CN109861911B - Infiltration method and device for SRMS strategy - Google Patents

Infiltration method and device for SRMS strategy Download PDF

Info

Publication number
CN109861911B
CN109861911B CN201910138627.6A CN201910138627A CN109861911B CN 109861911 B CN109861911 B CN 109861911B CN 201910138627 A CN201910138627 A CN 201910138627A CN 109861911 B CN109861911 B CN 109861911B
Authority
CN
China
Prior art keywords
srms
abr
area
backbone area
backbone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910138627.6A
Other languages
Chinese (zh)
Other versions
CN109861911A (en
Inventor
宁瑞庚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201910138627.6A priority Critical patent/CN109861911B/en
Publication of CN109861911A publication Critical patent/CN109861911A/en
Application granted granted Critical
Publication of CN109861911B publication Critical patent/CN109861911B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a penetration method and a penetration device for SRMS strategies of a label mapping server, and relates to the technical field of communication. The method is applied to a first area border routing equipment (ABR) supporting a penetration function in an Open Shortest Path First (OSPF) network, wherein the first ABR is connected with at least one non-backbone area, and the method comprises the following steps: when an SRMS strategy sent by target equipment is received, a target non-backbone area corresponding to the SRMS strategy is determined, and if the maximum preset number of equipment identifications corresponding to the target non-backbone area in the pre-stored corresponding relation between the non-backbone area and the equipment identifications of the ABR include the equipment identification of the first ABR, permeation processing between the backbone area and the target non-backbone area is carried out on the SRMS strategy. By adopting the method and the device, the waste of network resources can be avoided.

Description

Infiltration method and device for SRMS strategy
Technical Field
The present application relates to the field of communications technologies, and in particular, to a penetration method and apparatus for an SRMS policy of a tag mapping server.
Background
At present, a network applying an Open Shortest Path First (OSPF) routing protocol usually includes a backbone area and a plurality of non-backbone areas. A plurality of common routing devices can be arranged in the backbone area and the non-backbone area, and the interfaces of the common routing devices belong to the same area. An area border routing device (ABR) with Segment Routing (SR) capability is arranged between the backbone area and the non-backbone area, wherein part of interfaces of the ABR belong to the backbone area, and part of interfaces of the ABR belong to the non-backbone area. The policy penetration of a label mapping server (SRMS) between a backbone area and a non-backbone area can be realized through ABR.
Taking the example of the permeation from the backbone area to the non-backbone area, the routing device in the backbone area may flood an SRMS policy to each routing device in the non-backbone area, where the SRMS policy includes policy content to be permeated and an identifier (english: route id) of a router that sends the SRMS policy. And after receiving the SRMS strategy, the ABR modifies the route id into a self identifier and floods the modified SRMS strategy to the connected non-backbone area. If there are multiple ABRs between the non-backbone area and the backbone area, each routing device in the non-backbone area and each ABR connected to the non-backbone area will receive multiple SRMS strategies. And the devices determine the SRMS strategy with the maximum route id in the received SRMS strategies and store the SRMS strategy. Meanwhile, if the ABR determines the non-maximum route id of the route id, the ABR will cancel the message to each routing device in the non-backbone area, so as to age the SRMS strategy permeated by the ABR, and each device stores an effective SRMS strategy.
Based on the technical scheme, when SRMS strategy infiltration is carried out, multiple flooding can occur in a short time, and network resources are wasted.
Disclosure of Invention
In view of this, the present application provides a penetration method and apparatus for SRMS policy of a tag mapping server, so as to avoid network resource waste. The specific technical scheme is as follows:
in a first aspect, a method for permeating label mapping server SRMS policy is provided, the method is applied to a first area border routing equipment ABR supporting a permeation function in an open shortest path first OSPF network, the first ABR is connected with at least one non-backbone area, and the method includes:
when an SRMS strategy sent by target equipment is received, determining a target non-backbone area corresponding to the SRMS strategy;
and if the maximum preset number of equipment identifications corresponding to the target non-backbone area in the pre-stored corresponding relationship between the non-backbone area and the equipment identifications of the ABRs contains the equipment identification of the first ABR, performing infiltration processing between the backbone area and the target non-backbone area on the SRMS strategy.
Optionally, the determining the target non-backbone area corresponding to the SRMS policy includes:
if the area to which the input interface of the SRMS strategy belongs is a backbone area, determining that a non-backbone area connected with the equipment is a target non-backbone area corresponding to the SRMS strategy;
and if the area to which the input interface of the SRMS strategy belongs is a non-backbone area, determining that the non-backbone area to which the input interface belongs is a target non-backbone area corresponding to the SRMS strategy.
Optionally, when the preset number is greater than 1, performing infiltration processing between the backbone area and the target non-backbone area on the SRMS policy includes:
sending the SRMS strategy in a target infiltration area of the SRMS strategy;
if the device identifier of the second ABR is larger than the device identifier of the first ABR in the device identifiers corresponding to the target non-backbone area, sending a policy withdrawal message corresponding to the SRMS policy in the target permeable area when receiving the SRMS policy sent by the second ABR device in the target permeable area.
Optionally, the method further includes:
storing the corresponding relation between the non-backbone area and the equipment identifier of the first ABR;
when receiving a first link state broadcast (LSA) message sent by a second ABR of a first non-backbone area in the non-backbone area, if the first LSA message carries a device identifier and a penetration capability identifier of the second ABR, storing a corresponding relationship between the first non-backbone area and the device identifier of the second ABR, wherein the penetration capability identifier indicates that the second ABR supports a penetration function.
Optionally, the method further includes:
and sending a second LSA message in the non-backbone area, wherein the second LSA message carries the identifier of the first ABR and the identifier of the infiltration capacity.
In a second aspect, a penetration apparatus for a label mapping server SRMS policy is provided, the apparatus is applied to a first area border routing device, ABR, supporting a penetration function in an open shortest path first, OSPF, network, the first ABR is connected to at least one non-backbone area, and the apparatus comprises:
a determining module, configured to determine, when an SRMS policy sent by a target device is received, a target non-backbone area corresponding to the SRMS policy;
and the infiltration module is configured to perform infiltration processing between the backbone area and the target non-backbone area on the SRMS policy if the maximum preset number of device identifiers corresponding to the target non-backbone area includes the device identifier of the first ABR in the pre-stored correspondence between the non-backbone area and the device identifiers of the ABRs.
Optionally, the determining module is specifically configured to:
if the area to which the input interface of the SRMS strategy belongs is a backbone area, determining that a non-backbone area connected with the equipment is a target non-backbone area corresponding to the SRMS strategy;
and if the area to which the input interface of the SRMS strategy belongs is a non-backbone area, determining that the non-backbone area to which the input interface belongs is a target non-backbone area corresponding to the SRMS strategy.
Optionally, when the preset number is greater than 1, the infiltration module is specifically configured to:
sending the SRMS strategy in a target infiltration area of the SRMS strategy;
if the device identifier of the second ABR is larger than the device identifier of the first ABR in the device identifiers corresponding to the target non-backbone area, sending a policy withdrawal message corresponding to the SRMS policy in the target permeable area when receiving the SRMS policy sent by the second ABR device in the target permeable area.
Optionally, the apparatus further comprises:
a first storage module, configured to store a correspondence between the non-backbone area and the device identifier of the first ABR;
a second storage module, configured to, when a first link state broadcast LSA packet sent by a second ABR in a first non-backbone area in the non-backbone area is received, store a correspondence between the first non-backbone area and a device identifier of the second ABR if the first LSA packet carries the device identifier and a penetration capability identifier of the second ABR, where the penetration capability identifier indicates that the second ABR supports a penetration function.
Optionally, the apparatus further comprises:
and the sending module is used for sending a second LSA message in the non-backbone area, wherein the second LSA message carries the identifier of the first ABR and the permeability identifier.
In a third aspect, a network device is provided, which includes a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of the first aspect when executing the program stored in the memory.
In a fourth aspect, a computer-readable storage medium is provided, having stored thereon a computer program which, when being executed by a processor, carries out the method steps of the first aspect.
In a fifth aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method steps of the first aspect described above.
Therefore, by applying the infiltration method and apparatus for the SRMS policy provided by the present application, when the first ABR receives the SRMS policy sent by the target device, the target non-backbone area corresponding to the SRMS policy may be determined, and if the maximum preset number of device identifiers corresponding to the target non-backbone area in the pre-stored correspondence between the non-backbone area and the device identifier of the ABR includes the device identifier of the first ABR, the infiltration processing between the backbone area and the target non-backbone area is performed on the SRMS policy. Based on the above processing, among the ABRs connected to the target non-backbone area, only the preset number of ABRs with the largest device identifier will perform the penetration processing (i.e., flood the SRMS policy), and other ABRs connected to the target non-backbone area will not flood the SRMS policy, thereby effectively reducing the flooding times and avoiding the waste of network resources.
Of course, not all advantages described above need to be achieved at the same time in the practice of any one product or method of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of an OSPF network according to an embodiment of the present application;
fig. 2 is a flowchart of an infiltration method of an SRMS strategy provided in an embodiment of the present application;
FIG. 3 is a schematic structural diagram of an osmotic apparatus for SRMS strategy according to an embodiment of the present application;
FIG. 4 is a schematic structural diagram of an osmotic apparatus for SRMS strategy according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of an osmotic apparatus for SRMS strategy according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a network device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides a penetration method of an SRMS strategy, which can be applied to ABRs (which may be called first ABRs for convenience of distinction) in an OSPF network. An OSPF network may comprise a backbone area and a plurality of non-backbone areas. A plurality of common routing devices can be arranged in the backbone area and the non-backbone area, and the interfaces of the common routing devices belong to the same area. An ABR with SR capability can be arranged between the backbone area and the non-backbone area, wherein part of interfaces of the ABR belong to the backbone area, and part of interfaces belong to the non-backbone area. Fig. 1 is a schematic diagram of an OSPF network according to an embodiment of the present application. Including a diaphyseal region (i.e., area0), a non-diaphyseal region 1 (i.e., area1), and a non-diaphyseal region 2 (i.e., area2), ABR1 is connected to area0 and area1, and ABR2 is connected to area0, area1, and area 2. The area0 is also provided with a router 1 and a router 2, the area1 is also provided with a router 3, and the area2 is also provided with a router 4.
In practical application, a device in the OSPF network may send an SRMS policy to other devices, where the SRMS policy may be sent by using a class 10 LAS message, that is, the SRMS policy is only sent in an area to which an outgoing interface of the SRMS policy belongs. After the ABR in the area receives the SRMS policy, it may perform infiltration processing between the backbone area and the target non-backbone area on the SRMS policy, for example, the SRMS policy in the backbone area may be infiltrated into the non-backbone area, or the SRMS policy in the non-backbone area may be infiltrated into the backbone area. In this way, each device in the OSPF network can be made to receive the SRMS policy.
In an embodiment of the present application, the first ABR is an ABR supporting osmotic function. Specifically, the first ABR is a routing device in which SR capability is enabled in the OSPF network, and the routing device has neighbor devices in both the backbone area and the non-backbone area. The first ABR may store therein a correspondence between the non-backbone area and the device identifier of the ABR. The non-diaphysical region is a non-diaphysical region connected with the first ABR, and the equipment identifier of the ABR corresponding to the non-diaphysical region is the identifier of the ABR connected with the non-diaphysical region. When the first ABR receives an SRMS policy sent by a target device, a target non-backbone area corresponding to the SRMS policy may be determined, and if the maximum preset number of device identifiers corresponding to the target non-backbone area in the pre-stored correspondence between the non-backbone area and the device identifiers of the ABR includes the device identifier of the first ABR, the SRMS policy is subjected to infiltration processing between the backbone area and the target non-backbone area. Based on the above processing, among the ABRs connected to the target non-backbone area, only the preset number of ABRs with the largest device identifier will perform the penetration processing (i.e., flood the SRMS policy), and other ABRs connected to the target non-backbone area will not flood the SRMS policy, thereby effectively reducing the flooding times and avoiding the waste of network resources.
For convenience of description, in the embodiment of the present application, a process of establishing a correspondence between a non-backbone area and a device identifier of an ABR is described first, and specifically includes the following steps.
Step one, storing a corresponding relation between a non-backbone area and a device identifier of a first ABR;
in this embodiment of the application, the first ABR may obtain the configuration information of the device and the locally stored neighbor information, and further determine whether the device supports the penetration function according to the configuration information of the device and the locally stored neighbor information. The specific treatment process comprises the following steps: and judging whether the equipment enables SR capability according to the configuration information of the equipment, and judging whether the equipment has neighbor equipment in both a backbone area and a non-backbone area according to the neighbor information. If the device enables SR capability and neighbor devices exist in the backbone region and the non-backbone region, the device is judged to support the osmosis function. Otherwise, judging that the equipment does not support the penetration function.
Under the condition that the first ABR determines that the equipment supports the osmosis function, the first ABR can determine a non-backbone area connected with the equipment, and then, a corresponding relation between the equipment identifier of the equipment and the non-backbone area is established.
In addition, in the case that the first ABR determines that the present device supports the penetration function, the first ABR may also notify other ABRs that the present device supports the penetration function. The specific treatment process comprises the following steps: and sending a second LSA message in the non-backbone area.
And the second LSA message carries the identifier of the first ABR and the identifier of the infiltration capacity.
In this embodiment of the present application, when the first ABR determines that the present device supports the penetration function, the first ABR may send an LSA packet (for convenience of differentiation, may be referred to as a second LSA packet) in the non-backbone area through an interface connected to the non-backbone area. The second LSA message may be a type 10 LSA message, that is, the second LSA message is only sent in an area to which an outgoing interface of the message belongs (may also be referred to as flooding). Referring to fig. 1, when the ABR2 sends the second LSA message, the ABR1 sends the second LSA message in area1 and area2, respectively, and when the ABR1 sends the second LSA message, the ABR2 sends the second LSA message only in area 1.
Optionally, the second LSA message may be implemented by an existing message in the OSPF. For example, an LSA message for synchronizing configuration information exists in the OSPF, a certain Type-Length-Value (TLV) field in the LSA message may be defined as an OSPF router information capabilities TLV (chinese: OSPF router information function TLV) field, and a 6 th bit of the TLV field is defined for storing a penetration capability identifier. The location 1 indicates that the ABR supports the penetration function, and the location 0 indicates that the ABR does not support the penetration function, which may be referred to as a penetration capability identification field.
Similarly, other ABRs in the OSPF network may also determine whether themselves support the penetration function through the above processing, and establish a corresponding relationship between the non-backbone area and the device identifier of the ABR and send an LSA message when determining that themselves support the penetration function. In this way, the first ABR may receive LSA messages (for the sake of distinction, may be referred to as the first LSA message) sent by other ABRs, thereby performing step two.
And step two, when a first LSA message sent by a second ABR of a first non-backbone area in the non-backbone area is received, if the first LSA message carries the equipment identifier and the infiltration capacity identifier of the second ABR, storing the corresponding relation between the equipment identifiers of the first non-backbone area and the second ABR, wherein the infiltration capacity identifier represents that the second ABR supports the infiltration function.
In this embodiment of the application, when receiving a first LSA message sent by a second ABR, a first ABR may parse the first LSA message, obtain an equipment identifier in the first LSA message, and determine whether the first LSA message carries an osmotic capability identifier. For example, the TLV field of the OSPF router information function may be parsed, whether the 6 th bit (i.e., the penetration capability identifier field) in the TLV field is 1 or not may be determined, and if the penetration capability identifier field is 1, it is determined that the second ABR supports the penetration function; if the penetration capability identification field is 0, it is determined that the second ABR does not support the penetration function.
In this embodiment of the present application, it may be notified whether the ABR supports the penetration function by using a 10-type LSA packet, and because the 10-type LSA packet is sent only in an area to which an outgoing interface of the packet belongs, the first ABR may determine an incoming interface of the first LSA packet and a non-backbone area (i.e., a first non-backbone area) to which the incoming interface belongs, where the first non-backbone area is an area to which the second ABR is connected, and then may store a correspondence relationship between the device identifier of the first non-backbone area and the device identifier of the second ABR.
The correspondence between the non-backbone areas and the device identifiers of the ABRs may be stored in a table form (which may be referred to as a preference information table), and the first ABR may perform preference according to the preference information table to determine whether the device performs infiltration processing on the SRMS policy of each non-backbone area. As shown in table one, for an example of a preferred information table provided herein,
watch 1
Area 0.0.0.1 Area 0.0.0.2 Area 0.0.0.3
10.10.10.10 255.255.255.255 9.9.9.9
9.9.9.9 13.13.13.13 8.8.8.8
8.8.8.8 9.9.9.9 7.7.7.7
Wherein the route id of the first ABR is 9.9.9.9, and the first ABR is connected with non-diaphyseal region Area 0.0.0.1, Area0.0.0.2 and Area 0.0.0.3. Based on table one, the ABR supporting osmotic function linked to Area 0.0.0.1 further includes: ABR with route id of 10.10.10.10, ABR with route id of 8.8.8.8; the ABR supporting osmotic function linked to Area0.0.0.2 further comprises: ABR with route id of 255.255.255.255 and ABR with route id of 13.13.13.13; the ABR supporting osmotic function linked to the Area 0.0.0.3 further comprises: ABR with route id of 8.8.8.8 and ABR with route id of 7.7.7.7.
In the embodiment of the application, based on the OSPF routing protocol, two neighboring devices in the OSPF network can mutually sense whether the other side fails. For each ABR supporting the penetration function, when the ABR detects its neighbor ABR failure (down), the ABR deletes the failed ABR from the route LSA and floods the entire OSPF network. After receiving the LSA message, other ABRs may delete the failed ABR from the topology. At this time, the route id of the failed ABR is not reachable in the topology, and even if there is a 10-class LSA with the penetration capability identification field 1 sent by the failed ABR, other ABRs will not add the device identification of the failed ABR to the above-mentioned preference information table. If the preferred information table already has the device identifier of the failed ABR, other ABRs may delete the device identifier of the failed ABR from the preferred information table, so as to determine whether the device performs the penetration processing on the SRMS policy corresponding to the non-backbone area according to the updated preferred information table.
The infiltration method of the SRMS strategy provided in the examples of the present application will be described in detail below with reference to specific embodiments, as shown in fig. 2, and the specific steps are as follows.
Step 201, when receiving the SRMS policy sent by the target device, determining a target non-backbone area corresponding to the SRMS policy.
In this embodiment, the first ABR may receive the SRMS policy sent by the other device (i.e., the target device). For example, the SRMS policy may be (200.0.0.0/24,100,1, IA ═ 0, route id ═ a), where (200.0.0.0/24,100,1) is policy content, IA (english: infitrate area, chinese: infiltration area) indicates whether the policy is sent by the routing device in the area, IA is 0, indicates that the policy is sent by the routing device in the area, IA is 1, indicates that the policy is infiltrated by other areas, and route id ═ a indicates that the identifier of the router is a.
The target device may be a common routing device in a certain area, or may be an ABR. After receiving the SRMS policy, the first ABR may determine an area to which an ingress interface of the SRMS policy belongs, and then determine a target non-backbone area corresponding to the SRMS policy according to the area to which the ingress interface belongs.
Optionally, the specific processing procedure for determining the target non-backbone area corresponding to the SRMS policy may be: if the area to which the input interface of the SRMS strategy belongs is a backbone area, determining that a non-backbone area connected with the equipment is a target non-backbone area corresponding to the SRMS strategy; and if the area to which the input interface of the SRMS strategy belongs is the non-backbone area, determining that the non-backbone area to which the input interface belongs is the target non-backbone area corresponding to the SRMS strategy.
In this embodiment of the present application, if an area to which an ingress interface of an SRMS policy belongs is a backbone area, it is described that the SRMS policy is a policy in which the backbone area permeates into each non-backbone area, the first ABR may determine each non-backbone area connected to the apparatus, and each determined non-backbone area is a target non-backbone area corresponding to the SRMS policy. If the area to which the input interface of the SRMS policy belongs is a non-backbone area, it indicates that the SRMS policy is a policy of permeating from the non-backbone area to a backbone area, and the first ABR may determine the non-backbone area to which the input interface belongs, where the non-backbone area is a target non-backbone area corresponding to the SRMS policy.
For example, referring to the OSPF network shown in fig. 1, when the ABR2 receives the SRMS policy sent by the router 1, the ABR2 determines that the target non-backbone areas corresponding to the SRMS policy are area1 and area2, and when the ABR2 receives the SRMS policy sent by the router 4, the ABR2 determines that the target non-backbone area corresponding to the SRMS policy is area 2.
Step 202, if the maximum preset number of device identifiers corresponding to the target non-backbone area in the pre-stored correspondence between the non-backbone areas and the device identifiers of the ABRs includes the device identifier of the first ABR, performing infiltration processing between the backbone areas and the target non-backbone areas on the SRMS policy.
The preset number may be a positive integer.
In this embodiment of the present application, for each non-backbone area to which the first ABR is connected, after the corresponding relationship is established, the first ABR may determine, according to the corresponding relationship, whether the device performs the penetration processing on the SRMS policy corresponding to the non-backbone area, and correspondingly, when the first ABR detects that the route id corresponding to the non-backbone area changes, re-determine whether the device performs the penetration processing on the SRMS policy corresponding to the non-backbone area. Or, after receiving the SRMS policy, the first ABR may also determine whether the device performs the infiltration processing on the SRMS policy corresponding to the non-backbone area. In this way, the first ABR may determine a non-backbone area (which may be referred to as a second non-backbone area) that needs to be subjected to the infiltration processing, and further may determine whether the received SRMS policy needs to be subjected to the infiltration processing according to the determined second non-backbone area.
In one possible implementation, the process of the first ABR determining the second non-diaphyseal area is: for each non-backbone area in the preferred information table, the first ABR obtains the maximum preset number of device identifiers corresponding to the non-backbone area from the preferred information table to obtain a device identifier set, and then the first ABR judges whether the device identifier set contains the device identifier of the device. If so, determining that the infiltration treatment can be performed on the SRMS strategy corresponding to the non-diaphyseal region (namely, the non-diaphyseal region is a second non-diaphyseal region); if not, the infiltration processing is not performed on the SRMS strategy corresponding to the non-backbone region (i.e., the non-backbone region is not the second non-backbone region).
Based on the processing result, the first ABR may determine whether the target non-backbone area corresponding to the SRMS policy is the second non-backbone area. And if the target non-backbone area is the second non-backbone area, performing infiltration treatment between the backbone area and the target non-backbone area on the SRMS strategy. And if the target non-backbone area is not the second non-backbone area, performing infiltration processing between the backbone area and the target non-backbone area on the SRMS strategy.
For example, referring to table one above, assuming that the preset number is 2 and the route id of the first ABR is 9.9.9.9, the first ABR may penetrate the strategy of the diaphysial region area0 into area 0.0.0.1 and area 0.0.0.3 but cannot penetrate the strategy of the diaphysial region area0 into area0.0.0.2, and similarly, the first ABR may penetrate the strategies of area 0.0.0.1 and area 0.0.0.3 into area0 and cannot penetrate the strategy of area0.0.0.2 into area0.
Optionally, when the preset number is 1, if the device identifier of the first ABR is the largest device identifier corresponding to the target non-backbone area, the first ABR may perform infiltration processing between the backbone area and the target non-backbone area on the SRMS policy. For example, when the SRMS policy is an SRMS policy in a backbone area, the SRMS policy may be infiltrated into a target non-backbone area, and when the SRMS policy is an SRMS policy in a target non-backbone area, the SRMS policy may be infiltrated into a backbone area. In this way, each device in the OSPF network can be made to receive the SRMS policy.
When the preset number is greater than 1, the ABR may also perform suppression processing on the SRMS policy, and the specific processing procedure may be as follows: and sending the SRMS strategy in a target permeation area of the SRMS strategy, and if the equipment identifier of the second ABR is larger than that of the first ABR in the equipment identifiers corresponding to the target non-backbone area, sending a strategy cancellation message corresponding to the SRMS strategy in the target permeation area when receiving the SRMS strategy sent by the second ABR in the target permeation area.
In this embodiment of the application, if the maximum preset number of device identifiers corresponding to the target non-backbone area includes a device identifier of the first ABR (that is, the target non-backbone area is the second backbone area), the first ABR determines a target permeable area (that is, the target non-backbone area or the backbone area) of the SRMS policy, and then floods the SRMS policy in the target permeable area.
Since the preset number is greater than 1, there will be a preset number of SRMS strategies in the target infiltration zone. In this case, among the determined preset number of device identifiers, there may be a device identifier with a certain device identifier (i.e., the device identifier of the second ABR) larger than the device identifier of the first ABR. Based on this, after the first ABR floods the SRMS policy in the target permeable area, it may be determined whether the device identifier of the second ABR is larger than the device identifier of the first ABR among the preset number of device identifiers. If the policy revocation message exists, when the SRMS policy sent by the second ABR equipment in the target penetration area is received, the policy revocation message corresponding to the SRMS policy is sent in the target penetration area. The policy revocation message is an LSA message, and an age field in the LSA message is a maximum value, so that after each device in the target permeable area receives the policy revocation message, the device performs aging processing on the SRMS policy sent by the first ABR, and an effective SRMS policy is ensured to exist in the target permeable area.
Thus, because the preset number is greater than 1, when the maximum ABR of the equipment identifier fails, other ABRs can also penetrate the SRMS strategy, and the reliability of communication is improved. Meanwhile, the number of ABRs permeating the SRMS strategy is limited, so that compared with the prior art, the flooding frequency can be effectively reduced, and the waste of network resources is avoided.
In this embodiment of the present application, when the first ABR receives an SRMS policy sent by a target device, a target non-backbone area corresponding to the SRMS policy may be determined, and if, in a correspondence relationship between pre-stored non-backbone areas and device identifiers of the ABRs, the device identifiers of the first ABR are included in a maximum preset number of device identifiers corresponding to the target non-backbone areas, the permeation processing between the backbone areas and the target non-backbone areas is performed on the SRMS policy. Based on the above processing, among the ABRs connected to the target non-backbone area, only the preset number of ABRs with the largest device identifier will perform the penetration processing (i.e., flood the SRMS policy), and other ABRs connected to the target non-backbone area will not flood the SRMS policy, thereby effectively reducing the flooding times and avoiding the waste of network resources.
In addition, the infiltration method of the SRMS strategy provided in the embodiment of the present application may also be compatible with the currently implemented technical solution. That is, if an ABR in the OSPF network does not support the interworking function described in the embodiment of the present application, after receiving the SRMS policy flooded by the first ABR, the ABR may perform processing according to the existing implementation, flood the SRMS policy, and then determine whether to perform throttling processing according to the device identifier. Thus, when the route id of the ABR not supporting the penetration function is the maximum, the policy for the ABR penetration is effective in the network, and other ABRs supporting the penetration function do not penetrate the policy again. When the route id of the ABR not supporting the penetration function is smaller, the strategy of the ABR penetration supporting the penetration function is effective in the network, and the strategy of the ABR penetration not supporting the function is inhibited according to the flow.
By the infiltration method of the SRMS strategy provided by the embodiment of the application, the optimized action is concentrated on the ABR, the optimized operation can not be carried out on the ordinary routing equipment in the area, meanwhile, the quantity of the ABRs participating in infiltration is reduced, the flooding times can be effectively reduced, and the waste of network resources and the oscillation of the infiltration strategy are avoided. In addition, the fault points are concentrated (namely concentrated on the ABR equipment), and the fault location is easy.
Based on the same technical concept, as shown in fig. 3, an embodiment of the present application further provides a penetration apparatus for an SRMS policy, where the penetration apparatus is applied to a first area border routing device ABR supporting a penetration function in an open shortest path first OSPF network, and the first ABR is connected to at least one non-backbone area, and the apparatus includes:
a determining module 310, configured to determine, when receiving an SRMS policy sent by a target device, a target non-backbone area corresponding to the SRMS policy;
and a penetration module 320, configured to perform penetration processing between the backbone area and the target non-backbone area on the SRMS policy if the maximum preset number of device identifiers corresponding to the target non-backbone area in the pre-stored correspondence between the non-backbone area and the device identifiers of the ABRs includes the device identifier of the first ABR.
Optionally, the determining module 310 is specifically configured to:
if the area to which the input interface of the SRMS strategy belongs is a backbone area, determining that a non-backbone area connected with the equipment is a target non-backbone area corresponding to the SRMS strategy;
and if the area to which the input interface of the SRMS strategy belongs is the non-backbone area, determining that the non-backbone area to which the input interface belongs is the target non-backbone area corresponding to the SRMS strategy.
Optionally, when the preset number is greater than 1, the infiltration module 320 is specifically configured to:
sending the SRMS strategy in a target infiltration area of the SRMS strategy;
and if the equipment identifier of the second ABR is larger than that of the first ABR in the equipment identifiers corresponding to the target non-backbone area, sending a strategy cancellation message corresponding to the SRMS strategy in the target permeable area when the SRMS strategy sent by the second ABR in the target permeable area is received.
Optionally, as shown in fig. 4, the apparatus further includes:
a first storage module 330, configured to store a correspondence between a non-backbone area and a device identifier of a first ABR;
the second storage module 340 is configured to, when receiving a first link state broadcast LSA packet sent by a second ABR in a first non-backbone area in a non-backbone area, store a corresponding relationship between a device identifier of the first non-backbone area and a device identifier of a second ABR if the first LSA packet carries the device identifier and a penetration capability identifier of the second ABR, where the penetration capability identifier indicates that the second ABR supports a penetration function.
Optionally, as shown in fig. 5, the apparatus further includes:
a sending module 350, configured to send a second LSA packet in the non-backbone area, where the second LSA packet carries the identifier of the first ABR and the identifier of the penetration capability.
The embodiment of the application provides a permeation device for an SRMS policy, which may determine a target non-backbone area corresponding to the SRMS policy when a first ABR receives the SRMS policy sent by a target device, and perform permeation processing between the backbone area and the target non-backbone area on the SRMS policy if a maximum preset number of device identifiers corresponding to the target non-backbone area in a pre-stored correspondence between the non-backbone area and the device identifiers of the ABR include the device identifier of the first ABR. Based on the above processing, among the ABRs connected to the target non-backbone area, only the preset number of ABRs with the largest device identifier will perform the penetration processing (i.e., flood the SRMS policy), and other ABRs connected to the target non-backbone area will not flood the SRMS policy, thereby effectively reducing the flooding times and avoiding the waste of network resources.
Based on the same technical concept, the embodiment of the present application further provides a network device, as shown in fig. 6, including a processor 601, a communication interface 602, a memory 603, and a communication bus 604, where the processor 601, the communication interface 602, and the memory 603 complete mutual communication through the communication bus 604,
a memory 603 for storing a computer program;
the processor 601 is configured to implement the migration method of the virtual machine when executing the program stored in the memory 603, and the method includes:
when an SRMS strategy sent by target equipment is received, determining a target non-backbone area corresponding to the SRMS strategy;
and if the maximum preset number of equipment identifications corresponding to the target non-backbone area in the pre-stored corresponding relationship between the non-backbone area and the equipment identifications of the ABRs contains the equipment identification of the first ABR, performing infiltration processing between the backbone area and the target non-backbone area on the SRMS strategy.
Optionally, the determining the target non-backbone area corresponding to the SRMS policy includes:
if the area to which the input interface of the SRMS strategy belongs is a backbone area, determining that a non-backbone area connected with the equipment is a target non-backbone area corresponding to the SRMS strategy;
and if the area to which the input interface of the SRMS strategy belongs is a non-backbone area, determining that the non-backbone area to which the input interface belongs is a target non-backbone area corresponding to the SRMS strategy.
Optionally, when the preset number is greater than 1, performing infiltration processing between the backbone area and the target non-backbone area on the SRMS policy includes:
sending the SRMS strategy in a target infiltration area of the SRMS strategy;
if the device identifier of the second ABR is larger than the device identifier of the first ABR in the device identifiers corresponding to the target non-backbone area, sending a policy withdrawal message corresponding to the SRMS policy in the target permeable area when receiving the SRMS policy sent by the second ABR device in the target permeable area.
Optionally, the method further includes:
storing the corresponding relation between the non-backbone area and the equipment identifier of the first ABR;
when a first link state broadcast (LSA) message sent by a second ABR of a first non-backbone area in a non-backbone area is received, if the first LSA message carries a device identifier and a penetration capability identifier of the second ABR, storing a corresponding relation between the first non-backbone area and the device identifier of the second ABR, wherein the penetration capability identifier represents that the second ABR supports a penetration function.
Optionally, the method further includes:
and sending a second LSA message in the non-backbone area, wherein the second LSA message carries the identifier of the first ABR and the identifier of the infiltration capacity.
The communication bus mentioned in the network device may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the network device and other devices.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, or discrete hardware components.
Based on the same technical concept, the embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the infiltration method of the SRMS policy described above.
Based on the same technical concept, the embodiment of the present application also provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the infiltration method of the SRMS policy described above.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only for the preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application are included in the protection scope of the present application.

Claims (12)

1. A penetration method of a label mapping server (SRMS) strategy is applied to a first area border routing equipment (ABR) supporting penetration function in an Open Shortest Path First (OSPF) network, wherein the first ABR is connected with at least one non-backbone area, and the method comprises the following steps:
when an SRMS strategy sent by target equipment is received, determining a target non-backbone area corresponding to the SRMS strategy;
if the maximum preset number of equipment identifications corresponding to the target non-backbone area in the pre-stored corresponding relationship between the non-backbone area and the equipment identifications of the ABRs contains the equipment identification of the first ABR, performing infiltration processing between the backbone area and the target non-backbone area on the SRMS strategy;
and if the maximum preset number of equipment identifications corresponding to the target non-backbone area in the pre-stored corresponding relationship between the non-backbone area and the equipment identifications of the ABRs does not contain the equipment identification of the first ABR, performing no infiltration treatment between the backbone area and the target non-backbone area on the SRMS strategy.
2. The method of claim 1, wherein the determining the target non-backbone region corresponding to the SRMS policy comprises:
if the area to which the input interface of the SRMS strategy belongs is a backbone area, determining that a non-backbone area connected with the equipment is a target non-backbone area corresponding to the SRMS strategy;
and if the area to which the input interface of the SRMS strategy belongs is a non-backbone area, determining that the non-backbone area to which the input interface belongs is a target non-backbone area corresponding to the SRMS strategy.
3. The method of claim 1, wherein when the preset number is greater than 1, the performing infiltration processing between a backbone area and the target non-backbone area on the SRMS strategy comprises:
sending the SRMS strategy in a target infiltration area of the SRMS strategy;
if the device identifier of the second ABR is larger than the device identifier of the first ABR in the device identifiers corresponding to the target non-backbone area, sending a policy withdrawal message corresponding to the SRMS policy in the target permeable area when receiving the SRMS policy sent by the second ABR device in the target permeable area.
4. The method of claim 1, further comprising:
storing the corresponding relation between the non-backbone area and the equipment identifier of the first ABR;
when receiving a first link state broadcast (LSA) message sent by a second ABR of a first non-backbone area in the non-backbone area, if the first LSA message carries a device identifier and a penetration capability identifier of the second ABR, storing a corresponding relationship between the first non-backbone area and the device identifier of the second ABR, wherein the penetration capability identifier indicates that the second ABR supports a penetration function.
5. The method of claim 1, further comprising:
and sending a second LSA message in the non-backbone area, wherein the second LSA message carries the identifier of the first ABR and the identifier of the infiltration capacity.
6. A tunneling apparatus for label mapping server SRMS policy, the apparatus being applied to a first area border routing device, ABR, supporting a tunneling function in an open shortest path first, OSPF, network, the first ABR being connected to at least one non-backbone area, the apparatus comprising:
a determining module, configured to determine, when an SRMS policy sent by a target device is received, a target non-backbone area corresponding to the SRMS policy;
a penetration module, configured to perform penetration processing between the backbone area and the target non-backbone area on the SRMS policy if the maximum preset number of device identifiers corresponding to the target non-backbone area includes the device identifier of the first ABR in a pre-stored correspondence between the non-backbone area and the device identifiers of the ABRs; and if the maximum preset number of equipment identifications corresponding to the target non-backbone area in the pre-stored corresponding relationship between the non-backbone area and the equipment identifications of the ABRs does not contain the equipment identification of the first ABR, performing no infiltration treatment between the backbone area and the target non-backbone area on the SRMS strategy.
7. The apparatus of claim 6, wherein the determining module is specifically configured to:
if the area to which the input interface of the SRMS strategy belongs is a backbone area, determining that a non-backbone area connected with the equipment is a target non-backbone area corresponding to the SRMS strategy;
and if the area to which the input interface of the SRMS strategy belongs is a non-backbone area, determining that the non-backbone area to which the input interface belongs is a target non-backbone area corresponding to the SRMS strategy.
8. The device according to claim 6, wherein, when the preset number is greater than 1, the permeation module is specifically configured to:
sending the SRMS strategy in a target infiltration area of the SRMS strategy;
if the device identifier of the second ABR is larger than the device identifier of the first ABR in the device identifiers corresponding to the target non-backbone area, sending a policy withdrawal message corresponding to the SRMS policy in the target permeable area when receiving the SRMS policy sent by the second ABR device in the target permeable area.
9. The apparatus of claim 6, further comprising:
a first storage module, configured to store a correspondence between the non-backbone area and the device identifier of the first ABR;
a second storage module, configured to, when a first link state broadcast LSA packet sent by a second ABR in a first non-backbone area in the non-backbone area is received, store a correspondence between the first non-backbone area and a device identifier of the second ABR if the first LSA packet carries the device identifier and a penetration capability identifier of the second ABR, where the penetration capability identifier indicates that the second ABR supports a penetration function.
10. The apparatus of claim 6, further comprising:
and the sending module is used for sending a second LSA message in the non-backbone area, wherein the second LSA message carries the identifier of the first ABR and the permeability identifier.
11. The network equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing the communication between the processor and the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1 to 5 when executing a program stored in the memory.
12. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 1-5.
CN201910138627.6A 2019-02-25 2019-02-25 Infiltration method and device for SRMS strategy Active CN109861911B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910138627.6A CN109861911B (en) 2019-02-25 2019-02-25 Infiltration method and device for SRMS strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910138627.6A CN109861911B (en) 2019-02-25 2019-02-25 Infiltration method and device for SRMS strategy

Publications (2)

Publication Number Publication Date
CN109861911A CN109861911A (en) 2019-06-07
CN109861911B true CN109861911B (en) 2021-03-19

Family

ID=66898841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910138627.6A Active CN109861911B (en) 2019-02-25 2019-02-25 Infiltration method and device for SRMS strategy

Country Status (1)

Country Link
CN (1) CN109861911B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155135A (en) * 2006-09-28 2008-04-02 华为技术有限公司 Method and device for flooding autonomous system border router ability information
CN101227403A (en) * 2008-02-21 2008-07-23 中兴通讯股份有限公司 Route permeating method
CN101534240A (en) * 2008-03-14 2009-09-16 华为技术有限公司 Method, system and device for sending mapping information
CN106789619A (en) * 2015-11-24 2017-05-31 华为技术有限公司 A kind of method for determining mapping server, routing node and autonomous system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8411861B2 (en) * 2009-10-21 2013-04-02 Intel Corporation Apparatus, systems, and methods for checking if a receiver is on a revocation list based on SRMs of DVDs

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155135A (en) * 2006-09-28 2008-04-02 华为技术有限公司 Method and device for flooding autonomous system border router ability information
CN101227403A (en) * 2008-02-21 2008-07-23 中兴通讯股份有限公司 Route permeating method
CN101534240A (en) * 2008-03-14 2009-09-16 华为技术有限公司 Method, system and device for sending mapping information
CN106789619A (en) * 2015-11-24 2017-05-31 华为技术有限公司 A kind of method for determining mapping server, routing node and autonomous system

Also Published As

Publication number Publication date
CN109861911A (en) 2019-06-07

Similar Documents

Publication Publication Date Title
CN109861913B (en) Method and device for advertising prefix identification of cross-interior gateway protocol
CN110798403B (en) Communication method, communication device and communication system
CN113839870B (en) Path creation method, device and system
US11477114B2 (en) Packet forwarding method and apparatus
KR20120084774A (en) Method, apparatus and system for duplicate address detection proxy
CN106789635B (en) Message forwarding method and device
CN110661701B (en) Communication method, equipment and system for avoiding loop
US11750496B2 (en) Method for multi-cloud interconnection and device
CN106911549B (en) Data message processing method and device
CN108900441B (en) Network switching method, first electronic device and readable storage medium
US11343153B2 (en) BGP logical topology generation method, and device
CN107786441B (en) Communication method, OpenFlow switch and communication system
CN109861911B (en) Infiltration method and device for SRMS strategy
CN111327524B (en) Flow forwarding method and system, SDN controller and computer readable storage medium
CN110830598B (en) Method and network equipment for establishing and transmitting interface address and alias in BGP (Border gateway protocol) session
CN106878173B (en) Route sending method and device
CN115152192B (en) PCE controlled network reliability
CN113872843B (en) Route generation method, route processing method and device
CN114513453A (en) Fault processing method and device
CN111225006A (en) Connection establishing method, message transmission method, device and storage medium
CN110784410A (en) Route establishing method and related equipment
CN113852572B (en) Message processing method and device
CN108199946B (en) Data forwarding method and communication system
CN113691446B (en) Method and device for sending message
CN111327537B (en) Flow forwarding method and system, SDN controller and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant