CN107306210B - Method and device for determining cyclization - Google Patents

Method and device for determining cyclization Download PDF

Info

Publication number
CN107306210B
CN107306210B CN201610249304.0A CN201610249304A CN107306210B CN 107306210 B CN107306210 B CN 107306210B CN 201610249304 A CN201610249304 A CN 201610249304A CN 107306210 B CN107306210 B CN 107306210B
Authority
CN
China
Prior art keywords
service
flow
service flow
determining
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610249304.0A
Other languages
Chinese (zh)
Other versions
CN107306210A (en
Inventor
邓小军
刘虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610249304.0A priority Critical patent/CN107306210B/en
Priority to PCT/CN2017/076014 priority patent/WO2017181782A1/en
Publication of CN107306210A publication Critical patent/CN107306210A/en
Application granted granted Critical
Publication of CN107306210B publication Critical patent/CN107306210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method and a device for determining cyclization, wherein the method comprises the following steps: inserting a detection message into a service flow of a layer 2 virtual private network L2 vpn; and determining that the service flow forms a ring under the condition of receiving the detection message. The invention realizes the purpose of simply and conveniently detecting the self-loop actual situation of the service in the L2vpn, reduces the detection cost and improves the flexibility and the universality of the detection.

Description

Method and device for determining cyclization
Technical Field
The invention relates to the field of communication, in particular to a method and a device for determining ring formation.
Background
In the related art, several standard loop detections, such as Spanning Tree Protocol (STP), transparent Interconnection of multiple Links (Lots of Links, TRILL for short), etc., are deployed in a large network range, and have complex interaction, and the operation of device capability is limited by the complexity of networking. In some simple cases, there may be a case (as shown in fig. 1) where a user does not need to deploy a too large network, or the user does not know and is not aware of a network on a certain side, and in these simple cases, if the above-mentioned protocols such as STP, TRILL and the like are used for detecting looping, the following problems may be caused: first, deployment is difficult, and it is likely that peer networks cannot penetrate deployment; secondly, the overhead is large, and if STP, TRILL and the like are to be supported, the equipment support supporting the two large protocols is required. The cost of the equipment may be over-dimensioned, causing unnecessary waste.
For self-loop detection of the own device, self-loop under a normal layer two VLAN is initially considered. However, there is no support for the currently used L2vpn scenario. Therefore, how to detect the self-looping actual situation of the service in the L2vpn is an urgent problem to be solved in the related art.
In view of the above problems, no effective solution has been proposed in the related art.
Disclosure of Invention
The embodiment of the invention provides a method and a device for determining ring formation, which are used for at least solving the problem that the self-ring actual condition of a service in L2vpn cannot be detected in the related technology.
According to an embodiment of the present invention, there is provided a method of determining ringing, including: inserting a detection message into a service flow of a layer 2 virtual private network L2 vpn; and determining that the service flow forms a ring under the condition of receiving the detection message.
Optionally, before inserting the detection packet into the service flow of the L2vpn, the method further includes: acquiring service flow information used for indicating the service flow of the L2 vpn; and determining the service flow indicated in the service flow information according to the service flow information.
Optionally, after determining that looping occurs to the traffic flow, the method further includes: determining the service corresponding to the service flow which generates the looping; and performing damage-destroying treatment according to the determined service.
Optionally, the detecting packet carries identification information for identifying a service corresponding to the service flow, and determining the service corresponding to the service flow in which looping occurs includes: and determining the service corresponding to the service flow according to the identification information carried in the detection message.
Optionally, according to the determined service, performing a destruction process includes: and notifying the determined service identifier of the service to a flow control module, wherein the service identifier is used for indicating the flow control module to execute flow policy control for destructive processing.
According to another aspect of the present invention, there is provided an apparatus for determining looping, including: the inserting module is used for inserting a detection message into the service flow of the layer 2 virtual private network L2 vpn; and the first determining module is used for determining that the service flow forms a ring under the condition of receiving the detection message.
Optionally, the apparatus further comprises: an obtaining module, configured to obtain service flow information used for indicating the L2vpn service flow before the detection packet is inserted into the L2vpn service flow; and a second determining module, configured to determine, according to the service flow information, the service flow indicated in the service flow information.
Optionally, the apparatus further comprises: a third determining module, configured to determine, after it is determined that looping occurs on the service flow, a service corresponding to the service flow that has undergone looping; and the processing module is used for carrying out damage-breaking processing according to the determined service.
Optionally, the detection packet carries identification information for identifying a service corresponding to the service flow, and the third determining module includes: and the determining unit is used for determining the service corresponding to the service flow according to the identification information carried in the detection message.
Optionally, the processing module includes: and the processing unit is used for notifying the flow control module of the determined service identifier of the service, wherein the service identifier is used for indicating the flow control module to execute flow policy control for destructive processing.
By adopting the method for inserting the detection message into the service flow of the layer 2 virtual private network L2vpn to carry out ring formation detection, the invention does not need to add extra configuration, reduces the network burden, realizes the purpose of simply and conveniently detecting the self-ring actual condition of the service in the L2vpn, reduces the detection cost and improves the flexibility and the universality of the detection.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention and do not constitute a limitation of the invention. In the drawings:
fig. 1 is a schematic diagram of a network environment in the related art;
FIG. 2 is a flow diagram of determining looping according to an embodiment of the present invention;
fig. 3 is a block diagram of a device for determining looping according to an embodiment of the present invention;
FIG. 4 is a block diagram of a preferred configuration of a looping determination device according to an embodiment of the present invention;
FIG. 5 is a block diagram II of a preferred configuration of a looping determining apparatus according to an embodiment of the present invention;
fig. 6 is a block diagram showing the structure of the third determination module 52 in the looping determination apparatus according to the embodiment of the present invention;
FIG. 7 is a block diagram of the structure of processing module 54 in a looping determination device according to an embodiment of the present invention;
FIG. 8 is a relational diagram of a module A, B, C, D according to an embodiment of the present invention;
FIG. 9 is a relational diagram of a module A, B, C, D, E according to an embodiment of the invention;
FIG. 10 is a schematic diagram of an extended TLV according to an embodiment of the present invention;
FIG. 11 is a flow chart of interactions between A, B, C, D, E according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
In an embodiment of the present invention, a method for determining a ring is provided, and fig. 2 is a flowchart of determining a ring according to an embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
step S202, inserting a detection message into a service flow of a layer 2 virtual private network L2 vpn;
and step S204, determining that the service flow forms a ring under the condition of receiving the detection message.
The above operations may be performed by a self-loop detection protocol processing module, which may be located in the L2vpn function module (which is used to provide the protocol function of L2 vpn), or may exist separately as an independent module.
Through the steps, the detection message is inserted into the service flow of the layer 2 virtual private network L2vpn to carry out ring formation detection, additional configuration is not needed, network burden is reduced, the purpose of simply and conveniently detecting the self-ring actual condition of the service in the layer 2vpn is achieved, detection cost is reduced, and flexibility and universality of detection are improved.
In an optional embodiment, before inserting the detection packet into the L2vpn service flow, the method further includes: acquiring service flow information used for indicating the service flow of the L2 vpn; and determining the service flow indicated in the service flow information according to the service flow information. In this embodiment, the obtained service flow information may be obtained by mapping the L2vpn function module to the self-loop detection protocol processing module after establishing a message mechanism from the L2vpn function module to the self-loop detection protocol processing module.
In an optional embodiment, after determining that looping occurs on the service flow, the method further includes: determining the service corresponding to the service flow in which the looping occurs; and performing damage-destroying treatment according to the determined service. In this embodiment, after it is determined that looping occurs, it is described that looping is caused by looping of an outer network, and therefore, it is necessary to perform a fragmentation process, thereby ensuring normal operation of a service.
In an optional embodiment, the detecting packet carries identification information for identifying a service corresponding to a service flow, and determining the service corresponding to the service flow in which looping occurs includes: and determining the service corresponding to the service flow according to the identification information carried in the detection message. Optionally, the check message may carry the identification information in a plurality of ways, for example, the identification information may be carried by expanding the check message, or the identification may be carried by using some information included in the check message as the identification information.
In an optional embodiment, performing the destruction processing according to the determined service includes: and informing the flow control module of the determined service identifier of the service, wherein the service identifier is used for indicating the flow control module to execute flow policy control for destructive processing. In this embodiment, the flow control module is responsible for controlling the unified flow, and when the flow policy control of the destructive processing needs to be performed, the flow control module may notify a hardware resource management module in the system to execute a corresponding action.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
In this embodiment, a looping determining device is further provided, and the looping determining device is used for implementing the foregoing embodiments and preferred embodiments, and the details that have been already described are omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware or a combination of software and hardware is also possible and contemplated.
Fig. 3 is a block diagram showing the structure of a looping determining apparatus according to an embodiment of the present invention, which includes an inserting module 32 and a first determining module 34, as shown in fig. 3, and is explained as follows:
an inserting module 32, configured to insert a detection packet into a service flow of a layer 2 virtual private network L2 vpn; a first determining module 34, connected to the inserting module 32, configured to determine that looping occurs on the traffic flow when the detection packet is received.
Fig. 4 is a block diagram showing a preferred structure of a looping determining apparatus according to an embodiment of the present invention, and as shown in fig. 4, the apparatus includes an obtaining module 42 and a second determining module 44 in addition to all the modules shown in fig. 3, and the apparatus will be described below.
An obtaining module 42, configured to obtain service flow information used for indicating an L2vpn service flow before the detection packet is inserted into the L2vpn service flow; a second determining module 44, connected to the obtaining module 42 and the inserting module 32, configured to determine the service flow indicated in the service flow information according to the service flow information.
Fig. 5 is a block diagram of a preferred structure of a looping determining apparatus according to an embodiment of the present invention, and as shown in fig. 5, the apparatus includes a third determining module 52 and a processing module 54 in addition to all the modules shown in fig. 3, and the apparatus will be described below.
A third determining module 52, connected to the first determining module 34, configured to determine, after determining that looping occurs on the service flow, a service corresponding to the looped service flow; and a processing module 54, connected to the third determining module 52, for performing a damage-destroying process according to the determined service.
In an optional embodiment, the detection packet carries identification information for identifying a service corresponding to a service flow, fig. 6 is a block diagram of a structure of a third determining module 52 in a looping determining apparatus according to an embodiment of the present invention, as shown in fig. 6, the third determining module 52 includes a determining unit 62, and the determining unit 62 is described below:
and a determining unit 62, configured to determine, according to the identification information carried in the detection packet, a service corresponding to the service flow.
Fig. 7 is a block diagram of a processing module 54 in a looping determining apparatus according to an embodiment of the present invention, where, as shown in fig. 7, the processing module 54 includes a processing unit 72, and the processing unit 72 is described below:
and the processing unit is used for notifying the flow control module of the determined service identifier of the service, wherein the service identifier is used for indicating the flow control module to execute flow policy control for destructive processing.
The above devices can be applied to a self-loop detection protocol processing module, which can be located in an L2vpn function module (which is used to provide the protocol function of L2 vpn), or exist as an independent module, and the solution in the embodiment of the present invention can find and process the self-loop situation of the traffic flow on a single device, and particularly provide flexible application in L2 vpn. The invention is described below in connection with an overall structure:
the technical problem to be solved in the embodiment of the invention is as follows: the self-loop situation of the network outside the equipment under the L2vpn environment is solved, and the damage is realized in advance. The self-loop detection device in the embodiment of the invention can comprise the following modules:
a (L2 vpn function module), B (hardware resource management module), C (flow control module), D (underlying hardware logic action). Further comprising: e (self-loop detection protocol processing module).
Wherein, A, B and D are in hierarchical relationship, and C is in same level relationship with B. A provides the protocol function of L2vpn, B provides the unified management of resources, including some resource management and processing protocol status information reported by D and specifically operating to hardware action, C is responsible for the control of unified flow, the current source is mainly some QOS, ACL or some control means of service, L2vpn has a part of control means and also directly reaches C. And D is a hardware object organization for implementing actions specifically, and is mainly responsible for uplink resource report and receiving operation commands issued by resource management. C may also issue commands to D via B. A. B, C, D relationship is shown in FIG. 8.
A. B, C, D, E, in the uppermost layer, adding E with an L2vpn parallel layer, and mainly completing the interaction with the L2vpn, and meanwhile, the E module directly interacts with the C flow control management module to achieve unified control. E can exist without leaving the service, and can also be regarded as an attribute of the service, so that it can be understood that E is placed in other services as a virtual function point, but the actual E is a single control which operates independently without coupling, as shown in fig. 9.
The method for detecting the self-loop in the embodiment of the invention comprises the following steps:
the first step is as follows:
A. b, C, D operates normally, and includes D reporting resources to B (main resources include interface resources, CPU resources, and other hardware resources), B integrating resources and managing them uniformly, and notifying a resource used by a to a. A, under the condition of hardware resources, a self protocol is operated according to deployment, a data flow service is calculated and formed, a flow service strategy is notified to C, and C further integrates the flow service strategy and issues a command to D to be executed through B.
The second step is that:
turning on the E function block, A exists so E can execute. And meanwhile, a message mechanism from A to E is established, and information such as the stream service of A is mapped in E, so that E knows the stream service condition of A. And meanwhile, the E and the C establish a message mechanism, and the result generated by the E can be quickly transmitted to the C for processing.
The third step:
after the E acquires the necessary information from the a, the E starts to perform automatic detection, and the detection method is adopted, which is simple in the embodiment as follows:
e, continuously inserting detection messages into the flow periodically;
e, receiving the detection message sent by the self in the stream, and when receiving the detection message sent by the self, considering that the outer-layer network has a ring to cause the self to form a ring, and processing the ring;
looping processing considers the flexibility of data flow, and provides two basic mechanisms, namely, a TLV extended message (as shown in FIG. 10) is added in the message to carry some information needing extra detection; the second is that the calculation principle is extended to specific stream and uses the Type-Length-Value (TLV) information for unified processing except for basic ports. Both principles work well in dealing with the diversity of data streams.
In L2vpn, a Virtual Local Area Network (VLAN) flow (corresponding to the above traffic flow) is handled flexibly, which results in asymmetric resource deployment, that is, the resource configuration of each port may be different. Therefore, by adopting the above principle, TLV can be added to carry VLAN information transmission of the flow. During receiving, the flow service is determined through a receiving port + L2vpn example and through a VLAN received by a message, some strategies are specified, and flow control is realized.
And E, automatically breaking the loop, adopting the scheme, when a new interface accesses the data stream, immediately sending a detection message on the data stream by the interface, and immediately detecting the loop according to the method. User intervention is not needed, so that user configuration is reduced and maintenance is simple; on one hand, the detection is completely based on the flow, and the detected result is the real processing result of the flow.
The fourth step:
and C is informed to carry out strategy control immediately after the ring formation of E (likewise, C needs to be informed immediately after the ring formation of E is recovered).
The fifth step:
c receives the strategy control notice of E, immediately informs B of the hardware resource management module, and B enters into the action generation command bottom layer hardware to execute the command action.
By adopting the method and the device in the embodiment of the invention, more configuration management burden and network burden are reduced in certain network environments than large-scale destruction protocols, the technology is simple to realize, the cost is low, the loop can be detected by self by simple deployment, and great convenience and reliability are provided for users. Furthermore, because of the expansion and carrying of the TLV, the detection strategy can be comprehensively set, and the applicability and the flexibility are provided for service detection.
In the embodiment of the invention, in the aspect of interaction, the modules can interact with each other through reliable messages or in a library function mode.
In the embodiment of the present invention, the hardware module part includes: interface BSP, microcode.
In the embodiment of the present invention, the related software modules include: the system comprises an L2vpn service module, a self-loop detection module and a flow control module.
The processing steps of the flow section are shown in fig. 11, and mainly include the following steps:
s1, resource reporting and management (logic and resource separation) (including steps 1 and 2 shown in fig. 11).
And S2, the service performs self service operation according to the user strategy and resources, and guides the flow direction, at the moment, the service interacts with the C flow control management module to indirectly command the hardware to operate the flow according to the result (including steps 3 and 4' shown in FIG. 11).
And S3, when the self-loop detection is added, the self-loop detection does not affect the original business operation and flow control strategy, but obtains the business flow information from the business side and carries out the self-loop detection, the secondary scheme can expand and extend the application and the multi-business, and the basic idea is that the business is separated from the detection, does not interfere with each other and is isolated and coupled (comprising the steps 4 and 5 shown in the figure 11).
And S4, when a loop is detected, the E informs the C to carry out flow strategy control (comprising the step 6 shown in the figure 11).
And S5.C, integrating according to flow strategy control, and intensively informing the B resource gateway module, wherein the B resource management module commands D to execute command actions (comprising the step 7 shown in the figure 11).
Therefore, the S3 and the S4 are newly added flows, and the advantage of the new flows is that the former flows are not influenced by the first guarantee; secondly, the added flow is controllable and expandable, can be properly combined to meet the requirements of users, and has great flexibility; thirdly, as an independent operation module, although logically regarded as the attribute of the service embedded in the service, the E is actually operated independently and only acquires the information data of the service for processing, so that the E has strong expansibility and can perform detection on a plurality of services. The C flow control strategy performs unified management, calculates the actual condition execution action of each service, and hierarchically classifies the service, detection and strategy decision, thereby realizing unified management.
It should be noted that the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
The embodiment of the invention also provides a storage medium. Alternatively, in this embodiment, the storage medium may be configured to store program codes for performing the following steps:
s1, inserting a detection message into a service flow of a layer 2 virtual private network L2 vpn;
and S2, determining that service flow forms a ring under the condition of receiving the detection message.
Optionally, in this embodiment, the storage medium may include but is not limited to: various media capable of storing program codes, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Optionally, in this embodiment, the processor executes the above steps according to program codes stored in the storage medium.
Optionally, for a specific example in this embodiment, reference may be made to the examples described in the above embodiment and optional implementation, and this embodiment is not described herein again.
Through the embodiment of the invention, the defect that no self-loop detection technology exists under the L2vpn in the related technology can be made up, the flexible characteristic of the service of the L2vpn can be reasonably responded, and the hierarchy and class embedded architecture and the refining processing of the self-loop module can be universally used on other services. Therefore, self-loop detection of multiple services under single equipment, particularly L2vpn services, is flexibly solved. A simple self-loop detection mode is added, so that the cost of equipment is not too high, and the self-loop detection requirements of certain network environments can be well met; while providing flexible policy management.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method of determining ringing, comprising:
inserting a detection message into a service flow of a layer 2 virtual private network L2vpn, wherein a type length value TLV of the detection message carries identification information for identifying a service corresponding to the service flow, and the identification information comprises VLAN information of the service flow;
and under the condition of receiving the detection message, determining the service flow through a receiving port for receiving the detection message, the L2vpn example and the VLAN information, and determining that the service flow forms a ring.
2. The method of claim 1, wherein before inserting the detection packet into the traffic flow of the L2vpn, further comprising:
acquiring service flow information used for indicating the service flow of the L2 vpn;
and determining the service flow indicated in the service flow information according to the service flow information.
3. The method of claim 1, after determining that looping occurs for the traffic flow, further comprising:
determining the service corresponding to the service flow which generates the looping;
and performing damage-destroying treatment according to the determined service.
4. The method of claim 3, wherein performing a disruption process according to the determined service comprises:
and informing the flow control module of the determined service identifier of the service, wherein the service identifier is used for indicating the flow control module to execute flow policy control for destructive processing.
5. An apparatus for determining looping, comprising:
an inserting module, configured to insert a detection packet into a service flow of a layer 2 virtual private network L2vpn, where a type length value TLV of the detection packet carries identification information for identifying a service corresponding to the service flow, and the identification information includes VLAN information of the service flow;
and the first determining module is used for determining the service flow through a receiving port for receiving the detection message, the L2vpn instance and the VLAN information under the condition of receiving the detection message, and determining that the service flow forms a ring.
6. The apparatus of claim 5, further comprising:
an obtaining module, configured to obtain service flow information used for indicating the L2vpn service flow before the detection packet is inserted into the L2vpn service flow;
a second determining module, configured to determine, according to the service flow information, the service flow indicated in the service flow information.
7. The apparatus of claim 5, further comprising:
a third determining module, configured to determine, after it is determined that looping occurs on the service flow, a service corresponding to the service flow that has undergone looping;
and the processing module is used for carrying out damage-breaking processing according to the determined service.
8. The apparatus of claim 7, wherein the processing module comprises:
and the processing unit is used for notifying the flow control module of the determined service identifier of the service, wherein the service identifier is used for indicating the flow control module to execute flow policy control for destructive processing.
CN201610249304.0A 2016-04-20 2016-04-20 Method and device for determining cyclization Active CN107306210B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610249304.0A CN107306210B (en) 2016-04-20 2016-04-20 Method and device for determining cyclization
PCT/CN2017/076014 WO2017181782A1 (en) 2016-04-20 2017-03-08 Method and apparatus for determining loop formation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610249304.0A CN107306210B (en) 2016-04-20 2016-04-20 Method and device for determining cyclization

Publications (2)

Publication Number Publication Date
CN107306210A CN107306210A (en) 2017-10-31
CN107306210B true CN107306210B (en) 2023-04-18

Family

ID=60115623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610249304.0A Active CN107306210B (en) 2016-04-20 2016-04-20 Method and device for determining cyclization

Country Status (2)

Country Link
CN (1) CN107306210B (en)
WO (1) WO2017181782A1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103457819A (en) * 2013-08-01 2013-12-18 北京华为数字技术有限公司 Method and device for processing common gateway user service message

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4128974B2 (en) * 2004-03-31 2008-07-30 富士通株式会社 Layer 2 loop detection system
CN100463418C (en) * 2005-11-23 2009-02-18 杭州华三通信技术有限公司 Network performance test method, system and network device
CN101222435B (en) * 2008-02-02 2010-08-04 华为技术有限公司 Method and device for detecting network loopback
CN101534226A (en) * 2009-04-14 2009-09-16 杭州华三通信技术有限公司 VLAN-based whole network loop detection method and loop detection equipment
CN101562552B (en) * 2009-05-27 2011-09-14 华为技术有限公司 Method, system and device for detecting virtual private LAN loop
CN102045218B (en) * 2010-12-07 2012-11-07 成都市华为赛门铁克科技有限公司 Loop detection method and firewall device
CN102143026B (en) * 2011-04-29 2014-03-12 杭州华三通信技术有限公司 Method for avoiding loop circuit in virtual two layer network
CN103023770B (en) * 2011-09-21 2017-09-26 中兴通讯股份有限公司 The guard method of looped network and device
CN102420721B (en) * 2011-11-30 2015-04-22 瑞斯康达科技发展股份有限公司 Loop detection method and loop detecting device
CN104796298B (en) * 2014-01-22 2019-06-07 新华三技术有限公司 A kind of method and device of SDN network accident analysis

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103457819A (en) * 2013-08-01 2013-12-18 北京华为数字技术有限公司 Method and device for processing common gateway user service message

Also Published As

Publication number Publication date
WO2017181782A1 (en) 2017-10-26
CN107306210A (en) 2017-10-31

Similar Documents

Publication Publication Date Title
CN112868206B (en) Method, system and computer readable medium for providing service broker functionality
US11153148B2 (en) Resource state monitoring method, device and communication network
JP6466003B2 (en) Method and apparatus for VNF failover
WO2018153221A1 (en) Method, device and system for controlling quality-of-service of business in transmission network
US10237124B2 (en) Network operation, administration, and maintenance (OAM) method, apparatus, and system
CN105164974B (en) For having the network element of the telecommunication network of the control of decoupling and data plane
CN114788241A (en) Providing an interface between network management and slice management
CN115843429A (en) Method and apparatus for isolation support in network slicing
CN108604996A (en) A kind of strategy transmission method and apparatus in NFV systems
US10277484B2 (en) Self organizing network event reporting
US10659251B2 (en) Ring protection network division
CN107306210B (en) Method and device for determining cyclization
CN113824595B (en) Link switching control method and device and gateway equipment
WO2022078338A1 (en) Path determination method and apparatus, and computer storage medium
WO2017143958A1 (en) System, method and apparatus for implementing fast reroute (frr)
US10715420B2 (en) System, method and apparatus for implementing fast reroute (FRR)
CN103248505A (en) View-based network monitoring method and device
KR20170073691A (en) Information sending method, managed system, and managing system
KR101695850B1 (en) Sdn-based autonomic control and management system and method for large-scale virtual networks
CN110417568B (en) NFV strategy negotiation method and system
CN111865792B (en) BSID management method, routing equipment and readable storage medium
CN114024998B (en) Method and device for supporting multiple sessions based on netconf protocol
CN110011820B (en) Method and device for connecting systems and computer storage medium
CN117081811A (en) Network traffic arrangement method, system and related equipment in containerized scene
CN116886497A (en) Service grid business centralized proxy switching method and processing system based on DPU

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant