Method for implementing GRE tunnel, access device and aggregation gateway

Information

  • Patent Grant
  • 10212004
  • Patent Number
    10,212,004
  • Date Filed
    Monday, January 11, 2016
    8 years ago
  • Date Issued
    Tuesday, February 19, 2019
    5 years ago
Abstract
A method for implementing a GRE tunnel is provided. The access device obtains an address of an aggregation gateway group including at least one aggregation gateway. The access device sends a tunnel setup request in which an address of the access device is encapsulated by using the address of the aggregation gateway group as a destination address. The tunnel setup request is used to request for setting up a GRE tunnel. The access device receives a tunnel setup accept response sent back by an aggregation gateway and obtains an address of the aggregation gateway from the response. The aggregation gateway belongs to the aggregation gateway group. The access device configures the address of the aggregation gateway as a network side destination address of the GRE tunnel. A dynamic setup of a GRE tunnel on an access network that uses an aggregation technology is implemented.
Description
TECHNICAL FIELD

Embodiments of the present invention relate to communications technologies, and in particular, to a method for implementing a GRE tunnel, an access device, and an aggregation gateway.


BACKGROUND

In actual network transmission, an operator usually implements service transmission for a user by configuring a tunnel, such as a virtual local area network (Virtual Local Area Network, VLAN for short) tunnel, and a pseudo wire (Pseudo Wire, PW for short) tunnel. However, to configure these tunnels, a network and a network device must meet certain functional requirements. For example, when a PW tunnel is configured, both a provider edge (Provider Edge, PE for short) device and a provider (Provider, P for short) device on a network need to support label forwarding. Whereas a generic routing encapsulation (Generic Routing Encapsulation, GRE for short) tunnel is a simple data tunnel, in which configurations of the tunnel can be ensured only when the PE device of the tunnel is ensured. Therefore, the GRE technology receives extensive attention from equipment providers and operators.


On a wireless local access network (Wireless Local Access Network, WLAN for short), the GRE tunnel is especially useful. Generally, a WLAN network architecture includes an access point (Access Point, AP for short), an access controller (Access Controller, AC for short), and a gateway (Gateway, GW for short). The AP is a network element that is deployed on a side of a terminal and is accessed by the terminal. For example, a wireless fidelity (Wireless Fidelity, WiFi for short) hot spot is an AP. The AC is configured to control an access network element, for example, configuration of AP information. The AC may be deployed in a data transmission path and is responsible for routing and forwarding, and may also be connected only to the GW and be responsible for access control. The GW, also referred to as a WLAN GW, is a WLAN gateway device and is responsible for managing a WLAN user. The WLAN GW includes functions of a broadband remote access server (Broadband Remote Access Server, BRAS for short)/a broadband network gateway (Broadband Network Gateway, BNG for short) on an operator's network. It is a tendency in the future that a single WLAN GW is deployed to complete various management on the WLAN user, including billing, policy, quality of service (Quality of Service, QoS for short), and the like.


In addition to the foregoing scenarios, the operator, especially the fixed network operator, faces a bandwidth bottleneck during development. The uplink bandwidth of a broadband home gateway in a last mile is difficult to improve due to constraints of physical cables; costs for re-laying out the cables are high. The operator hopes to bind other links or links of other networks and use a network path on which multiple accesses coexist to improve broadband services over a fixed network. Therefore, the operator hopes to introduce an aggregation technology of homogeneous or heterogeneous access networks to an access network to improve network bandwidth.


A home gateway (Home Gateway, HG for short), as a network access device, can increase access bandwidth for a user by binding a plurality of links. In the case of aggregation of multiple access networks, it should be ensured that a technology that implements efficient tunnel transmission between the access device HG and an aggregation gateway (Aggregation Gateway, AG for short) is provided. During actual deployment of a network, the operator hopes to set up a tunnel based on the homogeneous or heterogeneous access network over a Layer 3 network, and to increase bandwidth utilization. To meet this requirement and to reduce requirements for a transmission network, many access device providers and operators are all in favor of a GRE transmission technology.


However, in an existing GRE tunnel, it is necessary to configure addresses of a source node and a destination node as the destination addresses of the tunnel on the source node and the destination node of the GRE tunnel, that is, to implement static configuration of the GRE tunnel. However, this is not applicable to a situation in which a variety of access networks are aggregated and a plurality of IP addresses exist in the access device or the AG. If the IP addresses are still statically configured, obviously, an advantage of an aggregation technology that dynamically selects the access network to make use of network resources cannot be brought into full play.


SUMMARY

Embodiments of the present invention provide a method for implementing a GRE tunnel, an access device, and an aggregation gateway, to dynamically set up a GRE tunnel on an access network that uses an aggregation technology. An embodiment of the present invention provides a method for implementing a GRE tunnel. An access device obtains an address of an aggregation gateway group. The aggregation gateway group includes at least one aggregation gateway. The access device sends a GRE tunnel setup request by using the address of the aggregation gateway group as a destination address. An address of the access device is encapsulated in the GRE tunnel setup request. The GRE tunnel setup request is used to request for setting up a GRE tunnel. The access device receives a GRE tunnel setup accept response sent back by an aggregation gateway and obtains an address of the aggregation gateway from the GRE tunnel setup accept response. The aggregation gateway belongs to the aggregation gateway group. The access device configures the address of the aggregation gateway as a network side destination address of the GRE tunnel.


An embodiment of the present invention provides a method for implementing a GRE tunnel performed by an aggregation gateway. The aggregation gateway receives a GRE tunnel setup request sent by an access device. The GRE tunnel setup request is used to request for setting up a GRE tunnel. A source address of the GRE tunnel setup request is an address of the access device. A destination address of the GRE tunnel setup request is an address of an aggregation gateway group. The aggregation gateway belongs to the aggregation gateway group. The aggregation gateway determines to accept the GRE tunnel setup request and obtains the address of the access device from the GRE tunnel setup request. The aggregation gateway configures the address of the access device as an access side destination address of the GRE tunnel and sends a GRE tunnel setup accept response by using the address of the access device as a destination address. An address of the aggregation gateway is encapsulated in the GRE tunnel setup accept response. The GRE tunnel setup accept response is used to indicate that the access device configures the address of the aggregation gateway as a network side destination address of the GRE tunnel.


An embodiment of the present invention provides an access device. The access device includes a transmitter, a receiver, a memory and a processor separately connected to the transmitter, the receiver and the memory. The memory stores program code, which when executed by the processor causes the access device to perform the following operations:

    • obtaining an address of an aggregation gateway group, wherein the aggregation gateway group comprises at least one aggregation gateway;
    • sending by using the address of the aggregation gateway group as a destination address, a GRE tunnel setup request in which an address of the access device is encapsulated, wherein the GRE tunnel setup request is used to request for setting up a GRE tunnel;
    • receiving a GRE tunnel setup accept response sent back by an aggregation gateway, and obtaining an address of the aggregation gateway from the GRE tunnel setup accept response, wherein the aggregation gateway belongs to the aggregation gateway group; and
    • configuring the address of the aggregation gateway as a network side destination address of the GRE tunnel.


An embodiment of the present invention provides an aggregation gateway. The aggregation gateway includes a transmitter, a receiver, a memory and a processor separately connected to the transmitter, the receiver and the memory. The memory stores program code, which when executed by the processor causes the aggregation gateway to perform the following operations:

    • receiving a GRE tunnel setup request sent by an access device, wherein the GRE tunnel setup request is used to request for setting up a GRE tunnel; a source address of the GRE tunnel setup request is an address of the access device, a destination address of the GRE tunnel setup request is an address of an aggregation gateway group, and the aggregation gateway belongs to the aggregation gateway group;
    • determining to accept the GRE tunnel setup request, obtaining the address of the access device from the GRE tunnel setup request, and configuring the address of the access device as an access side destination address of the GRE tunnel; and
    • sending by using the address of the access device as a destination address, a GRE tunnel setup accept response in which an address of the aggregation gateway is encapsulated, wherein the GRE tunnel setup accept response is used to indicate that the access device configures the address of the aggregation gateway as a network side destination address of the GRE tunnel.


In a method for implementing a GRE tunnel, an access device, and an aggregation gateway according to the embodiments of the present invention, there is no need to separately store a peer address on the access device and the AG or each line card in the AG by performing static configuration; instead, the access device obtains, in a dynamic interaction process, an address of an AG group, then sends a GRE tunnel setup request that carries an address of the access device to the AG group, and then receives a GRE tunnel setup accept response sent back by an AG that is about to set up the GRE tunnel in the AG group, and obtains, from the GRE tunnel setup accept response, an address of the AG as a network side destination address. In this way, the GRE tunnel is dynamically established on an access network that uses an aggregation technology, and an advantage of the aggregation technology that dynamically selects the access network to make use of network resources can be brought into full play, thereby resolving a problem that the static configuration of the GRE tunnel is difficult to implement because of aggregation of a plurality of access networks in the access device or the AG.





BRIEF DESCRIPTION OF DRAWINGS

To describe the technical solutions in the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings required for describing the embodiments. Apparently, the accompanying drawings in the following description show merely some embodiments of the present invention, and a person of ordinary skill in the art may still derive other drawings from these accompanying drawings without creative efforts.



FIG. 1 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 1 of the present invention;



FIG. 2A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 2 of the present invention;



FIG. 2B is a schematic diagram of a structure of an access network to which the present invention is applicable;



FIG. 3 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 3 of the present invention;



FIG. 4 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 4 of the present invention;



FIG. 5 is a schematic structural diagram of an access device according to Embodiment 5 of the present invention;



FIG. 6 is a schematic structural diagram of an aggregation gateway according to Embodiment 6 of the present invention;



FIG. 7 is a schematic structural diagram of an access device according to Embodiment 7 of the present invention; and



FIG. 8 is a schematic structural diagram of an aggregation gateway according to Embodiment 8 of the present invention.





DESCRIPTION OF EMBODIMENTS

The following clearly describes the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Apparently, the described embodiments are merely a part rather than all of the embodiments of the present invention. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts shall fall within the protection scope of the present invention.


Embodiment 1


FIG. 1 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 1 of the present invention. The method may be applicable to setting up a GRE tunnel between an access device and an AG and may be applicable to a network architecture of various access devices and AGs. Meanwhile, the method is applicable to the Internet Protocol Version 4 (Internet Protocol Version 4, IPv4 for short) and the Internet Protocol Version 6 (Internet Protocol Version 6, IPv6 for short), and is also applicable to a network on which the IPV4 and the IPV6 coexist. The method in this embodiment may be implemented by an access device on an access side, where the access device may be an access point (Access Point, AP for short), an HG, or the AG; the present invention is not limited thereto. As shown in FIG. 1, the method may be performed according to the following process:



101. The access device obtains an address of an aggregation gateway group, where the aggregation gateway group includes at least one aggregation gateway.



102. The access device sends, by using the address of the aggregation gateway group as a destination address, a GRE tunnel setup request in which an address of the access device is encapsulated, where the GRE tunnel setup request is used to request for setting up a GRE tunnel.



103. The access device receives a GRE tunnel setup accept response sent back by an aggregation gateway and obtains an address of the aggregation gateway from the GRE tunnel setup accept response, where the aggregation gateway belongs to the aggregation gateway group.



104. The access device configures the address of the aggregation gateway as a network side destination address of the GRE tunnel.


In this embodiment, there is no need to separately store a peer address on an access device and an AG or each line card in the AG by performing static configuration; instead, the access device obtains, in a dynamic interaction process, an address of an AG group, then sends a GRE tunnel setup request that carries an address of the access device to the AG group, and then receives a GRE tunnel setup accept response sent back by an AG that is about to set up the GRE tunnel in the AG group; and obtains, from the GRE tunnel setup accept response, an address of the AG as a network side destination address. In this way, the GRE tunnel is dynamically established on an access network that uses an aggregation technology, and an advantage of the aggregation technology that dynamically selects the access network to make use of network resources can be brought into full play, thereby resolving a problem that the static configuration of the GRE tunnel is difficult to implement because of aggregation of a plurality of access networks in the access device or the AG.


The following gives an detailed description with reference to a scenario of an access network:


Embodiment 2


FIG. 2A is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 2 of the present invention. FIG. 2B is a schematic diagram of a structure of an access network to which the present invention is applicable. As shown in FIG. 2B, the access network is formed by an access device HG 207, gateways GW1209 and GW2211, and AG1213, AG2215, and AG3217, where an AG group may include but is not limited to AG1213, AG2215, and AG3217. The AG group may include at least one AG, and here is merely an example. Each aggregation AG may include a plurality of line card (Line Card, LC for short) addresses, that is, T311-T313 of AG1213, T321-T323 of AG2215 and T331-T333 of AG3217 in the figure.


The access device may obtain an address of the aggregation gateway group by using a gateway configuration protocol according to this embodiment. A specific manner is as follows:



201. The access device 219 sends a Radius access request to the AG 221.



202. The AG 221 forwards the Radius access request to an authentication server 223.



203. The authentication server 223 sends a Radius access response to the AG 221.



204. The AG 221 sends the Radius access response that carries an anycast address of the AG 221 to the access device 219.



205. The access device 219 obtains the anycast address of the AG 221 from the Radius access response that carries the anycast address of the AG 221.


In the foregoing embodiment, the access device sends a user authentication request to the authentication server, receives the Radius access response sent back by the authentication server, and obtains the anycast address of the aggregation gateway from the Radius access response. Because the anycast address of the AG can be obtained by the access device by using the Radius access response, no extra process is required, and improvement and promotion can be easily implemented.


Optionally, the access device may also obtain the address of the aggregation gateway group by: obtaining, by the access device, a domain name of the aggregation gateway based on the gateway configuration protocol, and obtaining the anycast address of the aggregation gateway corresponding to the domain name by a domain name system (Domain Name System, DNS for short). Referring to FIG. 2B, the HG obtains the domain name of the AG based on the gateway configuration protocol such as TR069, and obtains the anycast address T2 of the AG corresponding to the domain name by using the DNS.


In the foregoing manner, the anycast address of the aggregation gateway is the address of the aggregation gateway group.


Further, the address of the aggregation gateway group may further be obtained by using a Dynamic Host Configuration Protocol (Dynamic Host Configuration Protocol, DHCP for short) or based on a Point-to-Point Protocol over Ethernet (Point-to-Point Protocol Over Ethernet, PPPoE for short), or the like. The present invention imposes no limitation on a manner for obtaining the address of the aggregation gateway group.


Embodiment 3


FIG. 3 is a signaling flowchart of a method for implementing a GRE tunnel according to Embodiment 3 of the present invention. As shown in FIG. 3, after an access device 305 obtains an address of an aggregation gateway group 309, the GRE tunnel may be set up according to the following process:



301. The access device 305 sends a GRE tunnel setup request that carries an address of the access device 305 to the aggregation gateway group 309.



302. An aggregation gateway 307 determines that the aggregation gateway 307 itself is an aggregation gateway to receive the GRE tunnel setup request according to a priority of the aggregation gateway group 309, and determines to accept the GRE tunnel setup request, and at the same time obtains, from the GRE tunnel setup request, the address of the access device 305, which serves as an access side destination address of a GRE tunnel.



303. The aggregation gateway 307 sends a GRE tunnel setup accept response that carries an address of the aggregation gateway 307 to the access device 305.



304. The access device obtains the address of the aggregation gateway 307 from the GRE tunnel setup accept response as a network side destination address of the GRE tunnel.


In this embodiment, the aggregation gateway has the highest priority in the aggregation gateway group. A cost value may be used as a criterion for measuring the priority. For example, an AG with the smallest cost value is the AG with the highest priority. The priority measurement criterion is not limited thereto, and here is merely an example.


Based on the foregoing embodiment, the present invention further provides a method for implementing tunnel availability maintenance, that is, after setup of the GRE tunnel is complete, the method may further include: sending, by the access device, a GRE tunnel keepalive packet to the aggregation gateway within a preset period by using the GRE tunnel. That is, the access device and the AG send the GRE tunnel keepalive packet to a peer end within the preset period, such as within a certain period of time, by using the GRE tunnel. The packet is, for example, a GRE Hello packet. If the peer end receives the packet within the preset period, it indicates that the GRE tunnel is normal.


Based on the foregoing embodiment, the present invention further provides a method for tearing down the GRE tunnel, that is, after the setup of the GRE tunnel is complete, the method further includes: receiving, by the access device, a GRE tunnel teardown packet sent by the aggregation gateway by using the GRE tunnel, or sending, by the access device, a GRE tunnel teardown packet to the aggregation gateway by using the GRE tunnel; and deleting, by the access device, the network side destination address of the GRE tunnel. That is, teardown of a tunnel may be implemented by the access device or the AG. For example, when the access device determines to tear down the GRE tunnel, the access device sends the GRE tunnel teardown packet by using the GRE tunnel; after receiving the packet, the AG deletes a locally stored access side destination address of the GRE tunnel, and the access device also deletes a locally stored network side destination address of the GRE tunnel.


Based on the foregoing embodiment, the present invention further provides a method for maintaining a GRE tunnel status, that is, after the setup of the GRE tunnel is complete, the method may further include: receiving, by the access device, a GRE tunnel notification packet sent by the aggregation gateway by using the GRE tunnel, or sending, by the access device, a GRE tunnel notification packet to the aggregation gateway by using the GRE tunnel, where the GRE tunnel notification packet is used to indicate status information of the GRE tunnel. That is, the status information of a tunnel may be sent by the access device or the AG.


In the foregoing embodiment, the GRE tunnel setup request, the GRE tunnel setup accept response, the GRE tunnel keepalive packet, the GRE tunnel teardown packet, and the GRE tunnel notification packet belong to a GRE tunnel control message, where the GRE tunnel control message includes a type field, and a value of the type field is used to indicate that the GRE tunnel control message is the GRE tunnel setup request, the GRE tunnel setup accept response, the GRE tunnel keepalive packet, the GRE tunnel teardown packet, or the GRE tunnel notification packet.


The GRE tunnel control message further includes an attribute type field and an attribute parameter field, where a value of the attribute type field is used to indicate a type of an attribute, and the attribute parameter field is used to indicate content of the attribute.


An attribute indicated by the value of the attribute type field in the GRE tunnel setup request includes: a unique user identifier or a local user identifier; an attribute indicated by the value of the attribute type field in the GRE tunnel setup accept response includes: the address of the aggregation gateway, which is a line card address of the aggregation gateway, the local user identifier, an upper limit of a tunnel delay, or a tunnel traffic check interval; an attribute indicated by the value of the attribute type field in the GRE tunnel keepalive packet includes: a transmission timestamp or a prefix of an IPv6 address of the aggregation gateway; an attribute indicated by the value of the attribute type field in the GRE tunnel notification packet includes: a status of an Internet Protocol television (Internet Protocol Television, IPTV for short) service, a bypass traffic rate, a digital subscriber line (Digital Subscriber Line, DSL for short) synchronization rate, a filter list, or a DSL tunnel switching indication.


For example, the present invention defines the following packets, which may be used as the GRE tunnel setup request, the GRE tunnel setup accept response, the GRE tunnel keepalive packet, the GRE tunnel teardown packet and the GRE tunnel notification packet, and so on. A packet format is as follows:





















0





1

2     
3  


0
1
2
3
4
5 6 7
8 9 0 1 2
3 4 5
6 7 8 9 0 1 2 3 4 5 6 7 8 9
0 1







C
R
K
S
s
Recur
Flags
Ver
Protocol Type








Key (Session ID)












MsgType
T
Res
Attribute Type
Data Length








Data Value









The GRE tunnel control message may be defined as follows:
















Control






message type


(4 bit)
Type
Sender
Receiver
Packet usage







GRE setup
1
HG
AG
Request for setting up a


request



tunnel


GRE setup
2
AG
HG
Send this message to notify


accept



an HG that a tunnel is






successfully set up if a






tunnel setup request is






authenticated and






authorized


GRE setup
3
AG
HG
Send this message to notify


deny



an HG that a tunnel setup






request is denied if






authentication and






authorization of the tunnel






setup request fails.


GRE hello
4
AG
HG
Tunnel keepalive packet




HG
AG


GRE tear down
5
HG
AG
Tunnel teardown packet


GRE notify
6
HG
AG
Timely tunnel notification




AG
HG
packet, for example,






notifying a single tunnel






fault


Reserved
0,



7-15









The value of the attribute type field may be defined as follows:
















Attribute
Value

Carried by



type
(8 bits)
Length
message
Attribute usage



















HG MAC
1
6 Byte
GRE setup
Uniquely identifies





request
a user


T3 IP
2
4 Byte
GRE setup
Instruct an HG to


address


accept
use the IP address






T3 as a tunnel IP






address


Bundle ID
3
4 Byte
GRE setup
Uniquely identify a





accept
user in an AG





GRE setup





request


Timestamp
4
4 Byte
GRE hello
Calculate a delay


IPTV active
5
4 Byte
GRE
Identify a status of


status


notify
an IPTV service. An





(HG−>AG)
AG needs to deduct






traffic of the IPTV






from a DSL tunnel






if there is the IPTV






service


Bypass
6
4 Byte
GRE
Bypass traffic rate.


traffic


notify
An AG needs to


rate


(HG−>AG)
deduct this part of






traffic from a DSL






tunnel


DSL
7
4 Byte
GRE
Carry a DSL


synchro-


notify
synchronization rate


nization


(HG−>AG)


rate


Filter list
8
Indefi-
GRE
Carry a filter list


package

nitely
notify
to indicate which





(AG−>HG)
traffic passes






through a tunnel






and which traffic






does not pass






through the tunnel


RTT
9
4 Byte
GRE setup
A delay threshold;


threshold


accept
all traffic does not






pass through a






tunnel when this






value is exceeded


Bypass
10
4 Byte
GRE setup
Interval for checking


Bandwidth


accept
bypass traffic


check


interval


Switching to
11
2 Byte
GRE
Instruct an AG to


DSL tunnel


notify
switch traffic only





(HG−>AG)
to a DSL tunnel


IPv6 prefix
12
16 Byte 
GRE hello
Carry a prefix of an


assigned


(AG−>HG)
IPv6 address assigned


by AG



by an AG in a Hello






packet; the prefix






assigned by the AG






can be learned after






an intermediate lawful






interception device






captures the packet


End AVP
255
1 Byte
All control
Identify the last AVP





message


Reserved
0,



13-255









Embodiment 4


FIG. 4 is a flowchart of a method for implementing a GRE tunnel according to Embodiment 4 of the present invention. The method may be applicable to setting up a GRE tunnel between an access device and an AG, and may be applicable to a network architecture of various access devices and AGs. Meanwhile, the method is applicable to the IPV4 and the IPV6, and is also applicable to a network on which the IPV4 and the IPV6 coexist. The method in this embodiment may be implemented by the AG on a network side. As shown in FIG. 4, the method may be performed according to the following process:



401. An aggregation gateway receives a GRE tunnel setup request sent by the access device, where the GRE tunnel setup request is used to request for setting up a GRE tunnel; a source address of the GRE tunnel setup request is an address of the access device, and a destination address of the GRE tunnel setup request is an address of an aggregation gateway group, where the aggregation gateway belongs to the aggregation gateway group.


Before this step, the method may also include: determining, by the aggregation gateway, that the aggregation gateway has the highest priority in the aggregation gateway group. A cost value may be used to measure the priority, and the cost value of the AG is implemented by configuration in an initial state. During use, the AG adjusts its cost value based on a usage of a device LC, to ensure that it has the highest priority, that is, it has the smallest cost value, so as to ensure that the AG, relative to a network side destination address of the GRE tunnel, is an AG with the highest priority in the aggregation gateway group. By using this dynamic tunnel setup manner, a GRE tunnel with a load sharing feature of a network aggregation gateway is dynamically set up.



402. The aggregation gateway determines to accept the GRE tunnel setup request, obtains the address of the access device from the GRE tunnel setup request, and configures the address of the access device as an access side destination address of the GRE tunnel.



403. The aggregation gateway sends, by using the address of the access device as a destination address, a GRE tunnel setup accept response in which an address of the aggregation gateway is encapsulated, where the GRE tunnel setup accept response is used to indicate that the access device configures the address of the aggregation gateway as a network side destination address of the GRE tunnel.


In this step, the address of the aggregation gateway may be an actual address of the aggregation gateway, or a line card address of a line card that actually works in the aggregation gateway. That is, with reference to FIG. 2B, the actual address of the AG may be an anycast address T2 of the first AG 213, and the address of the LC that actually works in the first AG 213 may be, for example, T311 of the first AG 213.


In this embodiment, there is no need to separately store a peer address on an access device and an AG or each line card in the AG by performing static configuration; instead, in a dynamic interaction process, a first AG receives a GRE tunnel setup request that carries an address of the access device sent by the access device; the first AG receives, after determining that it is the AG with the highest priority in an AG group, the GRE tunnel setup request, and sends, after determining to accept the GRE tunnel setup request, a GRE tunnel setup accept response that carries an address of the first AG to the access device, and obtains the address of the access device from the GRE tunnel setup request, where the address of the access device serves as an access side destination address. In this way, a GRE tunnel is dynamically established on an access network that uses an aggregation technology, and an advantage of the aggregation technology that dynamically selects the access network to make use of network resources can be brought into full play, thereby resolving a problem that the static configuration of the GRE tunnel is difficult to implement because of aggregation of a plurality of access networks in the access device or the AG.


Based on the foregoing embodiment, the present invention further provides a method for implementing tunnel availability maintenance, that is, after setup of the GRE tunnel is complete, the method may further include: sending, by the aggregation gateway, a GRE tunnel keepalive packet to the access device within a preset period by using the GRE tunnel. That is, the access device and the AG send the GRE tunnel keepalive packet to a peer end within the preset period, such as within a certain period of time, by using the GRE tunnel. The packet is, for example, a GRE Hello packet. If the peer end receives the packet within the preset period, it indicates that the GRE tunnel is normal.


Based on the foregoing embodiment, the present invention further provides a method for tearing down the GRE tunnel, that is, after the setup of the GRE tunnel is complete, the method further includes: receiving, by the aggregation gateway, a GRE tunnel teardown packet sent by the access device by using the GRE tunnel, or sending, by the aggregation gateway, a GRE tunnel teardown packet to the access device by using the GRE tunnel; and deleting, by the aggregation gateway, the access side destination address of the GRE tunnel. That is, teardown of a tunnel may be implemented by the access device or the first AG. For example, when the first AG determines to tear down the GRE tunnel, the first AG sends the GRE tunnel teardown packet by using the GRE tunnel; after receiving the packet, the access device deletes a locally stored network side destination address of the GRE tunnel, and the first AG also deletes a locally stored access side destination address of the GRE tunnel.


Based on the foregoing embodiment, the present invention further provides a method for maintaining a GRE tunnel status, that is, after the setup of the GRE tunnel is complete, the method may further include: receiving, by the aggregation gateway, a GRE tunnel notification packet sent by the access device by using the GRE tunnel, or sending, by the aggregation gateway, a GRE tunnel notification packet to the access device by using the GRE tunnel, where the GRE tunnel notification packet is used to indicate status information of the GRE tunnel. That is, the status information of the tunnel may be sent by the access device or the first AG.


In the foregoing embodiment, the GRE tunnel setup request, the GRE tunnel setup accept response, the GRE tunnel keepalive packet, the GRE tunnel teardown packet, and the GRE tunnel notification packet belong to a GRE tunnel control message, where the GRE tunnel control message includes a type field, and a value of the type field is used to indicate that the GRE tunnel control message is the GRE tunnel setup request, the GRE tunnel setup accept response, the GRE tunnel keepalive packet, the GRE tunnel teardown packet, or the GRE tunnel notification packet.


The GRE tunnel control message further includes an attribute type field and an attribute parameter field, where a value of the attribute type field is used to indicate a type of an attribute, and the attribute parameter field is used to indicate content of the attribute.


An attribute indicated by the value of the attribute type field in the GRE tunnel setup request includes: a unique user identifier or a local user identifier; an attribute indicated by the value of the attribute type field in the GRE tunnel setup accept response includes: the address of the aggregation gateway, which is a line card address of the aggregation gateway, the local user identifier, an upper limit of a tunnel delay, or a tunnel traffic check interval; an attribute indicated by the value of the attribute type field in the GRE tunnel keepalive packet includes: a transmission timestamp or a prefix of an IPv6 address of the aggregation gateway; an attribute indicated by the value of the attribute type field in the GRE tunnel notification packet includes: a status of an IPTV service, a bypass traffic rate, a DSL synchronization rate, a filter list, or DSL tunnel switching indication. For a packet format of the GRE tunnel setup request, the GRE tunnel setup accept response, the GRE tunnel keepalive packet, the GRE tunnel teardown packet, and the GRE tunnel notification packet, and definitions of the GRE tunnel control message and the value of the attribute type field, refer to the format and definitions described above. Details are not described herein again.


Embodiment 5


FIG. 5 is a schematic structural diagram of an access device according to Embodiment 5 of the present invention. As shown in FIG. 5, the access device may include: an obtaining module 51, a first sending module 52, a first receiving module 53, and a configuration module 54, where the obtaining module 51 may be configured to obtain an address of an aggregation gateway group, where the aggregation gateway group includes at least one aggregation gateway; the first sending module 52 may be configured to send, by using the address of the aggregation gateway group as a destination address, a GRE tunnel setup request in which an address of the access device is encapsulated, where the GRE tunnel setup request is used to request for setting up a GRE tunnel; the first receiving module 53 may be configured to receive a GRE tunnel setup accept response sent back by an aggregation gateway and obtain an address of the aggregation gateway from the GRE tunnel setup accept response, where the aggregation gateway belongs to the aggregation gateway group; and the configuration module 54 may be configured to configure the address of the aggregation gateway as a network side destination address of the aggregation gateway.


Optionally, the aggregation gateway has the highest priority in the aggregation gateway group.


Optionally, the obtaining module 51 may be specifically configured to: obtain a domain name of the aggregation gateway based on a gateway configuration protocol and obtain an anycast address of the aggregation gateway corresponding to the domain name by a domain name system (DNS); or send a user authentication request to an authentication server, receive a Radius access response sent back by the authentication server, and obtain an anycast address of the aggregation gateway from the Radius access response, where the anycast address of the aggregation gateway is the address of the aggregation gateway group.


Optionally, the configuration module 54 may be further configured to: send a GRE tunnel keepalive packet to the aggregation gateway within a preset period by using the GRE tunnel.


Optionally, the configuration module 54 may be further configured to: receive a GRE tunnel teardown packet sent by the aggregation gateway by using the GRE tunnel, or send a GRE tunnel teardown packet to the aggregation gateway by using the GRE tunnel, and delete the network side destination address of the GRE tunnel.


Optionally, the configuration module 54 may be further configured to: receive a GRE tunnel notification packet sent by the aggregation gateway by using the GRE tunnel, or send a GRE tunnel notification packet to the aggregation gateway by using the GRE tunnel, where the GRE tunnel notification packet is used to indicate status information of the GRE tunnel.


The device in this embodiment may be configured to execute the technical solutions in method embodiments shown in FIG. 1 to FIG. 3. For a specific function, refer to the foregoing method embodiments. Details are not described herein again.


Embodiment 6


FIG. 6 is a schematic structural diagram of an aggregation gateway according to Embodiment 6 of the present invention. As shown in FIG. 6, the aggregation gateway may include: a second receiving module 61, a processing module 62, and a second sending module 63. The second receiving module 61 may be configured to receive a GRE tunnel setup request sent by an access device, where the GRE tunnel setup request is used to request for setting up a GRE tunnel; a source address of the GRE tunnel setup request is an address of the access device, a destination address of the GRE tunnel setup request is an address of an aggregation gateway group, and the aggregation gateway belongs to the aggregation gateway group; the processing module 62 may be configured to determine to accept the GRE tunnel setup request, obtain the address of the access device from the GRE tunnel setup request, and configure the address of the access device as an access side destination address of the GRE tunnel; the second sending module 63 may be configured to send, by using the address of the access device as a destination address, a GRE tunnel setup accept response in which an address of the aggregation gateway is encapsulated, and the GRE tunnel setup accept response is used to indicate that the access device configures the address of the aggregation gateway as a network side destination address of the GRE tunnel.


Optionally, the second receiving module 61 may be specifically configured to: determine, before receiving the GRE tunnel setup request sent by the access device, that the aggregation gateway has the highest priority in the aggregation gateway group.


Optionally, the second sending module 63 may be specifically configured to: send a GRE tunnel keepalive packet to the access device within a preset period by using the GRE tunnel.


Optionally, the second sending module 63 may be specifically configured to: receive a GRE tunnel teardown packet sent by the access device by using the GRE tunnel, or send a GRE tunnel teardown packet to the access device by using the GRE tunnel, and delete the access side destination address of the GRE tunnel.


Optionally, the second sending module 63 may be specifically configured to: receive a GRE tunnel notification packet sent by the access device by using the GRE tunnel, or send a GRE tunnel notification packet to the access device by using the GRE tunnel, where the GRE tunnel notification packet is used to indicate status information of the GRE tunnel.


The device in this embodiment may be configured to execute the technical solution in the method embodiment shown in FIG. 4. For a specific function, refer to the foregoing method embodiment. Details are not described herein again.


Embodiment 7


FIG. 7 is a schematic structural diagram of an access device according to Embodiment 7 of the present invention. As shown in FIG. 7, the access device 75 may include: a transmitter 71, a receiver 72, a memory 73, and a processor 74 separately connected to the transmitter 71, the receiver 72, and the memory 73, where the memory 73 stores a string of program code, and the processor 74 is configured to call the program code stored in the memory 73 and may execute the technical solutions in the method embodiments shown in FIG. 1 to FIG. 3. For a specific function, refer to the foregoing method embodiments. Details are not described herein again.


Embodiment 8


FIG. 8 is a schematic structural diagram of an aggregation gateway according to Embodiment 8 of the present invention. As shown in FIG. 8, the aggregation gateway 85 may include: a transmitter 81, a receiver 82, a memory 83, and a processor 84 separately connected to the transmitter 81, the receiver 82, and the memory 83, where the memory 83 stores a string of program code, and the processor 84 is configured to call the program code stored in the memory 83 and may execute the technical solution in the method embodiment shown in FIG. 4. For a specific function, refer to the foregoing method embodiment. Details are not described herein again.


Persons of ordinary skill in the art may understand that all or a part of the steps of the method embodiments may be implemented by a program instructing relevant hardware. The program may be stored in a computer readable storage medium. When the program runs, the steps of the method embodiments are performed. The foregoing storage medium includes: any medium that can store program code, such as a ROM, a RAM, a magnetic disk, or an optical disc.


Finally, it should be noted that the foregoing embodiments are merely intended for describing the technical solutions of the present invention, other than limiting the present invention. Although the present invention is described in detail with reference to the foregoing embodiments, persons of ordinary skill in the art should understand that they may still make modifications to the technical solutions described in the foregoing embodiments, or make equivalent substitutions to some or all the technical features thereof, without departing from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims
  • 1. A method performed by an aggregation gateway for implementing a generic routing encapsulation (GRE) tunnel, comprising: receiving, from an access device, a GRE tunnel setup request for setting up a GRE tunnel, wherein a source address of the GRE tunnel setup request includes an address of the access device, and a destination address of the GRE tunnel setup request includes an address of an aggregation gateway group, and the aggregation gateway belongs to the aggregation gateway group;obtaining the address of the access device from the GRE tunnel setup request;configuring an access-side destination address of the GRE tunnel with the address of the access device;generating a GRE tunnel setup accept response having the address of the access device as a destination address and containing an address of a line card in the aggregation gateway; andsending the GRE tunnel setup accept response containing the address of the line card to the access device, wherein the GRE tunnel setup accept response indicates to the access device to configure a network-side destination address of the GRE tunnel with the address of the line card in the aggregation gateway.
  • 2. The method according to claim 1, further comprising: sending a GRE tunnel keepalive packet to the access device within a preset period by using the GRE tunnel.
  • 3. An aggregation gateway comprising: a transmitter; a receiver; a memory storing program code; anda processor connected to the transmitter, the receiver, and the memory, and configured to execute the program codeto perform operations comprising:receiving from an access device a generic routing encapsulation (GRE) tunnel setup request for setting up a GRE tunnel, wherein a source address of the GRE tunnel setup request includes an address of the access device, and a destination address of the GRE tunnel setup request includes an address of an aggregation gateway group, and the aggregation gateway belongs to the aggregation gateway group;obtaining the address of the access device from the GRE tunnel setup request;configuring an access-side destination address of the GRE tunnel with the address of the access device;generating a GRE tunnel setup accept response having the address of the access device as a destination address and containing an address of a line card in the aggregation gateway; andsending the GRE tunnel setup accept response containing the address of the line card to the access device, wherein the GRE tunnel setup accept response indicates to the access device to configure a network-side destination address of the GRE tunnel with the address of the line card in the aggregation gateway.
  • 4. The gateway according to claim 3, wherein the operations further comprise: sending a GRE tunnel keepalive packet to the access device within a preset period by using the GRE tunnel.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of International Application No. PCT/CN2013/079322, filed on Jul. 12, 2013, which is hereby incorporated by reference in its entirety.

US Referenced Citations (67)
Number Name Date Kind
6982984 Asayesh Jan 2006 B1
7136384 Wang Nov 2006 B1
7356031 Toebes Apr 2008 B1
7797426 Lyon Sep 2010 B1
7830787 Wijnands Nov 2010 B1
8595846 Etheredge Nov 2013 B1
8976649 Li Mar 2015 B2
9313687 Knutson Apr 2016 B2
9344421 Chen May 2016 B1
9350706 Smith May 2016 B1
9450817 Bahadur Sep 2016 B1
20030158967 Tripathi Aug 2003 A1
20040013118 Borella Jan 2004 A1
20040066769 Ahmavaara Apr 2004 A1
20040085951 Rezaiifar May 2004 A1
20050080884 Siorpaes Apr 2005 A1
20050089008 Choo Apr 2005 A1
20050220069 Li Oct 2005 A1
20060015590 Patil Jan 2006 A1
20060143702 Hisada Jun 2006 A1
20060198345 Chen Sep 2006 A1
20060200543 Kong et al. Sep 2006 A1
20060245408 Lee et al. Nov 2006 A1
20060251101 Zhang et al. Nov 2006 A1
20070147372 Liu Jun 2007 A1
20070254661 Chowdhury Nov 2007 A1
20070276905 Durand Nov 2007 A1
20080144627 Ballantyne Jun 2008 A1
20090003208 Payyappilly Jan 2009 A1
20090046577 Marin Feb 2009 A1
20090303973 Patil Dec 2009 A1
20090310551 Hellgren Dec 2009 A1
20100142410 Huynh Van Jun 2010 A1
20100238791 Duncan Sep 2010 A1
20100246829 McGrew Sep 2010 A1
20100302989 Sung Dec 2010 A1
20110038380 Li et al. Feb 2011 A1
20110044690 Al-Kadi Feb 2011 A1
20110069701 Wu Mar 2011 A1
20110110328 Pradeep et al. May 2011 A1
20110122824 Muhanna May 2011 A1
20110131645 Johnson Jun 2011 A1
20110274108 Fan Nov 2011 A1
20110286396 Kato Nov 2011 A1
20120033663 Guichard Feb 2012 A1
20120063450 Pignataro Mar 2012 A1
20120099561 Zhao Apr 2012 A1
20120099602 Nagapudi Apr 2012 A1
20120281708 Chauhan Nov 2012 A1
20130250951 Koganti Sep 2013 A1
20130254264 Hankinson Sep 2013 A1
20130315125 Ravishankar Nov 2013 A1
20140010234 Patel Jan 2014 A1
20140052860 Duggal Feb 2014 A1
20140056290 Pazhyannur Feb 2014 A1
20140105031 McDysan Apr 2014 A1
20140105216 McDysan Apr 2014 A1
20140157042 Johnson Jun 2014 A1
20140164617 Jalan Jun 2014 A1
20140321277 Lynn, Jr. et al. Oct 2014 A1
20140376550 Khan Dec 2014 A1
20150023352 Yang Jan 2015 A1
20150098472 Choi Apr 2015 A1
20150201447 Li Jul 2015 A1
20150288443 Foxworthy Oct 2015 A1
20150334633 Zhou Nov 2015 A1
20160127149 Xue et al. May 2016 A1
Foreign Referenced Citations (12)
Number Date Country
1398090 Feb 2003 CN
101119272 Feb 2008 CN
101133598 Feb 2008 CN
101207546 Jun 2008 CN
101572644 Nov 2009 CN
101572664 Nov 2009 CN
101645895 Feb 2010 CN
102025613 Apr 2011 CN
102065471 May 2011 CN
102868586 Jan 2013 CN
105264835 Dec 2016 CN
2071766 Jun 2009 EP
Non-Patent Literature Citations (4)
Entry
XP015094477. Xue D Guo Huawei L: “Dynamic Stateless GRE tunnel; draft_xue_dhc-dynamic-gre-00.tXt”, Jul. 9, 2013, total 10 pages.
S. Hanks et al, Generic Routing Encapsulation (GRE). RFC1701, Oct. 1994, 8 pages.
D. Farinacci et al, Generic Routing Encapsulation (GRE). RFC2784, Mar. 2000, 9 pages.
P. Calhoun, Ed. Et al, Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Specification. RFC5415, Mar. 2009, 155 pages.
Related Publications (1)
Number Date Country
20160127149 A1 May 2016 US
Continuations (1)
Number Date Country
Parent PCT/CN2013/079322 Jul 2013 US
Child 14992206 US