CN102882742B - Method and equipment for determining a traffic source - Google Patents

Method and equipment for determining a traffic source Download PDF

Info

Publication number
CN102882742B
CN102882742B CN201210358290.8A CN201210358290A CN102882742B CN 102882742 B CN102882742 B CN 102882742B CN 201210358290 A CN201210358290 A CN 201210358290A CN 102882742 B CN102882742 B CN 102882742B
Authority
CN
China
Prior art keywords
tunnel
described equipment
flow
equipment
vpn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210358290.8A
Other languages
Chinese (zh)
Other versions
CN102882742A (en
Inventor
孙昌盛
朱毅
毛羽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201210358290.8A priority Critical patent/CN102882742B/en
Publication of CN102882742A publication Critical patent/CN102882742A/en
Application granted granted Critical
Publication of CN102882742B publication Critical patent/CN102882742B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a method and equipment for determining a traffic source. The method comprises the following steps of: analyzing tunnel record information on the equipment, and acquiring information of all tunnels which pass through the equipment, wherein the information of each tunnel which passes through the equipment comprises an identifier of each tunnel which passes through the equipment and an ingress node identifier of each tunnel which passes through the equipment; acquiring an identifier of each virtual private network (VPN) born by each tunnel which passes through the equipment from an ingress node of each tunnel which passes through the equipment according to the ingress node identifier of each tunnel which passes through the equipment; and determining the traffic source of the equipment according to the acquired the identifier of each tunnel which passes through the equipment and the identifier of each VPN born by each tunnel which passes through the equipment. By the technical scheme, the problem that an abnormal traffic source cannot be determined in the prior art is solved.

Description

Traffic source defining method and equipment
Technical field
The present invention relates to the communication technology, particularly relate to a kind of traffic source defining method and equipment.
Background technology
Within a wireless communication network, interconnected by wireless backhaul bearer network between the radio network controller (Radio Network Controller, referred to as RNC) of base station and core net.Along with radio job flow explosive growth, more and more higher to the requirement of wireless backhaul bearer network, the trend of communication industry uses Internet protocol (Internet Protocol, referred to as IP) network, such as IP Radio Access Network (Radio Access Network, referred to as RAN) is as wireless backhaul bearer network.
IP RAN network is mainly used to carrying wireless base station flow.The flow that wireless terminal produces can be sent to wireless base station, these flows can by IP RAN Internet Transmission to RNC afterwards, these flows can be sent to the RNC at called wireless terminal place by RNC, flow is sent to called wireless terminal by the RNC at called wireless terminal place again, completes call.The use sense that the quality of IP RAN network determines terminal use is to a great extent subject to, and therefore, each operator all strictly can monitor the quality of IP RAN network.At present in the quality monitoring to IP RAN network, main monitored object comprises interface between bound interfaces to wireless base station and IP RAN network, IP RAN network internal network element and VPN (virtual private network) (Virtual Private Network end to end, referred to as VPN), main monitor control index is flow, error code, packet loss etc.Wherein, a problem is existed to the traffic monitoring of IP RAN network, in downstream flow, None-identified on abnormal link occurs exactly and the source of abnormal flow, and then cause cannot accurately judging take which kind of mode to solve abnormal flow problem.
Summary of the invention
The embodiment of the present invention provides a kind of traffic source defining method and equipment, in order to determine the source of the flow on equipment.
Embodiment of the present invention first aspect provides a kind of traffic source defining method, comprising:
Tunnel recorded information on equipment is analyzed, obtain the cunicular information through described equipment, the information through every bar tunnel of described equipment comprises the mark of the ingress in the mark through every bar tunnel of described equipment and the every bar tunnel through described equipment;
According to the mark of the ingress in the every bar tunnel through described equipment, obtain the mark of each VPN (virtual private network) VPN self carried through every bar tunnel of described equipment from the ingress in the every bar tunnel through described equipment;
According to the mark in the every bar tunnel through described equipment obtained and the mark of each VPN that carries through every bar tunnel of described equipment, determine the source of the flow on described equipment.
In an Alternate embodiments of first aspect, described method also comprises: according to the mark of each VPN that the every bar tunnel through described equipment carries, obtain the flow of each VPN carried through every bar tunnel of described equipment, according to the mark in the every bar tunnel through described equipment, obtain the flow in the every bar tunnel through described equipment;
The flow in the flow to each VPN that the every bar tunnel through described equipment carries and the every bar tunnel through described equipment is analyzed, and obtains flow proportional between each bar tunnel of described equipment and flow proportional between each VPN of carrying through every bar tunnel of described equipment;
According to the flow proportional between the flow in the every bar tunnel through described equipment obtained, flow proportional between each tunnel of described equipment, the flow of each VPN carried through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, flow abnormal cause is analyzed.
In an Alternate embodiments of first aspect, flow proportional between the flow in the described every bar tunnel through described equipment according to obtaining, flow proportional between each tunnel of described equipment, the flow of each VPN carried through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, carries out analysis to flow abnormal cause and comprises:
According to the flow proportional between the flow in the every bar tunnel through described equipment obtained, flow proportional between each tunnel of described equipment, the flow of each VPN carried through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, generate traffic statistics list;
Described traffic statistics stream table is shown to user, for described user, described Traffic Anomaly reason is analyzed.
In an Alternate embodiments of first aspect, described tunnel recorded information is path state block PSB and/or reservation state block RSB;
Describedly analyze the tunnel recorded information on equipment, the cunicular information obtained through described equipment comprises:
Take tunnel as dimension, PSB and/or RSB on described equipment is analyzed one by one, obtain the information in the every bar tunnel through described equipment; Or
With the interface on described equipment for dimension, comprehensively analyze PSB and/or RSB on described equipment, obtaining eachly on described equipment has the cunicular information that the interface of tunnel process is corresponding; Or
With the ingress in tunnel for dimension, PSB and/or RSB on described equipment is comprehensively analyzed, obtain through described equipment and the information in the tunnel of corresponding identical ingress.
In an Alternate embodiments of first aspect, described tunnel recorded information on equipment to be analyzed, obtains and comprised before the cunicular information of institute of described equipment:
According to the mark of described equipment, obtain PSB and/or RSB on described equipment from described equipment.
Embodiment of the present invention second aspect provides a kind of traffic source determination equipment, comprising:
Information acquisition module, for analyzing the tunnel recorded information on equipment, obtain the cunicular information through described equipment, the information through every bar tunnel of described equipment comprises the mark of the ingress in the mark through every bar tunnel of described equipment and the every bar tunnel through described equipment;
Identifier acquisition module, for the mark of the ingress in the every bar tunnel through described equipment obtained according to described information acquisition module, obtain the mark of each VPN (virtual private network) VPN self carried through every bar tunnel of described equipment from the ingress in the every bar tunnel through described equipment;
Source determination module, for the mark of the mark in the every bar tunnel through described equipment obtained according to described identifier acquisition module and each VPN carried through every bar tunnel of described equipment, determines the source of the flow on described equipment.
In an Alternate embodiments of second aspect, described equipment also comprises: flow obtains module, for the mark of each VPN carried through every bar tunnel of described equipment obtained according to described identifier acquisition module, obtain the flow of each VPN carried through every bar tunnel of described equipment, according to the mark in the every bar tunnel through described equipment that described information acquisition module obtains, obtain the flow in the every bar tunnel through described equipment;
Flow analysis module, for obtaining the flow of each VPN carried through every bar tunnel of described equipment that module obtains to described flow and analyzing through the flow in every bar tunnel of described equipment, obtain flow proportional between each bar tunnel of described equipment and flow proportional between each VPN of carrying through every bar tunnel of described equipment;
Analysis on Abnormal module, obtain for the flow proportional between the flow proportional between each tunnel of described equipment that obtains according to described flow analysis module and each VPN carried through every bar tunnel of described equipment and described flow the flow of each VPN in the every bar tunnel through described equipment and the flow in the every bar tunnel through described equipment that module obtains, flow abnormal cause is analyzed.
In an Alternate embodiments of second aspect, described Analysis on Abnormal module is specifically for the flow proportional between the flow of the flow according to the every bar tunnel through described equipment, the flow proportional between each tunnel of described equipment, each VPN through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, generate traffic statistics list, described traffic statistics list is shown to user, for described user, described Traffic Anomaly reason is analyzed.
In an Alternate embodiments of second aspect, described tunnel recorded information is path state block PSB and/or reservation state block RSB;
Described information acquisition module, specifically for taking tunnel as dimension, is analyzed one by one to PSB and/or RSB on described equipment, obtains the information in the every bar tunnel through described equipment; Or
Described information acquisition module specifically for the interface on described equipment for dimension, comprehensively analyze PSB and/or RSB on described equipment, obtaining eachly on described equipment has the cunicular information that the interface of tunnel process is corresponding; Or
Described information acquisition module specifically for the ingress in tunnel for dimension, PSB and/or RSB on described equipment is comprehensively analyzed, obtains through described equipment and the information in the tunnel of corresponding identical ingress.
In an Alternate embodiments of second aspect, described equipment also comprises: status block acquisition module, for obtaining before the cunicular information of institute of described equipment at described information acquisition module, according to the mark of described equipment, obtain PSB and/or RSB on described equipment from described equipment.
The traffic source defining method that the embodiment of the present invention provides and equipment, by analyzing the tunnel recorded information on equipment, obtain the cunicular information through this equipment, and then obtain the mark of the VPN of every bar tunnel carrying according to the mark of the ingress in this tunnel in the tunnel information obtained, the source of the flow on this equipment is determined according to the information of all tunnels of this equipment process obtained and the VPN of every bar tunnel carrying, solve the problem that the None-identified existed in the traffic monitoring to VPN goes out the source of abnormal flow, and then for accurately judging that take which kind of mode to solve abnormal flow problem provides condition.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of structural representation of IP RAN network;
The flow chart of the traffic source defining method that Fig. 2 provides for one embodiment of the invention;
The tunnel establishment procedure schematic diagram that Fig. 3 provides for one embodiment of the invention;
The flow chart of the traffic source defining method that Fig. 4 provides for another embodiment of the present invention;
The flow chart of the traffic source defining method that Fig. 5 provides for further embodiment of this invention
The schematic diagram of the VPN of the tunnel through node C9 that Fig. 6 provides for one embodiment of the invention and the carrying of each tunnel;
Fig. 7 is a kind of implementation structure of the traffic statistics list that one embodiment of the invention provides;
The structural representation of the traffic source determination equipment that Fig. 8 provides for one embodiment of the invention;
The structural representation of the traffic source determination equipment that Fig. 9 provides for another embodiment of the present invention;
The structural representation of the traffic source determination equipment that Figure 10 provides for further embodiment of this invention.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The following embodiment of the present invention is applicable to the various VPN carried by MPLS tunnel, the IP RAN network such as carried by MPLS tunnel, but is not limited thereto.The typical all-IP mode of IP RAN Web vector graphic carries communication flows.The physical layer of IP RAN network uses optical fiber, link layer uses Ethernet (English is Ethernet) or gigabit Ethernet (English is Gigabit Ethernet), signaling uses Routing Protocol and multiprotocol label switching (Multi Protocol Label Switch, referred to as MPLS) protocol suite/RSVP (Resource Reservation Protocol, referred to as RSVP), public network forwarding uses label switched path (the Label Switch Path generated by signaling negotiation, referred to as LSP), operation layer uses VPN.General LSP type comprises tag distribution protocol (Label Distribution Protocol, referred to as LDP) LSP and traffic engineering (Traffic Engineering, referred to as TE) LSP; Conventional VPN type comprises pseudo wire emulation (the Pseudo-Wire Emulation Edge to Edge of edge-to-edge, referred to as PWE3), VPLS (Virtual Private Lan Service, referred to as VPLS) and three-layer VPN (L3VPN).
Wherein, MPLS tunnel (English is Tunnel) is because reliability and maintainability is relatively good, so general operator can select MPLS Tunnel to carry VPN flow.Generally, this name of Tunnel represent TE LSP or be made up of active and standby TE LSP LSP combination.The following embodiment of the present invention all carries VPN flow for MPLS Tunnel and is described.Wherein, the type decided of VPN, in base station type, if Ethernet (English is Ethernet) interface is supported in base station, then generally selects L3PVN; If Ethernet interface is not supported in base station, only support the interface type such as E1 and/or asynchronous transfer mode (Asynchronous Transfer Mode, referred to as ATM), then select PWe3.The VPN related in the following embodiment of the present invention can be the VPN of any type.
Fig. 1 is a kind of structural representation of IP RAN network.As shown in Figure 1, IP RAN network is made up of access ring (in Fig. 1 annulus shown in dotted line) and convergence ring (in Fig. 1 annulus shown in solid line).Wherein, node A1-node A8 is positioned on access ring, and node C9 and node C10 is positioned at access ring simultaneously and converges on ring, and node C11-node C14 and node N15 and node N16 is positioned at and converges on ring.Node A1 is connected with base station with node A5, and base station here can be the base station transceiver platform (Base Transceiver Station, referred to as BTS) in 2G network, also can be the Node B in 3G network or eNode B.Node N15 is connected with node N16 and RNC.
Illustrate at this, IP RAN network generally adopts ring-shaped network (shown in Fig. 1 structure), but also can adopt the ring-like networking mode combined with chain.
In the following embodiment of the present invention to the monitored object of IP RAN network comprise interface between the bound interfaces (in Fig. 1 1. shown in position) of base station and RNC and IP RAN network, IP RAN network internal network element (in Fig. 1 2. shown in position) and end to end in VPN(Fig. 1 3. shown in position), the dotted line with arrow in Fig. 1 represents VPN end to end.In this monitor procedure, for the ease of determining the source of abnormal flow, following examples of the present invention provide a solution.
The flow chart of the traffic source defining method that Fig. 2 provides for one embodiment of the invention.As shown in Figure 2, the method for the present embodiment comprises:
Step 201, the tunnel recorded information on equipment to be analyzed, obtain the cunicular information through the said equipment, the information through every bar tunnel of the said equipment comprises the mark of the ingress in the mark (ID) through every bar tunnel of the said equipment and the every bar tunnel through the said equipment.
In real network, MPLS tunnel is generally used for carrying VPN flow.In the term in MPLS tunnel, generally the first node in tunnel is called into (English is Ingress) node, tail node is called (Egress) node, intermediate node is called transmission (English is Transit) node, and tunnel is directive, the Ingress node in the tunnel of a direction may be the Egress node in its reciprocal tunnel; And in the term of VPN, generally the end points of VPN being called Provider Edge (Provider Edge, referred to as PE) node, the intermediate node of VPN is called supplier (Provider, referred to as P) node.From MPLS tunnel angle, the equipment that Traffic Anomaly occurs in the present embodiment can be Ingress node, Transit node or Egress node.From VPN angle, the equipment in the present embodiment can be PE node or P node.In various embodiments of the present invention, the flow on described equipment may be abnormal, and the exception occurred comprises various abnormal behaviour, such as flow congestion or flow spilling etc.Whether the flow no matter on the said equipment there is exception, and the method that the embodiment of the present invention all can be adopted to provide is to determine the source of flow on it.
In various embodiments of the present invention, the tunnel recorded information on equipment mainly refers to the routing information about tunnel of this equipment records.Such as tunnel recorded information can comprise the mark (ID) in this tunnel, the destination address (i.e. the mark of the Egress node in this tunnel) in this tunnel if, when having active and standby two LSP under the Ingress node identification in this tunnel, local this tunnel of LSP ID(, can in order to distinguish this two LSP), the outgoing interface/incoming interface of this tunnel on this node etc.The specific implementation form of various embodiments of the present invention to tunnel recorded information does not limit.Comparatively common way is the routing information using path state block (Path State Block, referred to as PSB) and/or reservation state block (Resv State Block, referred to as RSB) to record tunnel.The present embodiment is described for PSB and/or RSB, but is not limited thereto.Those skilled in the art can release easily according to various embodiments of the present invention: the implementation process determining traffic source when tunnel recorded information adopts other modes to realize.
The process of establishing in MPLS tunnel is: Ingress node is according to traffic engineering tunnel configuration requirement, based on traffic engineering database (TE Data Base, referred to as TEDB), trigger Constraint Shortest Path First (Constrained Shortest Path First, referred to as CSPF) calculate, calculate each hop node of tunnel process, namely calculate fullpath; Then Ingress node is along oneself good path, to initiation path, downstream (English is Path) message, until Egress node, sets up PSB by way of each node; After Egress node receives Path message, show that road was laid, then turn around to send reserved (English is Resv) message and, to confirm " road was laid ", oppositely confirm Ingress node always, set up RSB by way of each node.Fig. 3 provides a kind of schematic diagram of process of establishing of tunnel, as shown in Figure 3, Ingress node is node 30, Egress node is node 36, node 31-node 35 is respectively Transit node, after tunnel has been set up, node 30-node 36 all establishes PSB and RSB.
At each node of tunnel process, such as PSB or RSB of Ingress node, Transit node or Egress nodes records, in fact have recorded the routing information in this tunnel.The routing information in a tunnel of certain nodes records comprises: the ID in this tunnel, the destination address (i.e. the mark of the Egress node in this tunnel) in this tunnel if, when having active and standby two LSP under the Ingress node identification in this tunnel, local this tunnel of LSP ID(, can in order to distinguish this two LSP), the outgoing interface/incoming interface of this tunnel on this node etc." destination address in tunnel ", " mark of Ingress node ", " ID in tunnel " and " local LSP ID " in above-mentioned routing information forms the whole network unique designation of a tunnel (TE LSP), is called four-tuple.Illustrate at this, in various embodiments of the present invention, the mark (ID) in said tunnel refers to " ID in tunnel " in four-tuple.In MPLS tunnel, LSR (Label Switch Router, referred to as the LSR) ID being designated this node of node.
In this explanation, if know that this tunnel comprises active and standby two LSP according to the ID in the every bar tunnel through the said equipment, optionally, the method that traffic source determination equipment can adopt the embodiment of the present invention to provide determines the source of the flow of a wherein LSP on the said equipment, optionally, the method that traffic source determination equipment can also adopt the embodiment of the present invention to provide determines the source of the flow of the every bar LSP through the said equipment.Various embodiments of the present invention are mainly described for existence LSP in tunnel.
Wherein, each node that every bar tunnel passes have recorded the routing information in this tunnel respectively in PSB and RSB, but the routing information in different tunnel is scattered in PSB and RSB corresponding to each bar tunnel.By being integrated by the routing information in each bar tunnel recorded in PSB and RSB corresponding for bar tunnel each on a node, whole tunnels that this node passes can be known.
Based on above-mentioned, the present embodiment, by analyzing the PSB on equipment, can obtain the cunicular information through the said equipment.Or the present embodiment, by analyzing the RSB on equipment, also can obtain the cunicular information through the said equipment.Or the present embodiment, by analyzing RSB and RSB on equipment simultaneously, also can obtain the cunicular information through the said equipment.The information spinner in tunnel mentioned here will refer to the LSR ID of the ID in tunnel and the ingress in tunnel, but is not limited thereto.
Step 202, mark according to the ingress in the every bar tunnel through the said equipment, obtain the mark of each VPN self carried through every bar tunnel of the said equipment from the ingress in the every bar tunnel through the said equipment.
Wherein, the ingress in every bar tunnel stores the information of the VPN that this tunnel carries, the information such as the mark of such as carried VPN and the flow of VPN.Based on this, the present embodiment, after the mark of ingress getting the every bar tunnel through the said equipment, can go according to the mark of ingress the mark ingress in every bar tunnel obtaining each VPN that this tunnel carries.
Step 203, according to the mark in the every bar tunnel through the said equipment obtained and the mark of each VPN that carries through every bar tunnel of the said equipment, determine the source of the flow on the said equipment.
After the mark of the VPN carried when the mark got through every bar tunnel of the said equipment and every bar tunnel, the each VPN carried through all tunnels of the said equipment and every bar tunnel can be determined, be equivalent to the concrete source being aware of the flow on the said equipment.Source mentioned here refers to which tunnel the flow on equipment comes from and come from which VPN in which tunnel.Wherein, the flow on the said equipment is the summation of flow in each VPN carried by each bar tunnel through the said equipment.
Illustrate at this, the executive agent of the present embodiment can be traffic source determination equipment, and this equipment can be the Network Management Equipment of being responsible for carrying out VPN traffic monitoring, can also be the said equipment itself.
From above-mentioned, the traffic source defining method that the present embodiment provides, by analyzing the tunnel recorded information on equipment, obtain the cunicular information through this equipment, and then obtain the mark of the VPN of every bar tunnel carrying according to the mark of the ingress in this tunnel in the tunnel information obtained, the source of the flow on this equipment is determined according to the information of all tunnels of this equipment process obtained and the VPN of every bar tunnel carrying, when flow further on equipment occurs abnormal, the source that abnormal flow occurs can be determined, solve the problem that the None-identified existed in the traffic monitoring to VPN goes out the source of abnormal flow, and then for accurately judging that take which kind of mode to solve abnormal flow problem provides condition.
In an Alternate embodiments of the present embodiment, as shown in Figure 4, the traffic source defining method of the present embodiment also comprises:
Step 204, the mark of each VPN carried according to the every bar tunnel through the said equipment, obtain the flow of each VPN through every bar tunnel of the said equipment, according to the mark in the every bar tunnel through the said equipment, obtain the flow in the every bar tunnel through the said equipment.
Optionally, may exist in VPN and the equipment of traffic monitoring is carried out to each VPN in each tunnel and each tunnel, this equipment knows the flow of each VPN, based on this, the flow of the VPN that the mark of flow and each VPN that the equipment that the traffic source determination equipment of the present embodiment can monitor the flow of each VPN from VPN obtains the tunnel that above-mentioned each Tunnel Identifier identifies identifies.Illustrate at this, the flow superposition of each VPN that the flow in a tunnel can be carried by this tunnel obtains, and also can add up separately the flow in this tunnel self.
Optionally, the traffic source determination equipment of the present embodiment itself has the function of the flow of each VPN in each tunnel in monitoring VPN and each tunnel, then the traffic source determination equipment of the present embodiment directly can monitor the flow of each VPN in each tunnel and each tunnel, thus the flow of VPN that the mark of the flow and each VPN that obtain the tunnel that above-mentioned each Tunnel Identifier identifies identifies.
Optionally, equipment VPN each in each tunnel being carried out to traffic monitoring in VPN, may be there is, after this monitoring of tools to the flow of VPN using the flow of VPN as the property store of this VPN on the ingress in this tunnel, VPN place.Based on this, the traffic source determination equipment of the present embodiment from the ingress in the every bar tunnel through the said equipment, can obtain the flow of each VPN in this tunnel.Concrete, traffic source determination equipment can distinguish the flow of different VPN according to the mark of each VPN in this tunnel of above-mentioned acquisition.
The above-mentioned execution mode being only illustrated the flow of each tunnel of several acquisition and each VPN, but be not limited thereto.
In addition, the process of the flow of each VPN that above-mentioned acquisition carries through every bar tunnel of the said equipment and every bar tunnel can, independent of the process of the mark of each VPN of acquisition, also can be the acquisition simultaneously completing the flow of each tunnel and each VPN and the mark of each VPN in same process.
The flow in step 205, the flow to each VPN that the every bar tunnel through the said equipment carries and the every bar tunnel through the said equipment is analyzed, and obtains flow proportional between each bar tunnel of the said equipment and flow proportional between each VPN of carrying through every bar tunnel of the said equipment.
Get each VPN carried through every bar tunnel of the said equipment flow and after the flow in every bar tunnel of the said equipment, by the flow of each VPN that carries the every bar tunnel through the said equipment with analyze through the flow in every bar tunnel of the said equipment, such as the flow in each tunnel is compared, obtain the flow proportional between each tunnel of the said equipment, the flow of VPN each in same tunnel is compared, obtains the flow proportional between each VPN that this tunnel carries.
Flow proportional between step 206, flow according to the every bar tunnel through the said equipment obtained, flow proportional between each tunnel of the said equipment, the flow of each VPN carried through every bar tunnel of the said equipment and each VPN of carrying through every bar tunnel of the said equipment, analyzes flow abnormal cause.
After flow in the every bar tunnel through the said equipment obtained, flow proportional between each tunnel of the said equipment, the flow of each VPN carried through every bar tunnel of the said equipment and the flow proportional between each VPN that every bar tunnel of the said equipment carries, can analyze flow abnormal cause according to these information of acquisition, and then on sound lines solve this Traffic Anomaly problem provide condition for adopting.
In an Alternate embodiments, traffic source determination equipment according to the flow proportional between the flow in the every bar tunnel through the said equipment obtained, flow proportional between each tunnel of the said equipment, the flow of each VPN carried through every bar tunnel of the said equipment and each VPN carried through every bar tunnel of the said equipment, can generate traffic statistics list; Then, the traffic statistics list of generation is shown to user, for user, flow abnormal cause is analyzed.By which, traffic source determination equipment can provide friendly graphic user interface (Graphical User Interface, referred to as GUI) to user, is convenient to user operation, is conducive to improving the efficiency determining abnormal flow source and reason.
In an Alternate embodiments, as shown in Figure 5, the traffic source defining method of the present embodiment also comprised before step 201:
Step 200, according to the mark of equipment that Traffic Anomaly occurs, obtain PSB and/or RSB on this equipment from the equipment that Traffic Anomaly occurs, tunnel recorded information is PSB and/or RSB.
Based on this, step 201 is specially to be analyzed PSB and/or RSB on equipment, and the acquisition of acquisition is through the cunicular information of the said equipment.
In this embodiment, traffic source determination equipment, except the flow on monitoring equipment, can also determine the information such as the mark of its equipment of monitoring.Here the mark of equipment is also the LSR ID of equipment.Based on this, traffic source determination equipment according to the mark of equipment, can obtain PSB and/or RSB on this equipment from equipment, so that follow-up PSB and/or RSB to obtaining analyzes, obtains the cunicular information through this equipment.
Wherein, traffic source determination equipment first obtains PSB and/or RSB on this equipment from the said equipment, and then to carry out analysis be a kind of Alternate embodiments, but is not limited thereto.Such as, traffic source determination equipment also can directly sign in on the said equipment, and completes the analysis to PSB and/or RSB on the above-described equipment, obtains the cunicular information through the said equipment.
Illustrate, when user or network operation engineer find Traffic Anomaly, the method provided by the present embodiment can determine the source of each flow on the interface that Traffic Anomaly occurs very soon, namely check that interface has which base station and big customer's special line, and the ratio of each flow on interface that Traffic Anomaly occurs can be viewed, namely the flow proportional of each base station and big customer's special line on this interface is checked, suppose to find this interface has the new base station of access or the VPN flow of big customer's special line and this VPN flow occupies certain flow ratio, and then can judge that Traffic Anomaly is the flow congestion caused because VPN adopts VPN mode to access new base station or big customer's special line (this is the Normal practice of distributing service), then can adopt and dilatation is carried out to this equipment, to solve the problem of flow congestion.
In an Alternate embodiments of the present embodiment, the execution mode of step 201 includes but not limited to following several:
Take tunnel as dimension, PSB and/or RSB on the said equipment is analyzed one by one, obtain the information in the every bar tunnel through the said equipment.Or
With the interface on the said equipment for dimension, comprehensively analyze PSB and/or RSB on the said equipment, each on acquisition the said equipment have the cunicular information that the interface of tunnel process is corresponding.Or
With the ingress in tunnel for dimension, PSB and/or RSB on the said equipment is comprehensively analyzed, obtain through the said equipment and the information in the tunnel of corresponding identical ingress.
About above-mentioned several mode, explanation will be further explained in follow-up instantiation.
Below in conjunction with the RAN of IP shown in Fig. 1 network configuration, the traffic source defining method that above-described embodiment provides is described in detail.
In IP RAN network, Traffic Anomaly problem usually causes because upstream flowrate is cumulative gradually, if such as node A6 newly connects base station, will cause access ring and converge the flow increase on ring, along with the increase gradually of base station number, downstream node may occur that flow overflows.The present embodiment newly connects base station with node A6 and introduces new flow to access ring and convergence ring, thus causes the link generation flow congestion between node C9 and node C12 or spilling, as shown in the "×" in Fig. 1.In the present embodiment, traffic source determination equipment has the function of IP RAN network being carried out to traffic monitoring simultaneously.
When traffic source determination device discovery node C9 there occurs flow congestion or overflows, obtain the PSB on node C9.Suppose to get the following PSB information meeting request comment (Request For Comments, referred to as RFC) standard from node C9.
Above-mentioned is 6 PSB, and the main contents comprised in each PSB are as shown in table 1.
Table 1
Suppose that the LSR ID of node A1 is 1.1.1.3, the LSR ID of node A2 is 1.1.1.22, the LSR ID of node C12 is 1.1.1.8, the LSR ID of node C13 is 1.1.1.4, then the known tunnel one through node C9 has 6.Take tunnel as dimension, above-mentioned PSB is analyzed one by one, the information in the every bar tunnel through node C9 can be known, as shown in table 2.
Table 2
With the interface on node C9 for dimension, above-mentioned PSB is comprehensively analyzed, can know that the tunnel information of GE8/0/1 and GE8/0/2 two interfaces through node C9 is as shown in table 3.Which interface that this mode can know node C9 more clearly has tunnel through and each interface on have which tunnel to pass through.
Table 3
With the ingress in tunnel for dimension, above-mentioned PSB is comprehensively analyzed, can to know through node C9 and the information in every bar tunnel divided with ingress is as shown in table 4.This mode can know the tunnel on node C9 is all using which node as ingress and each ingress which tunnel corresponding more clearly.
Table 4
In actual applications, above-mentioned any one dimension can be adopted to analyze the PSB on node C9, concrete which kind of dimension of employing, determines according to practical application request.
Traffic source determination equipment is getting after the information in each bar tunnel of node C9, according to the mark of the ingress in this tunnel in the information in every bar tunnel, each VPN that every bar tunnel self carries is obtained from the ingress in every bar tunnel, further, traffic source determination equipment can also obtain the flow of each VPN of every bar tunnel carrying.
In the present embodiment, suppose to carry 3 VPN respectively two tunnels from node A1 to node C13 and from node C13 to node A1, these 3 VPN are respectively the point-to-point VPN of L3VPN, two layers of multi-point to multi-point VPN and two layers; Carry 3 VPN respectively two tunnels from node A2 to node C12 and from node C12 to node A2, these 3 VPN are respectively the point-to-point VPN of L3VPN, two layers of multi-point to multi-point VPN and two layers; Carrying 1 VPN respectively two tunnels from node A1 to node C12 and from node C12 to node A1, is L3VPN.
Tunnel between the node A1 and node C13 of node C9, between node A2 and node C12 and between node A1 and node C12 and each VPN of carrying are as shown in Figure 6.Usually, L3VPN uses virtual routing forwarding (Virtual Routing Forwarding, referred to as VRF), the multi-point to multi-point VPN of two layers uses virtual switch instance (Virtual Switch Instance, referred to as VSI), and the point-to-point VPN of two layers uses PW, therefore in figure 6, represent L3VPN with VRF, represent the point-to-multipoint VPN of three layers with VSI, represent the point-to-point VPN of two layers with PW.For distinguishing the VPN of identical type in different tunnel, x, y, z is used to represent each VPN that the tunnel between node A1 and node C13 carries in Fig. 6 respectively, use m, n, k represent the VPN that tunnel carries between node A2 and node C12, represent with j the VPN that the tunnel between node A1 and node C12 carries.
After each VPN of all tunnels through node C9 that traffic source determination equipment gets and the carrying of every bar tunnel and flow thereof, can analyze the flow of each VPN of every bar tunnel carrying further, flow proportional between each VPN obtaining flow proportional between the flow in every bar tunnel, each bar tunnel and the carrying of every bar tunnel, and carry out the Traffic Anomaly analysis of causes according to these information obtained.
Optionally, in order to analyze flow abnormal cause more easily, traffic source determination equipment can according to the flow proportional between each VPN of the flow proportional between each VPN of all tunnels through node C9 of above-mentioned acquisition and the carrying of every bar tunnel and flow thereof, the flow in every bar tunnel, each bar tunnel and the carrying of every bar tunnel, generate traffic statistics list, and traffic statistics list is shown to user or network operation engineer, the analysis of Traffic Anomaly reason is carried out for user or network operation engineer etc.
Based on above-mentioned, with the flow bandwidth of node C9 for 1G, then the traffic statistics list of the node C9 of traffic source determination equipment generation as shown in Figure 7.As shown in Figure 7, the inbound traffics of node C9 are 780M, reach 78% of flow bandwidth.These inbound traffics are by tunnel 34(A1 → C13), tunnel 23(A2 → C12) and tunnel 13(A1 → C12) constitution, wherein, tunnel 34(A1 → C13) flow be 300M, account for 30% of flow bandwidth; Tunnel 23(A2 → C12) flow be 250M, account for 25% of flow bandwidth; Tunnel 13(A1 → C12) flow be 230M, account for 23% of flow bandwidth.Tunnel 34(A1 → C13) flow of each VPN that carries and ratio thereof be respectively 80M and 8%, 100M and 10% and 120M and 12%.Tunnel 23(A2 → C12) flow of each VPN that carries and ratio thereof be respectively 50M and 5%, 130M and 13% and 70M and 7%.Tunnel 13(A1 → C12) flow of VPN that carries and ratio thereof be 230M and 23%.
As shown in Figure 7, the outflow of node C9 is 800M, reaches 80% of flow bandwidth.This outflow is by tunnel 43(C13 → A1), tunnel 32(C12 → A2) and tunnel 31(C12 → A1) constitution, wherein, tunnel 43(C13 → A1) flow be 300M, account for 30% of flow bandwidth; Tunnel 32(C12 → A2) flow be 400M, account for 40% of flow bandwidth; Tunnel 31(C12 → A1) flow be 100M, account for 10% of flow bandwidth.Tunnel 43(C13 → A1) flow of each VPN that carries and ratio thereof be respectively 100M and 10%, 80M and 8% and 120M and 12%.Tunnel 32(C12 → A2) flow of each VPN that carries and ratio thereof be respectively 200M and 20%, 100M and 10% and 100M and 10%.Tunnel 31(C12 → A1) flow of VPN that carries and ratio thereof be 100M and 10%.
Illustrate at this, being only a kind of implementation of traffic statistics list shown in Fig. 7, being not limited to this, such as, can also be form.In addition, the statistics of carrying out according to the inbound traffics of node C9, outflow in the figure 7, in addition, can also add up according to the interface etc. on node C9, can add up the inbound traffics on each interface, outflow etc. further according to during interface statistics.
Next, user or network operation engineer can analyze according to traffic statistics list, determine Traffic Anomaly reason, and take correct method to solve Traffic Anomaly problem.Such as, if flow increases the exceptions such as the flow congestion caused, dilatation can be carried out to node C9, specifically can increase new interface to carry base station flow.Optionally, judging that flow exists extremely, can be further analyzed flow abnormal cause, cause if the reason analyzing Traffic Anomaly is some malicious attack, then can take to abandon the problem that the methods such as this flow solve this malicious attack, and blindness dilatation can not be carried out to node C9.About the process of the reason of analysis Traffic Anomaly, the present embodiment does not do too much explanation, and any method that can analyze Traffic Anomaly reason is all applicable to the embodiment of the present invention.
Wherein, in order to determine traffic source, LSR ID and the interface IP of each node of this tunnel process can also can be inquired on the ingress in tunnel, then the LSR ID of all nodes of every bar tunnel process in IP RAN network and the IP of interface is recorded, when after the node finding generation Traffic Anomaly, cunicular path in IR RAN network is all checked and can judge which tunnel have passed through this node for one time, can determine roughly based on this source that abnormal flow occurs.Suppose to have N number of node in IP RAN network and all configured tunneling technique between node between two, so needing to inquire about and record the LSR ID of all nodes and the IP(of interface on 2 × (N-1) × (N-1) bar tunnel is unidirectional because of tunnel, so the service connection between node needs to configure positive and negative two tunnels, therefore need to be multiplied by 2), this workload is larger, and search efficiency also can be very low.In addition; in real network, in order to realize protection, generally active and standby two LSP may configured with configuring in many tunnels or same tunnel between a pair node; so, in fact need the IP of the LSR ID of node in the tunnel inquired about and interface can be more.Moreover when there is variation in tunnel in IP RAN network, whole record and inspection action need to re-execute one time, and the feature dynamic change just of IP RAN network, the change of flow path is inevitable.As can be seen here, above-mentioned record and check the LSR ID of cunicular all nodes and the IP of interface determine substantially can not implement through the mode of Traffic Anomaly node, even if it is also very low to implement its efficiency reluctantly, and the method that the embodiment of the present invention provides can not only determine the source of abnormal flow, and the source of abnormal flow can be judged more fast, there is obvious benefit for fast processing Network Abnormal situation.
The structural representation of the traffic source determination equipment that Fig. 8 provides for one embodiment of the invention.As shown in Figure 8, the equipment of the present embodiment comprises: information acquisition module 81, identifier acquisition module 82 and source determination module 83.
Wherein, information acquisition module 81, for analyzing the tunnel recorded information on equipment, obtain the cunicular information through described equipment, the information through every bar tunnel of described equipment comprises the mark of the ingress in the mark through every bar tunnel of described equipment and the every bar tunnel through described equipment.Through the LSR ID that the mark of the ingress in every bar tunnel of described equipment can be this ingress.Here the mark in every bar tunnel refers to " ID in tunnel " in aforementioned four-tuple.Here tunnel recorded information mainly refers to the routing information in the tunnel of described equipment records, such as, comprise the information such as LSR ID and local LSP ID of the ID in tunnel, the LSR ID of the ingress in tunnel, the egress in tunnel.
Identifier acquisition module 82, be connected with information acquisition module 81, for the mark of the ingress in the every bar tunnel through described equipment obtained according to information acquisition module 81, obtain the mark of each VPN self carried through every bar tunnel of described equipment from the ingress in the every bar tunnel through described equipment.
Source determination module 83, be connected with identifier acquisition module 82, for the mark of the mark in the every bar tunnel through described equipment obtained according to identifier acquisition module 82 and each VPN carried through every bar tunnel of described equipment, determine the source of the flow on described equipment.
The traffic source determination equipment that the present embodiment provides can be the Network Management Equipment monitored network traffics, also can be the said equipment itself, can also be specifically designed to the autonomous device determining that abnormal flow is originated.
Each functional module of the traffic source determination equipment that the present embodiment provides can be used for performing the corresponding flow process in above-mentioned traffic source defining method embodiment, and its specific works principle repeats no more, and refers to the description of embodiment of the method.
The traffic source determination equipment that the present embodiment provides, by analyzing the tunnel recorded information on equipment, obtain the cunicular information through this equipment, and then obtain the mark of the VPN of every bar tunnel carrying according to the mark of the ingress in this tunnel in the tunnel information obtained, the source of the flow on this equipment is determined according to the information of all tunnels of this equipment process obtained and the VPN of every bar tunnel carrying, if the flow on equipment occurs abnormal, just can determine the source that abnormal flow occurs, solve the problem that the None-identified existed in the traffic monitoring to VPN goes out the source of abnormal flow, and then for accurately judging that take which kind of mode to solve abnormal flow problem provides condition.
The structural representation of the traffic source determination equipment that Fig. 9 provides for another embodiment of the present invention.The present embodiment is based on realization embodiment illustrated in fig. 8, as shown in Figure 9, the equipment of the present embodiment is except comprising: except information acquisition module 81, identifier acquisition module 82 and source determination module 83, also comprise: flow obtains module 84, flow analysis module 85 and Analysis on Abnormal module 86.
Wherein, flow obtains module 84, be connected with identifier acquisition module 82 and information acquisition module 81, for the mark of each VPN carried through every bar tunnel of described equipment obtained according to identifier acquisition module 82, obtain the flow of each VPN carried through every bar tunnel of described equipment, and according to the mark in the every bar tunnel through described equipment that information acquisition module 81 obtains, obtain the flow in the every bar tunnel through described equipment.
Flow analysis module 85, obtain module 84 with flow to be connected, for obtaining the flow of each VPN carried through every bar tunnel of described equipment that module 84 obtains to flow and analyzing through the flow in every bar tunnel of described equipment, obtain flow proportional between each bar tunnel of described equipment and flow proportional between each VPN of carrying through every bar tunnel of described equipment.
Analysis on Abnormal module 86, obtain module 84 with flow analysis module 85 and flow to be connected, obtain for the flow proportional between the flow proportional between each tunnel of described equipment that obtains according to flow analysis module 85 and each VPN carried through every bar tunnel of described equipment and flow the flow of each VPN in the every bar tunnel through described equipment and the flow in the every bar tunnel through described equipment that module 84 obtains, flow abnormal cause is analyzed.
In an Alternate embodiments, Analysis on Abnormal module 86 specifically can be used for the flow proportional between the flow according to the every bar tunnel through described equipment, the flow proportional between each tunnel of described equipment, the flow of each VPN through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, generate traffic statistics list, generated traffic statistics list is shown to user, for described user, described Traffic Anomaly reason is analyzed.
The traffic source determination equipment of the present embodiment can be analyzed flow abnormal cause by above-mentioned module, is conducive to taking correct method to solve Traffic Anomaly problem.
In an Alternate embodiments, above-mentioned tunnel recorded information can be PSB and/or RSB.Then information acquisition module 81 specifically can be used for taking tunnel as dimension, analyzes one by one PSB and/or RSB on described equipment, obtains the information in the every bar tunnel through described equipment.Or
Information acquisition module 81 specifically can be used for, with the interface on described equipment for dimension, comprehensively analyzing PSB and/or RSB on described equipment, and obtaining eachly on described equipment has the cunicular information that the interface of tunnel process is corresponding.Or
Information acquisition module 81 specifically can be used for, with the ingress in tunnel for dimension, comprehensively analyzing PSB and/or RSB on described equipment, obtains through described equipment and the information in the tunnel of corresponding identical ingress.
In an Alternate embodiments, the traffic source determination equipment of the present embodiment also comprises: status block acquisition module 87.
Status block acquisition module 87, is connected with information acquisition module 81, for obtaining before the cunicular information of institute of described equipment at information acquisition module 81, according to the mark of described equipment, obtains PSB and/or RSB on described equipment from described equipment.Status block acquisition module 87 is for providing PSB and/or RSB on described equipment to information acquisition module 81.
Each functional module of the traffic source determination equipment that the present embodiment provides can be used for performing the corresponding flow process in above-mentioned traffic source defining method embodiment, and its specific works principle repeats no more, and refers to the description of embodiment of the method.
The traffic source determination equipment that the present embodiment provides, by analyzing the tunnel recorded information on equipment, obtain the cunicular information through this equipment, and then obtain the mark of the VPN of every bar tunnel carrying according to the mark of the ingress in this tunnel in the tunnel information obtained, the source of the flow on this equipment is determined according to the information of all tunnels of this equipment process obtained and the VPN of every bar tunnel carrying, if the flow on equipment occurs abnormal, just can determine the source that abnormal flow occurs, solve the problem that the None-identified existed in the traffic monitoring to VPN goes out the source of abnormal flow, and then for accurately judging that take which kind of mode to solve abnormal flow problem provides condition.
The structural representation of the traffic source determination equipment that Figure 10 provides for further embodiment of this invention.The traffic source determination equipment that the present embodiment provides can be the Network Management Equipment monitored network traffics, also can be specifically designed to the autonomous device determining that abnormal flow is originated.As shown in Figure 10, the equipment of the present embodiment comprises: at least one processor 1001, memory 1002, communication interface 1003 and bus.Processor 1001, memory 1002 and communication interface 1003 are connected by bus and complete mutual communication.Described bus can be industry standard architecture (Industry Standard Architecture, referred to as ISA) bus, peripheral component interconnect (Peripheral Component, referred to as PCI) bus or extended industry-standard architecture (Extended Industry Standard Architecture, referred to as EISA) bus etc.Described bus can be divided into address bus, data/address bus, control bus etc.For ease of representing, only representing with a thick line in Figure 10, but not representing the bus only having a bus or a type.Wherein:
Memory 1002 is for stores executable programs code, and this program code comprises computer-managed instruction.Memory 1002 may comprise high-speed RAM memory, still may comprise nonvolatile memory (non-volatile memory), such as at least one magnetic disc store.
Processor 1001 runs the program corresponding with described executable program code by reading the executable program code stored in memory 1002, for:
Tunnel recorded information on equipment is analyzed, obtain the cunicular information through described equipment, the information through every bar tunnel of described equipment comprises the mark of the ingress in the mark through every bar tunnel of described equipment and the every bar tunnel through described equipment;
According to the mark of the ingress in the every bar tunnel through described equipment, obtain the mark of each VPN (virtual private network) VPN self carried through every bar tunnel of described equipment from the ingress in the every bar tunnel through described equipment;
According to the mark in the every bar tunnel through described equipment obtained and the mark of each VPN that carries through every bar tunnel of described equipment, determine the source that described equipment occurs abnormal flow.
Processor 1001 may be a central processing unit (Central Processing Unit, referred to as CPU), or specific integrated circuit (Application Specific Integrated Circuit, referred to as ASIC), or be configured to the one or more integrated circuits implementing the embodiment of the present invention.
It should be noted that, above-mentioned processor 1001, except having above-mentioned functions, also can be used for performing other flow processs in above-mentioned traffic source defining method embodiment, does not repeat them here.
Communication interface 1003 is mainly used in realizing the communication between the traffic source determination equipment of the present embodiment and other equipment or device.
The traffic source determination equipment that the present embodiment provides, by analyzing the tunnel recorded information on equipment, obtain the cunicular information through this equipment, and then obtain the mark of the VPN of every bar tunnel carrying according to the mark of the ingress in this tunnel in the tunnel information obtained, the source of the flow on this equipment is determined according to the information of all tunnels of this equipment process obtained and the VPN of every bar tunnel carrying, if the flow on equipment occurs abnormal, just can determine the source that abnormal flow occurs, solve the problem that the None-identified existed in the traffic monitoring to VPN goes out the source of abnormal flow, and then for accurately judging that take which kind of mode to solve abnormal flow problem provides condition.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for device and system embodiment, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.
It should be noted that, device embodiment described above is only schematic, the wherein said unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required common hardware by software and realize, can certainly comprise application-specific integrated circuit (ASIC), dedicated cpu, private memory, special components and parts etc. by specialized hardware to realize, but in a lot of situation, the former is better execution mode.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in the storage medium that can read, as the floppy disk of computer, USB flash disk, portable hard drive, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform method described in the present invention each embodiment.
Last it is noted that above each embodiment is only in order to illustrate technical scheme of the present invention, be not intended to limit; Although with reference to foregoing embodiments to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein some or all of technical characteristic; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a traffic source defining method, is characterized in that, comprising:
Tunnel recorded information on equipment is analyzed, obtain the cunicular information through described equipment, the information through every bar tunnel of described equipment comprises the mark of the ingress in the mark through every bar tunnel of described equipment and the every bar tunnel through described equipment;
According to the mark of the ingress in the every bar tunnel through described equipment, obtain the mark of each VPN (virtual private network) VPN self carried through every bar tunnel of described equipment from the ingress in the every bar tunnel through described equipment;
According to the mark in the every bar tunnel through described equipment obtained and the mark of each VPN that carries through every bar tunnel of described equipment, determine the source of the flow on described equipment.
2. traffic source defining method according to claim 1, is characterized in that, also comprise:
According to the mark of each VPN that the every bar tunnel through described equipment carries, obtain the flow of each VPN carried through every bar tunnel of described equipment, according to the mark in the every bar tunnel through described equipment, obtain the flow in the every bar tunnel through described equipment;
The flow in the flow to each VPN that the every bar tunnel through described equipment carries and the every bar tunnel through described equipment is analyzed, and obtains flow proportional between each bar tunnel of described equipment and flow proportional between each VPN of carrying through every bar tunnel of described equipment;
According to the flow proportional between the flow in the every bar tunnel through described equipment obtained, flow proportional between each tunnel of described equipment, the flow of each VPN carried through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, flow abnormal cause is analyzed.
3. traffic source defining method according to claim 2, it is characterized in that, flow proportional between the flow in the described every bar tunnel through described equipment according to obtaining, flow proportional between each tunnel of described equipment, the flow of each VPN carried through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, carries out analysis to flow abnormal cause and comprises:
According to the flow proportional between the flow in the every bar tunnel through described equipment obtained, flow proportional between each tunnel of described equipment, the flow of each VPN carried through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, generate traffic statistics list;
Described traffic statistics list is shown to user, for described user, described Traffic Anomaly reason is analyzed.
4. the traffic source defining method according to claim 1 or 2 or 3, is characterized in that, described tunnel recorded information is path state block PSB and/or reservation state block RSB;
Describedly analyze the tunnel recorded information on equipment, the cunicular information obtained through described equipment comprises:
Take tunnel as dimension, PSB and/or RSB on described equipment is analyzed one by one, obtain the information in the every bar tunnel through described equipment; Or
With the interface on described equipment for dimension, comprehensively analyze PSB and/or RSB on described equipment, obtaining eachly on described equipment has the cunicular information that the interface of tunnel process is corresponding; Or
With the ingress in tunnel for dimension, PSB and/or RSB on described equipment is comprehensively analyzed, obtain through described equipment and the information in the tunnel of corresponding identical ingress.
5. traffic source defining method according to claim 4, is characterized in that, describedly analyzes the tunnel recorded information on equipment, obtains and comprises before the cunicular information of institute of described equipment:
According to the mark of described equipment, obtain PSB and/or RSB on described equipment from described equipment.
6. a traffic source determination equipment, is characterized in that, comprising:
Information acquisition module, for analyzing the tunnel recorded information on equipment, obtain the cunicular information through described equipment, the information through every bar tunnel of described equipment comprises the mark of the ingress in the mark through every bar tunnel of described equipment and the every bar tunnel through described equipment;
Identifier acquisition module, for the mark of the ingress in the every bar tunnel through described equipment obtained according to described information acquisition module, obtain the mark of each VPN (virtual private network) VPN self carried through every bar tunnel of described equipment from the ingress in the every bar tunnel through described equipment;
Source determination module, for the mark of the mark in the every bar tunnel through described equipment obtained according to described identifier acquisition module and each VPN carried through every bar tunnel of described equipment, determines the source of the flow on described equipment.
7. traffic source determination equipment according to claim 6, is characterized in that, also comprise:
Flow obtains module, for the mark of each VPN carried through every bar tunnel of described equipment obtained according to described identifier acquisition module, obtain the flow of each VPN carried through every bar tunnel of described equipment, according to the mark in the every bar tunnel through described equipment that described information acquisition module obtains, obtain the flow in the every bar tunnel through described equipment;
Flow analysis module, for obtaining the flow of each VPN carried through every bar tunnel of described equipment that module obtains to described flow and analyzing through the flow in every bar tunnel of described equipment, obtain flow proportional between each bar tunnel of described equipment and flow proportional between each VPN of carrying through every bar tunnel of described equipment;
Analysis on Abnormal module, obtain for the flow proportional between the flow proportional between each tunnel of described equipment that obtains according to described flow analysis module and each VPN carried through every bar tunnel of described equipment and described flow the flow of each VPN in the every bar tunnel through described equipment and the flow in the every bar tunnel through described equipment that module obtains, flow abnormal cause is analyzed.
8. traffic source determination equipment according to claim 7, it is characterized in that, described Analysis on Abnormal module is specifically for the flow proportional between the flow of the flow according to the every bar tunnel through described equipment, the flow proportional between each tunnel of described equipment, each VPN through every bar tunnel of described equipment and each VPN of carrying through every bar tunnel of described equipment, generate traffic statistics list, described traffic statistics list is shown to user, for described user, described Traffic Anomaly reason is analyzed.
9. the traffic source determination equipment according to claim 6 or 7 or 8, is characterized in that, described tunnel recorded information is path state block PSB and/or reservation state block RSB;
Described information acquisition module, specifically for taking tunnel as dimension, is analyzed one by one to PSB and/or RSB on described equipment, obtains the information in the every bar tunnel through described equipment; Or
Described information acquisition module specifically for the interface on described equipment for dimension, comprehensively analyze PSB and/or RSB on described equipment, obtaining eachly on described equipment has the cunicular information that the interface of tunnel process is corresponding; Or
Described information acquisition module specifically for the ingress in tunnel for dimension, PSB and/or RSB on described equipment is comprehensively analyzed, obtains through described equipment and the information in the tunnel of corresponding identical ingress.
10. traffic source determination equipment according to claim 9, is characterized in that, also comprise:
Status block acquisition module, for obtaining before the cunicular information of institute of described equipment at described information acquisition module, according to the mark of described equipment, obtains PSB and/or RSB on described equipment from described equipment.
CN201210358290.8A 2012-09-24 2012-09-24 Method and equipment for determining a traffic source Active CN102882742B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210358290.8A CN102882742B (en) 2012-09-24 2012-09-24 Method and equipment for determining a traffic source

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210358290.8A CN102882742B (en) 2012-09-24 2012-09-24 Method and equipment for determining a traffic source

Publications (2)

Publication Number Publication Date
CN102882742A CN102882742A (en) 2013-01-16
CN102882742B true CN102882742B (en) 2015-01-21

Family

ID=47483896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210358290.8A Active CN102882742B (en) 2012-09-24 2012-09-24 Method and equipment for determining a traffic source

Country Status (1)

Country Link
CN (1) CN102882742B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108777679B (en) * 2018-05-22 2021-09-17 深信服科技股份有限公司 Method and device for generating traffic access relation of terminal and readable storage medium
CN114513435A (en) * 2022-01-14 2022-05-17 深信服科技股份有限公司 Method for detecting VPN tunnel, electronic device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195822A (en) * 2010-03-01 2011-09-21 杭州华三通信技术有限公司 Fault detection method and business provider edge (PE) equipment
EP2434688A1 (en) * 2009-11-18 2012-03-28 Huawei Technologies Co., Ltd. Method for locating fault link, method for analyzing root cause of warning, device and system thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2434688A1 (en) * 2009-11-18 2012-03-28 Huawei Technologies Co., Ltd. Method for locating fault link, method for analyzing root cause of warning, device and system thereof
CN102195822A (en) * 2010-03-01 2011-09-21 杭州华三通信技术有限公司 Fault detection method and business provider edge (PE) equipment

Also Published As

Publication number Publication date
CN102882742A (en) 2013-01-16

Similar Documents

Publication Publication Date Title
WO2021170092A1 (en) Message processing method and apparatus, and network device and storage medium
JP6447839B2 (en) Method, apparatus and system for implementing delay measurement
WO2019128950A1 (en) Packet processing method, network node, and system
CN102833109B (en) Positional information processing method and equipment of fault point
US7602702B1 (en) Fast reroute of traffic associated with a point to multi-point network tunnel
US11032193B2 (en) In-situ operation, administration, and maintenance in segment routing with multiprotocol label switching networks
EP2663034B1 (en) Method for negotiating flow label, and related device and system thereof
US9210037B2 (en) Method, apparatus and system for interconnected ring protection
CN107306222B (en) Method and equipment for establishing traffic engineering tunnel on label switching path
US9571381B2 (en) System and method for inter-domain RSVP-TE LSP load balancing
US9438511B2 (en) Identifying a label-switched path (LSP) associated with a multi protocol label switching (MPLS) service and diagnosing a LSP related fault
US8934335B2 (en) System and method for enhancing loop free alternative coverage
US10785095B2 (en) Service fault locating method and apparatus
JP6443864B2 (en) Method, apparatus and system for implementing packet loss detection
CN113726630A (en) Tunnel establishment method, device and system
EP4002776A1 (en) End-to-end flow monitoring in a computer network
Papán et al. The survey of current IPFRR mechanisms
EP2648382B1 (en) Method, device and system for establishing lsp
CN102882742B (en) Method and equipment for determining a traffic source
US8532101B2 (en) System and method for providing co-signaled return label switch paths
WO2017190675A1 (en) Link information processing method, apparatus and system
CN109150707B (en) Routing path analysis method and device
CN108702321A (en) Realize quick heavy-route(FRR)System, method and apparatus
CN108092866A (en) A kind of method, apparatus and system of tunnel switching
KR100776790B1 (en) Message processing method and apparatus in lsr for setting lsp using rsvp-te protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant