CN115913960A - Time-sensitive network verification equipment, method, device, system and medium - Google Patents

Time-sensitive network verification equipment, method, device, system and medium Download PDF

Info

Publication number
CN115913960A
CN115913960A CN202111013384.7A CN202111013384A CN115913960A CN 115913960 A CN115913960 A CN 115913960A CN 202111013384 A CN202111013384 A CN 202111013384A CN 115913960 A CN115913960 A CN 115913960A
Authority
CN
China
Prior art keywords
time
verification
authentication
module
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111013384.7A
Other languages
Chinese (zh)
Inventor
柳干
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CHJ Automotive Information Technology Co Ltd
Original Assignee
Beijing CHJ Automotive Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CHJ Automotive Information Technology Co Ltd filed Critical Beijing CHJ Automotive Information Technology Co Ltd
Publication of CN115913960A publication Critical patent/CN115913960A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The present disclosure relates to a time-sensitive network verification device, method, apparatus, system and medium, the verification device comprising an integration module and a switch module, the integration module comprising a first processor and an ethernet controller, the first processor and the ethernet controller being connected by a device interface, the ethernet controller comprising an ethernet interface, wherein the ethernet interface has an attribute of a time-sensitive network; the switching module comprises a second processor and a plurality of Ethernet interfaces, and the integration module and the switching module are connected through the Ethernet interfaces. The verification equipment provided by the disclosure has strong universality, can verify the time-sensitive network based on different modes of the verification equipment, does not need related personnel to select the type of the equipment, has wide application scenes, effectively reduces the waste of manpower and material resources, can accelerate the verification speed of the time-sensitive network, and reduces the verification time.

Description

Time sensitive network verification equipment, method, device, system and medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a time-sensitive network authentication device, method, apparatus, system, and medium.
Background
At present, a Time Sensitive Network (TSN) based on a vehicle-mounted ethernet gradually becomes a research focus, and the Time Sensitive ethernet can accurately transmit data while ensuring a transmission bandwidth, so a Time Sensitive Network verification device that can be quickly constructed and accurately verified is required.
At present, a plurality of devices which bear different functions are needed for time-sensitive network verification, and because the requirements of protocols of the time-sensitive network are different, the application scenes are different, and the required devices are also different, related developers are needed to conduct product research and model selection on the existing related devices, so that the devices which conduct time-sensitive network verification under different requirements are determined, the operation is complex, waste of manpower and material resources is easily caused, and the universality of the related verification devices is poor.
Disclosure of Invention
In order to solve the technical problems or at least partially solve the technical problems, the disclosure provides a time-sensitive network verification device, a method, a device, a system and a medium, the universality of the verification device is good, and the verification device can be applied to various scenes by controlling the mode of the verification device, so that the waste of manpower and material resources is effectively reduced.
In a first aspect, an embodiment of the present disclosure provides a time-sensitive network authentication device, where the authentication device includes an integration module and an exchange module;
the integrated module comprises a first processor and an Ethernet controller, wherein the first processor and the Ethernet controller are connected through a device interface, and the Ethernet controller comprises an Ethernet interface, wherein the Ethernet interface has the attribute of a time-sensitive network;
the switching module comprises a second processor and a plurality of Ethernet interfaces, and the integration module and the switching module are connected through the Ethernet interfaces.
Optionally, the first processor is configured to configure the integration module, and is further configured to generate, receive, store, and send data;
the second processor is used for configuring the switching module and is also used for generating, receiving, storing and sending data.
In a second aspect, an embodiment of the present disclosure provides a time-sensitive network authentication method, which is applied to the authentication device, and the method includes:
receiving a control instruction, wherein the control instruction comprises configuration information of verification equipment;
determining a verification mode of the verification device according to the configuration information of the verification device;
in the authentication mode, the time sensitive network is authenticated.
Optionally, determining the verification mode of the verification device according to the configuration information of the verification device includes:
if the first processor configures the integrated module according to the configuration information and the second processor configures the exchange module according to the configuration information, determining that the verification mode of the verification device is a sending mode;
if only the second processor configures the exchange module according to the configuration information, determining that the verification mode of the verification device is a forwarding mode;
and if the first processor configures the integrated module according to the configuration information and the exchange module is controlled by the configured integrated module, determining that the verification mode of the verification device is a receiving mode.
In a third aspect, an embodiment of the present disclosure provides a time-sensitive network authentication apparatus, including:
the receiving unit is used for receiving a control instruction, and the control instruction comprises configuration information of the verification equipment;
a determining unit configured to determine an authentication mode of the authentication device according to configuration information of the authentication device;
and the verification unit is used for verifying the time-sensitive network in a verification mode.
In a fourth aspect, an embodiment of the present disclosure provides a time-sensitive network authentication system, where the authentication system includes a plurality of authentication devices as described above; data transmission is carried out among the plurality of verification devices through Ethernet interfaces;
the plurality of authentication devices are configured to different authentication modes by the above time-sensitive network authentication method, wherein a first authentication device of the plurality of authentication devices is configured to a transmission mode, a second authentication device of the plurality of authentication devices is configured to a forwarding mode, and a third authentication device of the plurality of authentication devices is configured to a reception mode.
In a fifth aspect, an embodiment of the present disclosure provides a time-sensitive network authentication method, which is applied to the time-sensitive network authentication system, and the method includes:
the first verification device sends the generated first time data to the second verification device;
the second verification equipment performs time synchronization according to the first time data and sends the generated second time data to third verification equipment;
the third authentication device performs time synchronization based on the second time data.
Optionally, the first authentication device includes a first integration module and a first exchange module; the first verification device sends the generated first time data to a second verification device, and the method comprises the following steps:
the first integration module sends the generated first time data to the first exchange module; and the first exchange module performs time synchronization according to the first time data and sends the updated first time data to the second verification device.
Optionally, the second authentication device includes a second exchange module; the second verification device performs time synchronization according to the first time data, and sends the generated second time data to a third verification device, including:
and the second exchange module performs time synchronization according to the updated first time data and sends the generated second time data to the third verification device.
Optionally, the third authentication device includes a third integration module and a third exchange module; the third authentication device performs time synchronization according to the second time data, including:
and the third integration module controls the third exchange module to carry out time synchronization according to the second time data.
In a sixth aspect, an embodiment of the present disclosure provides an electronic device, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the time-sensitive network authentication method as described above.
In a seventh aspect, the disclosed embodiments provide a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the time-sensitive network authentication method as described above.
The time-sensitive network verification device comprises an integrated module and a switching module, wherein the integrated module comprises a first processor and an Ethernet controller, the first processor and the Ethernet controller are connected through a device interface, the Ethernet controller comprises an Ethernet interface, and the Ethernet interface has the attribute of a time-sensitive network; the switching module comprises a second processor and a plurality of Ethernet interfaces, and the integration module and the switching module are connected through the Ethernet interfaces. The verification equipment provided by the embodiment of the disclosure has strong universality, can verify a time-insensitive network in different modes of the verification equipment, does not need related personnel to select types of the equipment, has wide application scenes, effectively reduces the waste of manpower and material resources, can accelerate the verification speed of the time-sensitive network, and reduces the verification time.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present disclosure, the drawings used in the embodiments or technical solutions in the prior art description will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic structural diagram of a time-sensitive network authentication device according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a time-sensitive network authentication method according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a time-sensitive network authentication method according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a time-sensitive network authentication system according to an embodiment of the present disclosure;
fig. 5 is a flowchart illustrating a time-sensitive network authentication method according to an embodiment of the disclosure;
fig. 6 is a schematic structural diagram of a time-sensitive network authentication system according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of another time-sensitive network authentication system according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a time-sensitive network authentication apparatus according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, aspects of the present disclosure will be further described below. It should be noted that the embodiments and features of the embodiments of the present disclosure may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein; it is to be understood that the embodiments disclosed in the specification are only a few embodiments of the present disclosure, and not all embodiments.
Specifically, in the field of automobiles, a time-sensitive Network based on a vehicle-mounted ethernet gradually becomes a research focus, and compared with a conventional Controller Area Network (CAN) as an ethernet bus, the time-sensitive Network serving as the ethernet bus not only ensures a Network bandwidth in data transmission, but also ensures the problems of time sequence, delay, reliability and the like of data transmission. Therefore, to support the planning of future body electronics and electrical architectures, the validation of time sensitive networks needs to be quickly built and completed. For the authentication of a time sensitive network, at least the following needs to be included: the flow generation module is used for generating and sending data messages according to requirements; the end node equipment with the time-sensitive network characteristic is used for participating in time synchronization and data scheduling of the time-sensitive network; the bridge node equipment with the time sensitive network characteristic is used for participating in time synchronization, data scheduling, data forwarding and the like of the time sensitive network; and the flow analysis module is used for capturing data messages, analyzing flow scheduling results and the like. Through the combination of the modules and the equipment, the verification of the functions of time synchronization, gating scheduling, frame preemption, frame copying and elimination, frame filtering and the like defined in the time sensitive network protocol is completed. However, because the functions to be implemented by the end node and the bridge node are different, two different devices are usually required to implement the functions of the end node and the bridge node, and related personnel are required to determine the type selection of the end node and the bridge node according to scene requirements, that is, when time-sensitive network verification is performed, multiple different devices are required to be used, which easily causes waste of manpower and material resources, and consumes long time, and is inconvenient for performing quick and accurate verification on the time-sensitive network in different scenes. Accordingly, in response to the above problems, a time-sensitive network authentication apparatus provided by the present disclosure is explained by one or more embodiments below.
Specifically, time synchronization is mainly achieved according to a defined master clock and a defined slave clock, data of the master clock is transmitted through a master clock interface, data of the slave clock is transmitted through a slave clock interface, the master clock is used for generating time data and serves as a time source, and the slave clock is used for performing time synchronization with current time data generated by the master clock.
Specifically, the Time-Sensitive Network in the embodiment of the present disclosure may be a standard defined by Institute of Electrical and Electronics Engineers (IEEE) Time-Sensitive Network (TSN), for example, an IEEE 802.1 protocol.
Fig. 1 is a schematic structural diagram of a time-sensitive network authentication device according to an embodiment of the present disclosure, where an authentication device 100 includes an integration module 110 and a switching module 120.
It can be understood that the integrated module 110 may be an integrated circuit or an integrated Chip (SoC), in which all or most components of a computer or other electronic systems are integrated, where the components include a Central Processing Unit (CPU), a memory, an input/output port, a secondary storage, and usually further include other components such as a radio modem and a Graphics Processing Unit (GPU), and the specific type of the integrated module is not limited, and only needs to have the above functions.
It is understood that the switching module 120 may be an Ethernet Switch (also called switching hub, bridging hub, bridge), which is a kind of network hardware for receiving and forwarding data to a destination device through packet switching, so as to connect devices on a computer network.
The integration module 110 includes a first processor 111 and an ethernet controller 112, the ethernet controller 112 including an ethernet interface 113, the first processor 111 and the ethernet controller 112 being connected by a device interface, wherein the ethernet interface has the attributes of a time sensitive network.
Optionally, the first processor is configured to configure the integration module, and is further configured to generate, receive, store, and send data.
Understandably, the integrated module 110 includes a first processor 111 and an ethernet controller 112; the first processor 111 may be a CPU, an operating system (Linux operating system) may be run in the first processor 111, and the first processor 111 may implement functions such as generation and transmission of data traffic, which is equivalent to the traffic generation module in the verification system, may be used to generate and transmit time data, and may also implement capture and storage of traffic, which is equivalent to the traffic analysis module, and capture and store time data; the ethernet controller 112 is also called an ethernet adapter, and may specifically refer to a network card, the ethernet controller 112 supports a time-sensitive network, that is, has a time-sensitive network characteristic, and the ethernet controller 112 further includes an ethernet interface 113 as an interface of a time-sensitive network networking for data transmission.
The switch module 120 includes a second processor 121 and a plurality of ethernet interfaces 122 to 126, and the integration module 110 and the switch module 120 are connected through the ethernet interface 113 and the ethernet interface 122.
Optionally, the second processor is configured to configure the switching module, and is further configured to generate, receive, store, and send data.
It can be understood that, the switching module 120 includes a second processor 121 and a plurality of ethernet interfaces 122 to 126, and the second processor 121 may have the same functions as those of the first processor 111, and may implement functions such as generation and transmission of data traffic, and may also implement functions such as capture and storage of traffic; the ethernet interfaces 122 to 126 have the attribute of a time-sensitive network, and are configured to carry and forward a data packet in data transmission, and perform operations such as scheduling, preemption, copying, and filtering on the data packet according to a configuration rule of the second processor 121, where a specific configuration rule may be determined according to a verification requirement in a current scenario, and further may determine a function of each ethernet interface according to the configuration rule, for example, as a transmission interface or a sending interface.
Illustratively, referring to fig. 1, the switching module 120 includes 5 ethernet interfaces, and according to the configuration rule of the second processor 121, the ethernet interface 122 may be configured to receive data transmitted by the integration module 110, that is, the integration module 110 transmits data to the ethernet interface 122 through the ethernet interface 113, so as to complete data transmission between the integration module 110 and the switching module 120; the ethernet interface 123 and the ethernet interface 124 may also serve as a data receiving interface (slave clock interface) for receiving data transmitted by other authentication devices, and the ethernet interface 125 and the ethernet interface 126 may serve as a transmitting interface (master clock interface) for transmitting time data generated by the second processor 121 to other authentication devices; the number of ethernet interfaces included in the switching module 120 may be determined according to an address (IP) of a time-sensitive network switch (the switching module 120) actually used.
According to the time-sensitive network verification device provided by the embodiment of the disclosure, the integration module and the exchange module are integrated on one verification device, so that different functions can be realized by configuring the mode of the verification device according to the scene requirement of time-sensitive network verification, the operation steps of type selection of the device are reduced, the loss of manpower and material resources is reduced, the speed of verifying the time-sensitive network can be further increased, and the verification time is reduced.
Fig. 2 is a schematic flow chart of a time-sensitive network authentication method provided in an embodiment of the present disclosure, and on the basis of the above embodiment, the time-sensitive network authentication method is described based on the authentication device 100, which includes the following steps S210 to S230 shown in fig. 2:
s210, receiving a control instruction, wherein the control instruction comprises configuration information of the verification device.
Understandably, the verification device receives a control instruction, the control instruction includes configuration information of the verification device, wherein the control instruction may be sent by a terminal connected with the verification device, the terminal sends the generated control instruction to the verification device, and the control instruction may be generated by the terminal according to a target requirement of a time sensitive network to be verified.
Understandably, the terminal obtains target requirements of the time sensitive network to be verified, which have already been constructed, where the target requirements may include a protocol of the time sensitive network application and the number of verification devices required for verification, and different target requirements may be obtained according to different scenarios. Then, according to the obtained target requirement, a control instruction is generated, where the control instruction includes configuration information of the verification device, that is, information for configuring the integration module and the switching module in the verification device, and the configuration information may specifically include whether the integration module and the switching module are in a normal working state, whether the integration module and the switching module can participate in a networking of a time sensitive network for data transmission, a function to be implemented by each ethernet interface, and the like.
S220, determining the verification mode of the verification device according to the configuration information of the verification device.
Understandably, on the basis of the above S210, the verification device is configured according to the configuration information of the verification device in the control instruction, so as to determine the verification mode of the verification device, and the verification device can implement different functions in different modes. For example, a mode of the authentication device can be configured for realizing time synchronization and data scheduling, the authentication device in this mode corresponding to the above-described end node device; or another mode of configuring the verification device, which is used for implementing time synchronization, data scheduling, data forwarding and the like, and the verification device in this mode is equivalent to the above-mentioned bridge node device.
And S230, verifying the time-sensitive network in a verification mode.
It can be understood that, on the basis of the above S220, by using the configured verification device, in each mode of the verification device, the verification of the time sensitive network is performed according to the devices based on different functions in the above prior art, and various functions defined in the time sensitive network are verified, that is, in the determined mode of the verification device, the functions of time synchronization, data scheduling, and the like are implemented through the time sensitive network, that is, different modes are configured for the same verification device, so as to undertake the functions of the devices required in the time sensitive network verification.
The time-sensitive network verification method provided by the embodiment of the disclosure is applied to the verification device, the verification device receives the control instruction, determines the verification mode through the control instruction, and verifies the time-sensitive network in the verification mode. The verification of the time-sensitive network can be realized based on one verification device, the same verification device is configured to bear different functions in the time-sensitive network verification, the time-sensitive network verification method is suitable for various application scenes, the universality is high, related personnel are not required to investigate and select the device, a large amount of manpower and material resources are saved, the operation is simple and convenient, and the verification speed is further improved.
On the basis of the foregoing embodiment, optionally, determining the authentication mode of the authentication device according to the configuration information of the authentication device specifically includes the following steps S310 to S330 as shown in fig. 3:
s310, if the first processor configures the integrated module according to the configuration information and the second processor configures the exchange module according to the configuration information, determining that the verification mode of the verification device is a sending mode.
It can be understood that the first processor in the integrated module in the authentication device is used for configuring the integrated module, the second processor in the switching module in the authentication device is used for configuring the switching module, and the configured integrated module and the configured switching module jointly determine the authentication mode of the whole authentication device.
Understandably, the first processor configures the first integrated module according to the configuration information, the second processor configures the exchange module according to the configuration information, and after the configuration is completed, the verification mode of the verification device is determined to be a sending mode; namely, the integration module is configured to be in a working state, and time data can be generated and transmitted to the exchange module; meanwhile, the switching module is configured to be in a working state, time synchronization can be performed, time data can be sent to other verification devices (the verification device with a forwarding mode is a verification device), and the verification device is enabled to be in a sending mode through the configuration rule. The sending mode can realize the function of the traffic generation module, and can also perform the functions of time synchronization, data scheduling, data forwarding and the like, namely simultaneously undertake the work of the end node and the bridge node.
And S320, if only the second processor configures the exchange module according to the configuration information, determining that the verification mode of the verification device is a forwarding mode.
It can be understood that the first processor in the integrated module in the verification device does not configure the integrated module, that is, the second integrated module is in an inoperative state, and it can also be understood that the configuration information of the control instruction does not include information for configuring the integrated module; meanwhile, the second processor configures the switching module according to the configuration information, namely configures the second switching module to be in a working state, so that the functions of time synchronization and data forwarding can be realized; and determining that the verification mode of the verification device is a forwarding mode according to the configuration rule, wherein the verification device in the forwarding mode can realize the functions of data receiving, data forwarding and the like, namely undertake the work of the bridge node.
S330, if the first processor configures the integrated module according to the configuration information and the exchange module is controlled by the configured integrated module, determining that the verification mode of the verification device is a receiving mode.
It can be understood that, the first processor in the integrated module in the verification device configures the integrated module, configures the integrated module to be in a working state, and then configures the switch module with the configured integrated module, that is, the integrated module controls the switch module to perform data transmission, and the switch module can be regarded as an internal component of the integrated module, and the configuration rule makes the verification device be in a receiving mode, and the verification device in the receiving mode can be called as a third verification device; the receiving mode mainly refers to receiving time data and performing time synchronization according to the received time data, namely undertaking the work of the end node.
According to the time-sensitive network verification method provided by the embodiment of the disclosure, the verification mode of the verification device can be determined through the control instruction, the verification of the time-sensitive network is completed in the mode corresponding to each verification device, the verification speed is high, the structures of the verification devices are the same, the mode of each verification device only needs to be determined according to the control instruction, different modes realize different functions, the time-sensitive network verification in various scenes does not need to carry out the work of equipment investigation, model selection and the like, the waste of manpower and material resources can be reduced, and the universality is strong.
On the basis of the foregoing embodiments, fig. 4 is a schematic structural diagram of a time-sensitive network authentication system provided in the embodiments of the present disclosure, where the authentication system 400 may include a plurality of authentication devices 100, and data transmission is performed between the plurality of authentication devices through an ethernet interface.
The plurality of authentication devices are configured to different authentication modes by the above-described time-sensitive network authentication method, in which a first authentication device of the plurality of authentication devices is configured to a transmission mode, a second authentication device of the plurality of authentication devices is configured to a forwarding mode, and a third authentication device of the plurality of authentication devices is configured to a reception mode.
It can be understood that the modes of the first verification device, the second verification device, and the third verification device may be configured into different modes according to application requirements, for example, the first verification device may also be configured into a forwarding mode, the second verification device may be configured into a receiving mode, and the third verification device may be configured into a sending mode according to configuration information in the control instruction. The number of the verification devices included in the verification system for time-sensitive network verification is at least 3, and the 3 verification devices need to be configured to a sending mode, a forwarding mode and a receiving mode respectively, and after the requirements of the verification system defined above are met, the specific mode and the number configured by each verification device can be determined according to the user requirements.
It will be appreciated that the authentication system 400 of fig. 4 may determine the number of authentication devices 100 that need to be used according to the requirements of time-sensitive network authentication in different scenarios.
For example, referring to fig. 4, an authentication system 400 for authenticating a time-sensitive network includes 3 authentication devices, and in order to distinguish the configured modes of the authentication devices, a first authentication device, a second authentication device, and a third authentication device are used for illustration, which are respectively a first authentication device 410, a second authentication device 420, and a third authentication device 430, each of which represents an authentication mode, where the structures of the 3 authentication devices and the authentication device 100 are the same, and the first authentication device 410, the second authentication device 420, and the third authentication device 430 are configured in different modes by the above time-sensitive network authentication method for authenticating the time-sensitive network, where the first authentication device 410 in the authentication system 400 is configured in a transmission mode, the second authentication device 420 is configured in a forwarding mode, and the third authentication device 430 is configured in a reception mode.
It is understood that the first authentication device 410 in fig. 4 (the authentication device whose authentication mode is the transmission mode) includes a first integration module 411 and a first switching module 414. The first authentication device 410 is configured to be in a sending mode by the above time-sensitive network authentication method, wherein the first integrated module 411 is in an operating state, and the operating state refers to an application participating in the time-sensitive network, that is, data can be transmitted in the time-sensitive network. The internal transmission of the first processor 410 specifically includes: the first processor 412 generates time data and transmits the time data to the ethernet controller 413, then the ethernet controller 413 transmits the time data to the first switching module 414, then the first switching module 414 generates the time data and transmits the time data to the second authentication device 420, wherein the second authentication device 420 corresponds to an authentication device whose authentication mode is a forwarding mode.
It will be appreciated that the second authentication device 420 in fig. 4 comprises a second switching module 421, and that the second integrated module in the second authentication device 420 is not in use and is in an inactive state according to the above configuration rule configured as the forwarding mode, and thus is not shown in fig. 4. The internal transmission of the second authentication device 420 specifically includes: the second authentication apparatus 420 receives the time data transmitted by the first authentication apparatus 410, performs time synchronization according to the time data, and the second processor 422 generates the time data and transmits the generated time data to the third authentication apparatus 430.
It will be appreciated that the third authentication device 430 (the authentication device whose authentication mode is the reception mode) in fig. 4 includes a third integration module 431 and a third switching module 434. The internal transmission of the third authentication device 430 specifically includes: the third integration module 431 controls the third switching module 434 to receive the time data sent by the second verification device 420 and perform time synchronization according to the time data, and the dotted line indicates that the first processor 432 sends configuration information to the second processor 435, and the configuration information can be transmitted by the ethernet interface.
The time-sensitive network verification system provided by the embodiment of the disclosure comprises a plurality of verification devices 100, and each verification device has different functions by configuring each verification device, so that the verification of the time-sensitive network can be quickly and accurately realized by data transmission between the verification devices on the premise of meeting verification requirements, and the device does not need to be selected, so that the operation is simple and convenient, and the implementation is convenient.
On the basis of the foregoing embodiment, fig. 5 is a time-sensitive network authentication method provided by the embodiment of the present disclosure, which is applied to the foregoing authentication system 400, and specifically includes the following steps S510 to S530 as shown in fig. 5:
and S510, the first verification device sends the generated first time data to a second verification device.
Optionally, the sending, by the first verification device, the generated first time data to the second verification device specifically includes: the first integration module sends the generated first time data to the first exchange module; and the first exchange module performs time synchronization according to the first time data and sends the updated first time data to the second verification device.
Understandably, the first integrated module in the first authentication device (the authentication device whose authentication mode is the transmission mode) generates the first time data, specifically, the first processor in the first integrated module generates the first time data and transmits the first time data to the first switching module through the ethernet interface of the ethernet controller; the first switching module receives the first time data through the ethernet interface, performs time synchronization according to the first time data, generates updated first time data after the time synchronization is completed, and transmits the updated first time data to the second verification device (the verification device with the verification mode being the forwarding mode) through the ethernet interface.
Illustratively, referring to fig. 6, the authentication mode of the first authentication device 610 is a transmission mode, in which the first processor 513 in the first integration module 611 generates the first time data and transmits the first time data to the ethernet interface 616 in the switching module 612 through the ethernet interface 615 in the ethernet controller 614; the ethernet interface 616 in the switching module 612 receives the first time data, performs time synchronization according to the first time data, and after the time synchronization is completed, the second processor 617 generates updated first time data and transmits the updated first time data to the ethernet interface 623 in the second sub-authentication device 620 through the ethernet interface 618. The remaining ethernet interfaces of the first authentication device 610, the second authentication device 620, and the third authentication device 630 are not subjected to data transmission temporarily.
S520, the second verification device performs time synchronization according to the first time data and sends the generated second time data to a third verification device.
Optionally, the time synchronization performed by the second verification device, and sending the generated second time data to the third verification device specifically include: and the second exchange module performs time synchronization according to the updated first time data and sends the generated second time data to the third verification device.
Understandably, on the basis of the above S510, after the second verification device is determined to be in the forwarding mode, the second switching module in the second verification device performs time synchronization according to the received updated first time data, and after the time synchronization is completed, the second switching module generates second time data and sends the second time data to the third verification device through the ethernet interface (the verification device whose verification mode is the receiving mode).
For example, referring to fig. 6, the second verification device 620 is in a forwarding mode, in which the second switching module 621 receives, through the ethernet interface 623, the updated first time data transmitted by the ethernet interface 618 in the first verification device 610 and performs time synchronization according to the updated first time data, and after the second switching module 621 completes the time synchronization, the second processor 622 generates second time data and sends the second time data to the third verification device 630 through the ethernet interface 624 (the verification mode is a verification device in a receiving mode).
And S530, the third verification device performs time synchronization according to the second time data.
Optionally, the time synchronization performed by the third verification device according to the second time data specifically includes: and the third integration module controls the third exchange module to carry out time synchronization according to the second time data.
Understandably, on the basis of the above S520, in the forwarding mode of the third authentication device, the third integration module in the third authentication device controls the ethernet interface in the third switching module to receive the second time data transmitted by the second authentication device, and the third integration module and the third switching module perform time synchronization according to the second time data.
For example, referring to fig. 6, the third integration module 631 in the third authentication device 630 controls the ethernet interface 638 in the third switching module 636 to receive the second time data transmitted by the ethernet interface 624 in the second authentication device 620, and the third integration module 631 and the third switching module 636 perform time synchronization according to the second time data, where the third integration module 631 transmits configuration information to the third switching module 635 through the ethernet interface 634 in the ethernet controller 633, the configuration information is used to control the third switching module 635 to perform time synchronization and data reception, the ethernet interface 636 in the third switching module 635 receives the configuration information transmitted by the ethernet interface 634, that is, the ethernet interface 636 and the ethernet interface 634 are used as internal interfaces, do not have the property of time-sensitive ethernet and are only used for internal data communication, and the ethernet interface included in the third switching module 635 has the property of time-sensitive ethernet and can be used in the group network of the time-sensitive network.
According to the time-sensitive network verification method provided by the embodiment of the disclosure, the verification of the time-sensitive network is completed by configuring the mode of each verification device and in the mode corresponding to each verification device, the first verification device generates first time data and sends the first time data to the second verification device, then the second verification device performs time synchronization according to the first time data, after the time synchronization is completed, the second time data is generated and sent to the third verification device, and the third verification device performs time synchronization according to the second time data to complete the verification of the time-sensitive network. The verification equipment is enabled to bear different functions by configuring different modes for the verification equipment, verification of the time sensitive network is achieved in the mode corresponding to the verification equipment, flexibility is high, operation is simple and convenient, the method can be applied to various scenes, universality is high, sequential transmission of time data is guaranteed, and meanwhile rapid verification of the time sensitive network can be achieved.
On the basis of the above embodiments, the embodiment of the present disclosure further includes a schematic structural diagram of a verification system as shown in fig. 7, where the verification system performing time-sensitive network verification in fig. 7 includes 7 verification apparatuses 100 in total, where 1 first verification apparatus 710,2 in a forwarding mode and 1 second verification apparatus 740,3 in a receiving mode are included, and a specific transmission process of time data for verifying (time synchronizing) a time-sensitive network based on the verification system 700 includes:
it is to be understood that the authentication devices configured in the transmission mode described below are collectively referred to as a first authentication device, the authentication devices configured in the forwarding mode are collectively referred to as a second authentication device, and the authentication devices configured in the reception mode are collectively referred to as a third authentication device.
The transmission process of the time data in the first authentication device 710 includes: the first processor 713 in the integration module 711 generates first time data and transmits the first time data to the switching module 712 through an ethernet interface in the ethernet processor 714, the switching module 712 performs time synchronization according to the first time data, after the time synchronization is completed, the second processor 715 generates updated first time data and transmits the updated first time data to the second authentication device 730 through the ethernet interface 716; the ethernet interface of the ethernet processor 714 and the ethernet interface 716 correspond to a master clock interface, and the ethernet interface of the switching module 712 and the ethernet interface of the ethernet processor 714 for data transmission corresponds to a slave clock interface.
The transmission process of the time data in the second authentication device 730 includes: the ethernet interface 733 of the switching module 731 receives the updated first time data, the switching module 731 performs time synchronization according to the updated first time data, after the time synchronization is completed, the second processor 732 generates second time data and transmits the second time data to the third verification device 750 through the ethernet interface 734, transmits the second time data to the third verification device 760 through the time ethernet interface 735, and transmits the second time data to the second verification device 740 through the time ethernet interface 736; the ethernet interface 733 corresponds to a slave clock interface, and the ethernet interface 734, the ethernet interface 735, and the ethernet interface 736 correspond to a master clock interface.
The third verification device 750 receives the second time data through the ethernet interface 756 and performs data synchronization according to the second time data, wherein the first processor 753 in the integration module 751 transmits the configuration information to the switching module 752 through the ethernet interface in the ethernet controller 754 to configure the second processor 755; here, the ethernet interface 756 corresponds to a slave clock interface.
The third verification device 760 receives the second time data through the ethernet interface 766, and performs data synchronization according to the second time data, wherein the first processor 763 in the integration module 761 transmits the configuration information to the switching module 762 through the ethernet interface in the ethernet controller 764, and configures the second processor 765; the ethernet interface 766 corresponds to a slave clock interface.
The second verification device 740 receives the second time data through the ethernet interface 743, the switching module 741 performs time synchronization according to the second time data, and after the time synchronization is completed, the second processor 742 in the switching module 741 generates third time data and transmits the third time data to the third verification device 720 through the ethernet interface 744; here, the ethernet interface 743 corresponds to a slave clock interface, and the ethernet interface 744 corresponds to a master clock interface.
The third verifying device 720 receives the third time data through the ethernet interface 726 and performs data synchronization according to the third time data, wherein the first processor 723 in the integrating module 721 transmits the configuration information to the switching module 722 through the ethernet interface in the ethernet controller 724 to configure the second processor 725; here, the ethernet interface 726 corresponds to a slave clock interface.
Fig. 8 is a schematic structural diagram of a time-sensitive network authentication apparatus according to an embodiment of the present disclosure. The time-sensitive network authentication apparatus provided in the embodiment of the present disclosure may execute the processing procedure provided in the above time-sensitive network authentication method embodiment, as shown in fig. 8, the time-sensitive network authentication apparatus 800 includes:
it is to be understood that the time-sensitive network authentication apparatus may specifically be a time-sensitive network authentication device, or the time-sensitive network authentication apparatus is a component, module or element in the time-sensitive network authentication device.
A receiving unit 810, configured to receive a control instruction, where the control instruction includes configuration information of a verification device;
a determining unit 820 configured to determine an authentication mode of the authentication device according to configuration information of the authentication device;
the verifying unit 830 is configured to verify the time-sensitive network in a verification mode.
Optionally, the determining unit 820 determines the verification mode of the verification device according to the configuration information of the verification device, and is specifically configured to:
if the first processor configures the integrated module according to the configuration information and sends a control instruction to the second processor so that the second processor configures the switching module according to the configuration information, determining that the verification mode of the verification device is a sending mode; in another embodiment, if the first processor configures the integration module according to the configuration information and the second processor configures the switching module according to the configuration information, it may also be determined that the authentication mode of the authentication device is the transmission mode.
And if only the second processor configures the switching module according to the configuration information, determining that the verification mode of the verification device is a forwarding mode.
And if the first processor configures the integrated module according to the configuration information and the exchange module is controlled by the configured integrated module, determining that the verification mode of the verification device is a receiving mode.
The time-sensitive network verifying apparatus in the embodiment shown in fig. 8 may be used to implement the technical solution of the time-sensitive network verifying method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. The electronic device provided in the embodiment of the present disclosure may execute the processing procedure provided in the above time-sensitive network verification method, as shown in fig. 9, the electronic device 900 includes: a processor 910, a communication interface 920, and a memory 930; wherein the computer program is stored in the memory 930 and configured to be executed by the processor 910 for the time-sensitive network authentication method as described above.
In addition, the embodiment of the present disclosure also provides a computer readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the time-sensitive network authentication method described in the above embodiment.
Furthermore, the embodiments of the present disclosure also provide a computer program product, which includes a computer program or instructions, and when the computer program or instructions are executed by a processor, the time-sensitive network authentication method as described above is implemented.
It is noted that, in this document, relational terms such as "first" and "second," and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present disclosure, which will enable those skilled in the art to understand or practice the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A time-sensitive network authentication device, wherein the authentication device comprises an integration module and a switching module;
the integrated module comprises a first processor and an Ethernet controller, the first processor and the Ethernet controller are connected through a device interface, the Ethernet controller comprises an Ethernet interface, wherein the Ethernet interface has attributes of a time-sensitive network;
the switching module comprises a second processor and a plurality of Ethernet interfaces, and the integration module and the switching module are connected through the Ethernet interfaces.
2. The authentication device of claim 1 wherein said first processor is configured to configure said integration module and is further configured to generate, receive, store and transmit data;
the second processor is used for configuring the switching module and is also used for generating, receiving, storing and sending data.
3. A time-sensitive network authentication method applied to the authentication apparatus of any one of claims 1 to 2, the method comprising:
receiving a control instruction, wherein the control instruction comprises configuration information of the verification device;
determining a verification mode of the verification device according to the configuration information of the verification device;
and in the verification mode, verifying the time-sensitive network.
4. The method of claim 3, wherein determining the authentication mode of the authentication device according to the configuration information of the authentication device comprises:
if the first processor configures the integrated module according to the configuration information and the second processor configures the exchange module according to the configuration information, determining that the verification mode of the verification device is a sending mode;
if only the second processor configures the switching module according to the configuration information, determining that the verification mode of the verification device is a forwarding mode;
and if the first processor configures the integrated module according to the configuration information and the exchange module is controlled by the configured integrated module, determining that the verification mode of the verification device is a receiving mode.
5. A time-sensitive network authentication apparatus, comprising:
a receiving unit, configured to receive a control instruction, where the control instruction includes configuration information of the verification device;
a determining unit, configured to determine an authentication mode of the authentication device according to configuration information of the authentication device;
and the verification unit is used for verifying the time sensitive network in the verification mode.
6. A time sensitive network authentication system, characterized in that the authentication system comprises a plurality of authentication devices according to any of claims 1 to 2; data transmission is carried out among the verification devices through an Ethernet interface;
the plurality of authentication devices are configured to different authentication modes by the method of any of the preceding claims 3 to 4, wherein a first authentication device of the plurality of authentication devices is configured to transmit mode, a second authentication device of the plurality of authentication devices is configured to forward mode, and a third authentication device of the plurality of authentication devices is configured to receive mode.
7. A time-sensitive network authentication method applied to the authentication system of claim 6, the method comprising:
the first verification device sends the generated first time data to the second verification device;
the second verification equipment performs time synchronization according to the first time data and sends the generated second time data to the third verification equipment;
and the third verification equipment carries out time synchronization according to the second time data.
8. The method of claim 7, wherein the first authentication device comprises a first integrated module and a first switch module; the first verification device sending the generated first time data to the second verification device, including:
the first integration module sends the generated first time data to the first exchange module; the first exchange module carries out time synchronization according to the first time data and sends the updated first time data to the second verification equipment;
the second authentication device comprises a second switching module; the second verification device performs time synchronization according to the first time data, and sends the generated second time data to a third verification device, including:
the second exchange module performs time synchronization according to the updated first time data and sends the generated second time data to the third verification device;
the third authentication device comprises a third integration module and a third switching module; the third verification device performs time synchronization according to the second time data, and includes:
and the third integration module controls the third exchange module to carry out time synchronization according to the second time data.
9. An electronic device, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the time sensitive network authentication method of any of claims 3 to 4.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the time-sensitive network authentication method according to any one of claims 3 to 4.
CN202111013384.7A 2021-08-02 2021-08-31 Time-sensitive network verification equipment, method, device, system and medium Pending CN115913960A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110882809 2021-08-02
CN2021108828091 2021-08-02

Publications (1)

Publication Number Publication Date
CN115913960A true CN115913960A (en) 2023-04-04

Family

ID=85729441

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111016131.5A Pending CN115913961A (en) 2021-08-02 2021-08-31 Time-sensitive network verification method, device, equipment and storage medium
CN202111013384.7A Pending CN115913960A (en) 2021-08-02 2021-08-31 Time-sensitive network verification equipment, method, device, system and medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202111016131.5A Pending CN115913961A (en) 2021-08-02 2021-08-31 Time-sensitive network verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (2) CN115913961A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0308871D0 (en) * 2003-04-17 2003-05-21 Agilent Technologies Inc Testing network communications
CN1462132A (en) * 2002-05-30 2003-12-17 安捷伦科技有限公司 Testing network communication
WO2018191447A1 (en) * 2017-04-12 2018-10-18 General Electric Company (A New York Corporation) Time sensitive network (tsn) scheduler with verification
CN110380923A (en) * 2019-06-11 2019-10-25 国网浙江省电力有限公司杭州供电公司 Site element protection looped network test device
CN112105080A (en) * 2020-11-18 2020-12-18 之江实验室 Time-sensitive network data transmission system and transmission method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9331962B2 (en) * 2010-06-27 2016-05-03 Valens Semiconductor Ltd. Methods and systems for time sensitive networks
CN106161132B (en) * 2015-04-17 2019-10-01 伊姆西公司 Device and method for being tested storage network
CN109639493B (en) * 2018-12-20 2022-03-25 新华三技术有限公司 Network device, state control device and TSN configuration method
CN112769514A (en) * 2020-12-22 2021-05-07 国家电网有限公司 Time-sensitive based communication device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1462132A (en) * 2002-05-30 2003-12-17 安捷伦科技有限公司 Testing network communication
GB0308871D0 (en) * 2003-04-17 2003-05-21 Agilent Technologies Inc Testing network communications
WO2018191447A1 (en) * 2017-04-12 2018-10-18 General Electric Company (A New York Corporation) Time sensitive network (tsn) scheduler with verification
CN110380923A (en) * 2019-06-11 2019-10-25 国网浙江省电力有限公司杭州供电公司 Site element protection looped network test device
CN112105080A (en) * 2020-11-18 2020-12-18 之江实验室 Time-sensitive network data transmission system and transmission method

Also Published As

Publication number Publication date
CN115913961A (en) 2023-04-04

Similar Documents

Publication Publication Date Title
JP7183416B2 (en) Time-dependent networking communication method and apparatus
CN103346974B (en) Controlling method of service process and network device
CN108667638B (en) Network service configuration method and network management equipment
CN111865736B (en) Equipment control method and device
JP2020511083A (en) Service quality control method and device, SMF, UPF, UE, PCF and AN
US20210135967A1 (en) Intelligent in-band telemetry auto-configuration for ip networks
CN110740460A (en) device network access method, device, network device and storage medium
CN114553752B (en) Network performance test method and device based on simulation software and computer equipment
US20150124600A1 (en) Method for transmitting data in a packet-oriented communications network and correspondingly configured user terminal in said communications network
WO2021042612A1 (en) Wireless screen projection method and apparatus, device and storage medium
CN112131014A (en) Decision engine system and business processing method thereof
CN115913960A (en) Time-sensitive network verification equipment, method, device, system and medium
US20030055930A1 (en) Communication processing apparatus, management apparatus, computer-readable medium storing a program and communication system
US10149139B2 (en) Connection control method by communication terminal
CN102681969A (en) Long frame data transmission card and long frame data transmission method based on CAN (Controller Area Network) bus
CN115629596A (en) Remote control test method and device for networked controller, electronic equipment and storage medium
CN115733849A (en) Flash method, device, system, equipment and storage medium of electronic control unit
CN115102804A (en) Data routing method and device for vehicle-mounted gateway, vehicle-mounted gateway and storage medium
CN110971716B (en) Address configuration method, device, system and computer readable storage medium
CN112188411A (en) Multi-split system based on wireless Mesh network and data transmission method
CN104660403A (en) Equipment authorization method and server
EP4243383A1 (en) Message transmission method and system, and network device and storage medium
CN116599871B (en) Network time delay determining method and related device
CN113014648B (en) Small node group dynamic forwarding hybrid routing method and related equipment
US9391850B2 (en) Method and apparatus for quality-of-service (QoS) management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination