WO2017186159A1 - 报文传输 - Google Patents
报文传输 Download PDFInfo
- Publication number
- WO2017186159A1 WO2017186159A1 PCT/CN2017/082369 CN2017082369W WO2017186159A1 WO 2017186159 A1 WO2017186159 A1 WO 2017186159A1 CN 2017082369 W CN2017082369 W CN 2017082369W WO 2017186159 A1 WO2017186159 A1 WO 2017186159A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- vxlan
- tunnel
- packet
- domain
- vtep device
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title claims description 12
- 238000000034 method Methods 0.000 claims description 31
- 238000013507 mapping Methods 0.000 claims description 30
- 238000010586 diagram Methods 0.000 description 14
- 238000012545 processing Methods 0.000 description 12
- 230000006854 communication Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup; Address filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
Definitions
- VXLAN virtual scalable local area network
- the source virtual machine sends the message to the VXLAN tunnel endpoint (VTEP) to which it accesses, and the VTEP forwards the message to the destination virtual machine for access.
- VTEP VXLAN tunnel endpoint
- Another VTEP the other VTEP forwards the message to the destination virtual machine.
- VXLAN tunnels are established between VTEPs.
- N the number of VTEPs increases exponentially by the square of N, which consumes a large amount of resources to establish and maintain these VXLAN tunnels.
- FIG. 1 is a schematic flowchart diagram of a message transmission method according to an example of the present disclosure.
- FIG. 2 is a schematic structural diagram of a multiple data center provided by an example of the present disclosure.
- FIG. 3 is a schematic flowchart diagram of another packet transmission method according to an example of the present disclosure.
- FIG. 4 schematically illustrates a MAC address table provided by an example of the present disclosure.
- FIG. 5 is a schematic structural diagram of hardware of a VTEP device according to an example of the present disclosure.
- FIG. 6 is a schematic structural diagram of a message transmission apparatus according to an example of the present disclosure.
- FIG. 1 is a schematic flowchart diagram of a message transmission method according to an example of the present disclosure. This method can be applied to an exit VTEP device within a domain.
- the network may be divided into multiple domains, each domain containing one egress VTEP device and at least one local VTEP device.
- An intra-domain VXLAN tunnel can be established between the egress VTEP device and each local VTEP device in the domain, and an inter-domain VXLAN tunnel can be established between the egress VTEP devices of different domains.
- the above-mentioned domain may be, for example, a data center
- FIG. 2 is a schematic structural diagram of a multiple data center provided by an example of the present disclosure.
- the data center DC1 includes an egress VTEP device 10, and a plurality of local VTEP devices, such as a local VTEP device 10a, a local VTEP device 10b, and a local VTEP device 10c, respectively, which establish a VXLAN tunnel with the egress VTEP device 10, and
- the virtual machine 11A accessing the local VTEP device 10a, the virtual machine 11B accessing the local VTEP device 10b, and the virtual machine 11C accessing the local VTEP device 10c include a plurality of virtual machines.
- the data center DC2 includes an egress VTEP device 20, and a local VTEP device 20d, a local VTEP device 20e, a local VTEP device 20f, and the like, which respectively establish a VXLAN tunnel with the egress VTEP device 20, and also includes access to the local VTEP device.
- the message transmission method disclosed in the example of FIG. 1 may include the following steps.
- step S101 the egress VTEP device receives the message.
- step S102 When the packet received by the egress VTEP device is the first packet sent by the local VTEP device through the VXLAN tunnel in the domain, step S102 is performed.
- step S103 When the packet received by the egress VTEP device is the second packet sent by the peer egress VTEP device through the inter-domain VXLAN tunnel, step S103 is performed.
- first packet and the second packet are both unicast packets.
- the egress VTEP device determines the first tunnel interface according to the destination MAC address query MAC address table of the first packet, and sends the first packet by using the inter-domain VXLAN tunnel corresponding to the first tunnel interface.
- the first packet carries the destination MAC address and the VXLAN identifier.
- the egress VTEP device After receiving the first packet, the egress VTEP device identifies the virtual switching instance (VSI) to which the first packet belongs according to the VXLAN identifier, and then searches for the virtual switching instance (VSI) to which the first packet belongs.
- the MAC address table of the VSI obtains the first tunnel interface corresponding to the destination MAC address, and sends the first packet to the peer VTEP device through the inter-domain VXLAN tunnel corresponding to the first tunnel interface.
- the egress VTEP devices at both ends of the VXLAN tunnel may be peer-to-peer outlet VTEP devices.
- the egress VTEP device discards the first packet. That is, the packets received by the egress VTEP device from the local VTEP device are not forwarded to other local VTEP devices.
- the egress VTEP device may determine the second tunnel interface according to the destination MAC address of the second packet, and send the second packet through the intra-domain VXLAN tunnel corresponding to the second tunnel interface.
- the second packet carries the destination MAC address and the VXLAN identifier.
- the egress VTEP device After receiving the second packet, the egress VTEP device identifies the VSI to which the second packet belongs according to the VXLAN identifier, and then searches the VSI MAC address table according to the destination MAC address. Obtaining a second tunnel interface corresponding to the destination MAC address, and passing the VXLAN in the domain corresponding to the second tunnel interface The tunnel sends the second packet to the local VTEP device.
- the egress VTEP device discards the second packet. That is, the packets received by the egress VTEP device from the peer egress VTEP device are no longer forwarded to other egress VTEP devices.
- flooding traffic processing enables each egress VTEP device and each local VTEP device to learn the MAC addresses of all virtual machines in the network.
- the egress VTEP device can forward the broadcast packets or unknown unicast packets received through the intra-domain VXLAN tunnel through the inter-domain VXLAN tunnel instead of other intra-domain VXLAN tunnels. Received broadcast packets or unknown unicast packets can be forwarded through the intra-domain VXLAN tunnel instead of other inter-domain VXLAN tunnels.
- a local VTEP device receives a broadcast packet or an unknown unicast packet from another local VTEP device, it does not forward the packet to other local VTEP devices in the same domain.
- FIG. 4 schematically illustrates a MAC address table generated by the local VTEP device 10a, the local VTEP device 20f, the egress VTEP device 10, and the egress VTEP device 20 of FIG. 2, the MAC address table storing a MAC address, a VXLAN identifier, and a tunnel interface ( Corresponds to the correspondence between the outgoing interfaces).
- the MAC address table is not limited to the form shown in FIG. 4, and other forms may be employed.
- FIG. 3 is a schematic flowchart diagram of another packet transmission method according to an example of the present disclosure, including the following steps.
- step S301 the egress VTEP device receives the packet sent by the local VTEP device through the intra-domain VXLAN tunnel.
- the local VTEP device can identify the VXLAN to which the packet belongs, and determine the corresponding outgoing interface according to the destination MAC address of the packet and the VXLAN query MAC address table, and determine the corresponding outgoing interface.
- the interface sends a packet.
- the packet may be sent to other local VTEP devices or sent to the egress VTEP device.
- the virtual machine 11A sends a message to the virtual machine 11B
- the virtual machine 11A sends the message to the local VTEP device 10a to which the message is accessed.
- the destination MAC address of the message is the MAC address (MAC B) of the virtual machine 11B.
- the local VTEP device 10a recognizes that the VXLAN to which the message belongs is VXLAN10, and obtains the corresponding outgoing interface as Tunnel2 according to the MAC B and VXLAN 10 querying the MAC address table.
- the local VTEP device 10a passes the VXLAN tunnel in the domain corresponding to Tunnel2.
- the channel forwards the message to the local VTEP device 10b.
- the virtual machine 11A sends a message to the virtual machine 21F
- the virtual machine 11A sends the message to the local VTEP device 10a to which the message is accessed.
- the destination MAC address of the message is the MAC address (MAC F) of the virtual machine 21F, and the local VTEP.
- the device 10a recognizes that the VXLAN to which the message belongs is VXLAN10, and obtains the corresponding outgoing interface as Tunnel1 according to the MAC F and VXLAN10 querying the MAC address table.
- the local VTEP device 10a forwards the packet to the egress VTEP device 10 through the intra-domain VXLAN tunnel corresponding to the tunnel 1.
- the message here is equivalent to the first message in the example flow of Figure 1.
- step S302 the egress VTEP device queries the MAC address table according to the destination MAC address of the packet to determine the tunnel interface.
- the tunnel interface here is equivalent to the first tunnel interface in the example flow of Figure 1.
- the packet received by the VTEP device carries the VXLAN identifier and the destination MAC address, and the MAC address table is queried according to the VXLAN identifier and the destination MAC address to determine the outbound interface.
- step S303 is performed;
- the outbound interface is the tunnel interface of the VXLAN tunnel in the domain, the received packets are discarded.
- the egress VTEP device may record the type of tunnel interface in the MAC address table, for example, intra-domain or inter-domain, in order to identify that the VXLAN tunnel corresponding to the tunnel interface is an intra-domain VXLAN tunnel or an inter-domain VXLAN tunnel.
- the egress VTEP device 10 receives the packet from the local VTEP device 10a, and if the destination MAC address of the packet is MAC F, the MAC address table is queried to obtain the MAC F corresponding to the packet. If the tunnel interface is the tunnel 6 and the corresponding is the inter-domain VXLAN tunnel, go to step S303 and send the packet through the inter-domain VXLAN tunnel corresponding to the tunnel 6. If the destination MAC address of the packet is MAC B, query the MAC address table. The tunnel interface corresponding to MAC B is Tunnel 4, and the corresponding VXLAN tunnel is discarded.
- step S303 the egress VTEP device sends the packet to the peer egress VTEP device through the inter-domain VXLAN tunnel corresponding to the tunnel interface.
- the egress interface queried by the VTEP device 10 is the tunnel 6, and the packet can be sent to the egress VTEP device 20 through the inter-domain VXLAN tunnel corresponding to the tunnel 6.
- step S304 the peer-end egress VTEP device queries the MAC address table according to the destination MAC address of the packet to determine the tunnel interface.
- the packet received by the peer-end VTEP device is equivalent to the second packet in the example process of FIG. 1.
- the tunnel interface determined here is equivalent to the second tunnel interface in the example process of FIG.
- the packet received by the peer-end VTEP device through the inter-domain VXLAN tunnel carries the VXLAN identifier.
- the destination MAC address query the MAC address table according to the VXLAN identifier and the destination MAC address, and determine the outgoing interface.
- the outbound interface is the tunnel interface of the inter-domain VXLAN tunnel, the received packets are discarded to avoid loops.
- step S305 is performed.
- the multi-data center network structure is as follows: The egress VTEP device 20 receives the packet from the egress VTEP device 10. If the destination MAC address of the packet is MAC F, the MAC address table is queried to obtain the corresponding tunnel interface. If the tunnel is the VXLAN tunnel in the domain, the process proceeds to step S305. If the destination MAC address of the packet is MAC B, the MAC address table is queried. The tunnel interface is the tunnel. The corresponding tunnel is the inter-domain VXLAN tunnel. The message.
- step S305 the peer-end VTEP device sends the packet to the local VTEP device through the intra-domain VXLAN tunnel corresponding to the tunnel interface.
- the egress interface queried by the VTEP device 20 is the tunnel 9, and the packet can be sent to the local VTEP device 20f through the inter-domain VXLAN tunnel corresponding to the tunnel 9.
- the local VTEP device 20f can send the packet to the virtual machine 21F through the local interface according to the destination MAC address MAC F.
- the local VTEP device After receiving the packet, the local VTEP device does not forward the packet to other local VTEP devices in the data center. This avoids loops.
- the egress VTEP device may pre-establish mapping relationships between different VXLANs, such as inter-domain VXLAN identity mapping relationships.
- the egress VTEP device may search for the VXLAN mapping relationship of the inter-domain VXLAN identity according to the first VXLAN identifier carried in the first packet, and obtain the corresponding second VXLAN identifier, and the first packet carries the first packet.
- the VXLAN identifier is modified to the second VXLAN identifier, and the modified first packet is forwarded to the remote VTEP device through the inter-domain VXLAN tunnel.
- VXLANs in different data centers can be planned separately.
- the MAC address table stored in all the local VTEP devices and the egress VTEP device in the data center to which the virtual machine belongs may be updated.
- the VXLAN corresponding to the VTELAN may be stored in the egress VTEP device. Multiple sets of VXLAN identity mapping relationships, that is, the VXLAN can correspond to multiple other VXLANs.
- the egress VTEP device After receiving the first packet, the egress VTEP device obtains a corresponding plurality of second VXLAN identifiers according to the first VXLAN identifier carried in the first packet.
- the egress VTEP device may further store a mapping relationship between the VXLAN identifier and the MAC address, or a mapping relationship between the VXLAN identifier and the tunnel interface, according to the The destination MAC address of a packet is used to query the mapping between the VXLAN identifier and the MAC address, and obtain the corresponding VXLAN identifier.
- the mapping between the VXLAN identifier and the tunnel interface is obtained according to the first tunnel interface, and the corresponding VXLAN identifier is obtained. If the VXLAN identifier is included in the multiple VXLAN identifiers, the queried VXLAN is the correct second VXLAN identifier. Therefore, the first packet can be avoided from being sent to the non-destination virtual machine.
- the VXLAN identifiers corresponding to each data center are: ⁇ DC1, VXLAN1 ⁇ , ⁇ DC2, VXLAN2 ⁇ , ⁇ DC3, VXLAN3 ⁇ , and each data center.
- the inter-domain VXLAN identity mapping relationship stored in the egress VTEP device is:
- DC1 ⁇ (VXLAN1, VXLAN2), (VXLAN1, VXLAN3) ⁇ ;
- DC2 ⁇ (VXLAN2, VXLAN1), (VXLAN2, VXLAN3) ⁇ ;
- DC3 ⁇ (VXLAN3, VXLAN1), (VXLAN3, VXLAN2) ⁇ ;
- the egress VTEP device X1 in the DC1 can obtain the first according to the VXLAN identity mapping relationship ⁇ (VXLAN1, VXLAN2), (VXLAN1, VXLAN3) ⁇ stored in the egress VTEP device X1.
- the two VXLANs are labeled VXLAN2 and VXLAN3.
- the mapping relationship between the VXLAN identifier and the MAC address stored in the VTEP device X1 is: ⁇ (VXLAN2, Y1), (VXLAN3, Y2) ⁇
- the destination MAC address of the received packet is Y1.
- the VXLAN identifier corresponding to the destination MAC address Y1 is obtained as VXLAN2, and the second VXLAN identifier obtained in the above is VXLAN2 and VXLAN3, and the received report can be determined.
- the first VXLAN identifier carried in the text is modified to VXLAN2.
- the first tunnel is obtained according to the destination MAC address of the received packet.
- the VXLAN identifier corresponding to the first tunnel interface Z1 is obtained as VXLAN2 according to the mapping relationship between the VXLAN identifier and the tunnel interface.
- VXLAN2 and VXLAN3 it may be determined that the first VXLAN identifier carried in the received packet needs to be modified to VXLAN2.
- FIG. 5 is a schematic structural diagram of hardware of a VTEP device according to an example of the present disclosure.
- the VTEP device can include a processor 501, a machine readable storage medium 502 that stores machine readable instructions.
- the processor 501 is in communication with a machine readable storage medium 502, and the message transmission method described above can be performed by reading and executing machine readable instructions in the machine readable storage medium 502.
- a machine-readable storage medium may be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and so forth.
- the machine-readable storage medium may be: RAM (Radom Access Memory), volatile memory, non-volatile memory, flash memory, storage drive (such as a hard disk drive), solid state drive, any type of storage disk. (such as a disc, dvd, etc.), or a similar storage medium, or a combination thereof.
- a message transmission apparatus is also provided in the example of the present disclosure, and the message transmission apparatus can be applied to the VTEP device as shown in FIG.
- FIG. 6 which is a structural diagram of a message transmission apparatus proposed by the disclosed example, the apparatus may include a first message processing unit 601 and a second message processing unit 602.
- the first packet processing unit 601 is configured to receive the first packet sent by the local VTEP device by using the intra-domain VXLAN tunnel, and query the MAC address table according to the destination MAC address of the first packet to determine the first tunnel interface, and pass the first tunnel.
- the inter-domain VXLAN tunnel corresponding to the interface sends the first packet, where the egress VTEP device and the local VTEP device belong to the same domain, and the intra-domain VXLAN tunnel is the egress VTEP device and the local VTEP device.
- the second packet processing unit 602 is configured to receive the second packet sent by the peer-end VTEP device by using the inter-domain VXLAN tunnel, and query the MAC address table according to the destination MAC address of the second packet to obtain the corresponding second tunnel.
- the interface sends the second packet by using the intra-domain VXLAN tunnel corresponding to the second tunnel interface, where the egress VTEP device and the peer egress VTEP device belong to different domains, and the inter-domain VXLAN tunnel is the egress.
- the first packet processing unit 601 discards the first packet.
- the second packet processing unit 602 discards the second packet.
- the packet is forwarded through the inter-domain VXLAN tunnel. If the second packet processing unit 602 receives the broadcast packet or the unknown unicast packet through the inter-domain VXLAN tunnel, the packet is forwarded through the intra-domain VXLAN tunnel.
- the first packet processing unit 601 may include:
- a message receiving subunit configured to receive the first packet from the local VTEP device by using the intra-domain VXLAN tunnel
- An interface obtaining subunit configured to determine a first tunnel interface according to a destination MAC address query MAC address table of the first packet
- the identifier acquisition subunit is configured to store the inter-domain VXLAN identifier mapping relationship, and query the pre-stored inter-domain VXLAN identifier mapping relationship according to the first VXLAN identifier carried in the first packet to obtain the second VXLAN identifier.
- a packet sending sub-unit configured to: after the first VXLAN identifier carried in the first packet is modified into the second VXLAN identifier, the first VXLAN tunnel corresponding to the first tunnel interface carries the first VXLAN identifier The message is sent out.
- the identifier obtaining sub-unit is further configured to:
- a second VXLAN identifier from the plurality of second VXLAN identifiers including:
- mapping relationship between the pre-stored VXLAN identifier and the MAC address according to the destination MAC address of the first packet and acquiring the VXLAN identifier; or querying the mapping relationship between the pre-stored VXLAN identifier and the tunnel interface according to the first tunnel interface. , obtain the VXLAN logo;
- the queried VXLAN identifiers include the queried VXLAN identifier, determining that the queried VXLAN identifier is the selected second VXLAN identifier.
- a data center can include an egress VTEP device and at least one local VTEP device.
- An intra-domain VXLAN tunnel can be established between the egress VTEP device and the local VTEP device, and the egress VEPLAN device can establish an inter-domain VXLAN tunnel with the egress VTEP device in other data centers.
- the egress VTEP device can receive the first packet sent by the local VTEP device through the VXLAN tunnel in the domain, and query the MAC address table according to the destination MAC address of the first packet to determine the first tunnel interface.
- the egress VTEP device sends the first packet to the peer egress VTEP device through the inter-domain VXLAN tunnel corresponding to the first tunnel interface.
- the egress VTEP device can receive the second packet sent by the peer egress VTEP device through the inter-domain VXLAN tunnel, and query the MAC address table according to the destination MAC address of the second packet to determine the second tunnel interface.
- the egress VTEP device can pass the VXLAN tunnel in the domain corresponding to the second tunnel interface.
- the second packet is sent to the local VTEP device. In this way, only the inter-domain VXLAN tunnel between the VTEP devices needs to be established, so that the communication between the devices in the two data centers can be ensured, and the network resources occupied by the tunnels established between the VTEP devices in different data centers are reduced.
- the description is relatively simple, and the relevant parts can be referred to the partial description of the method example.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (14)
- 一种报文传输方法,所述方法包括:出口虚拟可扩展局域网隧道端点(VTEP,VXLAN Tunnel End Point)设备通过域内VXLAN隧道接收来自本地VTEP设备的第一报文,并根据所述第一报文的目的媒体接入控制(MAC)地址查询MAC地址表确定第一隧道接口,通过所述第一隧道接口对应的域间VXLAN隧道将所述第一报文发送出去;出口VTEP设备通过域间VXLAN隧道接收来自对端出口VTEP设备的第二报文,并根据所述第二报文的目的MAC地址查询MAC地址表确定第二隧道接口,通过所述第二隧道接口对应的域内VXLAN隧道将所述第二报文发送出去;所述出口VTEP设备与所述本地VTEP设备属于同一个域,所述域内VXLAN隧道为所述出口VTEP设备与所述本地VTEP设备之间建立的VXLAN隧道;所述出口VTEP设备与所述对端出口VTEP设备属于不同的域,所述域间VXLAN隧道为所述出口VTEP设备与所述对端出口VTEP设备之间建立的VXLAN隧道。
- 根据权利要求1所述的方法,其中,若所述第一隧道接口对应的VXLAN隧道为域内VXLAN隧道,所述出口VTEP设备丢弃所述第一报文。
- 根据权利要求1所述的方法,其中,若所述第二隧道接口对应的VXLAN隧道为域间VXLAN隧道,所述出口VTEP设备丢弃所述第二报文。
- 根据权利要求1所述的方法,还包括:所述出口VTEP设备通过域内VXLAN隧道接收到广播报文或未知单播报文时,通过域间VXLAN隧道进行转发;所述出口VTEP设备通过域间VXLAN隧道接收到广播报文或未知单播报文时,通过域内VXLAN隧道进行转发。
- 根据权利要求1所述的方法,还包括:所述出口VTEP设备存储域间VXLAN标识映射关系。
- 根据权利要求5所述的方法,其中,通过所述第一隧道接口对应的域间VXLAN隧道将所述第一报文发送出去,包括:所述出口VTEP设备根据所述第一报文携带的第一VXLAN标识查询所述域间VXLAN标识映射关系,获取第二VXLAN标识;所述出口VTEP设备将所述第一报文中携带的所述第一VXLAN标识修改为所述第二VXLAN标识;所述出口VTEP设备通过所述第一隧道接口对应的域间VXLAN隧道,将携带所述第二VXLAN标识的所述第一报文发送出去。
- 根据权利要求6所述的方法,在根据所述第一VXLAN标识查询所述域间VXLAN标识映射关系获取到多个第二VXLAN标识时,所述方法还包括:所述出口VTEP设备根据所述第一报文的目的MAC地址查询预先存储的VXLAN标识与MAC地址之间的映射关系,获取VXLAN标识;或者,根据所述第一隧道接口查询预先存储的VXLAN标识与与隧道接口之间的映射关系,获取VXLAN标识;若所述多个第二VXLAN标识中包含查询到的VXLAN标识,则所述出口VTEP设备确定查询到的VXLAN为选中的第二VXLAN标识。
- 一种出口虚拟可扩展局域网隧道端点(VTEP,VXLAN Tunnel End Point)设备,包括:处理器,和存储有机器可执行指令的机器可读存储介质,其中,通过读取并执行所述机器可执行指令,所述处理器被使得:通过域内VXLAN隧道接收来自本地VTEP设备的第一报文,并根据所述第一报文的目的媒体接入控制(MAC)地址查询MAC地址表以确定第一隧道接口,通过所述第一隧道接口对应的域间VXLAN隧道将所述第一报文发送出去;通过域间VXLAN隧道接收来自对端出口VTEP设备的第二报文,并根据所述第二报文的目的MAC地址查询MAC地址表以确定第二隧道接口,通过所述第二隧道接口对应的域内VXLAN隧道将所述第二报文发送出去,其中,所述出口VTEP设备与所述本地VTEP设备属于同一个域,所述域内VXLAN隧道为所述出口VTEP设备与所述本地VTEP设备之间建立的VXLAN隧道;所述出口VTEP设备与所述对端出口VTEP设备属于不同的域,所述域间VXLAN隧道为所述出口VTEP设备与所述对端出口VTEP设备之间建立的VXLAN隧道。
- 根据权利要求8所述的设备,其中,所述机器可执行指令还促使所述处理器:若所述第一隧道接口对应的VXLAN隧道为域内VXLAN隧道,丢弃所述第一报文。
- 根据权利要求8所述的设备,其中,所述机器可执行指令还促使所述处理器:若所述第二隧道接口对应的VXLAN隧道为域间VXLAN隧道,丢弃所述第二报文。
- 根据权利要求8所述的设备,其中,所述机器可执行指令还促使所述处理器:在通过域内VXLAN隧道接收到广播报文或未知单播报文时,通过域间VXLAN隧道进行转发;在通过域间VXLAN隧道接收到广播报文或未知单播报文时,通过域内VXLAN隧道进行转发。
- 根据权利要求8所述的设备,其中,所述机器可执行指令还促使所述处理器:存储域间VXLAN标识映射关系。
- 根据权利要求12所述的设备,其中,在通过所述第一隧道接口对应的域间VXLAN隧道将所述第一报文发送出去时,所述机器可执行指令促使所述处理器:根据所述第一报文携带的第一VXLAN标识查询所述域间VXLAN标识映射关系,获取第二VXLAN标识;将所述第一报文中携带的所述第一VXLAN标识修改为所述第二VXLAN标识;通过所述第一隧道接口对应的域间VXLAN隧道,将携带所述第二VXLAN标识的所述第一报文发送出去。
- 根据权利要求13所述的设备,其中,在根据所述第一VXLAN标识查询所述域间VXLAN标识映射关系获取到多个第二VXLAN标识时,所述机器可执行指令促使所述处理器:根据所述第一报文的目的MAC地址查询预先存储的VXLAN标识与MAC地址之间的映射关系,获取VXLAN标识;或者,根据所述第一隧道接口查询预先存储的VXLAN标识与与隧道接口之间的映射关系,获取VXLAN标识;若所述多个第二VXLAN标识中包含查询到的VXLAN标识,则确定查询到的VXLAN为选中的第二VXLAN标识。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/097,078 US11012258B2 (en) | 2016-04-29 | 2017-04-28 | Packet transmission |
EP17788811.2A EP3451592B1 (en) | 2016-04-29 | 2017-04-28 | Packet transmission between vxlan domains |
JP2018556314A JP6633775B2 (ja) | 2016-04-29 | 2017-04-28 | パケット伝送 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610285556.9A CN107342925B (zh) | 2016-04-29 | 2016-04-29 | 一种报文传输方法及装置 |
CN201610285556.9 | 2016-04-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017186159A1 true WO2017186159A1 (zh) | 2017-11-02 |
Family
ID=60160700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/082369 WO2017186159A1 (zh) | 2016-04-29 | 2017-04-28 | 报文传输 |
Country Status (5)
Country | Link |
---|---|
US (1) | US11012258B2 (zh) |
EP (1) | EP3451592B1 (zh) |
JP (1) | JP6633775B2 (zh) |
CN (1) | CN107342925B (zh) |
WO (1) | WO2017186159A1 (zh) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108199967B (zh) * | 2018-03-30 | 2020-08-11 | 新华三技术有限公司 | 路由处理方法及装置 |
CN110474829B (zh) * | 2018-05-10 | 2021-07-20 | 华为技术有限公司 | 传输报文的方法和装置 |
CN108924028B (zh) * | 2018-06-28 | 2020-11-10 | 新华三技术有限公司 | 一种非已知单播报文在隧道间的切换方法及装置 |
US11095558B2 (en) * | 2018-12-28 | 2021-08-17 | Alibaba Group Holding Limited | ASIC for routing a packet |
US11496365B2 (en) * | 2019-06-17 | 2022-11-08 | Cyxtera Data Centers, Inc. | Automated access to racks in a colocation data center |
CN113542112B (zh) * | 2020-04-20 | 2023-11-21 | 华为技术有限公司 | 一种报文转发方法及网络设备 |
CN112688887B (zh) * | 2020-12-23 | 2022-07-12 | 新华三技术有限公司 | 一种隧道的配置方法和节点设备 |
CN113194017B (zh) * | 2021-04-08 | 2022-08-16 | 广州极飞科技股份有限公司 | 设备通信控制方法、装置、设备、系统和存储介质 |
US20230135615A1 (en) * | 2021-10-29 | 2023-05-04 | Arista Networks, Inc. | Mac-based routing |
CN116170251A (zh) * | 2021-11-25 | 2023-05-26 | 中兴通讯股份有限公司 | 数据分发的方法、系统、运行控制装置及终端设备 |
CN115529339A (zh) * | 2022-10-14 | 2022-12-27 | 浪潮电子信息产业股份有限公司 | 数据中心之间的网络互联互通方法、装置、设备及介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103957160A (zh) * | 2014-05-12 | 2014-07-30 | 华为技术有限公司 | 一种发送报文的方法及设备 |
CN104115453A (zh) * | 2013-12-31 | 2014-10-22 | 华为技术有限公司 | 一种实现虚拟机通信的方法和装置 |
CN105359465A (zh) * | 2013-07-10 | 2016-02-24 | 思科技术公司 | 对跨多个数据中心站点的虚拟可扩展局域网段的支持 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8811409B2 (en) * | 2012-06-04 | 2014-08-19 | Telefonaktiebolaget L M Ericsson (Publ) | Routing VLAN tagged packets to far end addresses of virtual forwarding instances using separate administrations |
CN102970227B (zh) * | 2012-11-12 | 2016-03-02 | 盛科网络(苏州)有限公司 | 在asic中实现vxlan报文转发的方法和装置 |
US9036639B2 (en) * | 2012-11-29 | 2015-05-19 | Futurewei Technologies, Inc. | System and method for VXLAN inter-domain communications |
CN103095546B (zh) * | 2013-01-28 | 2015-10-07 | 华为技术有限公司 | 一种处理报文的方法、装置及数据中心网络 |
US9197551B2 (en) * | 2013-03-15 | 2015-11-24 | International Business Machines Corporation | Heterogeneous overlay network translation for domain unification |
CN103200069B (zh) * | 2013-03-29 | 2016-01-27 | 华为技术有限公司 | 一种报文处理的方法和设备 |
JP6064757B2 (ja) | 2013-04-10 | 2017-01-25 | 富士通株式会社 | 通信システム及び通信方法 |
US9565105B2 (en) * | 2013-09-04 | 2017-02-07 | Cisco Technology, Inc. | Implementation of virtual extensible local area network (VXLAN) in top-of-rack switches in a network environment |
KR101588134B1 (ko) * | 2013-10-04 | 2016-02-12 | 주식회사 케이티 | 오버레이에 기반한 네트워크 가상화에서 링크 장애를 탐지하는 방법 및 장치 |
CN104601427B (zh) * | 2013-10-31 | 2018-03-06 | 新华三技术有限公司 | 数据中心网络中的报文转发方法及装置 |
US10020961B2 (en) * | 2013-12-27 | 2018-07-10 | Electronics And Telecommunications Research Institute | Method and apparatus for network virtualization |
KR102236195B1 (ko) | 2013-12-27 | 2021-04-07 | 한국전자통신연구원 | 네트워크 가상화 방법 및 장치 |
CN104954218B (zh) * | 2014-03-24 | 2018-02-09 | 新华三技术有限公司 | 分布式虚拟交换装置及转发方法 |
KR20150113597A (ko) * | 2014-03-31 | 2015-10-08 | 한국전자통신연구원 | Arp 패킷 처리 방법 및 장치 |
WO2015180084A1 (zh) * | 2014-05-29 | 2015-12-03 | 华为技术有限公司 | 一种报文转发方法和VxLAN网关 |
US9509527B2 (en) * | 2014-06-30 | 2016-11-29 | Arista Networks, Inc. | Method and system for VXLAN encapsulation offload |
US9419897B2 (en) * | 2014-06-30 | 2016-08-16 | Nicira, Inc. | Methods and systems for providing multi-tenancy support for Single Root I/O Virtualization |
CN105471693B (zh) * | 2014-08-18 | 2019-02-05 | 华为技术有限公司 | 一种报文发送方法和网络节点 |
CN104243318B (zh) * | 2014-09-29 | 2018-10-09 | 新华三技术有限公司 | Vxlan网络中的mac地址学习方法及装置 |
CN104283980B (zh) * | 2014-10-09 | 2018-02-09 | 新华三技术有限公司 | 一种地址解析协议代答方法和装置 |
US11204791B2 (en) * | 2015-06-30 | 2021-12-21 | Nicira, Inc. | Dynamic virtual machine network policy for ingress optimization |
US9781037B2 (en) * | 2015-09-15 | 2017-10-03 | Cisco Technology, Inc. | Method and apparatus for advanced statistics collection |
US10079798B2 (en) * | 2015-10-23 | 2018-09-18 | Inernational Business Machines Corporation | Domain intercommunication in shared computing environments |
US9912614B2 (en) * | 2015-12-07 | 2018-03-06 | Brocade Communications Systems LLC | Interconnection of switches based on hierarchical overlay tunneling |
-
2016
- 2016-04-29 CN CN201610285556.9A patent/CN107342925B/zh active Active
-
2017
- 2017-04-28 US US16/097,078 patent/US11012258B2/en active Active
- 2017-04-28 EP EP17788811.2A patent/EP3451592B1/en active Active
- 2017-04-28 WO PCT/CN2017/082369 patent/WO2017186159A1/zh active Application Filing
- 2017-04-28 JP JP2018556314A patent/JP6633775B2/ja active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105359465A (zh) * | 2013-07-10 | 2016-02-24 | 思科技术公司 | 对跨多个数据中心站点的虚拟可扩展局域网段的支持 |
CN104115453A (zh) * | 2013-12-31 | 2014-10-22 | 华为技术有限公司 | 一种实现虚拟机通信的方法和装置 |
CN103957160A (zh) * | 2014-05-12 | 2014-07-30 | 华为技术有限公司 | 一种发送报文的方法及设备 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3451592A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP3451592A1 (en) | 2019-03-06 |
EP3451592B1 (en) | 2021-03-03 |
US11012258B2 (en) | 2021-05-18 |
CN107342925A (zh) | 2017-11-10 |
CN107342925B (zh) | 2020-03-06 |
US20200328914A1 (en) | 2020-10-15 |
JP2019515553A (ja) | 2019-06-06 |
JP6633775B2 (ja) | 2020-01-22 |
EP3451592A4 (en) | 2019-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017186159A1 (zh) | 报文传输 | |
US10897431B2 (en) | Cloud resource processing method and physical node | |
US9477604B2 (en) | Caching of look-up rules based on flow heuristics to enable high speed look-up | |
CN108259347B (zh) | 一种报文传输方法和装置 | |
US20150281075A1 (en) | Method and apparatus for processing address resolution protocol (arp) packet | |
WO2021004536A1 (zh) | 报文解析方法和装置 | |
WO2018233588A1 (zh) | 转发表项生成 | |
US20150067033A1 (en) | Relay Server Load Balancing and Placement using In-Band Signaling | |
US9906449B2 (en) | System and method for reduced forwarding information storage | |
US10404598B1 (en) | Managing next hop groups in routers | |
CN103560957A (zh) | 查表键值构造方法、微码下发方法、装置及系统 | |
TW201436508A (zh) | 轉發乙太網路封包的方法和裝置 | |
WO2018024187A1 (zh) | 报文监控 | |
WO2017028398A1 (zh) | 通信处理方法和装置 | |
CN107276916B (zh) | 基于协议无感知转发技术的交换机流表管理方法 | |
WO2018171722A1 (zh) | Mac地址同步 | |
US9401866B2 (en) | Data packet routing | |
WO2014067055A1 (zh) | 流表刷新的方法及装置 | |
US20160028622A1 (en) | Network path setup method based on identifier, and apparatus thereof | |
US20180367452A1 (en) | Information centric networking over multi-access network interfaces | |
US20140310419A1 (en) | Establishing communication between entities in a shared network | |
JP7289303B2 (ja) | ネットワーク通信方法および装置 | |
CN114697160A (zh) | 一种隧道报文的处理方法和装置 | |
US11909641B2 (en) | Forwarding table validation | |
CN105915471B (zh) | 报文转发方法以及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2018556314 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2017788811 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2017788811 Country of ref document: EP Effective date: 20181129 |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17788811 Country of ref document: EP Kind code of ref document: A1 |