Method and device for implementing IOAM package

A configuration request and configuration information technology, applied in the field of communication, can solve problems such as increasing the burden on network administrators, error-prone, and complex

Active Publication Date: 2018-12-07
ZTE CORP
View PDF11 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the IOAM entry node needs to complete the insertion of the IOAM header, it needs to determine which IOAM function option TLVs and the length of each IOAM function option TLV are included in the IOAM data content. These information are added by the network administrator according to the configuration on each IOAM transmission node Determine and deliver to the IOAM entry node. As mentioned above, the configuration on the IOAM transmission node is usually more complicated and easy to change, so this method of manually sending information to the IOAM entry node to achieve IOAM encapsulation increases network management. burden on staff and error-prone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for implementing IOAM package
  • Method and device for implementing IOAM package
  • Method and device for implementing IOAM package

Examples

Experimental program
Comparison scheme
Effect test

application example 1

[0060] image 3 It is a schematic diagram of implementing IOAM encapsulation in an IP network. In this application example, the IOAM entry node and the IOAM transmission node need to perform the following steps:

[0061] Step 11: The IOAM ingress node sends an ICMP request message carrying IOAM configuration request information.

[0062] Figure 4 Is the format diagram of the ICMP message, such as Figure 4 As shown, the ICMP message contains an 8-bit type field and an 8-bit code field. The IETF standard specifies some values ​​of these two fields. For example, type 8 code 0 means ICMP Ping request, type 0 code 0 means ICMP Ping response, type 10 code 0 for router solicitation, type 9 code 0 for router advertisement, etc. By defining the types and code values ​​that have not yet been specified, such as specifying type 19 code 0 to represent an IOAM configuration request, and type 20 code 0 to represent an IOAM configuration response, the ICMP request message can be made to...

application example 2

[0068] Image 6 It is a schematic diagram of implementing IOAM encapsulation in an MPLS network. In this application example, the IOAM entry node and the IOAM transmission node need to perform the following steps:

[0069] Step 21: The IOAM ingress node sends an LSP Ping request message carrying IOAM configuration request information.

[0070] Figure 7 is the format diagram of the LSP Ping message, such as Figure 7As shown, the LSP Ping request message includes a set of TLVs, and by adding a Type field to represent the new TLV of the IOAM configuration request, the LSP Ping request message can be made to carry the IOAM configuration request information.

[0071] Step 22: The IOAM transit node responds to the request, and replies to the IOAM ingress node with an LSP Ping response message carrying the IOAM configuration information of the node.

[0072] According to the LSP Ping mechanism, the sending node can send the LSP Ping request message to each node on the transmiss...

application example 3

[0076] Figure 8 It is a schematic diagram of using LoopBack to realize IOAM encapsulation in the Ethernet network. Figure 9 It is a schematic diagram of using LinkTrace to realize IOAM encapsulation in the Ethernet network. In this application example, the IOAM entry node and the IOAM transmission node need to perform the following steps:

[0077] Step 31: The IOAM entry node sends a LoopBack request message or a LinkTrace request message carrying the IOAM configuration request information.

[0078] Figure 10 is the format diagram of the LoopBack message, Figure 11 is the format diagram of the LinkTrace message, such as Figure 10 with Figure 11 Shown, LoopBack request message or LinkTrace request message all comprise a group of TLVs, by adding a Type field to represent the new TLV of IOAM configuration request, just can make LoopBack request message or LinkTrace request message carry IOAM configuration request information.

[0079] Step 32: The IOAM transfer node r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and a device for implementing IOAM package. The method includes the following steps that: an IOAM ingress node sends a first out-of-band OAM message carrying IOAM configuration request information, wherein the first out-of-band OAM message arrives sequentially at each of nodes on a service message transmission path; the IOAM ingress nodes receives a secondout-of-band OAM message carrying IOAM configuration information sent by IOAM transmission nodes; the IOAM ingress node performs IOAM package on a service data message according to the IOAM configuration information of the IOAM transmission nodes.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and device for encapsulating In-situ Operations, Administration and Maintenance (IOAM, In-situ Operations, Administration and Maintenance or In-band Operations, Administration and Maintenance). Background technique [0002] IOAM is a data communication network operation, management and maintenance (OAM) technology newly proposed by the industry. This technology is currently in a rapid development stage under the joint promotion of the industry, and is being developed by the Internet Engineering Task Force (IETF, Internet Engineering Task Force) of the International Organization for Standardization. Carry out standardized work. [0003] IETF's IOAM series proposals draft-brockners-inband-oam-requirements, draft-brockners-inband-oam-transport, and draft-brockners-inband-oam-data respectively describe the source of IOAM requirements, encapsulation format, and data content....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26H04L45/122
CPCH04L41/0246H04L43/10H04L45/20H04L41/0806H04L41/344
Inventor 肖敏
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products