A kind of ldp remote neighbor configuration method and device
A technology of remote neighbors and configuration methods, applied in the field of communication, can solve problems such as LSRCPU busy, LDP neighbor information or other protocol negotiation errors, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] based on figure 1 The network architecture shown, figure 2 A schematic diagram of the process of establishing a remote LDP neighbor is shown, which describes the process of LSR2 verifying the validity of the message and performing corresponding processing according to the verification result after LSR1 sends the LDPTargetHello message to LSR2. As shown, the process can include:
[0040] Step 201, after LSR2 receives the LDPTargetHello message sent by LSR1, the LDP module of LSR2 sends a forwarding hop count acquisition request to the OSPF module, which carries a source address and a destination address. Next, the source address refers to the address of LSR2, and the destination address refers to the source address of the LDPTargetHello message (that is, the address of LSR1).
[0041] In step 202, the OSPF module queries the OSPF routing table according to the destination address, and searches whether there is a matching route according to the longest match principle....
Embodiment 2
[0118] In order to reduce the reverse ABRTTL calculation overhead of the router, Embodiment 2 of the present invention improves Embodiment 1 above. That is, after the LDP proxy device (including the area proxy or / and backbone area proxy) performs the reverse ABRTTL calculation, the calculation result is saved or updated locally; or, the LDP proxy device receives the proxy response returned by other LDP proxy devices , save or update the reverse ABRTTL calculation result carried in the response locally. If the relevant information of the reverse ABR calculation result is saved in the form of a proxy table, each entry can contain the following information: initial neighbor, source address, destination address, proxy next hop, forwarding hops (such as including the lower limit of hops, The upper limit of the number of hops) may further include routing information, SPF information, and the like. in:
[0119] Start Neighbor: When a proxy request message is received from a neighbo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 