CN116800630A - Transmission detection method, device and system - Google Patents

Transmission detection method, device and system Download PDF

Info

Publication number
CN116800630A
CN116800630A CN202210265116.2A CN202210265116A CN116800630A CN 116800630 A CN116800630 A CN 116800630A CN 202210265116 A CN202210265116 A CN 202210265116A CN 116800630 A CN116800630 A CN 116800630A
Authority
CN
China
Prior art keywords
tail
nodes
target
service flow
target service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210265116.2A
Other languages
Chinese (zh)
Inventor
杨平安
黄金明
潘继雨
生绪博
周天然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202210265116.2A priority Critical patent/CN116800630A/en
Publication of CN116800630A publication Critical patent/CN116800630A/en
Pending legal-status Critical Current

Links

Abstract

A transmission detection method, device and system belong to the technical field of networks. The method is applied to a controller and comprises the following steps: receiving reporting information sent by a plurality of network nodes on a target transmission path, wherein the target transmission path is a transmission path of a target service flow, and the reporting information sent by each network node in the plurality of network nodes comprises detection information of the target service flow; and determining a detection result of the target service flow according to the reporting information sent by the network nodes and a tail node database of the target service flow, wherein the tail node database indicates a plurality of tail nodes on a target transmission path. The application realizes the detection of the target service flow in the scene that the transmission path of the target service flow is a point-to-multipoint path or a multipoint-to-multipoint path.

Description

Transmission detection method, device and system
Technical Field
The present application relates to the field of network technologies, and in particular, to a transmission detection method, device, and system.
Background
With the development of network technology, network-carried business has evolved from initial email to current production, finance, shopping, travel, etc. In order to guarantee the quality of service of a network to a service, detection of a service flow is often required. For example, whether transmission of a traffic stream is normal or not is detected, transmission quality of the traffic stream is detected, and the like.
In general, the transmission path of one traffic stream may be a point-to-point path, a point-to-multipoint path, or a multipoint-to-multipoint path, that is, the transmission path of one traffic stream may have a plurality of paths. In a scenario where the transmission path of a traffic stream is a point-to-multipoint path or a multipoint-to-multipoint path, how to detect the traffic stream is a problem to be solved.
Disclosure of Invention
The application provides a transmission detection method, a transmission detection device and a transmission detection system, which can realize the detection of a service flow in a scene that the transmission path of the service flow is a point-to-multipoint path or a multipoint-to-multipoint path, and can improve the accuracy of a detection result. The technical scheme of the application is as follows:
in a first aspect, a transmission detection method is provided, applied to a controller, and the method includes: receiving reporting information sent by a plurality of network nodes on a target transmission path, wherein the target transmission path is a transmission path of a target service flow, and the reporting information sent by the plurality of network nodes comprises detection information of the target service flow; and determining a detection result of the target service flow according to the reporting information sent by the network nodes and a tail node database of the target service flow, wherein the tail node database indicates a plurality of tail nodes on a target transmission path. The target transmission path is a point-to-multipoint path or a multipoint-to-multipoint path.
According to the technical scheme provided by the application, the controller determines the detection result of the target service flow according to the reporting information sent by a plurality of network nodes on the target transmission path (the transmission path of the target service flow) and the tail node database of the target service flow, wherein the tail node database indicates a plurality of tail nodes on the target transmission path. Therefore, the application realizes the detection of the target service flow in the scene that the transmission path of the target service flow is a point-to-multipoint path or a multipoint-to-multipoint path, for example, realizes the detection of the target service flow by adopting a path detection technology. In addition, the flow of the point-to-multipoint path and the flow of the multipoint-to-multipoint path are generally complex, the point-to-multipoint path and the multipoint-to-multipoint path are generally changed due to the change of the flow, so that tail nodes of the path are changed, or some tail nodes can not send report information (such as failure of detection functions of the tail nodes) to the controller due to self reasons, which easily affects the accuracy of the detection result.
Optionally, before determining the detection result of the target service flow according to the report information sent by the plurality of network nodes and the tail node database of the target service flow, the method further includes: and acquiring the tail node database.
According to the technical scheme provided by the application, the controller acquires the tail node database of the target service flow, so that the controller can conveniently determine the detection result of the target service flow according to the report information sent by the plurality of network nodes on the target transmission path and the tail node database of the target service flow.
Optionally, obtaining the tail node database includes: and acquiring a tail node database according to the path detection information of the target transmission path. For example, the controller controls the head node on the target transmission path to send a probe message, at least one network node on the target transmission path may acquire probe information based on the probe message in the transmission process of the probe message, and at least one network node on the target transmission path may send the probe information to the controller, so that the controller can acquire the path probe information of the target transmission path, thereby acquiring the tail node database according to the path probe information.
Optionally, the path detection information includes detection information sent by a plurality of tail nodes on the target transmission path, and the detection information sent by each tail node in the plurality of tail nodes includes indication information of the target traffic flow and indication information of each tail node; obtaining a tail node database according to path detection information of a target transmission path, including: and acquiring a tail node database according to the detection information sent by the plurality of tail nodes. For example, the controller determines that each tail node is a tail node on the target transmission path according to the indication information of the target traffic stream included in the probe information sent by each tail node and the indication information of each tail node, and the controller may determine a plurality of tail nodes on the target transmission path according to the probe information sent by a plurality of tail nodes, and further acquire (e.g., construct) a tail node database of the target traffic stream according to the determined plurality of tail nodes.
Optionally, the path detection information includes detection information sent by at least one head node on the target transmission path, where the detection information includes indication information of the target traffic flow and indication information of at least one tail node on the target transmission path; obtaining a tail node database according to path detection information of a target transmission path, including: and acquiring a tail node database according to the detection information sent by the at least one head node. For example, the controller determines that the at least one tail node is a tail node on the target transmission path according to the indication information of the target traffic stream and the indication information of the at least one tail node included in the probe information sent by each head node, and the controller can determine a plurality of tail nodes on the target transmission path according to the probe information sent by the at least one head node, so as to obtain a tail node database of the target traffic stream according to the determined plurality of tail nodes.
Optionally, the path detection information includes detection information sent by a head node on the target transmission path, where the detection information includes a tail node database; obtaining a tail node database according to path detection information of a target transmission path, including: and acquiring a tail node database according to the detection information sent by the head node. That is, after the tail node database is constructed by the head node, the tail node database is sent to the controller.
Optionally, obtaining the tail node database includes: and acquiring a tail node database according to the report information sent by the plurality of network nodes on the target transmission path, wherein the report information sent by at least one network node in the plurality of network nodes comprises the indication information of the target service flow and the indication information of at least one tail node on the target transmission path. For example, the controller determines that the at least one tail node is a tail node on the target transmission path according to the indication information of the target traffic flow and the indication information of the at least one tail node included in the report information sent by each network node in the plurality of network nodes, and the controller can determine a plurality of tail nodes on the target transmission path according to the report information sent by the plurality of network nodes, so that the controller obtains (e.g., constructs) a tail node database of the target traffic flow according to the determined plurality of tail nodes.
Optionally, the plurality of network nodes include q tail nodes, the reported information sent by the plurality of network nodes includes detection information of the target service flows acquired by the q tail nodes, and q is a positive integer; determining a detection result of the target service flow according to the reporting information sent by the plurality of network nodes and the tail node database of the target service flow, wherein the detection result comprises the following steps: and determining the detection result of the target service flow according to the detection information of the target service flow acquired by the q tail nodes and the tail node database.
Optionally, the plurality of network nodes include p head nodes and q tail nodes, the reported information sent by the plurality of network nodes includes detection information of the target service flows acquired by the p head nodes and detection information of the target service flows acquired by the q tail nodes, and p and q are positive integers; determining a detection result of the target service flow according to the reporting information sent by the plurality of network nodes and the tail node database of the target service flow, wherein the detection result comprises the following steps: and determining the detection result of the target service flow according to the detection information of the target service flow acquired by the p head nodes, the detection information of the target service flow acquired by the q tail nodes and the tail node database.
Optionally, the detection information of the target service flow acquired by each tail node of the q tail nodes includes a packet loss statistic value of the target service flow, and the packet loss statistic value of the target service flow acquired by each tail node includes: each tail node obtains a first packet loss statistical value from a received message belonging to a target service flow, and/or each tail node obtains a second packet loss statistical value according to the received message belonging to the target service flow; according to the detection information of the target service flows obtained by the q tail nodes and the tail node database, determining the detection result of the target service flows comprises the following steps: determining the packet loss of the target service flow according to the packet loss statistical values of the target service flow acquired by the q tail nodes; and determining the detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database.
Optionally, the detection information of the target service flow acquired by each of the p head nodes includes the number of messages belonging to the target service flow sent by each head node, and the detection information of the target service flow acquired by each of the q tail nodes includes the number of messages belonging to the target service flow received by each tail node; determining a detection result of the target service flow according to the detection information of the target service flow acquired by the p head nodes, the detection information of the target service flow acquired by the q tail nodes and the tail node database, including: determining the packet loss of the target service flow according to the number of messages belonging to the target service flow sent by the p head nodes and the number of messages belonging to the target service flow received by the q tail nodes; and determining the detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database.
Optionally, determining the detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database includes: when the packet loss of the target service flow meets the packet loss condition, determining that the detection result of the target service flow is normal; and when the packet loss of the target service flow does not meet the packet loss condition, determining a detection result of the target service flow according to the tail node database. That is, when the packet loss amount of the target traffic flow satisfies the packet loss amount condition, the tail node database of the target traffic flow may not need to be referred to when determining the detection result of the target traffic flow.
Optionally, the report information sent by the plurality of network nodes further includes indication information of q tail nodes; determining a detection result of the target service flow according to the tail node database, wherein the detection result comprises the following steps: determining whether the q tail nodes are matched with tail nodes indicated by the tail node database according to the indication information of the q tail nodes; if the q tail nodes are matched with the tail nodes indicated by the tail node database, determining that the detection result of the target service flow is normal; if the q tail nodes are not matched with the tail nodes indicated by the tail node database, an updated tail node database is obtained, and a detection result of the target service flow is determined according to the indication information of the q tail nodes and the updated tail node database.
Wherein, the matching of the q tail nodes with the tail nodes indicated by the tail node database may be: the q tail nodes are identical to the tail nodes indicated by the tail node database. That is, the tail nodes indicated by the tail node database are the q tail nodes. The q tail nodes not matching the tail nodes indicated by the tail node database may be: the q tail nodes are not identical to the tail nodes indicated by the tail node database. For example, at least one of the q tail nodes is not included in the plurality of tail nodes indicated by the tail node database, or the plurality of tail nodes indicated by the tail node database includes the q tail nodes and further includes tail nodes other than the q tail nodes.
According to the technical scheme provided by the application, if q tail nodes for sending the report information to the controller are matched with the tail nodes indicated by the tail node database, the fact that all tail nodes on the target transmission path send the report information to the controller is indicated, the target transmission path is unchanged, the detection function of the tail nodes on the target transmission path is not invalid, and the controller can determine that the detection result of the target service flow is normal; if q tail nodes of the reported information sent to the controller are not matched with the tail nodes indicated by the tail node database, the target transmission path is changed, or the detection function of some tail nodes on the target transmission path is invalid, in order to ensure the accuracy of the detection result, the controller acquires the updated tail node database, and determines the detection result of the target service flow according to the indication information of the q tail nodes and the updated tail node database.
Optionally, determining a detection result of the target service flow according to the indication information of the q tail nodes and the updated tail node database includes: determining whether the q tail nodes are matched with tail nodes indicated by an updated tail node database according to the indication information of the q tail nodes; if the q tail nodes are matched with the tail nodes indicated by the updated tail node database, determining that the detection result of the target service flow is normal; if the q tail nodes are not matched with the tail nodes indicated by the updated tail node database, determining that the detection result of the target service flow is abnormal.
According to the technical scheme provided by the application, if q tail nodes for sending reporting information to the controller are matched with the tail nodes indicated by the updated tail node database, the target transmission path is indicated to be changed, and all tail nodes on the changed target transmission path send the reporting information to the controller, so that the controller can determine that the detection result of the target service flow is normal; if q tail nodes for sending the reported information to the controller are not matched with the tail nodes indicated by the updated tail node database, the detection function of some tail nodes on the target transmission path is invalid, and the controller determines that the detection result of the target service flow is abnormal.
Optionally, the method further comprises: updating the tail node database when the updating condition is met;
wherein the update condition includes at least one of:
determining that the packet loss of the target service flow meets the packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path;
the detection information of the target service flow acquired by at least one tail node indicated by the tail node database is not received within the appointed duration;
the reported information sent by the network nodes on the target transmission path comprises detection information of target service flows acquired by the tail nodes, and the tail nodes are not matched with the tail nodes indicated by the tail node database;
The periodic update condition is satisfied.
According to the technical scheme provided by the application, the controller updates the tail node database of the target service flow when the updating condition is met, so that the influence on the accuracy of the detection result caused by the change of the target transmission path can be avoided.
Optionally, updating the tail node database when the update condition is satisfied, including:
updating the tail node database according to the reported information sent by the plurality of network nodes when the packet loss of the target service flow meets the packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path, wherein the reported information sent by at least one network node in the plurality of network nodes comprises the indication information of the target service flow and the indication information of at least one tail node on the target transmission path;
deleting at least one tail node from the tail node database when the detection information of the target service flow acquired by the at least one tail node indicated by the tail node database is not received within the appointed time length;
the method comprises the steps that when reported information sent by a plurality of network nodes on a target transmission path comprises detection information of target service flows acquired by a plurality of tail nodes, the tail nodes are not matched with tail nodes indicated by a tail node database, the tail node database is updated according to path detection information of the target transmission path;
And when the periodic updating condition is met, updating the tail node database according to the path detection information of the target transmission path.
According to the technical scheme provided by the application, when different updating conditions are met, the controller updates the tail node database of the target service flow in different modes, so that the updated tail node database can be matched with the target transmission path, namely, the updated tail node database is ensured to be capable of indicating all tail nodes on the target transmission path, and the accuracy of a detection result determined according to the updated tail node database is ensured.
Optionally, the method further comprises: and outputting the detection result of the target service flow. For example, the detection result of the output target traffic stream is displayed in the visual interface. Or, the detection result of the target service flow is broadcast in a voice mode.
In a second aspect, there is provided a transmission detection apparatus comprising means for performing the transmission detection method as provided in the first aspect or any of the alternatives of the first aspect. The modules may be implemented based on software, hardware, or a combination of software and hardware, and the modules may be arbitrarily combined or partitioned based on the specific implementation.
In a third aspect, a transmission detection apparatus is provided, comprising a memory and a processor;
the memory is used for storing a computer program;
the processor is configured to execute a computer program stored in the memory to cause the transmission detection apparatus to perform the transmission detection method as provided in the first aspect or any of the alternatives of the first aspect.
In a fourth aspect, there is provided a transmission detection system comprising a controller and a plurality of network nodes, the controller comprising a transmission detection apparatus as provided in the second or third aspect.
In a fifth aspect, there is provided a computer readable storage medium having stored therein a computer program which when executed implements a method as provided in the above first aspect or any of the alternatives of the first aspect.
In a sixth aspect, there is provided a computer program product comprising a program or code which when executed implements a method as provided in the first aspect or any of the alternatives of the first aspect.
In a seventh aspect, there is provided a chip comprising programmable logic circuitry and/or program instructions, the chip being operable to implement a method as provided in the above-described first aspect or any of the alternatives of the first aspect.
The technical scheme provided by the application has the beneficial effects that:
according to the transmission detection method, the transmission detection device and the transmission detection system provided by the application, the controller can determine the detection result of the target service flow according to the reporting information sent by the network nodes on the target transmission path and the tail node database of the target service flow, wherein the target transmission path is the transmission path of the target service flow, and the tail node database indicates a plurality of tail nodes on the target transmission path, namely, the target transmission path is a point-to-multipoint path or a multipoint-to-multipoint path. Therefore, the application realizes the detection of the target service flow in the scene that the transmission path of the target service flow is a point-to-multipoint path or a multipoint-to-multipoint path. In addition, the controller can determine whether detection information acquired by all tail nodes on the transmission path of the target service flow is collected according to the tail node database of the target service flow, so that the influence on the accuracy of detection results due to the change of the transmission path of the target service flow, the failure of the detection function of some tail nodes and the like is avoided, and the accuracy of the detection results is improved.
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present application;
Fig. 2 is a flowchart of a transmission detection method according to an embodiment of the present application;
fig. 3 is a flowchart of a method for determining a detection result of a target service flow according to an embodiment of the present application;
FIG. 4 is a flowchart of another method for determining a detection result of a target traffic flow according to an embodiment of the present application;
FIG. 5 is a flowchart of a method for determining a detection result of a target service flow according to indication information of a tail node and a tail node database according to an embodiment of the present application;
fig. 6 is a flowchart of another transmission detection method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a transmission detection apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of another transmission detection apparatus according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of still another transmission detection apparatus according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
With the development of network technology, network-carried services progress from initial email, web browsing to current production, finance, shopping, government, travel, etc., which puts higher demands and challenges on the quality of service of the network.
In order to guarantee the quality of service of a network to a service, detection of a service flow is often required. Current detection techniques include channel associated detection techniques and out-of-band detection techniques. The channel associated detection technology is a technology for carrying out transmission detection through a service message, and the detection result obtained based on the channel associated detection technology can accurately reflect the service quality of the network to the service. For example, the on-stream detection (in-situ flow information telemetry, IFIT) technique and the in-band operation management maintenance (in-suitoam operations administration and maintenance, IOAM) technique are both on-stream detection techniques. The out-of-band detection technology refers to a technology of performing transmission detection through an additional detection message, and can detect the quality of a transmission path used for transmitting a service flow in a network through the out-of-band detection technology, wherein the quality of the transmission path can reflect the service quality of the service flow by the network. The out-of-band detection technique may detect the quality of the backup path that does not carry traffic flows, etc.
In general, the transmission path of one traffic stream may be a point-to-point path, a point-to-multipoint path, or a multipoint-to-multipoint path. In a scenario that a transmission path of a service flow is a point-to-multipoint path or a multipoint-to-multipoint path, how to detect the service flow, especially how to detect the service flow by adopting a path detection technology, is a problem to be solved.
The request for comments (request for comments, RFC) 8889 provides a method for measuring a multipoint-to-multipoint path. In the method, network nodes on a transmission path of a service flow are divided into a plurality of network clusters, monitoring and statistics of the service flow are carried out in each network cluster to obtain a detection result of the service flow in each network cluster, and the detection result of the service flow is obtained according to the detection result of the service flow in the plurality of network clusters.
The method provided by RFC8889, although capable of implementing detection of traffic flows in a scenario of a multipoint-to-multipoint path, can only be applied to a case where a transmission path is fixed. For the situations that the transmission path changes and the detection function of the tail node on the transmission path fails, the method cannot accurately detect, for example, based on the method, whether the detection result of the service flow covers all the tail nodes on the transmission path of the service flow cannot be determined. However, the traffic of the point-to-multipoint path and the traffic of the multipoint-to-multipoint path are generally complex, and the traffic of the point-to-multipoint path and the multipoint-to-multipoint path are generally changed, so that tail nodes of the path are changed, or some tail nodes may not send report information to the controller due to self reasons (such as failure of the detection function of the tail nodes), which easily affects the accuracy of the detection result, so the method provided by RFC8889 easily affects the accuracy of the detection result. In addition, the method provided by the RFC8889 cannot dynamically deploy monitoring statistics based on the service flow, and has large resource waste.
The embodiment of the application provides a transmission detection method, a transmission detection device and a transmission detection system. In the transmission detection method, the controller may determine the detection result of the target traffic flow according to the report information sent by the plurality of network nodes on the target transmission path and the tail node database of the target traffic flow, where the target transmission path is a transmission path of the target traffic flow, and the tail node database indicates a plurality of tail nodes on the target transmission path, that is, the target transmission path is a point-to-multipoint path or a multipoint-to-multipoint path. Therefore, the application realizes the detection of the target service flow in the scene that the transmission path of the target service flow is a point-to-multipoint path or a multipoint-to-multipoint path. In addition, the controller can determine whether detection information acquired by all tail nodes on the transmission path of the target service flow is collected according to the tail node database of the target service flow, so that the influence on the accuracy of detection results due to the change of the transmission path of the target service flow, the failure of detection functions of some tail nodes on the transmission path of the target service flow and the like is avoided, and the accuracy of the detection results is improved. The controller can update the tail node database of the target service flow when the update condition is met, so that the influence on the accuracy of the detection result of the target service flow caused by the change of the target transmission path is avoided. The controller can dynamically deploy monitoring statistics based on measurement flow learning, so that resource waste is avoided.
The technical scheme of the application is described below, and the application scene of the application is described first.
Please refer to fig. 1, which illustrates a schematic diagram of an application scenario provided in an embodiment of the present application. The application scenario provides a communication network, which may also be referred to as a communication system. As shown in fig. 1, the communication network includes a controller 100 and a plurality of network nodes 101-105 (i.e., network node 101, network node 102, network node 103, network node 104, and network node 105). Controller 100 is connected to network nodes 101 to 105, respectively. Network node 102 is connected to network node 101 and network nodes 103 to 105, respectively. Network nodes 101-105 may perform traffic forwarding under the control of controller 100. For example, the network nodes 101 to 105 include edge network nodes, where the edge network nodes may be used for a workstation to access the communication network, and the network nodes 101 to 105 may forward traffic between different workstations accessing the communication network under the control of the controller 100, so as to implement traffic communication between the different workstations.
Wherein the controller 100 integrates functions of network management, traffic control, network analysis, and the like. The controller 100 may be a functional module deployed in a server, or a server cluster formed by a plurality of servers, or a cloud computing service center, or other devices or modules with network control functions. Each of the network nodes 101 to 105 may be a network device for traffic forwarding, such as a switch, a router, a virtual switch or a virtual router, or a part of a functional component in a network device. The embodiment of the present application is described taking as an example that each of the network nodes 101 to 105 is a network device, in one possible case, the network nodes 101 to 105 are the same network device, for example, the network nodes 101 to 105 are each routers. In another possible scenario, at least two of network nodes 101-105 are different network devices, e.g., one of network nodes 101-105 is a router and the other is a switch. The workstation accessing the communication network may be a host, a server, a base station, a Virtual Machine (VM), etc., and the host may be a smart phone, a tablet computer, a desktop computer, or an internet of things (internet of things, ioT) device, etc., which is not limited in the embodiment of the present application.
Communication networks typically include a transmission path for transmitting traffic streams, which may include a plurality of network nodes. Depending on the transmission direction of the traffic flow, the network nodes on the transmission path may comprise a head node, a tail node and at least one intermediate node located between the head node and the tail node. Traffic flows into the transmission path through the head node and out of the transmission path through the tail node. The number of intermediate nodes on the transmission path is different according to the length of the transmission path, or the transmission path includes only the head node and the tail node, not the intermediate node. In some implementations, the network node is also referred to as a network device, gateway device, routing node, or routing device; the head node is also called an ingress (ingress) device, a head node device; the intermediate node is also called a transit node, transit equipment and intermediate equipment; the tail node is also called an egress (egress) device; the transmission path is also referred to as a forwarding path, a communication link, a communication path, a communication tunnel, or a tunnel path, which is not limited by the embodiments of the present application.
In the embodiment of the present application, the transmission path of the traffic flow may be a point-to-multipoint path or a multipoint-to-multipoint path, that is, the transmission path of the traffic flow may include a plurality of tail nodes. For example, as shown in fig. 1, the communication network includes a transmission path P of a target traffic flow (for convenience of description, the transmission path of the target traffic flow is referred to as a target transmission path), the target transmission path P is a point-to-multipoint path, and the target transmission path P includes: network node 101- > network node 102- > network node 103, network node 101- > network node 102- > network node 104 and network node 101- > network node 102- > network node 105, network node 101 being the head node of the target transmission path P, network nodes 103-105 being the tail nodes of the target transmission path P, and network node 102 being the intermediate node of the target transmission path P.
In an embodiment of the present application, the controller 100 may maintain a tail node database of the target traffic flow, the tail node database indicating a plurality of tail nodes on the target transmission path P, e.g. the tail node database indicating the network nodes 103-105. In the process of transmitting the target traffic flow through the target transmission path P, a plurality of network nodes (for example, all or part of the network nodes 101 to 105) on the target transmission path P may send report information to the controller 100, and each network node sends report information to the controller 100 may include detection information of the target traffic flow. The controller 100 may determine the detection result of the target traffic flow according to the report information sent by the plurality of network nodes and the tail node database of the target traffic flow. The tail node database of the target traffic flow maintained by the controller 100 may be obtained by the controller 100 according to the report information sent by the plurality of network nodes on the target transmission path P, or may be obtained by the controller 100 according to the path detection information of the target transmission path P. The controller 100 may also update the tail node database when an update condition is met.
It should be noted that the application scenario shown in fig. 1 is only used as an example, and is not used to limit the technical scheme of the present application. In an implementation, the controller may also be integrated in the network node, e.g. the controller is integrated in the head node. The communication network may include more or fewer network nodes than shown in fig. 1, and the number of network nodes and the number of controllers may be configured as desired. The communication network shown in fig. 1 may be an internet protocol version 4 (internet protocol version, ipv 4) network, an internet protocol version 6 (internet protocol version, ipv 6) network, or a multiprotocol label switching (multiprotocol label switching, MPLS) network, as embodiments of the present application are not limited in this respect.
The above is an introduction to the application scenario of the present application, and the following describes an embodiment of the transmission detection method of the present application.
Referring to fig. 2, a flowchart of a transmission detection method according to an embodiment of the present application is shown. The transmission detection method may be applied to a controller. As shown in fig. 2, the method includes the following steps S10 to S20.
S10, receiving report information sent by a plurality of network nodes on a target transmission path, wherein the target transmission path is a transmission path of a target service flow, and the report information comprises detection information of the target service flow.
The target transmission path may be a point-to-multipoint path or a multipoint-to-multipoint path, and the network node on the target transmission path may include at least one head node and a plurality of tail nodes, and may further include at least one intermediate node. Since the target transmission path is a point-to-multipoint path or a multipoint-to-multipoint path, the target transmission path may be considered to include a plurality of sub-paths from at least one head node to a plurality of tail nodes.
In the embodiment of the present application, the head node may send a message of the target traffic flow to the tail node through the target transmission path (for convenience of description, the message of the target traffic flow is referred to as a target message). In the process that the target message is transmitted through the target transmission path, the network node on the target transmission path can acquire detection information of the target service flow according to the target message, and the plurality of network nodes on the target transmission path can send report information to the controller, and the controller can receive the report information sent by the plurality of network nodes on the target transmission path. The reporting information sent by each network node of the plurality of network nodes to the controller may include detection information of the target service flow, indication information of at least one network node on the target transmission path, indication information of an output interface of the at least one network node, and the like. The network node may send the report information to the controller via border gateway protocol (border gateway protocol, BGP), network configuration protocol (network configuration protocol, netcon f), path computation element communication protocol (path computation element communication protocol, PCEP), or other proprietary protocol.
The target message may be an IPv4 message, an IPv6 message, or an MPLS message, or may be a message of another protocol. The target message carries indication information of the target traffic flow so that the network node on the target transmission path can determine that the target message belongs to the target traffic flow. The target message may also carry detection indication information (e.g., a detection flag) so that the network node on the target transmission path may determine that the detection information of the target traffic flow may be obtained according to the target message. Optionally, the target message includes a detection header or an option (option) field, and the detection indication information may be located in the detection header or the option (option) field. The detection information of the target service flow may include packet loss statistics, delay statistics, number of target messages received by the network node, number of target messages sent by the network node, and so on. The indication information of the target traffic flow may be a triplet, a quintuple, a flow ID (flow identification), a flow label (flow label), etc., or may be other information capable of indicating the target traffic flow. The indication information of the network node may be an Identification (ID) of the network node, an internet protocol (internet protocol, IP) address, a media access control (media access control, MAC) address, or the like, or may be other information capable of indicating the network node. The indication information of the outgoing interface may be an identification of the outgoing interface, and the outgoing interface of the network node may be used to determine which sub-path in the target transmission path is a transmission path of the message sent by the network node through the outgoing interface.
In the embodiment of the application, the controller can learn the monitoring statistics of the dynamic deployment measurement flow based on the measurement flow (or referred to as the detection flow, wherein the measurement flow is the target traffic flow) so as to detect the target traffic flow. Optionally, the controller enables a measurement flow learning function in each network node on the target transmission path, and the controller configures measurement instances of the target traffic flow in each head node on the target transmission path. The head node may send a target packet to the tail node through the target transmission path according to the measurement instance of the target traffic flow, and obtain detection information of the target traffic flow according to the sent target packet. The intermediate node and the tail node can both perform measurement flow learning according to the indication information of the target service flow carried by the received target message, and acquire the detection information of the target service flow according to the target message after learning that the target message belongs to the target service flow. Examples of the measurement of the target traffic flow may include traffic characteristics, detection types, detection periods, etc. of the target traffic flow. The traffic characteristics of the target traffic flow may include triplets, quintuples, etc. of the target traffic flow, and the detection type may include hop-by-hop detection or end-to-end detection. The embodiment of the present application is described by taking the example of configuring the measurement of the target traffic flow in the head node by the controller as an example, and in other embodiments, the measurement of the target traffic flow may also be configured in the head node by the command line, which is not limited in this embodiment of the present application.
In an alternative embodiment of the application, the detection of the target traffic is implemented based on the IFIT technique. In the process that the target message is transmitted through the target transmission path, each network node on the target transmission path can carry out monitoring statistics on the target service flow according to the target message so as to acquire detection information of the target service flow. Each network node on the target transmission path may send reporting information to the controller. The detection information of the target traffic flow acquired by each network node may include any possible detection information that can be acquired based on the IFIT technology or based on future expansion technology of IFIT, for example, but not limited to, at least one of the following: the method comprises the steps of determining the number of target messages received by a network node, the number of target messages sent by the network node, packet loss statistics of target service flows acquired by the network node, receiving time stamps of all target messages received by the network node, sending time stamps of all target messages sent by the network node, transmission delay of all target messages in the network node and average transmission delay of a plurality of target messages in the network node.
In another alternative embodiment of the application, the detection of the target traffic is implemented based on IOAM technology. In the process that the target message is transmitted through the target transmission path, each network node on the target transmission path can carry out monitoring statistics on the target service flow according to the target message so as to acquire detection information of the target service flow. The head node and the intermediate node on the target transmission path can encapsulate the acquired detection information of the target service flow in the target message and transmit the target message to the tail node, and the tail node sends reporting information to the controller. The report information sent by the tail node to the controller may include detection information of the target traffic flow acquired by each network node on the target transmission path. The detection information of the target traffic flow acquired by each network node may include any possible detection information that can be acquired based on the IOAM technology or based on the future expansion technology of the IOAM, for example, but not limited to, at least one of the following: the method comprises the steps of determining the number of target messages received by a network node, the number of target messages sent by the network node, packet loss statistics of target service flows acquired by the network node, receiving time stamps of all target messages received by the network node, receiving time stamps of all target messages sent by the network node, transmission delay of all target messages in the network node and average transmission delay of a plurality of target messages in the network node.
The embodiment of the application takes the case that the reported information sent by a plurality of network nodes on the target transmission path to the controller comprises the detection information of the target service flow as an example. In an alternative embodiment, if the resource of a certain network node on the target transmission path is insufficient to detect the target traffic flow, the network node may send resource deficiency information to the controller (or the report information sent by the network node to the controller includes resource deficiency information), so as to inform the controller that the resource of the network node is insufficient to detect the target traffic flow, where the controller may determine that the detection of the target traffic flow fails. If the resource of a certain network node on the target transmission path is insufficient to detect the target service flow, the network node can also send an alarm to prompt the staff that the resource of the network node is insufficient, the staff can combine the alarm prompt and the detection deployment of the target service flow to determine that the detection of the target service flow fails, and can also manually perform the intervention of the detection deployment of the target service flow. For example, the network node may present an alert prompt, which may include an indication of the target traffic flow and an indication of the network node.
S20, determining a detection result of the target service flow according to reporting information sent by a plurality of network nodes on the target transmission path and a tail node database of the target service flow, wherein the tail node database indicates a plurality of tail nodes on the target transmission path.
The controller may maintain a tail node database of the target traffic stream, the tail node database indicating a plurality of tail nodes on the target transmission path. For example, the plurality of tail nodes on the target transmission path are recorded in the tail node database. After the controller receives the report information sent by the plurality of network nodes on the target transmission path, the detection result of the target service flow can be determined according to the report information sent by the plurality of network nodes and the tail node database of the target service flow.
In the embodiment of the present application, according to the difference of a plurality of network nodes sending the report information to the controller and the difference of the report information sent by the plurality of network nodes (or according to the difference of the detection technologies based on the detection of the target service flow), the controller determines the detection result of the target service flow according to the report information sent by the plurality of network nodes and the tail node database of the target service flow, and may include the following two implementation manners.
The first implementation mode: the plurality of network nodes for sending the report information to the controller comprise q tail nodes on the target transmission path, the report information sent by the plurality of network nodes comprises detection information of target service flows acquired by the q tail nodes, and q is a positive integer. The controller can determine the detection result of the target service flow according to the detection information of the target service flow obtained by the q tail nodes and the tail node database of the target service flow. Optionally, the plurality of network nodes are q tail nodes, and the reported information sent by the q tail nodes includes detection information of the target traffic flow acquired by the q tail nodes, detection information of the target traffic flow acquired by the head node on the target transmission path, and detection information of the target traffic flow acquired by the intermediate node on the target transmission path. The first implementation may correspond to IOAM techniques.
Optionally, the detection information of the target service flow acquired by each of the q tail nodes includes a packet loss statistic value of the target service flow. The packet loss statistical value of the target service flow acquired by each tail node may include: and each tail node acquires a first packet loss statistical value from the received message belonging to the target service flow (namely the target message), and/or acquires a second packet loss statistical value according to the received message belonging to the target service flow by each tail node. The target packet may carry at least one first packet loss statistic value, where each first packet loss statistic value corresponds to a head node or an intermediate node on the target transmission path. The first packet loss statistic value corresponding to each head node may be obtained by the head node according to statistics of messages sent by the head node and belonging to the target service flow. The first packet loss statistic value corresponding to each intermediate node may be obtained by the intermediate node according to statistics of a message belonging to the target service flow received by the intermediate node and a message belonging to the target service flow sent by the intermediate node.
As an example, please refer to fig. 3, which shows a flowchart of a method for determining a detection result of a target traffic flow according to detection information of the target traffic flow obtained by q tail nodes and a tail node database of the target traffic flow according to an embodiment of the present application. As shown in fig. 3, the method includes the following substeps S201A to S202A.
S201A, determining the packet loss of the target service flow according to the packet loss statistical values of the target service flow obtained by the q tail nodes.
Optionally, the controller determines the sum of the packet loss statistics values obtained by the q tail nodes as the packet loss of the target service flow.
S202A, determining a detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database of the target service flow.
The second implementation mode: the method comprises the steps that a plurality of network nodes for sending reporting information to a controller comprise p head nodes and q tail nodes on a target transmission path, the reporting information sent by the network nodes comprises detection information of target service flows acquired by the p head nodes and detection information of the target service flows acquired by the q tail nodes, and p and q are positive integers. The controller may determine a detection result of the target traffic stream according to the detection information of the target traffic stream acquired by the p head nodes, the detection information of the target traffic stream acquired by the q tail nodes, and the tail node database of the target traffic stream. Optionally, the plurality of network nodes sending the report information to the controller further include an intermediate node on the target transmission path, and the report information sent by the plurality of network nodes further includes detection information of the target service flow acquired by the intermediate node. The second implementation may correspond to IFIT technology.
Optionally, the detection information of the target service flow acquired by each of the p head nodes includes the number of messages belonging to the target service flow sent by each head node, and the detection information of the target service flow acquired by each of the q tail nodes includes the number of messages belonging to the target service flow received by each tail node. As an example, please refer to fig. 4, which shows a flowchart of a method for determining a detection result of a target service flow according to detection information of the target service flow acquired by p head nodes, detection information of the target service flow acquired by q tail nodes, and a tail node database of the target service flow provided in an embodiment of the present application. The method includes the following steps S201B to S202B.
S201B, determining packet loss of the target service flow according to the number of messages belonging to the target service flow sent by the p head nodes and the number of messages belonging to the target service flow received by the q tail nodes.
Optionally, the controller determines the total number (e.g. called the first total number) of the messages sent by the p head nodes belonging to the target traffic stream according to the number of the messages sent by the p head nodes belonging to the target traffic stream. The controller determines the total number (for example, called a second total number) of the messages belonging to the target service flow received by the q tail nodes according to the number of the messages belonging to the target service flow received by the q tail nodes, and the controller determines the difference between the first total number and the second total number as the packet loss of the target service flow.
S202B, determining a detection result of the target service flow according to the packet loss of the target service flow, the packet loss condition and the tail node database of the target service flow.
In the two implementations of S20, the determining, by the controller, the detection result of the target traffic flow according to the packet loss of the target traffic flow, the packet loss condition, and the tail node database of the target traffic flow may include (that is, both S202A and S202B may include: when the packet loss of the target service flow meets the packet loss condition, the controller determines that the detection result of the target service flow is normal; and when the packet loss of the target service flow does not meet the packet loss condition, the controller determines the detection result of the target service flow according to the tail node database of the target service flow.
As one example, the packet loss condition includes that the packet loss is not greater than a packet loss threshold. The controller may determine whether the packet loss of the target traffic is greater than the packet loss threshold. If the packet loss of the target service flow is not greater than the packet loss threshold, the controller determines that the packet loss of the target service flow meets the packet loss condition. If the packet loss of the target service flow is larger than the packet loss threshold, the controller determines that the packet loss of the target service flow does not meet the packet loss condition. The packet loss threshold may be set according to actual situations, for example, the packet loss threshold is set according to a quality requirement of a service to which the target service flow belongs. For example, the packet loss threshold is 0, that is, the packet loss is not allowed for the service to which the target service flow belongs.
In an optional embodiment, the report information sent by the plurality of network nodes to the controller further includes indication information of q tail nodes, and when the packet loss of the target service flow does not meet the packet loss condition, the controller may determine a detection result of the target service flow according to the indication information of q tail nodes and the tail node database of the target service flow.
As an example, please refer to fig. 5, which shows a flowchart of a method for determining a detection result of a target traffic flow by a controller according to indication information of q tail nodes and a tail node database of the target traffic flow according to an embodiment of the present application. As shown in fig. 5, the method includes the following substeps S2021 to S2023.
S2021, determining whether q tail nodes are matched with tail nodes indicated by a tail node database of the target service flow according to the indication information of the q tail nodes. If the q tail nodes match the tail nodes indicated by the tail node database, S2022 is performed. If the q tail nodes do not match the tail nodes indicated by the tail node database, S2023 is performed.
Wherein, the matching of the q tail nodes with the tail nodes indicated by the tail node database may be: the q tail nodes are identical to the tail nodes indicated by the tail node database. That is, the tail nodes indicated by the tail node database are the q tail nodes. For example, the q tail nodes are the network node 103, the network node 104 and the network node 105, and the tail nodes indicated by the tail node database are also the network node 103, the network node 104 and the network node 105, so that the q tail nodes are the same as the tail nodes indicated by the tail node database, and the q tail nodes are matched with the tail nodes indicated by the tail node database.
Wherein, the mismatching of the q tail nodes with the tail nodes indicated by the tail node database may be: the q tail nodes are not identical to the tail nodes indicated by the tail node database. For example, at least one of the q tail nodes is not included in the plurality of tail nodes indicated by the tail node database, or the plurality of tail nodes indicated by the tail node database includes the q tail nodes and further includes tail nodes other than the q tail nodes. For example, the q tail nodes are network node 103, network node 104, and network node 105, the tail nodes indicated by the tail node database are network node 103 and network node 104, and since the network node 105 of the q tail nodes is not included in the plurality of tail nodes indicated by the tail node database, the q tail nodes are not identical to the tail nodes indicated by the tail node database, and the q tail nodes are not matched with the tail nodes indicated by the tail node database. As another example, the q tail nodes are the network node 103 and the network node 104, and the tail nodes indicated by the tail node database are the network node 103, the network node 104 and the network node 105, and since the plurality of tail nodes indicated by the tail node database include the q tail nodes and further include the network node 105 other than the q tail nodes, the q tail nodes are different from the tail nodes indicated by the tail node database, and the q tail nodes are not matched with the tail nodes indicated by the tail node database.
Optionally, the controller determines the q tail nodes according to the indication information of the q tail nodes, and then judges whether the q tail nodes are identical to the tail nodes indicated by the tail node database. If the q tail nodes are identical to the tail nodes indicated by the tail node database, the controller determines that the q tail nodes are matched with the tail nodes indicated by the tail node database, and the controller performs S2022. If the q tail nodes are not identical to the tail nodes indicated by the tail node database, the controller determines that the q tail nodes are not matched with the tail nodes indicated by the tail node database, and the controller performs S2023.
S2022, determining that the detection result of the target service flow is normal.
If the controller determines that q tail nodes for sending the reporting information are matched with the tail nodes indicated by the tail node database, it is indicated that all the tail nodes send the reporting information to the controller, and further it is indicated that the target transmission path is unchanged, the detection function of the tail nodes on the target transmission path is not invalid, and the controller determines that the detection result of the target service flow is normal.
S2023, acquiring an updated tail node database, and determining a detection result of the target service flow according to the indication information of the q tail nodes and the updated tail node database.
If the controller determines that the q tail nodes for sending the report information are not matched with the tail nodes indicated by the tail node database, the detection function of some tail nodes on the target transmission path is invalid or the target transmission path is changed. In order to ensure the accuracy of the detection result, the controller may acquire an updated tail node database, and determine the detection result of the target service flow according to the indication information of the q tail nodes and the updated tail node database. The implementation process of the controller obtaining the updated tail node database will be described below, where the implementation process of the controller determining the detection result of the target service flow according to the indication information of the q tail nodes and the updated tail node database is mainly described.
Optionally, the controller determines whether the q tail nodes are matched with the tail nodes indicated by the updated tail node database according to the indication information of the q tail nodes. If the q tail nodes are matched with the tail nodes indicated by the updated tail node database, the target transmission path is changed, and all the tail nodes on the changed target transmission path send report information to the controller, and the controller determines that the detection result of the target service flow is normal. If the q tail nodes are not matched with the tail nodes indicated by the updated tail node database, the detection function of some tail nodes on the target transmission path is invalid, and the controller determines that the detection result of the target service flow is abnormal. The implementation process of the controller in determining whether the q tail nodes are matched with the tail nodes indicated by the updated tail node database may refer to S2021, which is not described herein.
In summary, according to the transmission detection method provided by the embodiment of the present application, the controller may determine the detection result of the target traffic flow according to the reporting information sent by the plurality of network nodes on the target transmission path and the tail node database of the target traffic flow, where the target transmission path is the transmission path of the target traffic flow, and the tail node database indicates a plurality of tail nodes on the target transmission path, that is, the target transmission path is a point-to-multipoint path or a multipoint-to-multipoint path. Therefore, the application realizes the detection of the target service flow in the scene that the transmission path of the target service flow is a point-to-multipoint path or a multipoint-to-multipoint path. In addition, the controller can determine whether detection information acquired by all tail nodes on the transmission path of the target service flow is collected according to the tail node database of the target service flow, so that the influence on the accuracy of a detection result due to the change of the transmission path of the target service flow, the failure of the detection function of the tail nodes on the transmission path of the target service flow and the like is avoided, and the accuracy of the detection result is improved. In the application, the controller dynamically deploys the monitoring statistics based on the measurement flow learning, realizes the deployment of the flow-following measurement statistics based on the service flow dynamics, realizes the accurate measurement statistics of the point-to-multipoint and multipoint-to-multipoint flow, realizes the optimal utilization of statistical resources, and solves the problem of large-scale deployment of the flow-following measurement.
As an alternative embodiment, please refer to fig. 6, which illustrates a flowchart of another transmission detection method according to an embodiment of the present application. As shown in fig. 6, after S20, the method further includes the following step S30.
S30, outputting a detection result of the target service flow.
The controller can display the detection result of the target service flow in the visual interface; and/or the controller can broadcast the detection result of the target service flow in a voice mode.
For example, the controller may have a display component (e.g., a display) and/or an audio component (e.g., a speaker) through which the controller displays a visual interface including the detection result of the target traffic stream and/or through which the controller broadcasts the detection result of the target traffic stream.
For another example, the controller displays the detection result of the target traffic flow by means of a display device connected to the controller. And/or the controller reports the detection result of the target service flow by means of the audio equipment connected with the controller.
The embodiment of the application takes the detection result of the target service flow as normal or abnormal as an example. In other embodiments, the detection result of the target traffic flow may further include transmission quality of the target traffic flow, such as, but not limited to, packet loss rate, transmission delay, and the like of the target traffic flow. The packet loss of the target service flow may be the packet loss of the target service flow on the target transmission path, or the packet loss of the target service flow on a link between some two network nodes. The packet loss rate of the target service flow may be the packet loss rate of the target service flow on the target transmission path, or the packet loss rate of the target service flow on a link between some two network nodes. The transmission delay of the target service flow may be the transmission delay of the target service flow on the target transmission path, the transmission delay of the target service flow on a link between some two network nodes, or the transmission delay of the target service flow in some one or some network nodes. In general, the target traffic flow includes a plurality of packets, and the transmission delay of the target traffic flow may be a statistical value obtained based on the plurality of packets of the target traffic flow, for example, an average transmission delay, which is not limited in the embodiment of the present application.
As an alternative embodiment, please continue with fig. 6, the method further includes the following step S40 before S20.
S40, acquiring a tail node database of the target service flow.
The controller may acquire the tail node database of the target traffic stream by probing the target transmission path before performing the detection of the target traffic stream. The controller may also obtain a tail node database of the target traffic stream according to the report information sent by the plurality of network nodes on the target transmission path in the process of detecting the target traffic stream. Thus, the controller's acquisition of the tail node database of the target traffic stream may include the following two implementations.
The first implementation mode: the controller acquires a tail node database of the target service flow by detecting the target transmission path. Optionally, the controller acquires path detection information of the target transmission path, and acquires a tail node database of the target traffic flow according to the path detection information of the target transmission path.
The controller may control the head node on the target transmission path to send a probe packet through the target transmission path, where the probe packet may carry indication information of the target traffic flow. Each intermediate node on the target transmission path may forward the probe message. Each tail node on the target transmission path can acquire the detection information according to the detection message. The probe information acquired by each tail node may include indication information of the target traffic flow and indication information of each tail node.
In an alternative embodiment, each tail node on the target transmission path sends the probe information acquired by each tail node to the controller, the path probe information acquired by the controller includes probe information sent by a plurality of tail nodes on the target transmission path, and the controller acquires a tail node database of the target traffic flow according to the probe information sent by the plurality of tail nodes. For example, the controller determines that each tail node is a tail node on the target transmission path according to the indication information of the target traffic flow included in the probe information sent by each tail node and the indication information of each tail node, and the controller can determine the plurality of tail nodes on the target transmission path according to the probe information sent by the plurality of tail nodes, so that the controller obtains (e.g. constructs) a tail node database of the target traffic flow according to the determined plurality of tail nodes. Wherein the tail node may send probe information to the controller via BGP, NETCONF, PCEP or other proprietary protocol.
In another alternative embodiment, after each tail node on the target transmission path acquires the probe information, the probe information is sent to the head node, and the head node sends the probe information to the controller. The path detection information acquired by the controller comprises detection information sent by at least one head node on the target transmission path, and the controller acquires a tail node database of the target service flow according to the detection information sent by the at least one head node. Wherein the probe information sent by each of the at least one head node includes indication information of the target traffic flow and indication information of at least one tail node on the target transmission path. For example, the controller determines that the at least one tail node is a tail node on the target transmission path according to the indication information of the target traffic flow and the indication information of the at least one tail node, which are included in the probe information sent by each head node; the controller can determine a plurality of tail nodes on the target transmission path according to the detection information sent by the at least one head node; and the controller further obtains (e.g., builds) a tail node database of the target traffic stream based on the determined plurality of tail nodes. Wherein the head node may send probe information to the controller via BGP, NETCONF, PCEP or other proprietary protocol.
In yet another alternative embodiment, after each tail node on the target transmission path acquires the probe information, the acquired probe information is sent to the head node, and the head node constructs a tail node database of the target traffic flow according to the probe information sent by the plurality of tail nodes, and sends the probe information including the tail node database to the controller. The path detection information acquired by the controller may include detection information sent by a head node on the target transmission path, and the controller acquires a tail node database of the target traffic flow according to the detection information sent by the head node. For example, the controller determines the tail node database included in the probe information sent by the head node as the tail node database of the target traffic flow. Wherein the head node may send probe information to the controller via BGP, NETCONF, PCEP or other proprietary protocol. The implementation process of constructing the tail node database of the target service flow by the head node according to the detection information sent by the plurality of tail nodes can refer to the implementation process of constructing the tail node database of the target service flow by the controller according to the detection information sent by the plurality of tail nodes, which is not described herein.
The second implementation mode: the controller obtains a tail node database of the target service flow according to the report information sent by the plurality of network nodes on the target transmission path, wherein the report information sent by at least one network node in the plurality of network nodes comprises the indication information of the target service flow and the indication information of at least one tail node on the target transmission path.
In the process of detecting the target traffic flow, the plurality of network nodes on the target transmission path may send report information to the controller, and the report information sent by at least one network node of the plurality of network nodes to the controller may include indication information of the target traffic flow and indication information of at least one tail node on the target transmission path. The controller may determine that the at least one tail node is a tail node on the target transmission path according to the indication information of the target traffic flow and the indication information of the at least one tail node included in the report information sent by each network node in the at least one network node, and may determine a plurality of tail nodes on the target transmission path according to the report information sent by the at least one network node, so that the controller obtains (e.g. constructs) a tail node database of the target traffic flow according to the determined plurality of tail nodes. For example, the at least one network node includes a plurality of tail nodes on the target transmission path, and the reporting information sent by each tail node in the plurality of tail nodes to the controller may include the indication information of the target traffic flow and the indication information of each tail node, which is not limited in the embodiment of the present application.
The two implementations described above for obtaining the tail node database are merely exemplary, and in other embodiments, the tail node database of the target traffic stream may be configured on the controller by an administrator. For example, the administrator determines the tail node on the transmission path of the target traffic flow according to the network topology or the path calculation result, and configures the tail node database of the target traffic flow on the controller according to the tail node on the transmission path of the target traffic flow. The tail node database configured by the administrator may be an initial tail node database, and the controller may update the tail node database of the target traffic stream subsequently when the update condition is satisfied. The implementation process of updating the tail node database of the target traffic flow by the controller will be described below, and will not be described in detail here. In addition, the controller may acquire the tail node database of the target service flow in any other realizable manner, and the embodiment of the present application does not limit the implementation manner of the controller for acquiring the tail node database.
As an alternative embodiment, please continue with fig. 6, after S40, the method further includes the following step S50.
S50, updating the tail node database of the target service flow when the updating condition is met.
After the controller acquires the tail node database of the target service flow, whether the update condition is met or not can be judged, and when the update condition is met, the controller updates the tail node database of the target service flow.
Wherein the update condition includes at least one of the following four conditions:
condition 1: and determining that the packet loss of the target service flow meets the packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path.
Condition 2: and detecting information of the target service flow, which is acquired by at least one tail node and is indicated by the tail node database of the target service flow, is not received within the appointed duration.
Condition 3: the reported information sent by the plurality of network nodes on the target transmission path comprises detection information of the target service flow acquired by the plurality of tail nodes, and the plurality of tail nodes are not matched with the tail nodes indicated by the tail node database of the target service flow
Condition 4: the periodic update condition is satisfied.
According to different updating conditions, the method for updating the tail node database of the target service flow by the controller is different. The following describes the process of updating the tail node database of the target traffic flow by the controller in four cases.
Case 1: when determining that the packet loss of the target service flow meets the packet loss condition according to the reporting information sent by the plurality of network nodes on the target transmission path, the controller updates the tail node database of the target service flow according to the reporting information sent by the plurality of network nodes. The report information sent by at least one network node in the plurality of network nodes comprises indication information of a target service flow and indication information of at least one tail node on a target transmission path.
For example, the packet loss condition includes that the packet loss is not greater than a packet loss threshold. The controller can determine the packet loss of the target service flow according to the report information sent by the plurality of network nodes on the target transmission path, and judge whether the packet loss of the target service flow is greater than the packet loss threshold. If the packet loss of the target service flow is not greater than the packet loss threshold, the packet loss of the target service flow is smaller, even no packet loss is caused, and the controller updates the tail node database of the target service flow according to the reporting information sent by the network nodes. For example, the report information sent by at least one network node of the plurality of network nodes to the controller includes indication information of the target traffic flow and indication information of at least one tail node on the target transmission path, the controller determines that the at least one tail node is a tail node on the target transmission path according to the indication information of the target traffic flow and the indication information of the at least one tail node included in the report information sent by each network node of the at least one network node, and the controller can determine the plurality of tail nodes on the target transmission path according to the report information sent by the at least one network node, and then the controller updates the tail node database of the target traffic flow according to the determined plurality of tail nodes.
Case 2: and when the detection information of the target service flow, which is acquired by at least one tail node and indicated by the tail node database of the target service flow, is not received within the appointed time length, the controller deletes the at least one tail node from the tail node database.
After the controller obtains the tail node database of the target service flow, it may determine whether detection information of the target service flow obtained by each tail node indicated by the tail node database is received within a specified duration, for example, the controller determines whether the report information received within the specified duration includes detection information of the target service flow obtained by each tail node indicated by the tail node database. If the detection information of the target service flow acquired by at least one tail node indicated by the tail node database is not received within the appointed time length, the controller deletes the at least one tail node from the tail node database so as to update the tail node database. The designated duration may be set according to the transmission requirement of the target service flow.
For example, the end nodes indicated by the end node database of the target traffic flow are the network node 103, the network node 104 and the network node 105, and if the controller determines that the detection information of the target traffic flow acquired by the network node 103 is not received within the specified duration, the controller deletes the network node 103 from the end node database to obtain an updated end node database, where the end nodes indicated by the updated end node database are the network node 104 and the network node 105.
Case 3: and when the plurality of tail nodes are not matched with the tail nodes indicated by the tail node database of the target service flow, the controller updates the tail node database of the target service flow according to the path detection information of the target transmission path.
The detection of the target traffic may be performed periodically, and in each detection period, the network node on the target transmission path may send report information to the controller, and the report information sent by each network node to the controller may include detection information of the target traffic acquired by at least one network node on the target transmission path. In each detection period, the controller may determine whether the report information sent by the plurality of network nodes on the target transmission path includes detection information of the target traffic flow acquired by the tail node. If the reported information sent by the plurality of network nodes comprises detection information of the target service flow acquired by the plurality of tail nodes, the controller judges whether the plurality of tail nodes are matched with the tail nodes indicated by the tail node database of the target service flow. If the plurality of tail nodes do not match the tail nodes indicated by the tail node database of the target traffic stream, the controller updates the tail node database of the target traffic stream by probing the target transmission path. For example, the controller updates the tail node database of the target traffic flow according to the path detection information of the target transmission path. Optionally, the controller reconstructs a tail node database of the target traffic flow according to the path detection information of the target transmission path, and the reconstructed tail node database is adopted to cover the original tail node database. The controller may refer to the first implementation manner in S40 for reconstructing the tail node database of the target traffic stream according to the path detection information of the target transmission path, which is not described herein.
Case 4: and when the periodic updating condition is met, the controller updates the tail node database of the target service flow according to the path detection information of the target transmission path.
The controller may periodically update the tail node database of the target traffic stream. After the controller obtains the tail node database of the target traffic stream, it may detect whether a periodic update condition is met (e.g., whether an update period is reached). If the periodic update condition is satisfied, the controller updates the tail node database of the target traffic flow by probing the target transmission path. For example, the controller updates the tail node database of the target traffic flow according to the path detection information of the target transmission path.
According to the technical scheme provided by the embodiment of the application, the controller updates the tail node database of the target service flow when the updating condition is met, so that the influence on the accuracy of the detection result due to the change of the target transmission path, the failure of the detection function of some tail nodes on the target transmission path and the like can be avoided.
The foregoing describes a transmission detection method provided by an embodiment of the present application, and the following describes an embodiment of the apparatus of the present application. The transmission detection apparatus of the present application may be used to perform the transmission detection method of the present application. For details not disclosed in the embodiments of the transmission detection apparatus of the present application, please refer to the embodiments of the transmission detection method of the present application.
Fig. 7 is a schematic structural diagram of a transmission detection apparatus 700 according to an embodiment of the application. The transmission detection apparatus 700 may be applied to a controller. For example, the transmission detection apparatus 700 is a controller or a functional component in a controller. Referring to fig. 7, the transmission detection apparatus 700 may include, but is not limited to:
the receiving module 710 is configured to receive report information sent by a plurality of network nodes on a target transmission path, where the target transmission path is a transmission path of a target traffic flow, and the report information includes detection information of the target traffic flow. The functional implementation of the receiving module 710 may refer to the relevant description in S10 above.
The determining module 720 is configured to determine a detection result of the target traffic flow according to the reporting information sent by the plurality of network nodes and a tail node database of the target traffic flow, where the tail node database indicates a plurality of tail nodes on the target transmission path. The functional implementation of the determining module 720 may refer to the relevant description in S20 above.
Optionally, please continue to refer to fig. 7, the transmission detection apparatus 700 further includes:
an obtaining module 730, configured to obtain the tail node database. The functional implementation of the acquisition module 730 may refer to the relevant description in S40 above.
Optionally, the acquiring module 730 is configured to acquire the tail node database according to path detection information of the target transmission path.
Optionally, the path detection information includes detection information sent by a plurality of tail nodes on the target transmission path, and the detection information sent by each tail node in the plurality of tail nodes includes indication information of the target traffic flow and indication information of each tail node; and an obtaining module 730, configured to obtain the tail node database according to the probe information sent by the plurality of tail nodes.
Optionally, the path detection information includes detection information sent by at least one head node on the target transmission path, where the detection information includes indication information of the target traffic flow and indication information of at least one tail node on the target transmission path; and an obtaining module 730, configured to obtain the tail node database according to the probe information sent by the at least one head node.
Optionally, the path detection information includes detection information sent by a head node on the target transmission path, where the detection information includes a tail node database; and the acquiring module 730 is configured to acquire the tail node database according to the probe information sent by the head node.
Optionally, the acquiring module 730 is configured to acquire the tail node database according to the report information sent by the plurality of network nodes on the target transmission path, where the report information sent by at least one network node in the plurality of network nodes includes the indication information of the target traffic flow and the indication information of at least one tail node on the target transmission path.
Optionally, the plurality of network nodes include q tail nodes, the reported information sent by the plurality of network nodes includes detection information of the target service flows acquired by the q tail nodes, and q is a positive integer; the determining module 720 is configured to determine a detection result of the target service flow according to the detection information of the target service flow obtained by the q tail nodes and the tail node database.
Optionally, the detection information of the target service flow acquired by each tail node of the q tail nodes includes a packet loss statistic value of the target service flow, and the packet loss statistic value of the target service flow acquired by each tail node includes: each tail node obtains a first packet loss statistical value from a received message belonging to a target service flow, and/or each tail node obtains a second packet loss statistical value according to the received message belonging to the target service flow; a determining module 720, configured to: determining the packet loss of the target service flow according to the packet loss statistical values of the target service flow acquired by the q tail nodes; and determining the detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database.
Optionally, the plurality of network nodes include p head nodes and q tail nodes, the reported information sent by the plurality of network nodes includes detection information of the target service flows acquired by the p head nodes and detection information of the target service flows acquired by the q tail nodes, and p and q are positive integers; the determining module 720 is configured to determine a detection result of the target traffic flow according to the detection information of the target traffic flow acquired by the p head nodes, the detection information of the target traffic flow acquired by the q tail nodes, and the tail node database.
Optionally, the detection information of the target service flow acquired by each of the p head nodes includes the number of messages belonging to the target service flow sent by each head node, and the detection information of the target service flow acquired by each of the q tail nodes includes the number of messages belonging to the target service flow received by each tail node; a determining module 720, configured to: determining the packet loss of the target service flow according to the number of messages belonging to the target service flow sent by the p head nodes and the number of messages belonging to the target service flow received by the q tail nodes; and determining the detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database.
Optionally, the determining module 720 is configured to: when the packet loss of the target service flow meets the packet loss condition, determining that the detection result of the target service flow is normal; and when the packet loss of the target service flow does not meet the packet loss condition, determining a detection result of the target service flow according to the tail node database.
Optionally, the report information sent by the plurality of network nodes further includes indication information of the q tail nodes; a determining module 720, configured to: determining whether the q tail nodes are matched with tail nodes indicated by the tail node database according to the indication information of the q tail nodes; if the q tail nodes are matched with the tail nodes indicated by the tail node database, determining that the detection result of the target service flow is normal; if the q tail nodes are not matched with the tail nodes indicated by the tail node database, an updated tail node database is obtained, and a detection result of the target service flow is determined according to the indication information of the q tail nodes and the updated tail node database.
Optionally, the determining module 720 is configured to: determining whether the q tail nodes are matched with tail nodes indicated by an updated tail node database according to the indication information of the q tail nodes; if the q tail nodes are matched with the tail nodes indicated by the updated tail node database, determining that the detection result of the target service flow is normal; if the q tail nodes are not matched with the tail nodes indicated by the updated tail node database, determining that the detection result of the target service flow is abnormal.
Optionally, please continue to refer to fig. 7, the transmission detection apparatus 700 further includes: an updating module 740, configured to update the tail node database when the updating condition is satisfied;
wherein the update condition includes at least one of:
determining that the packet loss of the target service flow meets the packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path;
the detection information of the target service flow acquired by at least one tail node indicated by the tail node database is not received within the appointed duration;
the reported information sent by the network nodes on the target transmission path comprises detection information of target service flows acquired by the tail nodes, and the tail nodes are not matched with the tail nodes indicated by the tail node database;
The periodic update condition is satisfied.
The update module 740 may be implemented as described above with reference to S50.
Optionally, an updating module 740 is configured to:
updating the tail node database according to the reported information sent by the plurality of network nodes when the packet loss of the target service flow meets the packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path, wherein the reported information sent by at least one network node in the plurality of network nodes comprises the indication information of the target service flow and the indication information of at least one tail node on the target transmission path;
deleting at least one tail node from the tail node database when the detection information of the target service flow acquired by the at least one tail node indicated by the tail node database is not received within the appointed time length;
the method comprises the steps that when reported information sent by a plurality of network nodes on a target transmission path comprises detection information of target service flows acquired by a plurality of tail nodes, the tail nodes are not matched with tail nodes indicated by a tail node database, the tail node database is updated according to path detection information of the target transmission path;
and when the periodic updating condition is met, updating the tail node database according to the path detection information of the target transmission path.
Optionally, please continue to refer to fig. 7, the transmission detection apparatus 700 further includes: and the output module 750 is configured to output a detection result of the target traffic flow. The implementation process of the output module 750 may refer to S30 described above.
In summary, in the transmission detection apparatus provided in the embodiment of the present application, the controller may determine the detection result of the target traffic flow according to the reporting information sent by the plurality of network nodes on the target transmission path and the tail node database of the target traffic flow, where the target transmission path is a transmission path of the target traffic flow, and the tail node database indicates a plurality of tail nodes on the target transmission path, that is, the target transmission path is a point-to-multipoint path or a multipoint-to-multipoint path. Therefore, the application realizes the detection of the target service flow in the scene that the transmission path of the target service flow is a point-to-multipoint path or a multipoint-to-multipoint path. In addition, the controller can determine whether detection information acquired by all tail nodes on the transmission path of the target service flow is collected according to the tail node database of the target service flow, so that the influence on the accuracy of a detection result due to the change of the transmission path of the target service flow, the failure of the detection function of the tail nodes on the transmission path of the target service flow and the like is avoided, and the accuracy of the detection result is improved.
The transmission detection apparatus provided by the embodiment of the application can also be implemented by an application-specific integrated circuit (application-specific integrated circuit, ASIC) or a programmable logic device (programmable logic device, PLD). The PLD may be a complex program logic device (complex programmable logical device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), general-purpose array logic (generic array logic, GAL), or any combination thereof. The transmission detection method provided by the above method embodiment may also be implemented by software, and when the transmission detection method provided by the above method embodiment is implemented by software, each module in the transmission detection apparatus may also be a software module.
Referring to fig. 8, a schematic structural diagram of another transmission detection apparatus 800 according to an embodiment of the application is shown, and the transmission detection apparatus 800 may be a controller. Referring to fig. 8, the transmission detecting apparatus 800 includes:
a processor 801 and a memory 802, the memory 801 and the memory 802 being connected via a bus 803. Fig. 8 illustrates the processor 801 and the memory 802 independently of each other. The processor 801 and the memory 802 may also be integrated.
The memory 802 is used to store, among other things, a computer program that includes an operating system and program code. The Memory 802 is a variety of types of storage media, such as, for example, the Memory 802 is a random access Memory (random access Memory, RAM), a read-only Memory (ROM), a non-volatile random access Memory (non-volatile random access Memory, NVRAM), a programmable read-only Memory (programmable read-only Memory, PROM), an erasable programmable read-only Memory (erasable programmable read-only Memory, EPROM), an electrically erasable programmable read-only Memory (electrically erasable programmable read-only Memory, EEPROM), a read-only disk (compact disc read-only Memory, CD-ROM), a flash Memory, a register, an optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), a magnetic disk, or other magnetic storage device.
Wherein the processor 801 is a general purpose processor or a special purpose processor. A general-purpose processor is a processor that performs certain steps and/or operations by reading and executing computer programs stored in a memory (e.g., memory 802), which may be used in the process of performing the steps and/or operations described above. The computer program is executed, for example, to implement the relevant functions of the aforementioned determination module 720, acquisition module 730, and update module 740. A general purpose processor such as, but not limited to, a central processing unit (central processing unit, CPU). A special purpose processor is a specially designed processor for performing certain steps and/or operations, such as, but not limited to, a digital signal processor (digital signal processor, DSP), ASIC, CPLD, FPGA, GAL, or any combination thereof. The processor 801 may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. The processor 801 comprises at least one circuit to perform all or part of the steps of the above embodiments providing a transmission detection method.
Optionally, the transmission detection apparatus 800 further comprises a network interface 804, the network interface 804 being connected to the processor 801 and the memory 802 by a bus 803. The network interface 804 enables the transmission detection apparatus 800 to communicate with other devices. The network interface 804 is capable of implementing the functions associated with the receiving module 710 described above.
Optionally, the transmission detection apparatus 800 further comprises an input/output (I/O) interface 805, and the I/O interface 805 is connected to the processor 801 and the memory 802 through the bus 803. The processor 801 can receive input commands or data, etc., through the I/O interface 805. The I/O interface 805 is used to connect the transmission detecting apparatus 800 to input devices, such as a keyboard, a mouse, and the like.
Optionally, the transmission detection apparatus 800 further comprises a display 806, the display 806 being connected to the processor 801 and the memory 802 via the bus 803. The display 806 can be used to display intermediate and/or final results, etc., produced by the processor 801 performing the transmission detection methods described above. For example, the display 806 is configured to output a detection result of the target traffic. In a possible implementation, the display 806 is a touch-sensitive display screen to provide a human-machine interaction interface. The display 806 may be capable of performing the functions associated with the output module 710 described above.
Optionally, in some possible scenarios, the above-described network interface 804 and I/O interface 805 are collectively referred to as a communication interface. In addition, the communication interface further includes a transceiver for receiving and transmitting information, which is not limited in the embodiment of the present application.
The bus 803 is any type of communication bus for interconnecting the internal devices of the transmission detection apparatus 800. Such as a system bus. The embodiment of the present application is described by taking the example that the devices inside the transmission detecting apparatus 800 are interconnected by the bus 803, the devices inside the transmission detecting apparatus 800 may also be communicatively connected to each other by other connection manners besides the bus 803, for example, the devices inside the transmission detecting apparatus 800 are interconnected by a logic interface inside the transmission detecting apparatus 800.
The above devices may be provided on separate chips, or may be provided at least partially or entirely on the same chip. Whether the individual devices are independently disposed on different chips or integrally disposed on one or more chips is often dependent on the needs of the product design. The embodiment of the application does not limit the specific implementation form of the device.
The transmission detection apparatus 800 shown in fig. 8 is merely exemplary, and in implementation, the transmission detection apparatus 800 includes other components, which are not listed herein. The transmission detecting apparatus 800 shown in fig. 8 may perform transmission detection on a target traffic stream by performing all or part of the steps of the transmission detecting method provided in the above-described embodiments.
Fig. 9 is a schematic diagram illustrating a transmission detection apparatus 900 according to another embodiment of the application. The transmission detection apparatus 900 may be a network node or a functional component in a network node. The transmission detection apparatus 900 includes: a main control board 910, an interface board 930, and an interface board 940. The plurality of interface boards also comprises, in the case of a plurality of interface boards, a switching network board (not shown in fig. 9) for completing the data exchange between the interface boards (interface boards are also called line cards or service boards).
The main control board 910 is used for performing functions such as system management, device maintenance, and protocol processing. The interface board 930 and the interface board 940 are used to provide various service interfaces (e.g., POS interface, GE interface, ATM interface, etc.) and to implement message forwarding. The main control board 910 mainly has 3 kinds of functional units: the system comprises a system management control unit, a system clock unit and a system maintenance unit. The main control board 910, the interface board 930 and the interface board 940 are connected to the system back board through a system bus to realize intercommunication. The interface board 930 includes one or more processors 931 thereon. The processor 931 is used for controlling and managing the interface board 930 and communicating with the central processor 912 on the main control board 910. A memory 932 on interface board 930 is used to store forwarding tables and the like. The interface board 930 includes one or more network interfaces 933 for receiving and transmitting messages. The specific implementation process is not repeated here one by one. As shown in fig. 9, the main control board 910 further includes a memory 914, where the memory 914 is used to store system management information, protocols, and the like, which is not limited by the embodiment of the present application.
As shown in fig. 9, the present embodiment includes a plurality of interface boards, and a distributed forwarding mechanism is used, where the operations on the interface board 940 are substantially similar to those of the interface board 930. For example, interface board 940 includes one or more network interfaces 943 for receiving and transmitting messages, memory 942 for storing forwarding tables, and a processor 941 for controlling and managing interface board 940 and communicating with central processor 912 on main control board 910. For brevity, the interface board 940 will not be described in detail herein.
The processor 931 in the interface board 930 and/or the processor 941 in the interface board 940 in fig. 9 may be dedicated hardware or chips, such as network processors or application-specific integrated circuits, to implement the functions described above, which is a so-called forwarding plane that uses dedicated hardware or chip processing. In other embodiments, the processor 931 in the interface board 930 and/or the processor 941 in the interface board 940 may also employ a general purpose processor, such as a CPU.
In addition, it should be noted that the master control board may have one or more pieces, and the master control board may include a main master control board and a standby master control board when there are more pieces. The interface boards may have one or more blocks, the more data processing capabilities the network nodes are, the more interface boards are provided. Under the condition of a plurality of interface boards, the interface boards can communicate through one or a plurality of exchange network boards, and load sharing redundancy backup can be realized jointly when a plurality of interface boards exist. Under the centralized forwarding architecture, the network node may not need to exchange network boards, and the interface board bears the processing function of the service data of the whole system. Under the distributed forwarding architecture, the network node comprises a plurality of interface boards, and data exchange among the plurality of interface boards can be realized through the exchange network board, so that high-capacity data exchange and processing capacity are provided. Therefore, the data access and processing power of the network nodes of the distributed architecture is greater than that of the network nodes of the centralized architecture. Which architecture is specifically adopted depends on the networking deployment scenario, and no limitation is made here.
In alternative embodiments, memory 932 and/or memory 942 may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disks, laser disks, optical disks, digital versatile disks, blu-ray disks, etc.), magnetic disks or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 932 may be provided separately, coupled to the processor 931 via a communication bus, or may be integrated with the processor 931. The memory 942 may be implemented within the processor 941 itself or it can be integral to the processor 941.
The memory 932 is for storing program codes and is controlled to be executed by the processor 931 to perform part or all of the steps of the transmission detection method provided by the above-described embodiment. The processor 931 is configured to execute program code stored in the memory 932. One or more software modules may be included in the program code. The one or more software modules may be the functional modules provided in the embodiment shown in fig. 6 described above. The memory 942 may also be used for storing program codes and is controlled to be executed by the processor 941 to perform part or all of the steps of the transmission detecting method provided in the above embodiments. Similarly, the memory 914 may also be used to store program codes and be controlled by the cpu 912 to perform part or all of the steps of the transmission detection method provided in the above embodiment.
In alternative embodiments, the network interfaces 933, 943 may be devices using any type of transceiver for communicating with other devices or communication networks, such as ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), etc.
The present application provides a computer-readable storage medium having stored therein a computer program which, when executed (e.g., by a transmission detection apparatus, a controller, one or more processors, etc.), performs all or part of the steps of the method provided by the method embodiments described above.
Embodiments of the present application provide a computer program product comprising a program or code which, when executed (e.g. by a transmission detection apparatus, a controller, one or more processors, etc.), performs all or part of the steps of a method as provided by the method embodiments described above.
Embodiments of the present application provide a chip comprising programmable logic circuits and/or program instructions, which when executed is adapted to carry out all or part of the steps of the method as provided by the method embodiments described above.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be embodied in whole or in part in the form of a computer program product comprising one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a network of computers, or other programmable devices. The computer instructions may be stored in or transmitted from one computer readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital subscriber line) or wireless (e.g., infrared, wireless, microwave, etc.) means from one website, computer, server, or data center. The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers, data centers, etc. that can be integrated with the available medium. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), optical medium, or semiconductor medium (e.g., solid state disk), etc.
It should be understood that the term "at least one" in the present application means one or more, and "a plurality" means two or more. In the present application, "/" means or, unless otherwise indicated, for example, A/B may mean A or B. The "and/or" in the present application is merely an association relationship describing the association object, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist together, and B exists alone. In addition, for the purpose of clarity of description, the words "first," "second," "third," and the like are used herein to distinguish between identical or similar items that have substantially the same function and effect. Those skilled in the art will appreciate that the words "first," "second," "third," etc. do not limit the number and order of execution.
Different types of embodiments, such as a method embodiment and a device embodiment, provided by the embodiment of the application can be mutually referred. The sequence of the operations of the method embodiment provided by the embodiment of the application can be properly adjusted, the operations can also be increased or decreased according to the situation, and any method which is easily conceivable to be changed by a person skilled in the art within the technical scope of the disclosure of the application is covered in the protection scope of the application, so that the description is omitted.
In the corresponding embodiments provided in the present application, it should be understood that the disclosed apparatus and the like may be implemented by other structural means. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of modules is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not performed.
The elements illustrated as separate elements may or may not be physically separate, and elements described as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network nodes. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
While the application has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made without departing from the spirit and scope of the application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (38)

1. A transmission detection method, applied to a controller, the method comprising:
receiving reporting information sent by a plurality of network nodes on a target transmission path, wherein the target transmission path is a transmission path of a target service flow, and the reporting information comprises detection information of the target service flow;
and determining a detection result of the target service flow according to the reporting information sent by the network nodes and a tail node database of the target service flow, wherein the tail node database indicates a plurality of tail nodes on the target transmission path.
2. The method of claim 1, wherein prior to determining the detection result of the target traffic flow based on the reporting information sent by the plurality of network nodes and the tail node database of the target traffic flow, the method further comprises: and acquiring the tail node database.
3. The method of claim 2, wherein the obtaining the tail node database comprises:
and acquiring the tail node database according to the path detection information of the target transmission path.
4. The method of claim 3, wherein the path probe information comprises probe information sent by a plurality of tail nodes on the target transmission path, the probe information sent by each tail node of the plurality of tail nodes comprising indication information of the target traffic flow and indication information of each tail node;
The obtaining the tail node database according to the path detection information of the target transmission path includes:
and acquiring the tail node database according to the detection information sent by the plurality of tail nodes.
5. A method according to claim 3, wherein the path probing information comprises probing information sent by at least one head node on the target transmission path, the probing information comprising indication information of the target traffic stream and indication information of at least one tail node on the target transmission path;
the obtaining the tail node database according to the path detection information of the target transmission path includes:
and acquiring the tail node database according to the detection information sent by the at least one head node.
6. A method according to claim 3, wherein the path probe information comprises probe information sent by a head node on the target transmission path, the probe information comprising the tail node database;
the obtaining the tail node database according to the path detection information of the target transmission path includes:
and acquiring the tail node database according to the detection information sent by the head node.
7. The method of claim 2, wherein the obtaining the tail node database comprises:
and acquiring the tail node database according to the report information sent by the network nodes on the target transmission path, wherein the report information sent by at least one network node in the network nodes comprises the indication information of the target service flow and the indication information of at least one tail node on the target transmission path.
8. The method according to any one of claims 1 to 7, wherein the plurality of network nodes includes q tail nodes, and the reported information sent by the plurality of network nodes includes detection information of the target traffic flow acquired by the q tail nodes, where q is a positive integer;
the determining the detection result of the target service flow according to the report information sent by the plurality of network nodes and the tail node database of the target service flow comprises the following steps:
and determining the detection result of the target service flow according to the detection information of the target service flow acquired by the q tail nodes and the tail node database.
9. The method according to any one of claims 1 to 7, wherein the plurality of network nodes includes p head nodes and q tail nodes, the reported information sent by the plurality of network nodes includes detection information of the target traffic flow acquired by the p head nodes and detection information of the target traffic flow acquired by the q tail nodes, and p and q are both positive integers;
The determining the detection result of the target service flow according to the report information sent by the plurality of network nodes and the tail node database of the target service flow comprises the following steps:
and determining a detection result of the target service flow according to the detection information of the target service flow acquired by the p head nodes, the detection information of the target service flow acquired by the q tail nodes and the tail node database.
10. The method of claim 8, wherein the detection information of the target traffic flow acquired by each of the q tail nodes includes a packet loss statistic of the target traffic flow, and wherein the packet loss statistic of the target traffic flow acquired by each tail node includes: each tail node acquires a first packet loss statistical value from a received message belonging to the target service flow, and/or acquires a second packet loss statistical value according to the received message statistics of the target service flow;
the determining the detection result of the target service flow according to the detection information of the target service flow obtained by the q tail nodes and the tail node database includes:
Determining the packet loss of the target service flow according to the packet loss statistical values of the target service flow obtained by the q tail nodes;
and determining a detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database.
11. The method according to claim 9, wherein the detection information of the target traffic flow acquired by each of the p head nodes includes the number of messages belonging to the target traffic flow sent by each of the p head nodes, and the detection information of the target traffic flow acquired by each of the q tail nodes includes the number of messages belonging to the target traffic flow received by each of the q tail nodes;
the determining the detection result of the target service flow according to the detection information of the target service flow acquired by the p head nodes, the detection information of the target service flow acquired by the q tail nodes and the tail node database includes:
determining the packet loss of the target service flow according to the number of messages belonging to the target service flow sent by the p head nodes and the number of messages belonging to the target service flow received by the q tail nodes;
And determining a detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database.
12. The method according to claim 10 or 11, wherein the determining the detection result of the target traffic flow according to the packet loss amount of the target traffic flow, the packet loss amount condition, and the tail node database includes:
when the packet loss amount of the target service flow meets the packet loss amount condition, determining that the detection result of the target service flow is normal;
and when the packet loss amount of the target service flow does not meet the packet loss amount condition, determining a detection result of the target service flow according to the tail node database.
13. The method of claim 12, wherein the reported information sent by the plurality of network nodes further comprises indication information of the q tail nodes;
the determining the detection result of the target service flow according to the tail node database comprises the following steps:
determining whether the q tail nodes are matched with tail nodes indicated by the tail node database according to the indication information of the q tail nodes;
if the q tail nodes are matched with the tail nodes indicated by the tail node database, determining that the detection result of the target service flow is normal;
And if the q tail nodes are not matched with the tail nodes indicated by the tail node database, acquiring an updated tail node database, and determining the detection result of the target service flow according to the indication information of the q tail nodes and the updated tail node database.
14. The method according to claim 13, wherein determining the detection result of the target traffic flow according to the indication information of the q tail nodes and the updated tail node database comprises:
determining whether the q tail nodes are matched with tail nodes indicated by the updated tail node database according to the indication information of the q tail nodes;
if the q tail nodes are matched with the tail nodes indicated by the updated tail node database, determining that the detection result of the target service flow is normal;
and if the q tail nodes are not matched with the tail nodes indicated by the updated tail node database, determining that the detection result of the target service flow is abnormal.
15. The method according to any one of claims 1 to 14, further comprising:
updating the tail node database when the updating condition is met;
Wherein the update condition includes at least one of:
determining that the packet loss of the target service flow meets a packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path;
the detection information of the target service flow, which is acquired by at least one tail node and indicated by the tail node database, is not received within a specified duration;
the reported information sent by the network nodes on the target transmission path comprises detection information of the target service flow acquired by the tail nodes, and the tail nodes are not matched with the tail nodes indicated by the tail node database;
the periodic update condition is satisfied.
16. The method of claim 15, wherein updating the tail node database when the update condition is satisfied comprises:
updating the tail node database according to the reported information sent by the plurality of network nodes when the packet loss of the target service flow meets the packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path, wherein the reported information sent by at least one network node in the plurality of network nodes comprises the indication information of the target service flow and the indication information of at least one tail node on the target transmission path;
Deleting at least one tail node from the tail node database when the detection information of the target service flow, which is acquired by the at least one tail node and indicated by the tail node database, is not received within the specified duration;
when the reported information sent by a plurality of network nodes on the target transmission path comprises detection information of the target service flow acquired by a plurality of tail nodes, and the plurality of tail nodes are not matched with the tail nodes indicated by the tail node database, updating the tail node database according to the path detection information of the target transmission path;
and when the periodic updating condition is met, updating the tail node database according to the path detection information of the target transmission path.
17. The method according to any one of claims 1 to 16, further comprising:
and outputting the detection result of the target service flow.
18. A transmission detection apparatus, characterized by being applied to a controller, the apparatus comprising:
the receiving module is used for receiving reporting information sent by a plurality of network nodes on a target transmission path, wherein the target transmission path is a transmission path of a target service flow, and the reporting information comprises detection information of the target service flow;
And the determining module is used for determining the detection result of the target service flow according to the reporting information sent by the plurality of network nodes and the tail node database of the target service flow, wherein the tail node database indicates a plurality of tail nodes on the target transmission path.
19. The apparatus of claim 18, wherein the apparatus further comprises:
and the acquisition module is used for acquiring the tail node database.
20. The apparatus of claim 19, wherein the device comprises a plurality of sensors,
the acquisition module is used for acquiring the tail node database according to the path detection information of the target transmission path.
21. The apparatus of claim 20, wherein the path probe information comprises probe information sent by a plurality of tail nodes on the target transmission path, the probe information sent by each tail node of the plurality of tail nodes comprising indication information of the target traffic flow and indication information of each tail node;
the acquisition module is used for acquiring the tail node database according to the detection information sent by the plurality of tail nodes.
22. The apparatus of claim 20, wherein the path probe information comprises probe information sent by at least one head node on the target transmission path, the probe information comprising indication information of the target traffic stream and indication information of at least one tail node on the target transmission path;
The acquisition module is used for acquiring the tail node database according to the detection information sent by the at least one head node.
23. The apparatus of claim 20, wherein the path probe information comprises probe information sent by a head node on the target transmission path, the probe information comprising the tail node database;
the acquisition module is used for acquiring the tail node database according to the detection information sent by the head node.
24. The apparatus of claim 19, wherein the device comprises a plurality of sensors,
the obtaining module is configured to obtain the tail node database according to the report information sent by the plurality of network nodes on the target transmission path, where the report information sent by at least one network node in the plurality of network nodes includes the indication information of the target service flow and the indication information of at least one tail node on the target transmission path.
25. The apparatus according to any one of claims 18 to 24, wherein the plurality of network nodes includes q tail nodes, and the reported information sent by the plurality of network nodes includes detection information of the target traffic flow acquired by the q tail nodes, where q is a positive integer;
The determining module is configured to determine a detection result of the target service flow according to the detection information of the target service flow obtained by the q tail nodes and the tail node database.
26. The apparatus according to any one of claims 18 to 24, wherein the plurality of network nodes includes p head nodes and q tail nodes, the reported information sent by the plurality of network nodes includes detection information of the target traffic flow acquired by the p head nodes and detection information of the target traffic flow acquired by the q tail nodes, and p and q are both positive integers;
the determining module is configured to determine a detection result of the target service flow according to the detection information of the target service flow acquired by the p head nodes, the detection information of the target service flow acquired by the q tail nodes, and the tail node database.
27. The apparatus of claim 25, wherein the detection information of the target traffic flow acquired by each of the q tail nodes includes a packet loss statistic of the target traffic flow, and wherein the packet loss statistic of the target traffic flow acquired by each tail node includes: each tail node acquires a first packet loss statistical value from a received message belonging to the target service flow, and/or acquires a second packet loss statistical value according to the received message statistics of the target service flow;
The determining module is used for:
determining the packet loss of the target service flow according to the packet loss statistical values of the target service flow obtained by the q tail nodes;
and determining a detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database.
28. The apparatus of claim 26, wherein the detection information of the target traffic flow acquired by each of the p head nodes includes a number of messages belonging to the target traffic flow sent by each of the p head nodes, and the detection information of the target traffic flow acquired by each of the q tail nodes includes a number of messages belonging to the target traffic flow received by each of the q tail nodes;
the determining module is used for:
determining the packet loss of the target service flow according to the number of messages belonging to the target service flow sent by the p head nodes and the number of messages belonging to the target service flow received by the q tail nodes;
and determining a detection result of the target service flow according to the packet loss amount of the target service flow, the packet loss amount condition and the tail node database.
29. The apparatus according to claim 27 or 28, wherein the determining module is configured to:
when the packet loss amount of the target service flow meets the packet loss amount condition, determining that the detection result of the target service flow is normal;
and when the packet loss amount of the target service flow does not meet the packet loss amount condition, determining a detection result of the target service flow according to the tail node database.
30. The apparatus of claim 29, wherein the reported information sent by the plurality of network nodes further comprises indication information of the q tail nodes; the determining module is used for:
determining whether the q tail nodes are matched with tail nodes indicated by the tail node database according to the indication information of the q tail nodes;
if the q tail nodes are matched with the tail nodes indicated by the tail node database, determining that the detection result of the target service flow is normal;
and if the q tail nodes are not matched with the tail nodes indicated by the tail node database, acquiring an updated tail node database, and determining the detection result of the target service flow according to the indication information of the q tail nodes and the updated tail node database.
31. The apparatus of claim 30, wherein the means for determining is configured to:
determining whether the q tail nodes are matched with tail nodes indicated by the updated tail node database according to the indication information of the q tail nodes;
if the q tail nodes are matched with the tail nodes indicated by the updated tail node database, determining that the detection result of the target service flow is normal;
and if the q tail nodes are not matched with the tail nodes indicated by the updated tail node database, determining that the detection result of the target service flow is abnormal.
32. The apparatus according to any one of claims 18 to 31, further comprising:
the updating module is used for updating the tail node database when the updating condition is met;
wherein the update condition includes at least one of:
determining that the packet loss of the target service flow meets a packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path;
the detection information of the target service flow, which is acquired by at least one tail node and indicated by the tail node database, is not received within a specified duration;
The reported information sent by the network nodes on the target transmission path comprises detection information of the target service flow acquired by the tail nodes, and the tail nodes are not matched with the tail nodes indicated by the tail node database;
the periodic update condition is satisfied.
33. The apparatus of claim 32, wherein the update module is configured to:
updating the tail node database according to the reported information sent by the plurality of network nodes when the packet loss of the target service flow meets the packet loss condition according to the reported information sent by the plurality of network nodes on the target transmission path, wherein the reported information sent by at least one network node in the plurality of network nodes comprises the indication information of the target service flow and the indication information of at least one tail node on the target transmission path;
deleting at least one tail node from the tail node database when the detection information of the target service flow, which is acquired by the at least one tail node and indicated by the tail node database, is not received within the specified duration;
when the reported information sent by a plurality of network nodes on the target transmission path comprises detection information of the target service flow acquired by a plurality of tail nodes, and the plurality of tail nodes are not matched with the tail nodes indicated by the tail node database, updating the tail node database according to the path detection information of the target transmission path;
And when the periodic updating condition is met, updating the tail node database according to the path detection information of the target transmission path.
34. The apparatus according to any one of claims 18 to 33, further comprising:
and the output module is used for outputting the detection result of the target service flow.
35. A transmission detection apparatus comprising a memory and a processor;
the memory is used for storing a computer program;
the processor is configured to execute a computer program stored in the memory to cause the transmission detection apparatus to execute the transmission detection method according to any one of claims 1 to 17.
36. A transmission detection system comprising a controller and a plurality of network nodes, the controller comprising a transmission detection apparatus as claimed in any one of claims 18 to 35.
37. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program which, when executed, implements the transmission detection method according to any one of claims 1 to 17.
38. A computer program product, characterized in that the computer program product comprises a program or code which, when executed, implements the transmission detection method according to any one of claims 1 to 17.
CN202210265116.2A 2022-03-17 2022-03-17 Transmission detection method, device and system Pending CN116800630A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210265116.2A CN116800630A (en) 2022-03-17 2022-03-17 Transmission detection method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210265116.2A CN116800630A (en) 2022-03-17 2022-03-17 Transmission detection method, device and system

Publications (1)

Publication Number Publication Date
CN116800630A true CN116800630A (en) 2023-09-22

Family

ID=88040875

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210265116.2A Pending CN116800630A (en) 2022-03-17 2022-03-17 Transmission detection method, device and system

Country Status (1)

Country Link
CN (1) CN116800630A (en)

Similar Documents

Publication Publication Date Title
EP2672668B1 (en) Facilitating the operation of a virtual network by predicting a failure
CN109495322B (en) Network fault positioning method, related equipment and computer storage medium
US7912055B1 (en) Method and apparatus for configuration and analysis of network multicast routing protocols
US10484265B2 (en) Dynamic update of virtual network topology
US7359335B2 (en) Automatic configuration of network for monitoring
US9992091B2 (en) Performing network topology traces with minimal data collection
US20180295029A1 (en) Managing groups of servers
CN110011869B (en) Controller apparatus, method, and computer-readable storage medium
CN113315645A (en) Method for configuring performance detection indication information and related equipment
CN114513429A (en) Transmission method for detection message, and method and equipment for determining reverse path
EP3917086A1 (en) Network topology discovery method, device, and system
US7792045B1 (en) Method and apparatus for configuration and analysis of internal network routing protocols
CN110830598B (en) Method and network equipment for establishing and transmitting interface address and alias in BGP (Border gateway protocol) session
CN116800630A (en) Transmission detection method, device and system
CN112332956B (en) Information sharing method and device in redundant network and computer storage medium
EP3756310B1 (en) Method and first node for managing transmission of probe messages
CN116915837B (en) Communication method and communication system based on software defined network
WO2023233470A1 (en) Estimating the cause of network abnormality
US11563640B2 (en) Network data extraction parser-model in SDN
US20230057463A1 (en) Network timing topology discovery and visualization using Interior Gateway Protocols
CN114629834B (en) Communication method and device
US20230354105A1 (en) Network resource request method and related device thereof
US20230403609A1 (en) Systems and methods for providing multi-layer client assurance architecture for private cellular networking
WO2023233471A1 (en) Cause inference of abnormality of network
CN117278451A (en) Stream following detection method, device, equipment, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination