还可以包括通信接口920。在本申请实施例中,通信接口920可以是收发器、电路、总线、模块或其它类型的通信接口,用于通过传输介质和其它设备进行通信。
当通信装置900用于执行第一通信装置所执行的操作时,处理器910用于获取第一上层overlay隧道信息,所述第一overlay隧道信息与所述第一通信装置创建的第一overlay隧道关联;通信接口920用于向第二通信装置发送第一协议报文,所述第一协议报文包括所述第一通信装置的标识信息和所述第一overlay隧道信息。
当通信装置900用于执行第二通信装置所执行的操作时,通信接口920用于接收第一通信装置发送的第一协议报文,所述第一协议报文包括所述第一通信装置的标识信息和第一上层overlay隧道信息,所述第一overlay隧道信息与所述第一通信装置创建的第一overlay隧道关联;处理器910用于根据所述第一协议报文,获取所述第一overlay隧道信息。
通信接口920还用于执行上述方法实施例中第一通信装置和/或第二通信装置的方法所涉及的其它接收或发送的步骤或操作。处理器910还可以用于执行上述方法实施例中除收发之外的其它对应的步骤或操作,在此不再一一赘述。
通信装置900还可以包括至少一个存储器930,用于存储程序指令和/或数据。存储器930和处理器910耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器920可能和存储器930协同操作。处理器910可能执行存储器930中存储的程序指令。在一种可能的实现中,所述至少一个存储器中的至少一个可以与处理器集成在一起。在另一种可能的实现中,存储器930位于通信装置900之外。
本申请实施例中不限定通信接口920、处理器910以及存储器930之间的具体连接介质。本申请实施例在图9中以存储器930、处理器910以及通信接口920之间通过总线940连接,总线在图9中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
示例性的,处理器910可以是一个或多个中央处理器(Central Processing Unit,CPU),在处理器910是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。处理器910可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。
示例性的,存储器930可包括但不限于硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等非易失性存储器,随机存储记忆体(Random Access Memory,RAM)、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、只读存储器(Read-Only Memory,ROM)或便携式只读存储器(Compact Disc Read-Only Memory,CD-ROM)等等。存储器是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本申请实施例中的存储器还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。
基于与上述方法实施例相同构思,本申请实施例提供了一种计算机可读存储介质,上述计算机可读存储介质上存储有计算机程序,上述计算机程序被处理器执行时,如图2-7对应部分或全部步骤被执行。
基于与上述方法实施例相同构思,本申请实施例还提供了一种包括指令的计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如图2-7对应的部分或全部步骤。
基于与上述方法实施例相同构思,本申请实施例还提供了一种通信系统,包括方法200中的第一通信装置和第二通信装置。
应说明的是:以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申 请各实施例技术方案的精神和范围。

Claims (30)

  1. 一种通信方法,其特征在于,由第一通信装置执行,所述方法包括:
    获取第一上层overlay隧道信息,所述第一overlay隧道信息与所述第一通信装置创建的第一overlay隧道关联;
    向第二通信装置发送第一协议报文,所述第一协议报文包括所述第一通信装置的标识信息和所述第一overlay隧道信息。
  2. 根据权利要求1所述的方法,其特征在于,所述第一协议报文为第一内部网关协议IGP报文。
  3. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    自动运行IGP进程;
    生成逻辑接口;
    基于所述逻辑接口动态使能所述IGP。
  4. 根据权利要求3所述的方法,其特征在于,所述逻辑接口的地址与所述第一overlay隧道的本地传输网络端口TNP的互联网协议IP地址相同。
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述第一overlay隧道信息包括第一overlay隧道的本地传输网络端口TNP的IP地址和对端传输网络端口TNP的IP地址。
  6. 根据权利要求5所述的方法,其特征在于,所述第一overlay隧道信息还包括在所述第一通信装置的位置Locator中为所述第一overlay隧道分配的第一overlay隧道段标识SID。
  7. 根据权利要求6所述的方法,其特征在于,所述第一overlay隧道SID为End.X SID。
  8. 根据权利要求6或7所述的方法,其特征在于,所述方法还包括:
    通过动态主机配置协议DHCP从互联网服务提供商ISP获取所述Locator。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,所述方法还包括:
    接收所述第二通信装置发送的第二协议报文,所述第二协议报文包括所述第二通信装置的标识信息和第二overlay隧道信息,所述第二overlay隧道信息与所述第二通信装置创建的第二overlay隧道关联。
  10. 根据权利要求9所述的方法,其特征在于,所述第二协议报文为第二IGP报文。
  11. 根据权利要求9或10所述的方法,其特征在于,所述第二overlay隧道信息包括第二overlay隧道的本地传输网络端口TNP的IP地址和对端传输网络端口TNP的IP地址。
  12. 根据权利要求9-11任一项所述的方法,其特征在于,所述第二overlay隧道信息还包括在所述第二通信装置的Locator中为所述第二overlay隧道分配的第二overlay隧道SID。
  13. 根据权利要求9-12任一项所述的方法,其特征在于,所述方法还包括:根据所述第一overlay隧道信息和所述第二overlay隧道信息,获取overlay拓扑信息。
  14. 根据权利要求13所述的方法,其特征在于,所述方法还包括:根据所述overlay拓扑信息,计算到达所述第二通信装置的overlay路由。
  15. 根据权利要求14所述的方法,其特征在于,所述overlay路由为软件定义广域网SD-WAN overlay路由。
  16. 根据权利要求1-15任一项所述的方法,其特征在于,所述第一overlay隧道为软件定义广域网SD-WAN overlay隧道。
  17. 根据权利要求1-16任一项所述的方法,其特征在于,所述方法还包括:
    向第三通信装置发送第三协议报文,所述第三协议报文包括所述第一通信装置的标识信息和所述第一overlay隧道信息。
  18. 根据权利要求17所述的方法,其特征在于,所述第三协议报文为第三IGP报文。
  19. 根据权利要求17或18所述的方法,其特征在于,所述方法还包括:
    接收所述第三通信装置发送的第四协议报文,所述第四协议报文包括所述第三通信装置的标识信息和第三overlay隧道信息,所述第三overlay隧道信息与所述第三通信装置创建的第三overlay隧道关联。
  20. 一种通信方法,其特征在于,由第二通信装置执行,所述方法包括:
    接收第一通信装置发送的第一协议报文,所述第一协议报文包括所述第一通信装置的标识信息和第一上层overlay隧道信息,所述第一overlay隧道信息与所述第一通信装置创建的第一overlay隧道关联;
    根据所述第一协议报文,获取所述第一overlay隧道信息。
  21. 根据权利要求20所述的方法,其特征在于,所述方法还包括:
    根据所述第一overlay隧道信息和第二overlay隧道信息,获取overlay拓扑信息,所述第二overlay隧道信息与所述第二通信装置创建的第二overlay隧道关联。
  22. 根据权利要求21所述的方法,其特征在于,所述方法还包括:根据所述overlay拓扑信息,计算到达所述第一通信装置的overlay路由。
  23. 根据权利要求21或22所述的方法,其特征在于,所述第二overlay隧道为软件定义广域网SD-WAN overlay隧道。
  24. 根据权利要求20-23任一项所述的方法,其特征在于,所述方法还包括:
    向第一通信装置发送第二协议报文,所述第二协议报文包括所述第二通信装置的标识信息和所述第二overlay隧道信息。
  25. 根据权利要求20-23任一项所述的方法,其特征在于,所述方法还包括:
    向第三通信装置发送第五协议报文,所述第五协议报文包括所述第二通信装置的标识信息和所述第二overlay隧道信息。
  26. 根据权利要求25所述的方法,其特征在于,所述方法还包括:
    接收所述第三通信装置发送的第六协议报文,所述第六协议报文包括所述第三通信装置的标识信息和第三overlay隧道信息,所述第三overlay隧道信息与所述第三通信装置创建的第三overlay隧道关联。
  27. 一种通信装置,其特征在于,包括至少一个处理器,所述处理器用于执行存储器中存储的程序,当所述程序被执行时,使得所述装置执行:
    如权利要求1-19任一项或权利要求20-26任一项所述的方法。
  28. 一种包含指令的计算机程序产品,其特征在于,当所述计算机程序产品在处理器上运行时,执行:
    如权利要求1-19任一项或权利要求20-26任一项所述的方法。
  29. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,如权利要求1-19任一项或权利要求20-26任一项所述的方法被执行。
  30. 一种通信系统,其特征在于,所述通信系统包括:第一通信装置和第二通信装置,所述第一通信装置用于执行权利要求1-19任一项所述的方法,所述第二通信装置用于执行权利要求20-26任一项所述的方法。
PCT/CN2023/105747 2022-11-30 2023-07-04 一种通信方法及装置 WO2024113867A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211545216.7 2022-11-30
CN202211545216.7A CN118118436A (zh) 2022-11-30 2022-11-30 一种通信方法及装置

Publications (1)

Publication Number Publication Date
WO2024113867A1 true WO2024113867A1 (zh) 2024-06-06

Family

ID=91218641

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/105747 WO2024113867A1 (zh) 2022-11-30 2023-07-04 一种通信方法及装置

Country Status (2)

Country Link
CN (1) CN118118436A (zh)
WO (1) WO2024113867A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917682A (zh) * 2014-03-14 2015-09-16 杭州华三通信技术有限公司 一种叠加网络的配置方法和装置
CN107809367A (zh) * 2017-11-07 2018-03-16 锐捷网络股份有限公司 一种sdn网络的设备上线方法及sdn控制器、网络设备
WO2020187398A1 (en) * 2019-03-19 2020-09-24 Nokia Solutions And Networks Oy Tunnel endpoint encoding for mobile network architecture
CN112187611A (zh) * 2020-09-30 2021-01-05 瑞斯康达科技发展股份有限公司 一种建立业务隧道的方法、存储介质和设备
CN114760167A (zh) * 2020-12-29 2022-07-15 华为技术有限公司 报文转发的方法、装置和网络系统
CN114915519A (zh) * 2021-02-07 2022-08-16 华为技术有限公司 通信方法和通信装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917682A (zh) * 2014-03-14 2015-09-16 杭州华三通信技术有限公司 一种叠加网络的配置方法和装置
CN107809367A (zh) * 2017-11-07 2018-03-16 锐捷网络股份有限公司 一种sdn网络的设备上线方法及sdn控制器、网络设备
WO2020187398A1 (en) * 2019-03-19 2020-09-24 Nokia Solutions And Networks Oy Tunnel endpoint encoding for mobile network architecture
CN112187611A (zh) * 2020-09-30 2021-01-05 瑞斯康达科技发展股份有限公司 一种建立业务隧道的方法、存储介质和设备
CN114760167A (zh) * 2020-12-29 2022-07-15 华为技术有限公司 报文转发的方法、装置和网络系统
CN114915519A (zh) * 2021-02-07 2022-08-16 华为技术有限公司 通信方法和通信装置

Also Published As

Publication number Publication date
CN118118436A (zh) 2024-05-31

Similar Documents

Publication Publication Date Title
USRE50105E1 (en) Overlay management protocol for secure routing based on an overlay network
JP7275237B2 (ja) 複数のパブリッククラウドに跨る仮想ネットワークの生成
US10757008B2 (en) Flow specification protocol-based communications method, device, and system
JP7208386B2 (ja) パケット転送方法、パケット送信装置、およびパケット受信装置
US10412019B2 (en) Path computation element central controllers (PCECCs) for network services
US9979605B2 (en) Virtualization mapping
EP3402141B1 (en) Virtual private network (vpn) service optimization method and device
EP3231160B1 (en) Stateful load balancing in a stateless network
US8874709B2 (en) Automatic subnet creation in networks that support dynamic ethernet-local area network services for use by operation, administration, and maintenance
US7486659B1 (en) Method and apparatus for exchanging routing information between virtual private network sites
JP2021530912A (ja) ネットワークスライス制御方法及び装置、コンピュータ読み取り可能な記憶媒体
JP7154315B2 (ja) 仮想プライベートネットワークを管理するための方法およびデバイス
WO2019184653A1 (zh) 链路配置方法和控制器
WO2023045871A1 (zh) 报文处理方法、网络设备及系统
CN106936714A (zh) 一种vpn的处理方法和pe设备以及系统
JP2020188478A (ja) Sfcネットワークにおけるトポロジー情報を同期させるための方法、およびルーティングネットワーク要素
CN103634210A (zh) 发现vpls实例的对端pe设备的方法及设备
WO2024113867A1 (zh) 一种通信方法及装置
CN108259292B (zh) 建立隧道的方法及装置
WO2024007762A1 (zh) 一种路由发布方法、通信方法及装置
WO2024109042A1 (zh) 用于sd-wan的通信方法、报文处理方法及网络设备
USRE50148E1 (en) Overlay management protocol for secure routing based on an overlay network
WO2022053007A1 (zh) 网络可达性验证方法及装置、计算机存储介质
CN115865823A (zh) 流量传输方法、装置、计算机设备及存储介质
JP2024534590A (ja) パケット処理方法、ネットワークデバイス、およびネットワークシステム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23896030

Country of ref document: EP

Kind code of ref document: A1