CN108259336A - Data center's interconnected method and device - Google Patents

Data center's interconnected method and device Download PDF

Info

Publication number
CN108259336A
CN108259336A CN201711172805.4A CN201711172805A CN108259336A CN 108259336 A CN108259336 A CN 108259336A CN 201711172805 A CN201711172805 A CN 201711172805A CN 108259336 A CN108259336 A CN 108259336A
Authority
CN
China
Prior art keywords
routing
evpn
data center
protection group
local
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711172805.4A
Other languages
Chinese (zh)
Other versions
CN108259336B (en
Inventor
杨正广
陈军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN201711172805.4A priority Critical patent/CN108259336B/en
Publication of CN108259336A publication Critical patent/CN108259336A/en
Application granted granted Critical
Publication of CN108259336B publication Critical patent/CN108259336B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This application provides data center's interconnected methods.In the application,The protection group address of each difference ED configurations of same data center is identical,It is equivalent to form a virtual protection group,And the protection group address (being equivalent to local terminal protection group) that the source in tunnel established between two different data centers is configured for ED in Local Data center,Destination is the protection group address (being equivalent to opposite end protection group) that ED is configured in the data center of opposite end,This means that tunnel between two different data centers is using protection group integrally to establish,So,For the ED at any data center,Traffic sharing will be carried out during subsequently again by tunnel to opposite end data center converting flow between each ED in the protection group (corresponding with the protection group address that ED in the data center of opposite end is configured) of opposite end data center,Finally realize the load balancing between difference ED in same data center.

Description

Data center's interconnected method and device
Technical field
This application involves network communication technologies, more particularly to data center's interconnected method and device.
Background technology
The data center of different location deployment passes through Ethernet Virtual Private Network (EVPN:Ethernet Virtual Private Network) realize data center interconnection (DCI:Data Center Interconnection), data center is mutual Connection can improve business robustness, reduce network delay, reduce network jitter etc..
EVPN is a kind of two-layer virtual private network (VPN:Virtual Private Network) technology, in EVPN In, control plane uses Multiprotocol Border Gateway Protocol (MP:Multiprotocol Border Gateway Protocol) it is logical EVPN routing iinformations are accused, data plane uses expansible Virtual Local Area Network (VXLAN:Virtual eXtensible LAN) envelope Dress mode E-Packets.When different data center is dispersed in different location, EVPN is provided mutually for the data center of different location Connection.
Invention content
This application provides method and apparatus, to realize the multiple and different of same data center in data center's interconnecting application Load balancing between edge device.
The technical solution that the application provides includes:
A kind of data center's interconnected method, this method are applied to the edge device ED of data center, including:
Configuration protection group address;The protection group address is identical with the protection group address of other ED of same data center;
Notice next-hop is set as the EVPN routings of the protection group address;
Receive the EVPN routings that opposite end ED is noticed in the data center of opposite end;Wherein, the EVPN routings of the opposite end ED notices Next-hop be the opposite end ED configuration protection group address;
The EVPN routings of reception are added to local EVPN routing tables, and check Local Data center and opposite end data center Between whether have been established that source address is the protection group address of local terminal ED configurations, destination address is protection group that the opposite end ED is configured The tunnel of address, if so, the outgoing interface being route added to the EVPN of local EVPN routing tables is set as the tunnel.
A kind of data center's interconnect device, the device are applied to the edge device ED of data center, including:
Dispensing unit, for protection group address to be configured in local terminal ED;Its of the protection group address and same data center The protection group address of his ED is identical;
Advertising of route unit, for noticing the EVPN routings that next-hop is set as the protection group address;
Receiving unit is route, for receiving the EVPN routings that opposite end ED is noticed in the data center of opposite end;Wherein, the opposite end The next-hop of the EVPN routings of ED notices is the protection group address of opposite end ED configurations;
Routing processing unit, the EVPN routings for the routing receiving unit to be received are added to local EVPN and route Table, and check whether had been established between Local Data center and opposite end data center source address be local terminal ED protection group address, Tunnel of the destination address for the protection group address of opposite end ED configurations, if so, will be added to local EVPN routing tables The outgoing interface of EVPN routings is set as the tunnel.
As can be seen from the above technical solutions, in the application, the protection group of each difference ED configurations of same data center Address is identical, is equivalent to form a virtual protection group, and the source in tunnel established between two different data centers is The protection group address (being equivalent to local terminal protection group) that ED is configured in Local Data center, destination are that ED matches in the data center of opposite end The protection group address (being equivalent to opposite end protection group) put, it means that the tunnel between two different data centers is to protect group Integrally establish, in this way, for the ED at any data center, subsequently again by tunnel to opposite end data center converting flow when It will be in each ED in the protection group (corresponding with the protection group address that ED in the data center of opposite end is configured) of opposite end data center Between carry out traffic sharing, finally realize the load balancing between difference ED in same data center.
Description of the drawings
Attached drawing herein is incorporated into specification and forms the part of this specification, shows the implementation for meeting the disclosure Example, and for explaining the principle of the disclosure together with specification.
Fig. 1 is data center's networking schematic diagram;
Fig. 2 is data center's networking schematic diagram of configuration protection group address that the application provides;
Fig. 3 is the method flow diagram that the application provides;
Fig. 4 is the embodiment application networking schematic diagram that the application provides;
Fig. 5 is the structure drawing of device that the application provides;
Fig. 6 is the hardware architecture diagram of Fig. 5 shown devices that the application provides.
Specific embodiment
Fig. 1 shows the networking of typical data center's interconnection.It is with DC100 and DC101 interconnections in networking shown in FIG. 1 Example.In Fig. 1, edge device (ED:Edge Device) 110, ED111 be DC1 outlet.ED112, ED113 are going out for DC2 Mouthful.
In DC1 or DC2 shown in Fig. 1, either ED or leaf equipment (Leaf) can all be configured only one and set Standby mark, which can be loopback (Lookback) address.Such as in DC1 shown in FIG. 1, unique the one of ED110 configurations A device identification is Lookback1a, and the only one device identification of ED111 configurations is Lookback2a, Leaf120 configurations Only one device identification is Lookback3a, and the only one device identification of Leaf121 configurations is Lookback4a, in DC2, The only one device identification of ED112 configurations is Lookback5a, and the only one device identification of ED113 configurations is The only one device identification of Lookback6a, Leaf122 configuration is Lookback7a, and the only one of Leaf123 configurations is set It is standby to be identified as Lookback8a.
When there is more ED in same data center, it is reliable to effectively improve network for progress load balancing between more ED Property.But EVPN is two-layer virtual private network, there is presently no perfect load sharing schemes.
In order to realize, load balancing, the application improve the routing publication of EVPN between more ED in data center, By the improvement, load balancing between more ED can be realized in data center.Before the method provided in description the application, first retouch State this application involves data center:
Data center is divided into two parts of basal layer (Underlay) network and superimposed layer (Overlay) network.Overlay Network and Underlay networks are independent from each other, and Overlay networks are the superpositions (Overlay) on Underlay network foundations What first level logical network was formed.
ED or Leaf can be used to indicate the Unique Device of its configuration according to the generation of Underlay Routing Protocols in data center Mark reachable Underlay (by taking Lookback addresses as an example) route and is advertised to opposite end, and the next-hop of Underlay routings is Notice the interface IP address of the physical port of Underlay routings.Here Underlay Routing Protocols include static routing protocol (such as preconfigured Routing Protocol), also including dynamic routing protocol (such as the common association such as Intermediate System to Intermediate System, ospf protocol View).
After opposite end receives Underlay routings, the Underlay received routings are added to local Underlay routing tables In.Also, opposite end can also route indicated Lookback addresses with the Underlay received and establish EVPN neighbours, to pass through EVPN neighbours issue the EVPN routings in Overlay networks.
By taking the ED110 in DC1 shown in FIG. 1 as an example, ED110 is used to indicate this according to the generation of Underlay Routing Protocols The Underlay that unique device identity, that is, Lookback1a of ED110 configurations is reachable is route, and be advertised to what is connected in same DC1 ED112, ED113 in Leaf120, Leaf121 and DC2.This ED110 configurations are used to indicate to ED112 notices with ED110 Loop-back address Lookback1 it is reachable Underlay routing for, wherein, ED110 notice Underlay routing it is next Jump on ED110 with ED112 interconnection physical port interface IP address, when ED112 receive ED110 notice Underlay roads By then the Underlay received routings are added in the Underlay routing tables of local by ED112, added to local Underlay roads It is the interface IP address with the physical port of ED112 interconnections on above-mentioned ED110 by the next-hop that the Underlay in table is route.And And ED112 can also establish EVPN neighbours with Lookback1a, to issue the EVPN roads in Overlay networks by EVPN neighbours By.
At present, 5 kinds of EVPN routings of EVPN technical definitions, and influence forwarding there are three types of routeing, be respectively:
MAC/IP Advertisement Route:MAC/IP publication routings, referred to as 2 classes routing, for noticing MAC Location and host route information;
Inclusive Multicast Ethernet Tag Route:Inclusive multicast Ethernet label routing, again Referred to as IMET routings, abbreviation 3 classes routing, for noticing VTEP and its affiliated VXLAN information, with the automatic discovery VTEP of realization, certainly It is dynamic to establish VXLAN tunnels and auto-associating VXLAN and VXLAN tunnels;
IP Prefix advertisement route:IP prefix routes, referred to as 5 classes routing, for IP prefixes Form notices BGP IPv4 singlecast routers or BGP IPv6 singlecast routers;
In existing scheme, either ED or Leaf, the next-hop of the EVPN routings of notice use configuration Lookback addresses.
In this application, it in order to realize the load balancing in same data center between more ED, can be directed in each data Each ED in the heart additionally makes configuration, the step 301 specifically to see below.
The method provided below the application is described:
Referring to Fig. 3, Fig. 3 is the method flow diagram that the application provides.The flow is applied to the ED of data center.
Step 301, configuration protection group address;The protection group address is with the protection group of other ED of same data center Location is identical.
In this application, in order to realize the load balancing in same data center between more ED, for each data center In each ED make following configuration:Configuration protection group address.
Wherein, difference ED is configured same protection group address in same data center, the ED configurations in different data center Protect group address different.Still in networking shown in Fig. 1, then the same protection group address of ED110, ED111 configuration in DC1 (is denoted as Protect group address 1), the same protection group address of ED112, ED113 configuration (being denoted as protection group address 2) in DC2.Wherein, it protects Group address 1 is different from protection group address 2.
In this application, same protection group address is configured on each ED in same data center, it is same is equivalent to realization One virtual protection group of formation between each difference ED in one data center, and the member that ED is protection group, protection group Address is the protection group address being configured on ED.The virtual protection group that each difference ED in same data center is formed is as one Overall work.On the basis of networking shown in Fig. 1, Fig. 2 shows data center's networking schematic diagrams of configuration protection group address
In this application, the protection group address that the ED in data center is configured is with being different from the Lookback that ED is configured in itself Location, the Lookback addresses being configured in itself relative to ED are a virtual addresses, are not used to mark ED.
Step 302, notice next-hop is set as the EVPN routings of the protection group address.
As described above, in current EVPN, for ED when noticing EVPN routings, the next-hop of the EVPN routings of notice is ED The loop-back address Lookback of configuration itself.And in the application, the scheme of ED notice EVPN routings is improved, for ED The EVPN routings of notice, next-hop is no longer the loop-back address Lookback that ED is configured in itself, but protects group address.
It is next with EVPN routings after ED or Leaf that same data center is in local terminal ED receive EVPN routings Tunnel is established in jump.
It, will as steps described below 303 after the opposite end ED that different data center is in local terminal ED receives EVPN routings The operation that middle local terminal ED is performed performs.
Equally, opposite end ED also can be according to the description publication next-hop of the above-mentioned steps 302 protection group configured for opposite end ED The EVPN routings of address after local terminal ED receives the EVPN routings of opposite end ED notices, perform following step 303.
Step 303, local terminal ED receives the EVPN routings that opposite end ED is noticed in the data center of opposite end, and the EVPN of reception is route Added to local EVPN routing tables, and check and source address whether has been established between Local Data center and opposite end data center as this The tunnel of the protection group address, destination address of ED configurations for the protection group address of opposite end ED configurations is held, if so, by adding The outgoing interface being route to the EVPN of local EVPN routing tables is set as the tunnel;Wherein, the EVPN routings of the opposite end ED notices Next-hop be the opposite end ED configuration protection group address.
As one embodiment, above-mentioned tunnel is not set up between Local Data center and opposite end data center if checking, Then establish above-mentioned tunnel between Local Data center and opposite end data center, and will be added to the EVPN of local EVPN routing tables The outgoing interface of routing is set as above-mentioned tunnel.
As described above, the protection group address of each difference ED configurations of same data center is identical in the application, is equivalent to A virtual protection group is formed, and combines the tunnel that the description in step 303 is known that between two different data centers The protection group address (being equivalent to local terminal protection group) that is configured for ED in Local Data center of source, destination is in end data The protection group address (being equivalent to opposite end protection group) of ED configurations in the heart, it means that the tunnel between two different data centers is It is integrally established using protection group, in this way, for the ED at any data center, is subsequently turned again by tunnel to opposite end data center It will be in the protection group (corresponding with the protection group address that ED in the data center of opposite end is configured) of opposite end data center when sending out flow Each ED between carry out traffic sharing, finally realize the load balancing between difference ED in same data center.
So far, flow shown in Fig. 3 is completed.
In this application, the EVPN routings of local terminal ED notices, it may be possible to which the EVPN routings that local terminal ED is locally generated also have May be EVPN routings (the referred to as non-local EVPN roads for the notices of the ED in other opposite end data centers that local terminal ED is received By), it route below by subdivision local EVPN routings and non-local EVPN and is set as to describe how to notice next-hop in step 302 Protect the EVPN routings of group address:
As one embodiment, in step 302 notice next-hop be set as it is described protection group address EVPN routing include with Lower step b1 to b3:
Step b1, if the inclusive multicast Ethernet label that EVPN routings to be noticed are defined for the EVPN of local terminal ED generations Routing (local 3 classes routing), then the next-hop for setting the inclusive multicast Ethernet label routing (local 3 classes routing) is this ED configured protection group address in end is simultaneously noticed.
Wherein, in order to ensure inclusive multicast Ethernet label routing (local 3 class roads that the EVPN of local terminal ED generations is defined By) next-hop be set as the configured protection group address of local terminal ED, need to make following configuration in advance:Two layers of void are configured in local terminal ED Intend exchanging example (VSI:Virtual Switch Instance) relevant VXLAN ID, routing property (RT:Route Target) and, VXLAN ID, the MAC Address of three layers of VXLAN is configured in local terminal ED;Wherein, two layers of relevant VXLAN of VSI ID, RT are identical with relevant VXLAN ID of VSI, the RT that other ED in same data center are configured respectively;Three layers of VXLAN's VXLAN ID, MAC Address are identical with VXLAN ID, the MAC Address of the three layers of VXLAN being configured of other ED in same data center.
By being configured above, finally ensure the inclusive multicast Ethernet label road of each ED generations in same data center All it is identical by (local 3 classes routing), based on this, when the inclusive multicast Ethernet label that the EVPN of local terminal ED generations is defined During routing (local 3 classes routing), so that it may by the next-hop of the inclusive multicast Ethernet label routing (local 3 classes routing) of generation It is set as the configured protection group address of local terminal ED.The protection of each difference ED configurations based on same data center as described above Group address is identical, is equivalent to form a virtual protection group, then local terminal ED is by the inclusive multicast Ethernet label road of generation The configured protection group address of local terminal ED is set as by the next-hop of (local 3 classes routing), it is meant that each in Local Data center A ED is externally worked as a whole with protection group, to realize that the load balancing in same data center between difference ED provides Basis.
Similarly, relevant VXLAN ID of two layers of VSI, the RT of each ED configuration be identical in the data center of opposite end, Yi Jisan VXLAN ID, the MAC Address of layer VXLAN is identical.
Step b2, if the MAC/IP publications routing (local 2 that EVPN routings to be noticed are defined for the EVPN of local terminal ED generations Class is route) or IP prefix routes (local 5 classes routing), then when check MAC/IP publications routing or IP prefix routes meet it is pre- If routing policy when, setting meets the MAC/IP publication routings (local 2 classes routing) of preset routing policy or IP prefixes The next-hop of routing (local 5 classes routing) is the configured protection group address of local terminal ED and notices.
Step b3, if the MAC/IP publications routing (non-that EVPN routings to be noticed are defined for the local terminal ED EVPN received Ground 2 class routing) or IP prefix routes (non-local 5 class routing), then the MAC/IP of reception is set to issue routing (non-local 2 class Routing) or IP prefix routes (non-local 5 class routing) the next-hop protection group address configured for local terminal ED and notice.
As one embodiment, in the step b2 being described above, local terminal ED just generates MAC/ generally when as gateway IP publications routing (local 2 classes routing) and IP prefix routes (local 5 classes routing).
Wherein, when local terminal ED generation MAC/IP publications routing (local 2 classes routing), not broadly by the MAC/ of generation The next-hop of IP publications routing (local 2 classes routing) is set as the configured protection group address of local terminal ED, but judges generation Whether MAC/IP publications routing (local 2 classes routing) meets preset routing policy, when only meeting preset routing policy, The next-hop of the MAC/IP publications routing (local 2 classes routing) of generation can be set as the configured protection group address of local terminal ED.
Equally, when local terminal ED generation IP prefix routes (local 5 classes routing), not broadly by the IP prefixes road of generation The configured protection group address of local terminal ED is set as by the next-hop of (local 5 classes routing), but judges the IP prefix routes of generation Whether (local 5 classes routing) meets preset routing policy, just can will be before the IP of generation when only meeting preset routing policy The next-hop for sewing routing (local 5 classes routing) is set as the configured protection group address of local terminal ED.
In one example, preset routing policy includes the specified network segment, is used to indicate the road for matching the specified network segment By performing following operate:Next-hop is revised as the configured protection group address of local terminal ED.Wherein, preset routing policy includes The specified network segment can be a network segment, or more than two different segments.
Based on the description above for preset routing policy, then in the application, above-mentioned local terminal ED judges the MAC/ of generation Whether IP publications routing (local 2 classes routing) or IP prefix routes (local 5 classes routing) meet preset routing policy and can wrap It includes:Whether the network segment belonging to the MAC/IP publications routing of local terminal ED inspection generations or IP prefix routes matches the specified net Section, if so, determining that the MAC/IP publications routing or IP prefix routes meet preset routing policy.Citing description:
If preset routing policy includes more than two specified network segments, then local terminal ED is for the MAC/IP publications road of generation By (local 2 classes routing), check whether the network segment belonging to the MAC/IP publications routing (local 2 classes routing) of the generation is included in road In the specified network segment included by strategy, if so, determining that the MAC/IP publications routing (local 2 classes routing) of generation meets Preset routing policy;Equally, for the IP prefix routes of generation (local 5 classes routing), the IP prefix routes of the generation are checked Whether the network segment belonging to (local 5 classes routing) is included in the specified network segment that routing policy is included, if so, determining life Into IP prefix routes (local 5 classes routing) meet preset routing policy.
By above-mentioned routing policy, the MAC/IP for only the meeting routing policy publications that local terminal ED is locally generated can be realized Routing (local 2 classes routing), IP prefix routes (local 5 classes routing) can just be set as the next-hop protection group configured for local terminal ED Address, flexibility are good.
And it route (local 2 classes routing), IP prefixes road when local terminal ED judges the MAC/IP publications for being unsatisfactory for routing policy It by (local 5 classes routing), is then performed according to existing EVPN routing plans, the MAC/IP publication routings of routing policy will be unsatisfactory for The next-hop of (local 2 classes routing) is set as the unique mark such as loop-back address Lookback of local terminal ED configurations, will be unsatisfactory for road The unique mark such as loop-back address of local terminal ED configurations is set as by the next-hop of the IP prefix routes (local 5 classes routing) of strategy Lookback。
Based on being described above, carried out between how realizing the ED in same data center below based on one embodiment description Load balancing:
Fig. 4 shows the embodiment application networking schematic diagram that the application provides.In networking shown in Fig. 4 with DC401 with For DC402 interconnections.In Fig. 4, ED411, ED412 are the outlets of DC401.ED413, ED414 are the outlets of DC402.
In DC401 or DC402 shown in Fig. 4, only one equipment mark can be configured in either ED or Leaf Know, which can be Lookback addresses.For example the only one device identification of ED411 configurations shown in Fig. 4 is The only one device identification of Lookback1c, ED412 configuration is Lookback2c, the only one equipment mark of ED413 configurations Know for Lookback3c, the only one device identification that ED414 is configured is Lookback4c.Leaf and the application relationship are little, It repeats no more.
In this application, same protection group address (being denoted as Group1d) can be also configured in ED411, ED412 in DC401, A protection group (being denoted as Group1) is formed, ED413, ED414 in DC402 can also be configured same protection group address and (be denoted as Group2d), a protection group (being denoted as Group2) is formed, Group1d is different from Group2d.
In this application, ED411, ED412 configuration in DC401 identical (are denoted as with the relevant VXLAN ID of two layers of VSI VXLAN100), VXLAN ID (being denoted as VXLAN200), the MAC Address of RT (being denoted as RT1) and the identical three layers of VXLAN of configuration (being denoted as MAC1).
In this application, ED413, ED414 configuration in DC402 identical (are denoted as with the relevant VXLAN ID of two layers of VSI VXLAN300), the VXLAN ID of RT (being denoted as RT2, different from RT1) and the identical three layers of VXLAN of configuration (are denoted as VXLAN400), MAC Address (being denoted as MAC2).
Advertising of route is described by taking ED411 as an example:
According to Underlay Routing Protocols, in the present embodiment, ED411 generations are used to indicate the unique of this ED110 configurations Underlay routings reachable device identification Lookback1c, and it is advertised to each Leaf and DC402 connected in same DC1 In ED413, ED414.The unique device identity of this ED411 configurations is used to indicate (with loopback to ED413 notices with ED411 For the Lookback1c of location) for reachable Underlay routings, wherein, the next-hop of the Underlay routings of ED411 notices For on ED411 with ED413 interconnection physical port interface IP address, when ED413 receive ED411 notice Underlay routing, Then the Underlay received routings are added in the Underlay routing tables of local by ED413, are route added to local Underlay The next-hop of Underlay routings in table is the interface IP address with the physical port of ED413 interconnections on above-mentioned ED411.Also, The loop-back address Lookback1c that ED413 can also route instruction with Underlay establishes EVPN neighbours, to be sent out by EVPN neighbours EVPN routings in cloth Overlay networks.
According to Underlay Routing Protocols, in the present embodiment, ED411 generations are used to indicate the protection of this ED110 configurations Underlay routings reachable group address Group1d, and be advertised in each Leaf and DC402 connected in same DC1 ED413、ED414.The protection group address Group1d for being used to indicate this ED411 configurations to ED413 notices with ED411 is reachable For Underlay routings, wherein, the next-hop of the Underlay routings of ED411 notices is the object with ED413 interconnections on ED411 The interface IP address of port is managed, when ED413 receives the Underlay routings of ED411 notices, inspection local Underlay routing tables are It is not no be useful for the reachable Underlay routings of instruction protection group address Group1d, if it is not, then ED413 will be received Underlay routings are added in the Underlay routing tables of local, the Underlay roads added in local Underlay routing tables By interface IP address of the next-hop for the upper physical ports interconnected with ED413 of above-mentioned ED411;If so, in local Underlay Existing be used to indicate in the reachable Underlay routings of protection group address Group1d newly increases reception in routing table The next-hop (on above-mentioned ED411 and interface IP address of the physical port of ED413 interconnections) of Underlay routings.ED412 also can be by Underlay routings are noticed by way of being used to indicate the reachable Underlay routings of protection group address Group1d according to ED411, Final to realize in the Underlay routing tables of ED413 locals, Group1d is finally associated with two next-hops, and one is on ED411 With the interface IP address of the physical port of ED413 interconnections, another interface for ED412 upper physical ports interconnected with ED413 Location.Final associated two next-hops of Group1d have been illustrated below:
Next-hop 1e:For the interface IP address with the physical port of ED413 interconnections on ED411;
Next-hop 2e:For the interface IP address with the physical port of ED413 interconnections on ED412.
The two next-hops are next-hop of equal value.
According to EVPN Routing Protocols, ED411 is set as local terminal when noticing EVPN routings, by the EVPN next-hops routeing Protection group address Group1d configured ED411 notices modified EVPN routings.EVPN roads are noticed to ED413 with ED411 For, wherein, the EVPN routings of ED411 notices are route for ED411 2 classes locally generated, next-hop Group1d.For just In description, ED411 is denoted as EVPN routings 500 to the EVPN routings that ED413 is noticed here.
When ED413 receives the EVPN routings 500 of ED411 notices, then EVPN routings 500 are added to local EVPN route Table, the next-hop added to the EVPN routings 500 of local EVPN routing tables is Group1d.
ED413 checks Local Data center, that is, DC402 with opposite end data center (data center residing for ED411) i.e. Whether have been established that source address is the configured protection group address i.e. Group2d of this ED413, destination address is between DC401 The tunnel of Group1d.
ED413, which is checked, does not set up that source address is Group2d, destination address is Group1d's between DC402 and DC401 Tunnel is then established the tunnel that source address is Group2d, destination address is Group1d between DC402 and DC401, will be added to The outgoing interface of the EVPN routings 500 of local EVPN routing tables is set as the tunnel of the foundation.
Similarly, it is configured to be set as local terminal ED412 when noticing EVPN routings by ED412 for the EVPN next-hops routeing Group address Group1d is protected, notices modified EVPN routings.By taking ED412 is to ED413 notice EVPN routings as an example, wherein, The 2 classes routing that the EVPN routings of ED412 notices are locally generated for ED412, next-hop Group1d.For ease of description, here will ED412 is denoted as EVPN routings 600 to the EVPN routings that ED413 is noticed.
When ED413 receives the EVPN routings 600 of ED412 notices, then EVPN routings 600 are added to local EVPN route Table, the next-hop added to the EVPN routings 600 of local EVPN routing tables is Group1d, and check Local Data center i.e. Whether source address is had been established between DC402 and opposite end data center (data center residing for ED412) i.e. DC401 as this ED413 Tunnels of the configured protection group address, that is, Group2d, destination address for Group1d.
The tunnel that source address is Group2d, destination address is Group1d has been established between checking DC402 and DC401 in ED413 Road is then not repeated to establish same tunnel, will be directly set as added to the outgoing interface of the EVPN of local EVPN routing tables routings 600 The tunnel of the foundation.
The mode of ED413, ED414 notice routing is repeated no more similar to ED411, ED412.
Later, DC402 communicates with DC401, by taking the ED413 in DC402 is to DC401 transmitting data flows as an example:
ED413 determines outgoing interface as tunnel in transmitting data flow, according to local EVPN routing tables, and next-hop is Group1d。
ED413 is associated with two interface IP addresses according to discovery Group1d in the Underlay routing tables of local:One is ED411 The interface IP address of the physical port of upper and ED413 interconnections;Another is the interface with the physical port of ED413 interconnections on ED412 Address, then ED413 selects one from two interface IP addresses and the tunnel by being used as outgoing interface is sent out to the interface IP address of selection Send data flow.Here, ED413 selects the mode of one to have from two interface IP addresses Deng.Final ED413 selects the load balancing between two ED realized in DC401 from two interface IP addresses.
So far, the description of embodiment is completed.
The method provided above the application is described.The device provided below the application is described:
Referring to Fig. 5, Fig. 5 is the structure drawing of device that the application provides.The device is applied to the ED of data center, wherein, together Same protection group address is configured in difference ED in one data center.
As shown in figure 5, the device may include:
Dispensing unit, for protection group address to be configured in local terminal ED;Its of the protection group address and same data center The protection group address of his ED is identical;
Advertising of route unit, for noticing the EVPN routings that next-hop is set as the protection group address;
Receiving unit is route, for receiving the EVPN routings that opposite end ED is noticed in the data center of opposite end;Wherein, the opposite end The next-hop of the EVPN routings of ED notices is the protection group address of opposite end ED configurations;
Routing processing unit, the EVPN routings for the routing receiving unit to be received are added to local EVPN and route Table, and check whether had been established between Local Data center and opposite end data center source address be local terminal ED protection group address, Tunnel of the destination address for the protection group address of opposite end ED configurations, if so, will be added to local EVPN routing tables The outgoing interface of EVPN routings is set as the tunnel.
As one embodiment, the routing processing unit further check Local Data center in end data The tunnel is not set up between the heart, then the tunnel is established between Local Data center and opposite end data center, and will add The outgoing interface being route to the EVPN of local EVPN routing tables is set as the tunnel.
As one embodiment, the advertising of route unit is specifically used for:
If the inclusive multicast Ethernet label routing that EVPN routings to be noticed are defined for the EVPN of local terminal ED generations, The next-hop for setting the inclusive multicast Ethernet label routing is the configured protection group address of local terminal ED and notices;
If EVPN routings to be noticed are the EVPN of the local terminal ED generations MAC/IP publications routings defined or IP prefix routes, Then when the MAC/IP for checking generation issues routing or IP prefix routes meet preset routing policy, setting meets preset The MAC/IP publications routing of routing policy or the next-hop of IP prefix routes are the configured protection group address of local terminal ED and notice;
If EVPN routings to be noticed are the local terminal ED EVPN received the MAC/IP publications routings defined or IP prefixes road By it is the configured protection group address of local terminal ED then to set the MAC/IP publications routing of reception or the next-hop of IP prefix routes And it notices.
As one embodiment, the preset routing policy includes the specified network segment, is used to indicate the matching specified net The EVPN routings of section perform following operate:Next-hop is set as the configured protection group address of local terminal ED;
The advertising of route unit checks that the MAC/IP publications routing of generation or IP prefix routes meet preset road Included by strategy:
Whether the network segment belonging to the MAC/IP publications routing of inspection generation or IP prefix routes matches the specified network segment, If so, determine that the MAC/IP publications routing of generation or IP prefix routes meet preset routing policy.
As one embodiment, the dispensing unit is further configured two-layer virtual and exchanges the relevant VXLAN of example VSI ID, routing property RT and VXLAN ID, the MAC Address that three layers of VXLAN is configured;
Wherein, the VSI that relevant VXLAN ID of VSI, RT are configured respectively with other ED in same data center is relevant VXLAN ID, RT are identical;
Three layers of VXLAN that VXLAN ID, the MAC Address of three layers of VXLAN is configured with other ED in same data center VXLAN ID, MAC Address it is identical.
So far, the structure description of Fig. 5 shown devices is completed.
Accordingly, present invention also provides the hardware structure diagrams of Fig. 5 shown devices.As shown in fig. 6, the hardware configuration packet It includes:
It may include processor 601, the machine readable storage medium 602 for being stored with machine-executable instruction.Processor 601 with Machine readable storage medium 602 can communicate via system bus 603.Also, by reading and performing machine readable storage medium In 602 above-described data center is can perform with the corresponding machine-executable instruction of data center's interconnection logic, processor 601 Interconnected method.
Machine readable storage medium 602 referred to herein can be any electronics, magnetism, optics or other physical stores Device can include or store information, such as executable instruction, data, etc..For example, machine readable storage medium can be:With Machine access memory (English:Radom Access Memory, referred to as:RAM), volatile memory, nonvolatile memory, sudden strain of a muscle It deposits, memory driver (such as hard disk drive), solid state disk, any kind of storage dish (such as CD, dvd) or similar Storage medium or combination thereof.
So far, hardware configuration description shown in fig. 6 is completed.
In this application, a kind of machine readable storage medium including machine-executable instruction is additionally provided, such as in Fig. 6 Machine readable storage medium 602, the machine-executable instruction can perform by the processor 601 in data center's interconnect device To realize data center's interconnected method described above.
Specifically, by call and perform interconnect the corresponding machine of logic with data center in machine readable storage medium can Execute instruction, processor 601 can perform the operation in the interconnected method of data above center.
The foregoing is merely the preferred embodiment of the application, not limiting the application, all essences in the application God and any modification, equivalent substitution, improvement and etc. within principle, done, should be included within the scope of the application protection.

Claims (10)

1. a kind of data center's interconnected method, which is characterized in that this method is applied to the edge device ED of data center, including:
Configuration protection group address;The protection group address is identical with the protection group address of other ED of same data center;
Notice next-hop is set as the EVPN routings of the protection group address;
Receive the EVPN routings that opposite end ED is noticed in the data center of opposite end;Wherein, under the EVPN routings of the opposite end ED notices One jumps the protection group address for opposite end ED configurations;
The EVPN routings of reception are added to local EVPN routing tables, and check between Local Data center and opposite end data center Whether source address be the protection group address of local terminal ED configuration, destination address be the opposite end ED configuration protection group address is had been established Tunnel, if so, the outgoing interface being route added to the EVPN of local EVPN routing tables is set as the tunnel.
2. according to the method described in claim 1, it is characterized in that, this method further includes:
The tunnel is not set up between Local Data center and opposite end data center if checking, Local Data center with it is right The tunnel is established between end data center, and the outgoing interface being route added to the EVPN of local EVPN routing tables is set as described Tunnel.
3. according to the method described in claim 1, it is characterized in that, the notice next-hop is set as the protection group address EVPN routings include:
If the inclusive multicast Ethernet label routing that EVPN routings to be noticed are defined for the EVPN of local terminal ED generations, is set The next-hop of the inclusive multicast Ethernet label routing protection group address configured for local terminal ED is simultaneously noticed;
If EVPN routings to be noticed are the EVPN of the local terminal ED generations MAC/IP publications routings defined or IP prefix routes, when When checking that the MAC/IP publications routing of generation or IP prefix routes meet preset routing policy, setting meets preset routing The MAC/IP publications routing of strategy or the next-hop of IP prefix routes are the configured protection group address of local terminal ED and notice;
If EVPN routings to be noticed are the local terminal ED EVPN received the MAC/IP publications routings defined or IP prefix routes, The MAC/IP publications routing or the next-hop of IP prefix routes that setting receives are the configured protection group address of local terminal ED and lead to It accuses.
4. according to the method described in claim 3, it is characterized in that, the preset routing policy is used for including specifying the network segment Indicate that the EVPN routings for matching the specified network segment perform following operate:Next-hop is with being set as the configured protection groups of local terminal ED Location;
The MAC/IP publications routing for checking generation or IP prefix routes meet preset routing policy and include:
Whether the network segment belonging to the MAC/IP publications routing of inspection generation or IP prefix routes matches the specified network segment, if It is to determine that the MAC/IP publications routing of generation or IP prefix routes meet preset routing policy.
5. method according to any one of claims 1 to 4, which is characterized in that
Two-layer virtual is configured and exchanges relevant VXLAN ID of example VSI, routing property RT, wherein, two layers of relevant VXLAN of VSI ID, RT are identical with relevant VXLAN ID of VSI, the RT that other ED in same data center are configured respectively;
VXLAN ID, the MAC Address of three layers of VXLAN, VXLAN ID, MAC Address and the same data of three layers of VXLAN are configured VXLAN ID, the MAC Address of three layers of VXLAN that other ED are configured are identical in center.
6. a kind of data center's interconnect device, which is characterized in that the device is applied to the edge device ED of data center, including:
Dispensing unit, for protection group address to be configured in local terminal ED;The protection group address and other ED of same data center Protection group address it is identical;
Advertising of route unit, for noticing the EVPN routings that next-hop is set as the protection group address;
Receiving unit is route, for receiving the EVPN routings that opposite end ED is noticed in the data center of opposite end;Wherein, the opposite end ED leads to The next-hop of the EVPN routings of announcement is the protection group address of opposite end ED configurations;
Routing processing unit, the EVPN routings for the routing receiving unit to be received are added to local EVPN routing tables, and Check that it is the protection group address of local terminal ED, destination that source address whether has been established between Local Data center and opposite end data center Tunnel of the location for the protection group address of opposite end ED configurations, if so, by being route added to the EVPN of local EVPN routing tables Outgoing interface be set as the tunnel.
7. device according to claim 6, which is characterized in that the routing processing unit is further checking local terminal number According to the tunnel is not set up between center and opposite end data center, then established between Local Data center and opposite end data center The tunnel, and the outgoing interface being route added to the EVPN of local EVPN routing tables is set as the tunnel.
8. device according to claim 6, which is characterized in that the advertising of route unit is specifically used for:
If the inclusive multicast Ethernet label routing that EVPN routings to be noticed are defined for the EVPN of local terminal ED generations, is set The next-hop of the inclusive multicast Ethernet label routing protection group address configured for local terminal ED is simultaneously noticed;
If EVPN routings to be noticed are the EVPN of the local terminal ED generations MAC/IP publications routings defined or IP prefix routes, when When checking that the MAC/IP publications routing of generation or IP prefix routes meet preset routing policy, setting meets preset routing The MAC/IP publications routing of strategy or the next-hop of IP prefix routes are the configured protection group address of local terminal ED and notice;
If EVPN routings to be noticed are the local terminal ED EVPN received the MAC/IP publications routings defined or IP prefix routes, The MAC/IP publications routing or the next-hop of IP prefix routes that setting receives are the configured protection group address of local terminal ED and lead to It accuses.
9. device according to claim 8, which is characterized in that the preset routing policy includes the specified network segment, is used for Indicate that the EVPN routings for matching the specified network segment perform following operate:Next-hop is with being set as the configured protection groups of local terminal ED Location;
The advertising of route unit checks that the MAC/IP publications routing of generation or IP prefix routes meet preset routing plan Slightly include:
Whether the network segment belonging to the MAC/IP publications routing of inspection generation or IP prefix routes matches the specified network segment, if It is to determine that the MAC/IP publications routing of generation or IP prefix routes meet preset routing policy.
10. according to any device of claim 6 to 9, which is characterized in that
The dispensing unit is further configured two-layer virtual and exchanges relevant VXLAN ID of example VSI, routing property RT, Yi Jipei Put VXLAN ID, the MAC Address of three layers of VXLAN;
Wherein, the relevant VXLAN of VSI that relevant VXLAN ID of VSI, RT are configured respectively with other ED in same data center ID, RT are identical;
VXLAN ID, MAC Address and the three layers of VXLAN of other ED configurations in same data center of three layers of VXLAN VXLAN ID, MAC Address are identical.
CN201711172805.4A 2017-11-22 2017-11-22 Data center interconnection method and device Active CN108259336B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711172805.4A CN108259336B (en) 2017-11-22 2017-11-22 Data center interconnection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711172805.4A CN108259336B (en) 2017-11-22 2017-11-22 Data center interconnection method and device

Publications (2)

Publication Number Publication Date
CN108259336A true CN108259336A (en) 2018-07-06
CN108259336B CN108259336B (en) 2020-12-29

Family

ID=62722152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711172805.4A Active CN108259336B (en) 2017-11-22 2017-11-22 Data center interconnection method and device

Country Status (1)

Country Link
CN (1) CN108259336B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865803A (en) * 2020-06-01 2020-10-30 锐捷网络股份有限公司 Route processing method and device based on EVPN

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710509A (en) * 2012-05-18 2012-10-03 杭州华三通信技术有限公司 Automatic data center configuration method and method
US8494792B2 (en) * 2006-09-15 2013-07-23 Itron, Inc. Distributing metering responses for load balancing an AMR network
CN103259809A (en) * 2012-02-15 2013-08-21 株式会社日立制作所 Load balancer, load balancing method and stratified data center system
US20150100560A1 (en) * 2013-10-04 2015-04-09 Nicira, Inc. Network Controller for Managing Software and Hardware Forwarding Elements
CN107273185A (en) * 2017-06-19 2017-10-20 成都鼎智汇科技有限公司 A kind of control method for equalizing load based on virtual machine

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8494792B2 (en) * 2006-09-15 2013-07-23 Itron, Inc. Distributing metering responses for load balancing an AMR network
CN103259809A (en) * 2012-02-15 2013-08-21 株式会社日立制作所 Load balancer, load balancing method and stratified data center system
CN102710509A (en) * 2012-05-18 2012-10-03 杭州华三通信技术有限公司 Automatic data center configuration method and method
US20150100560A1 (en) * 2013-10-04 2015-04-09 Nicira, Inc. Network Controller for Managing Software and Hardware Forwarding Elements
CN107273185A (en) * 2017-06-19 2017-10-20 成都鼎智汇科技有限公司 A kind of control method for equalizing load based on virtual machine

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865803A (en) * 2020-06-01 2020-10-30 锐捷网络股份有限公司 Route processing method and device based on EVPN

Also Published As

Publication number Publication date
CN108259336B (en) 2020-12-29

Similar Documents

Publication Publication Date Title
US12010097B2 (en) Network architecture for cloud computing environments
US11805045B2 (en) Selective routing
US10116559B2 (en) Operations, administration and management (OAM) in overlay data center environments
US10333836B2 (en) Convergence for EVPN multi-homed networks
US20210314253A1 (en) Generating forward and reverse direction connection-tracking records for service paths at a network edge
US10666561B2 (en) Virtual machine migration
CN107819677B (en) Message forwarding method and device
CN108702328B (en) IS-IS extension for flexible path splicing and selection of traffic traversing segmented routing and MPLS networks
WO2019105462A1 (en) Method and apparatus for sending packet, method and apparatus for processing packet, pe node, and node
CN108259303B (en) Message forwarding method and device
CN106878048B (en) Fault processing method and device
CN105634770B (en) The method and apparatus for disposing virtual extended local area network
EP2761827A1 (en) Incremental deployment of mrt based ipfrr
CN106209643A (en) Message forwarding method and device
EP3716529B1 (en) Tunneling inter-domain stateless internet protocol multicast packets
US20150341263A1 (en) Associating internet protocol (ip) addresses with ethernet virtualisation interconnection (evi) links
CN115225568B (en) Fast reroute to an ethernet vpn-vpn
CN106059946A (en) Message forwarding method and message forwarding device
CN107634893B (en) Method and device for processing Media Access Control (MAC) address advertisement route
CN108259336A (en) Data center's interconnected method and device
EP3481010B1 (en) Method, related device, and system for establishing label-switched path for virtual private network
CN117692384A (en) Method for realizing VPN local interview and related device
CN111431789A (en) Multi-data center interconnection communication method and DCI equipment
Salam et al. RFC 7623: Provider Backbone Bridging Combined with Ethernet VPN (PBB-EVPN)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant