WO2022022366A1 - 隧道bfd会话建立方法及装置 - Google Patents
隧道bfd会话建立方法及装置 Download PDFInfo
- Publication number
- WO2022022366A1 WO2022022366A1 PCT/CN2021/107713 CN2021107713W WO2022022366A1 WO 2022022366 A1 WO2022022366 A1 WO 2022022366A1 CN 2021107713 W CN2021107713 W CN 2021107713W WO 2022022366 A1 WO2022022366 A1 WO 2022022366A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- edge node
- tunnel
- bfd
- bfd session
- session establishment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
- H04L12/4675—Dynamic sharing of VLAN information amongst network nodes
- H04L12/4679—Arrangements for the registration or de-registration of VLAN attribute values, e.g. VLAN identifiers, port VLAN membership
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
- H04L2012/4629—LAN interconnection over a backbone network, e.g. Internet, Frame Relay using multilayer switching, e.g. layer 3 switching
Definitions
- Embodiments of the present invention relate to the field of communications, and in particular, to a method and apparatus for establishing a tunnel BFD session.
- FIG. 1 is a schematic diagram of the structure of the overlay network provided according to related technologies.
- the overlay network includes two different types of networks: edge nodes and intermediate nodes.
- Node customer equipment (Customer Equipment) is connected to the edge node to access the cascading network.
- the edge node will add outer encapsulation for all packets entering the cascading network.
- Layer destination address where the outer source address points to the local edge node with the outer encapsulation added, and the outer destination address points to the remote edge node.
- the remote edge node receives the data packet with the outer encapsulation added, it first removes the data Outer encapsulation of the packet, and then send the packet with the outer encapsulation removed to the client side port of the connected client device.
- a (Bidirectional Forwarding Detection, BFD) session is used to perform connectivity detection on the above-mentioned tunnel.
- BFD Bidirectional Forwarding Detection
- the establishment of the above-mentioned tunnel BFD session is usually established by manual configuration. Since the number of edge nodes in the data center cascading network is very large, the above manual configuration process not only requires a lot of manpower and time costs for configuration operations, but also extremely expensive. prone to configuration errors.
- Embodiments of the present invention provide a method and device for establishing a tunnel BFD session, so as to at least solve a series of problems in the related art that a tunnel BFD session is established by relying on manual configuration.
- a method for establishing a tunnel BFD session which is characterized by being applied to a first edge node, and the method includes:
- Acquire first content information generate a first tunnel bidirectional forwarding detection BFD session establishment packet according to the first content information, and send the first tunnel BFD session establishment packet to a second edge node; wherein the first tunnel BFD session establishment packet is The tunnel BFD session establishment message carries a first BFD state field, and the first BFD state field is used to instruct the second edge node to switch the BFD state of the second edge node according to the first BFD state field;
- the two-tunnel BFD session establishment packet carries a second BFD state field, and the second BFD state field is used to instruct the first edge node to switch the BFD state of the first edge node according to the second BFD state field ;
- a tunnel BFD session is established between the first edge node and the second edge node.
- an apparatus for establishing a tunnel BFD session is further provided, characterized in that it is set at the first edge node, and the apparatus includes:
- a sending module configured to acquire first content information, generate a first tunnel BFD session establishment packet according to the first content information, and send the first tunnel BFD session establishment packet to a second edge node; wherein the The first tunnel BFD session establishment packet carries a first BFD state field, and the first BFD state field is used to instruct the second edge node to switch the BFD of the second edge node according to the first BFD state field state;
- a receiving module configured to receive a second tunnel BFD session establishment message sent by the second edge node; wherein the second tunnel BFD session establishment message is obtained by the second edge node according to the second content information pre-obtained Generated, the second tunnel BFD session establishment packet carries a second BFD state field, and the second BFD state field is used to instruct the first edge node to switch the first edge node according to the second BFD state field.
- BFD status of edge nodes
- an establishment module configured to establish between the first edge node and the second edge node when the BFD state of the first edge node and the BFD state of the second edge node are in preset states Tunnel BFD sessions.
- a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute any one of the above methods when running steps in the examples.
- an electronic device comprising a memory and a processor, wherein the memory stores a computer program, the processor is configured to run the computer program to execute any of the above Steps in Method Examples.
- the first edge node can be made to obtain the first content information, generate the first tunnel bidirectional forwarding detection BFD session establishment packet according to the first content information, and send the first tunnel BFD session establishment packet to the second tunnel BFD session establishment packet.
- the first tunnel BFD session establishment message carries a first BFD state field, and the first BFD state field is used to instruct the second edge node to switch the BFD state of the second edge node according to the first BFD state field; and Further, the second tunnel BFD session establishment packet sent by the second edge node is received by the first edge node; wherein the second tunnel BFD session establishment packet is generated by the second edge node according to the second content information acquired in advance, and the second tunnel BFD session establishment packet is generated by the second edge node according to the pre-acquired second content information.
- the two-tunnel BFD session establishment packet carries a second BFD state field, and the second BFD state field is used to instruct the first edge node to switch the BFD state of the first edge node according to the second BFD state field;
- the BFD state of the node and the BFD state of the second edge node are in preset states, a tunnel BFD session is established between the first edge node and the second edge node. Because the embodiment of the present invention can realize the automatic establishment of the tunnel BFD session between the first edge node and the second edge node without relying on manual operation, the embodiment of the present invention can solve the problem that the tunnel BFD session is established by manual configuration in the related art. A series of problems are generated in order to achieve the effect of realizing the automatic establishment of the tunnel BFD session.
- Fig. 1 is the structural representation of the laminated net provided according to the related art
- FIG. 2 is a schematic diagram of the format of a VXLAN tunnel encapsulation header provided according to an embodiment of the present invention
- FIG. 3 is a schematic diagram of the format of a VXLAN-GPE tunnel encapsulation header provided according to an embodiment of the present invention
- FIG. 4 is a schematic diagram of the format of a Geneve tunnel encapsulation header provided according to an embodiment of the present invention.
- FIG. 5 is a schematic diagram of the format of a BFD control message provided according to an embodiment of the present invention.
- FIG. 6 is a schematic diagram of a BFD session state change provided according to an embodiment of the present invention.
- FIG. 7 is a flowchart of a method for establishing a tunnel BFD session according to an embodiment of the present invention.
- FIG. 8 is a schematic diagram of a format of a first tunnel BFD session establishment message provided according to an embodiment of the present invention.
- FIG. 9 is a schematic diagram of a format of a second tunnel BFD session establishment message provided according to an embodiment of the present invention.
- FIG. 10 is a schematic diagram (1) of the format of a BFD session establishment message provided according to an exemplary embodiment of the present invention.
- FIG. 11 is a schematic diagram (2) of the format of a BFD session establishment message provided according to an exemplary embodiment of the present invention.
- FIG. 12 is a schematic diagram (3) of the format of a BFD session establishment message provided according to an exemplary embodiment of the present invention.
- FIG. 13 is a flowchart of an apparatus for establishing a tunnel BFD session according to an embodiment of the present invention.
- the layered network tunneling protocols involved in the layered network technology include the Virtual eXtensible Local Area Network (VXLAN) tunneling protocol, the Generic Protocol Extension for VXLAN, VXLAN-GPE ) tunneling protocol, Generic Network Virtualization Encapsulation (Geneve) tunneling protocol.
- VXLAN Virtual eXtensible Local Area Network
- VXLAN-GPE Generic Protocol Extension for VXLAN
- GPE Generic Network Virtualization Encapsulation
- the above three tunneling protocols are indicated by a specific User Datagram Protocol (UDP) destination port number.
- UDP User Datagram Protocol
- FIG. 2 is a schematic diagram of the format of a VXLAN tunnel encapsulation header provided according to an embodiment of the present invention.
- the VXLAN tunneling protocol can be indicated by the UDP destination port number 4789
- FIG. 3 is an embodiment of the present invention.
- Provided is a schematic diagram of the format of the VXLAN-GPE tunnel encapsulation header.
- the VXLAN-GPE tunnel protocol can be indicated by the UDP destination port number 4790.
- Figure 4 is a schematic diagram of the format of the Geneve tunnel encapsulation header provided according to an embodiment of the present invention. , as shown in Figure 4, the Geneve tunneling protocol can be indicated by the UDP destination port number 6081.
- the above three tunnel encapsulation headers all carry a virtual network identifier (Virtual Network Interface, VNI) used to isolate the virtual network.
- VNI Virtual Network Interface
- the VXLAN-GPE tunnel encapsulation header and the Geneve tunnel encapsulation header also carry the Next Protocol or Protocol Type used to indicate the next-layer protocol, while VXLAN does not carry a similar indication field; therefore, the VXLAN-GPE tunneling protocol and Geneve
- the tunneling protocol can support many different types of encapsulation modes, for example, the Ethernet frame encapsulation mode and the Internet Protocol (Internet Protocol, IP) packet encapsulation mode; VXLAN can only support the Ethernet frame encapsulation mode.
- IP Internet Protocol
- VXLAN tunnels, VXLAN-GPE tunnels and Geneve tunnels can perform connectivity detection through the BFD basic protocol.
- the basic BFD protocol is applied to the connectivity detection process of the VXLAN tunnel, the VXLAN-GPE tunnel and the Geneve tunnel, the BFD session established on the above-mentioned tunnel may be called a tunnel BFD session.
- FIG. 5 is a schematic diagram of the format of a BFD control packet provided according to an embodiment of the present invention, the BFD control packet (BFD Detection Control Packet) specified by the BFD basic protocol, the format of which is shown in FIG. 5 .
- BFD control packet BFD Detection Control Packet
- My Discriminator My Discriminator
- peer identifier Your Discriminator
- the establishment of a tunnel BFD session usually requires the two ends of the session to send three BFD control packets to each other, so as to realize the status of the BFD session from going offline (DOWN), to starting (INIT), and then going online (UP).
- a schematic diagram of a state change of a BFD session provided by an embodiment of the present invention, the state change of the above-mentioned BFD session is shown in FIG. 6 .
- a BFD session usually runs in asynchronous mode. In this mode, the network nodes at both ends of the BFD session periodically exchange BFD control packets.
- the BFD control message announces that the BFD session has changed from the online state to the offline state, and may trigger subsequent operations such as protection switching.
- the establishment and transmission of the above-mentioned BFD control packets and the establishment of the tunnel BFD session are all manually configured by the administrator.
- one or more tunnels for packet forwarding are established between each two edge nodes based on the client-side port, and a tunnel BFD session can be enabled for each tunnel.
- Establishing a BFD session in the above manual configuration method not only requires a lot of manpower and time for configuration operations, but also is prone to configuration errors.
- the embodiments of the present invention provide a method and device for establishing a tunnel BFD session, which can automatically realize the establishment of the above-mentioned tunnel BFD session, thereby significantly improving the efficiency and accuracy of the BFD session establishment.
- the following describes the method and device for establishing a tunnel BFD session in the embodiments of the present invention:
- an embodiment of the present invention provides a method for establishing a tunnel BFD session, which is applied to a first edge node.
- FIG. 7 is a flowchart of a method for establishing a tunnel BFD session according to an embodiment of the present invention. As shown in FIG. The method for establishing a tunnel BFD session in the embodiment of the invention includes:
- the first edge network node acquires first content information, generates a first tunnel BFD session establishment packet according to the first content information, and sends the first tunnel BFD session establishment packet to the second edge node; wherein the first tunnel BFD session establishment packet is The session establishment message carries a first BFD state field, and the first BFD state field is used to instruct the second edge node to switch the BFD state of the second edge node according to the first BFD state field;
- the first edge network node receives the second tunnel BFD session establishment packet sent by the second edge node; wherein the second tunnel BFD session establishment packet is generated by the second edge node according to the pre-acquired second content information, and the second tunnel BFD session establishment packet is generated by the second edge node according to the pre-acquired second content information.
- the tunnel BFD session establishment message carries a second BFD state field, and the second BFD state field is used to instruct the first edge node to switch the BFD state of the first edge node according to the second BFD state field;
- the first edge node and the second edge node in the embodiment of the present invention are used to indicate edge nodes on both sides of the tunnel.
- the order of step S102 and step S104 can be interchanged.
- the first edge node generates and sends the first tunnel BFD session establishment message to the second edge node, and generates a message with the second edge node.
- the sequence of sending the second tunnel BFD session establishment message to the first edge node is not limited. The above process is illustrated below by way of example:
- the first edge node may first generate the first tunnel BFD session establishment packet according to the first content information, send the first tunnel BFD session establishment packet to the second edge node, and then receive the message sent by the second edge node.
- the second tunnel BFD session establishment message may first receive the second tunnel BFD session establishment packet sent by the second edge node, then generate the first tunnel BFD session establishment packet according to the first content information, and send the first tunnel BFD session A session establishment message is sent to the second edge node.
- the first edge node may receive the second tunnel BFD session establishment packet sent by the second edge node, generate the first tunnel BFD session establishment packet according to the first content information at the same time, and send the first tunnel BFD session Create a message to the second edge node.
- the edge node that preferentially generates and sends the tunnel BFD session establishment message to another edge node may be used as the first edge node, and the corresponding other edge node may be used as the second edge node.
- the management entity of the data center network may issue a tunnel BFD session establishment request to the first edge network node to instruct the first edge node to establish a tunnel BFD session with the second edge node, that is, the first edge network
- the node acquires a tunnel BFD session establishment request for instructing the establishment of a tunnel BFD session between the first edge node and the second edge node.
- the above-mentioned tunnel BFD session establishment request may not only be sent to the first edge node, but also may be sent to the second edge node, and may also be sent to the first edge node and the second edge node at the same time. This embodiment of the present invention does not limit this.
- acquiring the first content information includes:
- the first edge node can request the second edge node to return the first response message carrying the first content information through the first request message, so that the first edge node can obtain the first edge node. content information, and then generate and send the first tunnel BFD session establishment message.
- the first content information carried in the first response message returned by the second edge node may be determined by the second edge node according to the client-side port to which it is connected.
- the above-mentioned first content information includes at least one of the following:
- FIG. 8 is a schematic diagram of the format of a first tunnel BFD session establishment packet provided according to an embodiment of the present invention.
- the encapsulation format of the first tunnel BFD session establishment packet is shown in FIG. 8 .
- the first tunnel BFD session establishment packet In the BFD session establishment packet the first BFD status field is encapsulated in the first tunnel BFD session establishment packet, and the first tunnel BFD session establishment packet further includes: a tunnel encapsulation packet header, a data address packet header, a Indicates the UDP header and peer identifier of the user datagram protocol encapsulated by the tunnel;
- the encapsulation header is used to carry the VNI; the data address header is used to carry the MAC address and IP address; the UDP header used to indicate tunnel encapsulation is used to carry the tunnel encapsulation protocol; the peer identifier is used to carry the tunnel BFD session local identifier.
- the data address packet header is composed of the Ethernet header and the IP header; or, in the case that the encapsulation mode is the IP packet encapsulation mode, the data address packet The packet header consists of the IP header.
- the second edge node can obtain the second content information in various ways.
- the first request message carries the second content information
- the second content message is obtained by the second edge node according to the information.
- the second edge node can obtain the second content information carried therein, and then generate a second tunnel BFD session establishment message according to the second content information, and sent to the first edge node.
- the second edge node may actively request the first edge node to send the second content information, that is, in the foregoing step S104, before receiving the second tunnel BFD session establishment packet sent by the second edge node, further include: :
- the second edge node after receiving the second request information returned by the first edge node, the second edge node can obtain the second content information carried therein, and then generate a second tunnel BFD session establishment message according to the second content information, and sent to the first edge node.
- the composition of the second content information is the same.
- the second content information includes at least one of the following:
- the MAC address of the client port connected to the first edge node, the IP address of the client port connected to the first edge node, the VNI to which the client port connected to the first edge node belongs, the client port connected to the first edge node The tunnel encapsulation protocol adopted by the side port, the tunnel encapsulation mode adopted by the client port connected to the first edge node, and the tunnel BFD session local identifier configured for the first edge node on the client port connected to the first edge node.
- FIG. 9 is a schematic diagram of a format of a second tunnel BFD session establishment packet provided according to an embodiment of the present invention.
- the encapsulation format of the second tunnel BFD session establishment packet is shown in FIG. 9 .
- FIG. 9 an example is implemented
- the above-mentioned second BFD status field is encapsulated in the second tunnel BFD session establishment packet, and the second tunnel BFD session establishment packet further includes: a tunnel encapsulation packet header, a data address packet header, a packet used to indicate tunnel encapsulation UDP header, peer identifier;
- the encapsulation header is used to carry the VNI; the data address header is used to carry the MAC address and IP address; the UDP header used to indicate tunnel encapsulation is used to carry the tunnel encapsulation protocol; the peer identifier is used to carry the tunnel BFD session local identifier.
- the data address packet header is composed of the Ethernet header and the IP header; or, in the case that the encapsulation mode is the IP packet encapsulation mode, the data address packet The packet header consists of the IP header.
- the above-mentioned first request message, the first response message, the second request message and the second response message can be realized based on different mechanisms or protocols, and in an example, the above-mentioned first request message can be based on the Internet Control Message Protocol (Internet Control Message Protocol).
- ICMP Internet Control Message Protocol
- the above-mentioned second request message is generated according to the Internet Control Message Protocol ICMP Ping mechanism, and the second response message is generated according to the ICMP Ping mechanism.
- the first tunnel BFD session establishment packet and the second tunnel BFD session establishment packet are packets generated based on the ICMP Ping mechanism.
- the first request message is generated according to the interior gateway protocol (Interior Gateway Protocol, IGP), and the first response message is generated according to the IGP; correspondingly, the second request message is generated according to the interior gateway protocol IGP, and the second response message is generated according to the IGP generation.
- IGP Interior Gateway Protocol
- the first tunnel BFD session establishment packet and the second tunnel BFD session establishment packet are packets generated based on IGP.
- the first request message is generated according to the Border Gateway Protocol (Border Gateway Protocol, BGP) protocol, and the first response message is generated according to BGP; correspondingly, the second request message is generated according to the Border Gateway Protocol (BGP) protocol, and the second response message is generated according to the BGP protocol.
- BGP Border Gateway Protocol
- Messages are generated according to BGP.
- the first tunnel BFD session establishment packet and the second tunnel BFD session establishment packet are packets generated based on BGP.
- the establishment of the first tunnel BFD session establishment packet and the second tunnel BFD session can further precisely control the scope and timing of its influence. setup time.
- the first BFD status field in the first tunnel BFD session establishment packet may be determined by the current BFD status of the first edge node. Therefore, after receiving the first tunnel BFD session establishment packet, the second edge node receives the first tunnel BFD session establishment packet. , the BFD state of itself can be switched according to the BFD state indicated in the first BFD state field.
- the second BFD status field in the second tunnel BFD session establishment packet can be determined by the current BFD status of the second edge node. Therefore, after the first edge node receives the second tunnel BFD session establishment packet, the It can switch its own BFD state according to the BFD state indicated in the second BFD state field.
- the method further includes:
- the BFD state of the first edge node includes one of the following: DOWN state, INIT state, and UP state; the BFD state of the second edge node includes one of the following: DOWN state, INIT state, and UP state.
- the BFD states of the first edge node and the second edge node are both in the DOWN state.
- the first edge node sends the first tunnel BFD session establishment packet to the second edge node (denoted as The first BFD state field in the first tunnel BFD session establishment packet 01) indicates the DOWN state.
- the second edge node switches its own BFD state to the INIT state.
- the second BFD status field in the second tunnel BFD session establishment packet (referred to as the second tunnel BFD session establishment packet 01) sent by the second edge node to the first edge node indicates as follows: In the DOWN state, after receiving the second tunnel BFD session establishment packet 01, the first edge node switches its own BFD state to the INIT state.
- the first edge node repeatedly sends the first tunnel BFD session establishment packet (referred to as the first tunnel BFD session establishment packet 02) to the second edge node, and the first tunnel BFD session establishment packet 02 is the first one.
- the BFD state field indicates the current BFD state of the first edge node, that is, the INIT state.
- the second edge node switches its BFD state to the UP state.
- the second edge node repeatedly sends the second tunnel BFD session establishment packet (referred to as the second tunnel BFD session establishment packet 02) to the first edge node, and the second tunnel BFD session establishment packet 02 is the second one.
- the BFD state field indicates the current BFD state of the second edge node, that is, the INIT state. After receiving the second tunnel BFD session establishment packet 02, the first edge node switches its BFD state to the UP state.
- the first edge node repeatedly sends the first tunnel BFD session establishment packet (referred to as the first tunnel BFD session establishment packet 03) to the second edge node, and the first tunnel BFD session establishment packet 03 is the first
- the BFD state field indicates the current BFD state of the first edge node, that is, the UP state.
- the second edge node may also repeatedly send the second tunnel BFD session establishment packet (referred to as the second tunnel BFD session establishment packet 03) to the first edge node.
- the second BFD state field indicates the current BFD state of the second edge node, that is, the UP state. Since its own BFD session state is already in the UP state, the first edge node can be determined through the first tunnel BFD session establishment packet 03. Both the BFD state and the second edge node are in the UP state.
- the above-mentioned BFD state of the first edge node and the BFD state of the second edge node are both in the UP state, that is, the BFD state of the first edge node and the BFD state of the second edge node in the embodiment of the present invention are in the preset state.
- a tunnel BFD session can be established between the first edge node and the second edge node.
- the first edge node can automatically generate the first tunnel BFD session establishment message and send it to the second edge node.
- the second tunnel BFD session establishment message can also be automatically generated by the second edge node and sent to the first edge node, so that on the one hand, between the first edge node and the second edge node can be carried in the tunnel BFD
- the BFD state field in the session establishment packet switches the state of the edge node itself, so that when the BFD state of the first edge node and the second edge node reaches the preset state, the BFD session establishment packet of the first tunnel and the second edge node can be connected according to the first tunnel BFD session establishment packet.
- the two-tunnel BFD session establishment message implements the establishment of a tunnel BFD session.
- tunnel BFD sessions do not depend on the manual configuration of the administrator, and the establishment of the tunnel BFD session can be realized completely based on the automatic interaction between the first edge node and the second edge node.
- the embodiment of the present invention can realize the automatic establishment of a tunnel BFD session between any two edge nodes without manual participation, so the efficiency and accuracy of the tunnel BFD session establishment can be significantly improved, so as to solve the problem in the related art.
- Tunnel BFD sessions rely on manual configuration to create problems such as low processing efficiency and errors.
- edge node 1 has one client port Int11
- edge node 2 has one client port Int21. Both ports Int11 and Int21 use the Geneve tunnel encapsulation protocol and the Ethernet frame encapsulation mode.
- the VNI to which ports Int11 and Int21 belong. is 10.
- the data center network administrator delivers a command to automatically establish a tunnel BFD session to edge node 1 , specifying that a tunnel BFD session needs to be established with edge node 2 .
- the edge node 1 sends an ICMP Ping request message to the edge node 2, requesting the edge node 2 to send back information required for automatically establishing a tunnel BFD session.
- the edge node 2 after receiving the ICMP Ping request message, the edge node 2 sends back an ICMP Ping response message to the edge node 1, which carries the information required for automatically establishing a tunnel BFD session, specifically including the following information:
- the tunnel encapsulation protocol adopted by the client-side port Int21 of the edge node 2 is Geneve, and the adopted encapsulation mode is the Ethernet frame encapsulation mode;
- the local identifier of the tunnel BFD session configured for the edge node 1 by the client-side port Int21 of the edge node 2 is Discr2.
- the edge node 1 after receiving the ICMP Ping response message, uses the information carried in the message to construct a tunnel BFD session establishment message.
- Fig. 10 is a schematic diagram (1) of the format of a BFD session establishment message provided according to an exemplary embodiment of the present invention.
- the format of the above-mentioned BFD session establishment message is shown in Fig. 10, wherein the MAC address, IP address and VNI of Int21 10
- the destination MAC address in the Inner Ethernet Header, the destination IP address in the Inner IPvX Header, and the virtual network identifier in the Geneve Header are respectively filled in;
- Int21 The tunnel BFD session local identifier Discr2 configured for edge node 1 is filled in BFD Control
- the peer identifier in the Packet is the packet.
- This exemplary embodiment describes a process for an edge node to generate a tunnel BFD session establishment message.
- Edge node 1 in the data center network has two client-side ports Int11 and Int12, and edge node 2 has two client-side ports Int21 and Int22.
- Ports Int11, Int12, Int21, and Int22 all use VXLAN-GPE tunnel encapsulation protocol and IP packets.
- the VNI to which ports Int11 and Int21 belong is 10
- the VNI to which ports Int12 and Int22 belong is 20.
- the data center network administrator delivers a command to automatically establish a tunnel BFD session to edge node 1 , specifying that a tunnel BFD session needs to be established with edge node 2 .
- the edge node 1 sends an ICMP Ping request message to the edge node 2, requesting the edge node 2 to send back information required for automatically establishing a tunnel BFD session.
- the edge node 2 after receiving the ICMP Ping request message, the edge node 2 sends back an ICMP Ping response message to the edge node 1, which carries the information required for automatically establishing a tunnel BFD session, specifically including the following information:
- the tunnel encapsulation protocol adopted by the client-side ports Int21 and Int22 of the edge node 2 is VXLAN-GPE, and the adopted encapsulation mode is the IP packet encapsulation mode;
- the local identifier of the tunnel BFD session configured by the client port Int21 of the edge node 2 for the edge node 1 is Discr21, and the client port Int22 of the edge node 2 configured for the edge node 1
- the local identifier of the tunnel BFD session is Discr22.
- the edge node 1 after receiving the ICMP Ping response message, uses the information carried in the message to construct a tunnel BFD session establishment message.
- FIG. 11 is a schematic diagram (2) of the format of the BFD session establishment packet provided according to an exemplary embodiment of the present invention.
- Figure 11 shows the format of the BFD session establishment message. Since the VNIs to which Int21 and Int22 belong are different, tunnel BFD session establishment packets are respectively constructed for VNI 10 to which Int21 belongs and VNI 20 to which Int22 belongs.
- the IP address of Int21 and the VNI 10 to which it belongs are respectively filled in the destination IP address in the Inner IPvX Header and the virtual network identifier in the VXLAN-GPE Header; Int21 is for edge nodes. 1.
- the configured tunnel BFD session local identifier Discr21 is filled with the peer identifier in the BFD Control Packet; in the tunnel BFD session establishment message constructed for VNI 20, the IP address of Int22 and the VNI 20 to which it belongs are filled in Inner IPvX respectively The destination IP address in the Header, the virtual network identifier in the VXLAN-GPE Header; Int22, the tunnel BFD session local identifier Discr22 configured for edge node 1 is filled with the peer identifier in the BFD Control Packet.
- edge node 1 has one client-side port Int11
- edge node 2 has two client-side ports Int21 and Int22.
- Ports Int11, Int21, and Int22 all use Geneve tunnel encapsulation protocol and Ethernet frame encapsulation mode.
- Ports Int11 and Int22 The VNI to which Int21 belongs is 10, and the VNI to which port Int22 belongs is 20.
- the data center network administrator delivers a command to automatically establish a tunnel BFD session to edge node 1 , specifying that a tunnel BFD session needs to be established with edge node 2 .
- the edge node 1 sends an ICMP Ping request message to the edge node 2, requesting the edge node 2 to send back information required for automatically establishing a tunnel BFD session.
- the edge node 2 after receiving the ICMP Ping request message, the edge node 2 sends back an ICMP Ping response message to the edge node 1, which carries the information required for automatically establishing a tunnel BFD session, specifically including the following information:
- the tunnel encapsulation protocol adopted by the client-side ports Int21 and Int22 of the edge node 2 is Geneve, and the adopted encapsulation mode is the Ethernet frame encapsulation mode;
- the local identifier of the tunnel BFD session configured by the client port Int21 of the edge node 2 for the edge node 1 is Discr21, and the client port Int22 of the edge node 2 configured for the edge node 1
- the local identifier of the tunnel BFD session is Discr22.
- the edge node 1 uses the information carried in the message to construct a tunnel BFD session establishment message for the VNI 10. Since edge node 1 does not contain a client-side port belonging to VNI 20, no tunnel BFD session establishment message will be constructed for VNI 20.
- the data center network administrator delivers a command to automatically establish a tunnel BFD session to edge node 2 , specifying that a tunnel BFD session needs to be established with edge node 1 .
- the edge node 2 sends an ICMP Ping request message to the edge node 1, requesting the edge node 1 to send back information required for automatically establishing a tunnel BFD session.
- the edge node 1 after receiving the ICMP Ping request message, the edge node 1 sends back an ICMP Ping response message to the edge node 2, which carries the information required for automatically establishing the tunnel BFD session.
- the edge node 2 after receiving the ICMP Ping response message, uses the information carried in the message to construct a tunnel BFD session establishment message for the VNI 10.
- the tunnel BFD session of the VNI 10 can be established.
- edge node 1 has one client port Int11
- edge node 2 has one client port Int21. Both ports Int11 and Int21 use the Geneve tunnel encapsulation protocol and the Ethernet frame encapsulation mode.
- the VNI to which ports Int11 and Int21 belong. is 10.
- the data center network administrator delivers a command to automatically establish a tunnel BFD session to edge node 1 , specifying that a tunnel BFD session needs to be established with edge node 2 .
- the edge node 1 sends an ICMP Ping request message to the edge node 2, requesting the edge node 2 to send back information required for automatically establishing a tunnel BFD session.
- the ICMP Ping request message also carries the information required by the edge node 2 for automatically establishing the tunnel BFD session, specifically including the following information:
- the tunnel encapsulation protocol adopted by the client-side port Int11 of the edge node 1 is Geneve, and the adopted encapsulation mode is the Ethernet frame encapsulation mode;
- the local identifier of the tunnel BFD session configured for the edge node 2 by the client-side port Int11 of the edge node 1 is Discr1.
- the edge node 2 after receiving the ICMP Ping request message, the edge node 2 sends back an ICMP Ping response message to the edge node 1, which carries the information required for automatically establishing a tunnel BFD session, specifically including the following information:
- the tunnel encapsulation protocol adopted by the client-side port Int21 of the edge node 2 is Geneve, and the adopted encapsulation mode is the Ethernet frame encapsulation mode;
- the local identifier of the tunnel BFD session configured for the edge node 1 by the client-side port Int21 of the edge node 2 is Discr2.
- the edge node 2 uses the information carried in the received ICMP Ping request message to construct a tunnel BFD session establishment message.
- the format of the BFD session establishment message is shown in Figure 12, where the MAC address, IP address and VNI 10 of Int11 are respectively filled in the destination MAC address in the Inner Ethernet Header, the destination IP address in the Inner IPvX Header, and the Geneve Header
- the virtual network identifier in Int11, the local identifier Discr1 of the tunnel BFD session configured for edge node 2 is filled with the peer identifier in the BFD Control Packet.
- the edge node 1 uses the information carried in the message to construct a tunnel BFD session establishment message, and the message format is shown in Figure 9.
- the MAC address, IP address and VNI 10 of Int21 are respectively filled in the destination MAC address in the Inner Ethernet Header, the destination IP address in the Inner IPvX Header, and the virtual network identifier in the Geneve Header; Int21 is configured for edge node 1.
- the tunnel BFD session local identifier Discr2 is filled with the peer identifier in the BFD Control Packet.
- the tunnel BFD session can be established.
- the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course can also be implemented by hardware, but in many cases the former is better implementation.
- the technical solutions of the present invention can be embodied in the form of software products in essence, or the parts that make contributions to related technologies.
- the computer software products are stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) ), including several instructions to enable a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods described in the various embodiments of the present invention.
- an embodiment of the present invention further provides a tunnel BFD session establishment device, which is set at the first edge node, and the device is used to implement the above embodiments and preferred implementations, which have been described and will not be repeated.
- the term "module” may be a combination of software and/or hardware that implements a predetermined function.
- the apparatus described in the following embodiments is preferably implemented in software, implementations in hardware, or a combination of software and hardware, are also possible and contemplated.
- FIG. 13 is a structural block diagram of an apparatus for establishing a tunnel BFD session provided according to an embodiment of the present invention. As shown in FIG. 13 , the apparatus for establishing a tunnel BFD session in the embodiment of the present invention includes:
- the sending module 202 is configured to obtain first content information, generate a first tunnel BFD session establishment packet according to the first content information, and send the first tunnel BFD session establishment packet to the second edge node; wherein, the first tunnel BFD session The establishment message carries a first BFD state field, and the first BFD state field is used to instruct the second edge node to switch the BFD state of the second edge node according to the first BFD state field;
- the receiving module 204 is configured to receive the second tunnel BFD session establishment packet sent by the second edge node; wherein the second tunnel BFD session establishment packet is generated by the second edge node according to the second content information acquired in advance, and the second tunnel BFD session establishment packet is generated by the second edge node according to the pre-acquired second content information.
- the BFD session establishment message carries a second BFD state field, and the second BFD state field is used to instruct the first edge node to switch the BFD state of the first edge node according to the second BFD state field;
- the establishing module 206 is configured to establish a tunnel BFD session between the first edge node and the second edge node when the BFD state of the first edge node and the BFD state of the second edge node are in preset states.
- the above-mentioned acquiring the first content information includes:
- the above-mentioned first content information includes at least one of the following:
- the MAC address of the media access control layer of the client port connected to the second edge node, the Internet Protocol IP address of the client port connected to the second edge node, and the virtual network to which the client port connected to the second edge node belongs Identifies the VNI, the tunnel encapsulation protocol adopted by the client port connected to the second edge node, the tunnel encapsulation mode adopted by the client port connected to the second edge node, and the client port connected to the second edge node for the first edge node.
- the local identifier of the configured tunnel BFD session is Identifies the VNI, the tunnel encapsulation protocol adopted by the client port connected to the second edge node, the tunnel encapsulation mode adopted by the client port connected to the second edge node, and the client port connected to the second edge node for the first edge node.
- the above-mentioned first BFD status field is encapsulated in a first tunnel BFD session establishment packet
- the first tunnel BFD session establishment packet further includes: a tunnel encapsulation packet header, a data address packet header, a To indicate the user datagram protocol UDP header of tunnel encapsulation, peer identifier;
- the encapsulation header is used to carry the VNI; the data address header is used to carry the MAC address and IP address; the UDP header used to indicate tunnel encapsulation is used to carry the tunnel encapsulation protocol; the peer identifier is used to carry the tunnel BFD session local identifier.
- the data address packet header is composed of the Ethernet header and the IP header; or, in the case that the encapsulation mode is the IP packet encapsulation mode, the data address packet The packet header consists of the IP header.
- the first request message carries second content information
- the second content message is acquired by the second edge node according to the first request message
- the method before receiving the second tunnel BFD session establishment message sent by the second edge node, the method further includes:
- the above-mentioned second content information includes at least one of the following:
- the MAC address of the client port connected to the first edge node, the IP address of the client port connected to the first edge node, the VNI to which the client port connected to the first edge node belongs, the client port connected to the first edge node The tunnel encapsulation protocol adopted by the side port, the tunnel encapsulation mode adopted by the client port connected to the first edge node, and the tunnel BFD session local identifier configured for the first edge node on the client port connected to the first edge node.
- the above-mentioned second BFD status field is encapsulated in a second tunnel BFD session establishment packet
- the second tunnel BFD session establishment packet further includes: a tunnel encapsulation packet header, a data address packet header, a UDP header and peer identifier to indicate tunnel encapsulation;
- the encapsulation header is used to carry the VNI; the data address header is used to carry the MAC address and IP address; the UDP header used to indicate tunnel encapsulation is used to carry the tunnel encapsulation protocol; the peer identifier is used to carry the tunnel BFD session local identifier.
- the data address packet header is composed of the Ethernet header and the IP header; or, in the case that the encapsulation mode is the IP packet encapsulation mode, the data address packet The packet header consists of the IP header.
- the above-mentioned first request message is generated according to Internet Control Message Protocol ICMP Ping, and the first response message is generated according to ICMP Ping; or, the first request message is generated according to interior gateway protocol IGP, and the first response message is generated according to IGP or, the first request message is generated according to the Border Gateway Protocol (BGP) protocol, and the first response message is generated according to BGP.
- ICMP Ping Internet Control Message Protocol
- IGP interior gateway protocol
- BGP Border Gateway Protocol
- the above-mentioned second request message is generated according to Internet Control Message Protocol ICMP Ping, and the second response message is generated according to ICMP Ping; or, the second request message is generated according to interior gateway protocol IGP, and the second response message is generated according to IGP or, the second request message is generated according to the Border Gateway Protocol (BGP) protocol, and the second response message is generated according to the BGP protocol.
- ICMP Ping Internet Control Message Protocol
- IGP interior gateway protocol
- BGP Border Gateway Protocol
- the method before acquiring the first content information, the method further includes:
- tunnel BFD session establishment request is used to instruct the first edge node and the second edge node to establish a tunnel BFD session.
- the method further includes:
- the BFD state of the first edge node includes one of the following: offline DOWN state, startup INIT state, and online UP state; the BFD state of the second edge node includes one of the following: DOWN state, INIT state, and UP state.
- a tunnel BFD session is established between the first edge node and the second edge node, and further include:
- a tunnel BFD session is established between the first edge node and the second edge node.
- the above modules can be implemented by software or hardware, and the latter can be implemented in the following ways, but not limited to this: the above modules are all located in the same processor; or, the above modules can be combined in any combination The forms are located in different processors.
- an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute any one of the above method embodiments when running. A step of.
- the above-mentioned computer-readable storage medium may include, but is not limited to, a USB flash drive, a read-only memory (Read-Only Memory, referred to as ROM), a random access memory (Random Access Memory, referred to as RAM), Various media that can store computer programs, such as removable hard disks, magnetic disks, or optical disks.
- ROM Read-Only Memory
- RAM Random Access Memory
- an embodiment of the present invention also provides an electronic device, including a memory and a processor, where a computer program is stored in the memory, and the processor is configured to run the computer program to execute any of the above method embodiments. step.
- the above-mentioned electronic device may further include a transmission device and an input-output device, wherein the transmission device is connected to the above-mentioned processor, and the input-output device is connected to the above-mentioned processor.
- modules or steps of the present invention can be implemented by a general-purpose computing device, which can be centralized on a single computing device, or distributed in a network composed of multiple computing devices
- they can be implemented in program code executable by a computing device, so that they can be stored in a storage device and executed by the computing device, and in some cases, can be performed in a different order than shown here.
- the described steps, or they are respectively made into individual integrated circuit modules, or a plurality of modules or steps in them are made into a single integrated circuit module to realize.
- the present invention is not limited to any particular combination of hardware and software.
- the first edge node can obtain the first content information, generate the first tunnel bidirectional forwarding detection BFD session establishment packet according to the first content information, and send the first tunnel BFD session establishment packet to the second edge node;
- a tunnel BFD session establishment packet carries a first BFD state field, and the first BFD state field is used to instruct the second edge node to switch the BFD state of the second edge node according to the first BFD state field;
- the edge node receives the second tunnel BFD session establishment packet sent by the second edge node; wherein the second tunnel BFD session establishment packet is generated by the second edge node according to the second content information acquired in advance, and the second tunnel BFD session establishment packet is generated.
- the text carries the second BFD state field, and the second BFD state field is used to instruct the first edge node to switch the BFD state of the first edge node according to the second BFD state field;
- the BFD state of the second edge node is in a preset state, a tunnel BFD session is established between the first edge node and the second edge node. Since the embodiment of the present invention can realize the automatic establishment of the tunnel BFD session between the first edge node and the second edge node without relying on manual operation, the embodiment of the present invention can solve the problem that the tunnel BFD session is established by manual configuration in the related art. A series of problems are generated in order to achieve the effect of realizing the automatic establishment of the tunnel BFD session.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Health & Medical Sciences (AREA)
- Cardiology (AREA)
- General Health & Medical Sciences (AREA)
Abstract
Description
Claims (18)
- 一种隧道BFD会话建立方法,应用于第一边缘节点,所述方法包括:获取第一内容信息,并根据所述第一内容信息生成第一隧道双向转发检测BFD会话建立报文,发送所述第一隧道BFD会话建立报文至第二边缘节点;其中,所述第一隧道BFD会话建立报文中携带有第一BFD状态字段,所述第一BFD状态字段用于指示所述第二边缘节点根据所述第一BFD状态字段切换所述第二边缘节点的BFD状态;接收所述第二边缘节点发送的第二隧道BFD会话建立报文;其中,所述第二隧道BFD会话建立报文由所述第二边缘节点根据预先获取的第二内容信息生成,所述第二隧道BFD会话建立报文中携带有第二BFD状态字段,所述第二BFD状态字段用于指示所述第一边缘节点根据所述第二BFD状态字段切换所述第一边缘节点的BFD状态;在所述第一边缘节点的BFD状态与所述第二边缘节点的BFD状态处于预设状态的情形下,在所述第一边缘节点与所述第二边缘节点之间建立隧道BFD会话。
- 根据权利要求1所述的方法,其中,所述获取第一内容信息,包括:发送第一请求消息至所述第二边缘节点,以供所述第二边缘节点响应于所述第一请求消息返回第一响应消息;其中,所述第一响应消息中携带有所述第一内容信息;根据所述第一响应消息获取所述第一内容信息。
- 根据权利要求2所述的方法,其中,所述第一内容信息包括以下至少之一:所述第二边缘节点所连接的客户侧端口的介质访问控制层MAC地址,所述第二边缘节点所连接的客户侧端口的网际互连协议IP地址,所述第二边缘节点所连接的客户侧端口所属的虚拟网络标识VNI,所述第二边缘节点所连接的客户侧端口采用的隧道封装协议,所述第二边缘节点所连接的客户侧端口采用的隧道封装模式,所述第二边缘节点所连接的客户侧端口针对第一边缘节点配置的隧道BFD会话本地标识符。
- 根据权利要求3所述的方法,其中,所述第一BFD状态字段封装于所述第一隧道BFD会话建立报文中,所述第一隧道BFD会话建立报文还包括有:隧道封装报文头、数据地址报文头、用于指示隧道封装的用户数据报协议UDP头、对端标识符;其中,所述封装报文头用于携带所述VNI;数据地址报文头用于携带所述MAC地址与所述IP地址;所述用于指示隧道封装的UDP头用于携带所述隧道封装协议;所述对端标识符用于携带所述隧道BFD会话本地标识符。
- 根据权利要求3所述的方法,其中,在所述封装模式为Ethernet帧封装模式的情形下,所述数据地址报文头由以太头与IP头构成;或者,在在所述封装模式为IP报文封装模式的情形下,所述数据地址报文头由IP头构成。
- 根据权利要求2所述的方法,其中,所述第一请求消息中携带有所述第二内容信息,所述第二内容消息由所述第二边缘节点根据所述第一请求消息获取。
- 根据权利要求1所述的方法,其中,所述接收所述第二边缘节点发送的第二隧道BFD 会话建立报文之前,还包括:接收所述第二边缘节点发送的第二请求消息,并根据所述第二请求消息返回携带有所述第二内容信息的第二响应消息至所述第二边缘节点,以供所述第二边缘节点根据所述第二响应消息获取所述第二内容信息。
- 根据权利要求6或7所述的方法,其中,所述第二内容信息包括以下至少之一:所述第一边缘节点所连接的客户侧端口的MAC地址,所述第一边缘节点所连接的客户侧端口的IP地址,所述第一边缘节点所连接的客户侧端口所属的VNI,所述第一边缘节点所连接的客户侧端口采用的隧道封装协议,所述第一边缘节点所连接的客户侧端口采用的隧道封装模式,所述第一边缘节点所连接的客户侧端口针对所述第一边缘节点配置的隧道BFD会话本地标识符。
- 根据权利要求8所述的方法,其中,所述第二BFD状态字段封装于所述第二隧道BFD会话建立报文中,所述第二隧道BFD会话建立报文还包括有:隧道封装报文头、数据地址报文头、用于指示隧道封装的UDP头、对端标识符;其中,所述封装报文头用于携带所述VNI;数据地址报文头用于携带所述MAC地址与所述IP地址;所述用于指示隧道封装的UDP头用于携带所述隧道封装协议;所述对端标识符用于携带所述隧道BFD会话本地标识符。
- 根据权利要求9所述的方法,其中,在所述封装模式为Ethernet帧封装模式的情形下,所述数据地址报文头由以太头与IP头构成;或者,在在所述封装模式为IP报文封装模式的情形下,所述数据地址报文头由IP头构成。
- 根据权利要求2所述的方法,其中,所述第一请求消息根据互联网控制消息协议ICMP Ping生成,所述第一响应消息根据所述ICMP Ping生成;或者,所述第一请求消息根据内部网关协议IGP生成,所述第一响应消息根据所述IGP生成;或者,所述第一请求消息根据边界网关协议BGP协议生成,所述第一响应消息根据所述BGP生成。
- 根据权利要求6或7所述的方法,其中,所述第二请求消息根据互联网控制消息协议ICMP Ping生成,所述第二响应消息根据所述ICMP Ping生成;或者,所述第二请求消息根据内部网关协议IGP生成,所述第二响应消息根据所述IGP生成;或者,所述第二请求消息根据边界网关协议BGP协议生成,所述第二响应消息根据所述BGP生成。
- 根据权利要求1至7任一项中所述的方法,其中,所述获取第一内容信息之前,还包括:获取隧道BFD会话建立请求,其中,所述隧道BFD会话建立请求用于指示所述第一边缘节点与所述第二边缘节点之间建立隧道BFD会话。
- 根据权利要求1至7任一项中所述的方法,其中,所述第一边缘节点根据所述第二BFD状态字段切换所述第一边缘节点的BFD状态之后,还包括:重新发送所述第一隧道BFD会话建立报文至所述第二边缘节点,其中,所述第一隧道BFD会话建立报文中的所述第一BFD状态字段为所述第一边缘节点当前的BFD状态;接收所述第二边缘节点重新发送的第二隧道BFD会话建立报文;其中,所述第二隧道BFD会话建立报文中的所述第二BFD状态字段为所述第二边缘节点当前的BFD状态;所述第一边缘节点的BFD状态包括以下之一:下线DOWN状态,启动INIT状态、上线UP状态;所述第二边缘节点的BFD状态包括以下之一:DOWN状态,INIT状态、UP状态。
- 根据权利要求14所述的方法,其中,所述在所述第一边缘节点的BFD状态与所述第二边缘节点的BFD状态处于预设状态的情形下,在所述第一边缘节点与所述第二边缘节点之间建立隧道BFD会话,还包括:在所述第一边缘节点的BFD状态与所述第二边缘节点的BFD状态均处于UP状态的情形下,在所述第一边缘节点与所述第二边缘节点之间建立隧道BFD会话。
- 一种隧道BFD会话建立装置,设置于第一边缘节点,所述装置包括:发送模块,设置为获取第一内容信息,并根据所述第一内容信息生成第一隧道BFD会话建立报文,发送所述第一隧道BFD会话建立报文至第二边缘节点;其中,所述第一隧道BFD会话建立报文中携带有第一BFD状态字段,所述第一BFD状态字段用于指示所述第二边缘节点根据所述第一BFD状态字段切换所述第二边缘节点的BFD状态;接收模块,设置为接收所述第二边缘节点发送的第二隧道BFD会话建立报文;其中,所述第二隧道BFD会话建立报文由所述第二边缘节点根据预先获取的第二内容信息生成,所述第二隧道BFD会话建立报文中携带有第二BFD状态字段,所述第二BFD状态字段用于指示所述第一边缘节点根据所述第二BFD状态字段切换所述第一边缘节点的BFD状态;建立模块,设置为在所述第一边缘节点的BFD状态与所述第二边缘节点的BFD状态处于预设状态的情形下,在所述第一边缘节点与所述第二边缘节点之间建立隧道BFD会话。
- 一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机程序,其中,所述计算机程序被设置为运行时执行所述权利要求1至15任一项中所述的方法。
- 一种电子装置,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为运行所述计算机程序以执行所述权利要求1至15任一项中所述的方法。
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US18/018,676 US12556469B2 (en) | 2020-07-30 | 2021-07-21 | Tunnel BFD session establishment method and device |
| CA3187709A CA3187709A1 (en) | 2020-07-30 | 2021-07-21 | Tunnel bfd session establishment method and device |
| KR1020237004466A KR20230041727A (ko) | 2020-07-30 | 2021-07-21 | 터널 bfd 세션 설립 방법 및 장치 |
| EP21850703.6A EP4191960A4 (en) | 2020-07-30 | 2021-07-21 | METHOD AND DEVICE FOR ESTABLISHING TUNNEL BFD SESSION |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010753186.3 | 2020-07-30 | ||
| CN202010753186.3A CN112491638B (zh) | 2020-07-30 | 2020-07-30 | 隧道bfd会话建立方法及装置 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022022366A1 true WO2022022366A1 (zh) | 2022-02-03 |
Family
ID=74921057
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2021/107713 Ceased WO2022022366A1 (zh) | 2020-07-30 | 2021-07-21 | 隧道bfd会话建立方法及装置 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US12556469B2 (zh) |
| EP (1) | EP4191960A4 (zh) |
| KR (1) | KR20230041727A (zh) |
| CN (1) | CN112491638B (zh) |
| CA (1) | CA3187709A1 (zh) |
| WO (1) | WO2022022366A1 (zh) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112491638B (zh) | 2020-07-30 | 2025-04-04 | 中兴通讯股份有限公司 | 隧道bfd会话建立方法及装置 |
| CN115373755B (zh) * | 2021-05-20 | 2025-10-31 | 中国移动通信集团有限公司 | 一种参数配置方法、装置、设备及存储介质 |
| CN113225252B (zh) * | 2021-07-09 | 2022-02-15 | 腾讯科技(深圳)有限公司 | 双向转发检测bfd会话的建立方法、处理方法以及相关设备 |
| CN115622915A (zh) | 2021-07-16 | 2023-01-17 | 华为技术有限公司 | 一种故障检测的方法、装置和系统 |
| US20240333580A1 (en) * | 2023-03-28 | 2024-10-03 | Hewlett Packard Enterprise Development Lp | Method and system for fast failover in isp peering |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107113221A (zh) * | 2015-01-16 | 2017-08-29 | 阿尔卡特朗讯公司 | 使用通用路由封装的网络虚拟化双向转发检测 |
| CN107277058A (zh) * | 2017-08-07 | 2017-10-20 | 南京南瑞集团公司 | 一种基于bfd协议的接口认证方法及系统 |
| WO2018010614A1 (zh) * | 2016-07-15 | 2018-01-18 | 新华三技术有限公司 | Bfd会话连接建立 |
| US20190342200A1 (en) * | 2018-05-07 | 2019-11-07 | Oracle International Corporation | Methods, systems, and computer readable media for multiple bidirectional forwarding detection (bfd) session optimization |
| CN112491638A (zh) * | 2020-07-30 | 2021-03-12 | 中兴通讯股份有限公司 | 隧道bfd会话建立方法及装置 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101163060B (zh) | 2007-11-30 | 2010-06-09 | 杭州华三通信技术有限公司 | Bfd会话建立方法、bfd会话建立装置及路由设备 |
| CN102265568B (zh) * | 2011-06-13 | 2015-01-07 | 华为技术有限公司 | 一种通信方法及负载均衡器 |
| CN102571497B (zh) * | 2012-01-29 | 2016-03-30 | 华为技术有限公司 | 一种IPSec隧道故障检测的方法、装置及系统 |
| CN104333872B (zh) | 2014-10-29 | 2018-06-01 | 中国联合网络通信集团有限公司 | 一种基于双向转发检测技术的建立会话的方法及系统 |
| US9819511B2 (en) * | 2015-01-16 | 2017-11-14 | Alcatel Lucent | Bidirectional forwarding detection over a virtual extensible local area network |
| CN107317753B (zh) * | 2016-04-27 | 2021-02-05 | 华为技术有限公司 | 双向转发检测bfd会话建立的方法、装置和系统 |
| CN108063718B (zh) * | 2017-12-18 | 2021-02-05 | 迈普通信技术股份有限公司 | 报文处理方法、装置及电子设备 |
| CN110875855A (zh) * | 2018-08-30 | 2020-03-10 | 北京华为数字技术有限公司 | 检测网络链路状态的方法和网络设备 |
| CN109412926B (zh) * | 2018-11-16 | 2021-04-27 | 新华三技术有限公司 | 一种隧道建立方法和装置 |
| CN110740094B (zh) * | 2019-10-28 | 2021-09-21 | 新华三信息安全技术有限公司 | 一种网络设备、bfd报文的传输方法及装置 |
-
2020
- 2020-07-30 CN CN202010753186.3A patent/CN112491638B/zh active Active
-
2021
- 2021-07-21 EP EP21850703.6A patent/EP4191960A4/en active Pending
- 2021-07-21 CA CA3187709A patent/CA3187709A1/en active Pending
- 2021-07-21 KR KR1020237004466A patent/KR20230041727A/ko active Pending
- 2021-07-21 US US18/018,676 patent/US12556469B2/en active Active
- 2021-07-21 WO PCT/CN2021/107713 patent/WO2022022366A1/zh not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107113221A (zh) * | 2015-01-16 | 2017-08-29 | 阿尔卡特朗讯公司 | 使用通用路由封装的网络虚拟化双向转发检测 |
| WO2018010614A1 (zh) * | 2016-07-15 | 2018-01-18 | 新华三技术有限公司 | Bfd会话连接建立 |
| CN107277058A (zh) * | 2017-08-07 | 2017-10-20 | 南京南瑞集团公司 | 一种基于bfd协议的接口认证方法及系统 |
| US20190342200A1 (en) * | 2018-05-07 | 2019-11-07 | Oracle International Corporation | Methods, systems, and computer readable media for multiple bidirectional forwarding detection (bfd) session optimization |
| CN112491638A (zh) * | 2020-07-30 | 2021-03-12 | 中兴通讯股份有限公司 | 隧道bfd会话建立方法及装置 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP4191960A4 * |
Also Published As
| Publication number | Publication date |
|---|---|
| US20230300048A1 (en) | 2023-09-21 |
| EP4191960A4 (en) | 2023-12-27 |
| EP4191960A1 (en) | 2023-06-07 |
| KR20230041727A (ko) | 2023-03-24 |
| US12556469B2 (en) | 2026-02-17 |
| CN112491638A (zh) | 2021-03-12 |
| CN112491638B (zh) | 2025-04-04 |
| CA3187709A1 (en) | 2022-02-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2022022366A1 (zh) | 隧道bfd会话建立方法及装置 | |
| US20240333632A1 (en) | Flow modification including shared context | |
| US10574763B2 (en) | Session-identifer based TWAMP data session provisioning in computer networks | |
| CN107948076B (zh) | 一种转发报文的方法及装置 | |
| TWI583151B (zh) | 實施及管理虛擬網路的系統與方法 | |
| TWI461030B (zh) | 在快速重新路由條件下之資源保留協定訊務工程平穩重新啟動 | |
| EP3459225B1 (en) | Methods and apparatus for enabling live virtual machine (vm) migration in software-defined networking networks | |
| WO2017209932A1 (en) | Link status monitoring based on packet loss detection | |
| US20170346707A1 (en) | Detecting Source Network Address Translation in a Communication System | |
| WO2017209944A1 (en) | Session continuity in the presence of network address translation | |
| US10581669B2 (en) | Restoring control-plane connectivity with a network management entity | |
| US11343332B2 (en) | Method for seamless migration of session authentication to a different stateful diameter authenticating peer | |
| US8971195B2 (en) | Querying health of full-meshed forwarding planes | |
| WO2017209943A1 (en) | Reverse forwarding information base enforcement | |
| CN101425942A (zh) | 一种实现双向转发检测的方法、装置及系统 | |
| CN105637806A (zh) | 网络拓扑确定方法和装置、集中式网络状态信息存储设备 | |
| US11451637B2 (en) | Method for migration of session accounting to a different stateful accounting peer | |
| EP4074013B1 (en) | Mechanism to enable third party services and applications discovery in distributed edge computing environment | |
| CN104734929A (zh) | 路由扩散的方法及装置 | |
| Jain | OpenFlow, software defined networking (SDN) and network function virtualization (NFV) | |
| WO2018108121A1 (zh) | 设备堆叠建立 | |
| Wolinsky et al. | On the design and implementation of structured P2P VPNs | |
| US20260067206A1 (en) | Exchange of Reachability Information Based on Spanning Tree State | |
| CN121312111A (zh) | 用于路由会话的丢失会话数据的缓解 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| ENP | Entry into the national phase |
Ref document number: 3187709 Country of ref document: CA |
|
| ENP | Entry into the national phase |
Ref document number: 20237004466 Country of ref document: KR Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202317011661 Country of ref document: IN |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2021850703 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2021850703 Country of ref document: EP Effective date: 20230228 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWG | Wipo information: grant in national office |
Ref document number: 18018676 Country of ref document: US |