CN115174415B - Information release control method, device and equipment for virtual tunnel endpoint - Google Patents

Information release control method, device and equipment for virtual tunnel endpoint Download PDF

Info

Publication number
CN115174415B
CN115174415B CN202210761043.6A CN202210761043A CN115174415B CN 115174415 B CN115174415 B CN 115174415B CN 202210761043 A CN202210761043 A CN 202210761043A CN 115174415 B CN115174415 B CN 115174415B
Authority
CN
China
Prior art keywords
target virtual
virtual machine
tunnel endpoint
state change
virtual tunnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210761043.6A
Other languages
Chinese (zh)
Other versions
CN115174415A (en
Inventor
袁福利
陈翔
周庆飞
王少美
颜虹
任长雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202210761043.6A priority Critical patent/CN115174415B/en
Publication of CN115174415A publication Critical patent/CN115174415A/en
Application granted granted Critical
Publication of CN115174415B publication Critical patent/CN115174415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application is applicable to the technical field of networks, and particularly discloses an information release control method, device, equipment and a computer readable storage medium for a virtual tunnel endpoint.

Description

Information release control method, device and equipment for virtual tunnel endpoint
Technical Field
The present invention relates to the field of network technologies, and in particular, to a method, an apparatus, a device, and a computer readable storage medium for controlling information release of a virtual tunnel endpoint.
Background
The original implementation scheme of the virtual extension local area network (Virtual Extensible Local Area Network, VXLAN) has no control plane, and the discovery and host information learning of the virtual tunnel endpoint (Virtual Tunnel End Point, VTEP) are carried out through the flow flooding of the data plane. The host information includes an IP address, a MAC (Media Access Control Address) address, a VXLAN network identifier VNI, a gateway VTEP IP address, etc., where the host mainly refers to a virtual machine (a physical machine where the virtual machine is located) directly connected to the virtual tunnel endpoint. Because of the lack of a control plane, each virtual tunnel endpoint needs to send a large amount of data to complete the interaction of host information with other virtual tunnel endpoints, and the large amount of data occupies the data transmission channel, so that a data center network has a lot of flooding traffic.
To solve this problem, the virtual extended lan introduces an ethernet virtual private network (Ethernet Virtual Private Network, EVPN) as a control plane, and implements the characteristics of automatic discovery of virtual tunnel endpoints, mutual advertisement of host information, and the like by exchanging border gateway protocol ethernet virtual private network (Border Gateway Protocol Ethernet Virtual Private Network, BGP EVPN) routes between virtual tunnel endpoints, thereby avoiding unnecessary data traffic flooding.
The ethernet virtual private network is a virtual private network (Virtual Private Network, VPN) technology for data center large two-layer network interconnection. The EVPN technology adopts a mechanism similar to BGP/MPLS IP VPN, defines new network layer reachability information (Network Layer Reachability Information, NLRI) which is Ethernet virtual private network layer reachability information EVPN NLRI on the basis of border gateway protocols (Border Gateway Protocol, BGP), and defines 5 new BGP EVPN route types for address learning and release between different stations of the EVPN network. Wherein BGP EVPN type2 type routing can be used to pass host MAC addresses and IP addresses. When the virtual machine is on-line, the virtual tunnel endpoint connected with the virtual machine (the physical machine) issues a type2 information update message BGP update to all virtual tunnel endpoints with border gateway protocol neighbor relation based on the border gateway protocol.
However, if a certain virtual machine is frequently connected to the network, disconnected from the network, or continuously drifted between different virtual tunnel endpoints due to faults or other reasons, the virtual tunnel endpoint connected to the virtual machine (the physical machine where the virtual machine is located) frequently issues the information update message BGP update, so that a large amount of information update messages BGP update exist in the network, which wastes a large amount of bandwidth resources, and meanwhile, causes instability of the network and affects normal service.
Disclosure of Invention
The purpose of the present application is to provide a method, a device and a computer readable storage medium for controlling information release of a virtual tunnel endpoint, which are used for alleviating the problems that a large amount of information update messages exist in a network due to frequent change of a virtual machine connection state, so that a large amount of information update messages exist in the network, thereby wasting bandwidth resources and affecting services.
In order to solve the above technical problems, the present application provides an information release control method for a virtual tunnel endpoint, including:
when a state change event occurs in a target virtual machine connected with a target virtual tunnel endpoint, acquiring historical state change data of the target virtual machine;
determining a connection state change frequency parameter of the target virtual machine according to the historical state change data;
if the connection state change frequent degree parameter of the target virtual machine accords with a preset state change frequent standard, prohibiting the target virtual tunnel endpoint from issuing a state update message of the target virtual machine to a border gateway protocol neighbor node;
and if the connection state change frequency degree parameter of the target virtual machine does not accord with the state change frequency standard, allowing the target virtual tunnel endpoint to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
Optionally, the determining, according to the historical state change data, a connection state change frequency parameter of the target virtual machine specifically includes:
when the target virtual machine performs one online action or one offline action on the target virtual tunnel endpoint, adding one to a first penalty coefficient corresponding to the target virtual machine;
if the target virtual machine does not have the online action or the offline action after the first attenuation period is spaced, subtracting one from the first penalty coefficient corresponding to the target virtual machine;
wherein the first penalty coefficient is an integer not less than zero.
Optionally, the state change frequent criterion specifically is:
the first punishment coefficient corresponding to the target virtual machine is larger than a first preset number of times.
Optionally, the state change frequent criterion specifically is:
the first penalty coefficient corresponding to the target virtual machine is greater than a first preset number of times, or the first penalty coefficient corresponding to the target virtual machine does not fall below a second preset number of times after being greater than the first preset number of times last time.
Optionally, the determining, according to the historical state change data, a connection state change frequency parameter of the target virtual machine specifically includes:
When the target virtual machine performs one-time action of changing the connected virtual tunnel endpoint, adding one to a second penalty coefficient corresponding to the target virtual machine;
if the target virtual machine does not change the connected virtual tunnel endpoint after the second attenuation period is spaced, subtracting one from the second penalty coefficient corresponding to the target virtual machine;
wherein the second penalty coefficient is an integer not less than zero.
Optionally, the state change frequent criterion specifically is:
the second punishment coefficient corresponding to the target virtual machine is larger than a third preset number of times.
Optionally, the state change frequent criterion specifically is:
the second penalty coefficient corresponding to the target virtual machine is greater than a third preset number of times, or the second penalty coefficient corresponding to the target virtual machine does not fall below a fourth preset number of times after the second penalty coefficient corresponding to the target virtual machine is greater than the third preset number of times last time.
Optionally, the method is applied to a monitoring server, and the monitoring server is a server which is connected with each virtual tunnel endpoint in the cluster where the target virtual tunnel endpoint is located.
Optionally, the method further comprises:
and presetting feedback time with each virtual tunnel endpoint so that the target virtual tunnel endpoint determines a release strategy of a state update message of the target virtual machine according to the latest connection state change frequent degree parameter of the target virtual machine when the connection state change frequent degree parameter of the target virtual machine is not received in the feedback time after the state change event is reported.
In order to solve the above technical problem, the present application further provides an information release control device of a virtual tunnel endpoint, including:
the state monitoring unit is used for acquiring historical state change data of a target virtual machine connected with a target virtual tunnel endpoint after a state change event occurs to the target virtual machine;
the parameter determining unit is used for determining a connection state change frequency parameter of the target virtual machine according to the historical state change data;
the release control unit is used for blocking the target virtual tunnel endpoint from releasing the state update message of the target virtual machine to the border gateway protocol neighbor node if the connection state change frequency parameter of the target virtual machine accords with a preset state change frequency standard; and if the connection state change frequency degree parameter of the target virtual machine does not accord with the state change frequency standard, allowing the target virtual tunnel endpoint to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
In order to solve the above technical problem, the present application further provides an information publishing control device of a virtual tunnel endpoint, including:
a memory for storing a computer program;
And a processor, configured to execute the computer program, where the computer program when executed by the processor implements the steps of the information release control method of a virtual tunnel endpoint according to any one of the foregoing.
To solve the above technical problem, the present application further provides a computer readable storage medium, on which a computer program is stored, where the computer program when executed by a processor implements the steps of the information release control method of a virtual tunnel endpoint according to any one of the above.
According to the information release control method of the virtual tunnel endpoint, after a state change event occurs in a target virtual machine connected with the target virtual tunnel endpoint, the target virtual tunnel endpoint does not release a state update message of the target virtual machine, but waits for a connection state change frequent degree parameter of a fixed target virtual machine determined according to historical state change data of the target virtual machine, the connection state change frequent degree parameter of the target virtual machine is compared with a preset state change frequent standard, whether the situation of frequent change of the connection state of the target virtual machine exists or not is determined in a quantitative mode, the target virtual tunnel endpoint is forbidden to release the state update message of the target virtual machine to a boundary gateway protocol neighbor node when the situation exists, and the target virtual tunnel endpoint is allowed to release the state update message when the situation does not exist, so that the problems that a large amount of information update messages exist in a network due to frequent change of the connection state of the virtual machine are effectively relieved, bandwidth resources are wasted, and business is influenced.
The application further provides an information release control device, equipment and a computer readable storage medium of the virtual tunnel endpoint, which have the beneficial effects and are not described herein.
Drawings
For a clearer description of embodiments of the present application or of the prior art, the drawings that are used in the description of the embodiments or of the prior art will be briefly described, it being apparent that the drawings in the description that follow are only some embodiments of the present application, and that other drawings may be obtained from these drawings by a person of ordinary skill in the art without inventive effort.
Fig. 1 is a flowchart of an information release control method of a virtual tunnel endpoint according to an embodiment of the present application;
fig. 2 is a schematic connection diagram of a monitoring server according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an information publishing control device of a virtual tunnel endpoint according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an information publishing control device of a virtual tunnel endpoint according to an embodiment of the present application.
Detailed Description
The core of the application is to provide a method, a device, equipment and a computer readable storage medium for controlling information release of a virtual tunnel endpoint, which are used for solving the problems that a large amount of information update messages exist in a network due to frequent change of the connection state of a virtual machine, so that a large amount of information update messages exist in the network, thereby wasting bandwidth resources and affecting services.
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Example 1
Fig. 1 is a flowchart of an information release control method of a virtual tunnel endpoint according to an embodiment of the present application; fig. 2 is a connection schematic diagram of a monitoring server according to an embodiment of the present application.
As shown in fig. 1, the information release control method for a virtual tunnel endpoint provided in the embodiment of the present application includes:
s101: and when a state change event occurs in a target virtual machine connected with the target virtual tunnel endpoint, acquiring historical state change data of the target virtual machine.
S102: and determining the connection state change frequency parameter of the target virtual machine according to the historical state change data.
S103: and if the connection state change frequency degree parameter of the target virtual machine accords with the preset state change frequency standard, prohibiting the target virtual tunnel endpoint from issuing a state update message of the target virtual machine to the border gateway protocol neighbor node.
S104: and if the connection state change frequency degree parameter of the target virtual machine does not accord with the state change frequency standard, allowing the target virtual tunnel endpoint to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
The three modes of the virtual tunnel endpoint (Virtual Tunnel End Point, VTEP), the virtual extended lan (Virtual Extensible Local Area Network, VXLAN) gateway, and VXLAN IP gateway may be virtual switches or physical switches. In this application, for convenience of description, a virtual tunnel endpoint and a target virtual tunnel endpoint refer to a switch (switch) that implements a virtual tunnel endpoint function.
Host information such as MAC address, IP address, etc. of hosts is transferred between virtual tunnel endpoints in an ethernet virtual private network (Ethernet Virtual Private Network, EVPN) through a border gateway protocol (Border Gateway Protocol, BGP) type2 route. In the prior art, after a virtual machine is on line, a virtual tunnel endpoint connected with a physical machine where the virtual machine is located will issue a type2 type information update message BGP update to all virtual tunnel endpoints having a border gateway protocol neighbor relation. If a certain virtual machine frequently goes up and down due to faults or other reasons or continuously drifts among different virtual tunnel endpoints, the corresponding virtual tunnel endpoint continuously issues information update messages (including BGP notification of the virtual machine going up and revocation messages of the virtual machine going down), so that a chain reaction is triggered, all virtual tunnel endpoints in a cluster where the virtual tunnel endpoint is located can repeat the same actions, issue BGP notification and revocation messages, waste a large amount of bandwidth resources, and meanwhile, cause unstable network and influence normal service. There is no reliable solution for frequent oscillation drift of hosts in ethernet virtual private networks.
The information release control method of the virtual tunnel endpoint aims at the problem of frequent oscillation drift of the host in the Ethernet virtual private network scene, and achieves the scheme of preventing network oscillation.
As shown in fig. 2, virtual tunnel endpoints in the ethernet virtual private network are interconnected two by two, and on this basis, each virtual tunnel endpoint may be arranged into a tree structure for data management, that is, each virtual tunnel endpoint is divided into a Spine node (Spine) and Leaf nodes (Leaf 1, leaf 2), and in general, hosts (Host 1, host1', host 2) are connected to the virtual tunnel endpoint as the Leaf nodes, one virtual tunnel endpoint may be connected to multiple hosts, and one Host may run multiple Virtual Machines (VMs). Frequent changes in the connection state of the virtual machine to the virtual tunnel endpoint are more likely to be caused by disconnection between the host and the virtual tunnel endpoint, and may also be caused by failure of the virtual machine itself. The embodiment of the application mainly focuses on the connection state between the virtual machine and the virtual tunnel endpoint, and does not focus on the data structure of the virtual tunnel endpoint. That is, as shown in fig. 2, the information release control method of the virtual tunnel endpoint provided in the embodiment of the present application may be applied to a monitoring server, where the monitoring server is a server connected to each virtual tunnel endpoint in a cluster where a target virtual tunnel endpoint is located. In general, in addition to virtual tunnel endpoints, a plurality of servers exist in a data network cluster, the servers have higher performance, and originally have a connection relationship with each virtual tunnel endpoint, and one or more servers respectively connected with each virtual tunnel endpoint in the cluster are selected as monitoring servers, so that information release control of the highly available virtual tunnel endpoints can be realized.
In consideration of possible connection interruption between the virtual tunnel endpoint and the monitoring server, in addition to using a plurality of servers as the monitoring server to improve availability, the information release control method for the virtual tunnel endpoint provided by the embodiment of the application may further include: and pre-agreeing feedback time with each virtual tunnel endpoint, so that when the target virtual tunnel endpoint does not receive the connection state change frequent degree parameter of the target virtual machine in the feedback time after reporting the state change event, the issuing strategy of the state update message of the target virtual machine is determined according to the latest connection state change frequent degree parameter of the target virtual machine.
Specifically, different feedback time can be agreed between different virtual tunnel endpoints and the monitoring server, the monitoring server manages feedback time of each virtual tunnel endpoint and historical state change data of each virtual machine, and each virtual tunnel endpoint manages virtual machines connected with the virtual tunnel endpoint and feedback time agreed between the virtual tunnel endpoint and the monitoring server. After the target virtual tunnel endpoint monitors the local online action or the local offline action of the target virtual machine, reporting the online action or the local offline action of the target virtual machine to the monitoring server, and waiting for a connection state change frequency parameter fed back by the monitoring server or a release strategy of a state update message of the target virtual machine. If the feedback time is exceeded and no message fed back by the monitoring server is received, disconnection from the monitoring server is determined, and at the moment, the virtual tunnel endpoint can temporarily adopt the latest connection state change frequency degree parameter of the target virtual machine stored locally to determine the release strategy of the state update message of the target virtual machine or execute the release strategy of the latest state update message of the target virtual machine stored locally.
In addition, the virtual tunnel endpoint can also adopt a heartbeat mechanism to monitor the connection state between the virtual tunnel endpoint and the monitoring server in real time, and directly adopts the latest connection state change frequency degree parameter of the target virtual machine stored locally to determine the release strategy of the state update message of the target virtual machine or execute the latest release strategy of the state update message of the target virtual machine stored locally when the online or offline action of the target virtual machine is monitored and the monitoring server cannot be connected.
When the monitoring server is set, the target virtual tunnel endpoint may report a state change event of the target virtual machine to the monitoring server based on the routing of the border gateway protocol type 2.
Or, the information release control method of the virtual tunnel endpoint provided by the embodiment of the application can also be applied to the virtual tunnel endpoint, namely, the virtual tunnel endpoint automatically determines the connection state change frequency degree of the target virtual machine and formulates a release strategy of the state update message of the target virtual machine after receiving the state change event of the target virtual machine connected with the virtual tunnel endpoint. The performance of the virtual tunnel endpoint (switch) is poorer than that of the server, but the time for communicating with the monitoring server can be saved, and information delay caused by unstable connection state between the virtual tunnel endpoint and the monitoring server can be avoided. However, the disadvantage of this scheme is that the virtual tunnel endpoint is not easy to determine that the target virtual machine frequently drifts between different virtual tunnel endpoints, and needs to interact with other virtual tunnel endpoints before determining.
In addition, the information release control method of the virtual tunnel endpoint provided by the embodiment of the application can be further applied to part of virtual tunnel endpoints in a cluster and used for managing information release strategies of all virtual tunnel endpoints, and after the target virtual tunnel endpoint monitors that a state change event occurs in a target virtual machine connected with the target virtual tunnel endpoint, the target virtual tunnel endpoint reports the information release strategies of state update messages of the target virtual machine for realizing control.
Whether applied to a monitoring server or a virtual tunnel endpoint, the information release control method of the virtual tunnel endpoint provided by the embodiment of the application needs to preset a calculation mode of a connection state change frequency parameter and determine a state change frequency standard. The calculation mode of the connection state change frequent degree parameter and the state change frequent standard aim at quantitatively planning whether the virtual machine connected with the virtual tunnel endpoint frequently generates the connection state change or not, and then the determination of the calculation mode of the connection state change frequent degree parameter and the determination of the state change frequent degree standard can be formulated and replaced in advance by a network administrator according to the busyness degree of the data cluster, and the calculation relation between the two parameters and the busyness degree parameter can be preset, so that the cluster can be formulated and replaced automatically.
Through the above-mentioned alternative scheme, oscillation suppression and drift suppression can be performed on the information update message issued by the virtual tunnel endpoint by formulating the connection state change frequent degree parameter and the state change frequent standard. And when the situation that the connection state is not changed frequently exists in the target virtual machine is quantitatively determined, the monitoring server or the target virtual tunnel endpoint can flood the state update message of the target virtual machine based on the routing of the type2 border gateway protocol so as to synchronize to each virtual tunnel endpoint in the cluster.
According to the information release control method of the virtual tunnel endpoint, after a state change event occurs in a target virtual machine connected with the target virtual tunnel endpoint, the target virtual tunnel endpoint does not release a state update message of the target virtual machine, but waits for a connection state change frequent degree parameter of a fixed target virtual machine determined according to historical state change data of the target virtual machine, the connection state change frequent degree parameter of the target virtual machine is compared with a preset state change frequent standard, whether the situation of frequent change of the connection state of the target virtual machine exists or not is determined in a quantitative mode, the target virtual tunnel endpoint is forbidden to release the state update message of the target virtual machine to a boundary gateway protocol neighbor node when the situation exists, and the target virtual tunnel endpoint is allowed to release the state update message when the situation does not exist, so that the problems that a large amount of information update messages exist in a network and bandwidth resources are wasted and service influence are effectively relieved due to frequent change of the connection state of the virtual machine.
Example two
Based on the above embodiment, in order to implement oscillation suppression of a host frequent oscillation event, such as frequent online and offline of a target virtual machine on a target virtual tunnel endpoint, in the information release control method of a virtual tunnel endpoint provided in the embodiment of the present application, S102: determining the connection state change frequency parameter of the target virtual machine according to the historical state change data specifically may include:
when the target virtual machine performs one online action or one offline action on the target virtual tunnel endpoint, adding one to a first punishment coefficient corresponding to the target virtual machine;
if the target virtual machine does not have the online action or the offline action after the first attenuation period is spaced, subtracting one from a first penalty coefficient corresponding to the target virtual machine;
wherein the first penalty coefficient is an integer not less than zero.
In the implementation, the first penalty coefficient is used as a connection state change frequency parameter of the target virtual machine, and the first penalty coefficient is attenuated by using a first attenuation period to reflect the change of the connection state change frequency of the target virtual machine with time. The first penalty coefficient may be changed by adding one to each time the target virtual machine performs an online action or a offline action on the target virtual tunnel endpoint, or may be accumulated by other manners, for example, may be accumulated by other values, or the value accumulated each time is increased with the increase of the number of times, or other accumulation calculation manners are adopted. And as the connection state of the target virtual machine tends to be stable, i.e. after the first attenuation period is spaced, the target virtual machine does not have an online action or a offline action, the first penalty coefficient corresponding to the target virtual machine can be reduced by one, or the first penalty coefficient is reduced by other values, or the reduced value is increased or reduced along with the extension of time, or other accumulated calculation modes are adopted.
Based on this, in the information release control method of a virtual tunnel endpoint provided in the embodiment of the present application, the state change frequent criterion may specifically be: the first punishment coefficient corresponding to the target virtual machine is larger than the first preset times. When the ratio of the first punishment coefficient to the times is 1:1, the first punishment coefficient is adopted to be compared with the first preset times. If other accumulating modes are adopted, other types of thresholds can be correspondingly set. When the first punishment coefficient corresponding to the target virtual machine is larger than the first preset times, the condition that the state of the target virtual machine connected with the target virtual tunnel endpoint is changed frequently is considered, and then the target virtual tunnel endpoint is forbidden to issue a state update message of the target virtual machine to the border gateway protocol neighbor node. And when the first penalty coefficient corresponding to the target virtual machine is smaller than or equal to the first preset times, allowing the target virtual tunnel endpoint to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
However, the adoption of the above-described state change frequent criteria may cause the target virtual machine to switch between frequent and infrequent state changes, which is also disadvantageous for stable control. Therefore, it is preferable that the status change frequent criteria specifically are: the first punishment coefficient corresponding to the target virtual machine is larger than the first preset times, or the first punishment coefficient corresponding to the target virtual machine does not fall below the second preset times after being larger than the first preset times last time. That is, when the first penalty coefficient corresponding to the target virtual machine is greater than the first preset times, the condition that the state of the target virtual machine connected with the target virtual tunnel endpoint is changed frequently is considered, and then the target virtual tunnel endpoint is forbidden to issue the state update message of the target virtual machine to the border gateway protocol neighbor node. When the first penalty coefficient corresponding to the target virtual machine is reduced from the condition that the first penalty coefficient is larger than the first preset times to the condition that the first penalty coefficient is smaller than the first preset times, the oscillation suppression of the target virtual machine is not released, and the first penalty coefficient corresponding to the target virtual machine is waited to continue to be reduced to the condition that the second penalty coefficient is smaller than the second preset times (the second preset times are smaller than the first preset times), the target virtual tunnel endpoint is allowed to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
Example III
When a target virtual machine frequently drifts (switches) between different virtual tunnel endpoints, there may be no frequent change in the connection state of the target virtual machine detected by a single target virtual tunnel endpoint, but from the perspective of the entire cluster, the target virtual machine has frequently drifted.
On the basis of the above embodiment, in order to implement drift suppression of frequent drift of the target virtual machine between different virtual tunnel endpoints, in the information release control method of a virtual tunnel endpoint provided in the embodiment of the present application, S102: determining the connection state change frequency parameter of the target virtual machine according to the historical state change data specifically may include:
when the target virtual machine performs the action of changing the connected virtual tunnel endpoint once, adding one to a second punishment coefficient corresponding to the target virtual machine;
if the target virtual machine does not change the connected virtual tunnel endpoint after the second attenuation period is spaced, subtracting one from a second punishment coefficient corresponding to the target virtual machine;
wherein the second penalty coefficient is an integer not less than zero.
In specific implementation, the first penalty coefficient is used as a connection state change frequency parameter of the target virtual machine, and the second attenuation period is utilized to attenuate the first penalty coefficient so as to reflect the change of the connection state change frequency of the target virtual machine with time. The first penalty coefficient may be changed by adding one to each time the target virtual machine has drift of the virtual tunnel endpoint, or may be accumulated by other manners, for example, may be accumulated by other values, or the value accumulated each time is increased with the increase of the number of times, or other accumulation calculation manners are adopted. And as the connection state of the target virtual machine tends to be stable, that is, when the target virtual machine does not drift after the first attenuation period is spaced, the second penalty coefficient corresponding to the target virtual machine can be subtracted by one, or the second penalty coefficient is subtracted by other values, or the subtracted values are increased or decreased along with the extension of time, or other accumulated calculation modes are adopted.
Based on this, in the information release control method of a virtual tunnel endpoint provided in the embodiment of the present application, the state change frequent criterion may specifically be: the second punishment coefficient corresponding to the target virtual machine is larger than the third preset times. When the ratio of the second punishment coefficient to the times is 1:1, the second punishment coefficient is adopted to be compared with a third preset time. If other accumulating modes are adopted, other types of thresholds can be correspondingly set. When the second penalty coefficient corresponding to the target virtual machine is larger than the third preset times, the condition that the target virtual machine connected with the target virtual tunnel endpoint has frequent drift is considered, and the target virtual tunnel endpoint is forbidden to issue a state update message of the target virtual machine to the border gateway protocol neighbor node. And when the second penalty coefficient corresponding to the target virtual machine is smaller than or equal to the third preset times, allowing the target virtual tunnel endpoint to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
However, the adoption of the above-described state change frequent criteria may cause the target virtual machine to switch between frequent and infrequent state changes, which is also disadvantageous for stable control. Therefore, it is preferable that the status change frequent criteria specifically are: the second penalty coefficient corresponding to the target virtual machine is larger than the third preset times, or the second penalty coefficient corresponding to the target virtual machine does not fall below the fourth preset times after the second penalty coefficient corresponding to the target virtual machine is larger than the third preset times last time. That is, when the second penalty coefficient corresponding to the target virtual machine is greater than the third preset times, the condition that the target virtual machine connected with the target virtual tunnel endpoint has frequent drift is considered, and then the target virtual tunnel endpoint is forbidden to issue the state update message of the target virtual machine to the border gateway protocol neighbor node. When the second penalty coefficient corresponding to the target virtual machine is reduced from the condition that the second penalty coefficient is larger than the third preset times to the condition that the second penalty coefficient is smaller than the third preset times, the drift suppression of the target virtual machine is not released, and the second penalty coefficient corresponding to the target virtual machine is waited to continue to be reduced to the condition that the second penalty coefficient is smaller than the fourth preset times (the fourth preset times are smaller than the third preset times), the state update message of the target virtual machine is allowed to be issued to the border gateway protocol neighbor node by the target virtual tunnel endpoint.
Various embodiments of a virtual tunnel endpoint information release control method are detailed above, and on the basis of the embodiments, the application also discloses an information release control device, equipment and a computer readable storage medium of the virtual tunnel endpoint corresponding to the method.
Example IV
Fig. 3 is a schematic structural diagram of an information release control device of a virtual tunnel endpoint according to an embodiment of the present application.
As shown in fig. 3, an information release control device for a virtual tunnel endpoint provided in an embodiment of the present application includes:
the state monitoring unit 301 is configured to obtain historical state change data of a target virtual machine connected to a target virtual tunnel endpoint after a state change event occurs in the target virtual machine;
a parameter determining unit 302, configured to determine a connection state change frequency parameter of the target virtual machine according to the historical state change data;
the release control unit 303 is configured to block the target virtual tunnel endpoint from releasing the state update message of the target virtual machine to the border gateway protocol neighbor node if the connection state change frequency parameter of the target virtual machine meets a preset state change frequency standard; and if the connection state change frequency degree parameter of the target virtual machine does not accord with the state change frequency standard, allowing the target virtual tunnel endpoint to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
Further, the parameter determining unit 302 may specifically include:
the first punishment subunit is used for adding one to a first punishment coefficient corresponding to the target virtual machine when the target virtual machine performs one-time online action or one-time offline action on the target virtual tunnel endpoint;
the second punishment subunit is used for subtracting one from the first punishment coefficient corresponding to the target virtual machine if the target virtual machine does not have the online action or the offline action after the first attenuation period is spaced;
wherein the first penalty coefficient is an integer not less than zero.
Further, the state change frequent standard specifically includes:
the first punishment coefficient corresponding to the target virtual machine is larger than the first preset times.
Or, the state change frequent standard specifically includes:
the first punishment coefficient corresponding to the target virtual machine is larger than the first preset times, or the first punishment coefficient corresponding to the target virtual machine does not fall below the second preset times after being larger than the first preset times last time.
Further, the parameter determining unit 302 may specifically include:
the third punishment subunit is used for adding one to a second punishment coefficient corresponding to the target virtual machine when the target virtual machine performs one-time action of changing the connected virtual tunnel endpoint;
A fourth punishment subunit, configured to reduce, by one, a second punishment coefficient corresponding to the target virtual machine if the target virtual machine does not change the connected virtual tunnel endpoint after the second attenuation period is set;
wherein the second penalty coefficient is an integer not less than zero.
Further, the state change frequent standard specifically includes:
the second punishment coefficient corresponding to the target virtual machine is larger than the third preset times.
Or, the state change frequent standard specifically includes:
the second penalty coefficient corresponding to the target virtual machine is larger than the third preset times, or the second penalty coefficient corresponding to the target virtual machine does not fall below the fourth preset times after the second penalty coefficient corresponding to the target virtual machine is larger than the third preset times last time.
Further, the information release control device of the virtual tunnel endpoint provided by the embodiment of the application is applied to a monitoring server, wherein the monitoring server is a server which is respectively connected with each virtual tunnel endpoint in a cluster where a target virtual tunnel endpoint is located.
Further, the information release control device of a virtual tunnel endpoint provided in the embodiment of the present application further includes:
the feedback control unit is used for presetting feedback time with each virtual tunnel endpoint so that when the target virtual tunnel endpoint does not receive the connection state change frequent degree parameter of the target virtual machine in the feedback time after the state change event is reported, the issuing strategy of the state update message of the target virtual machine is determined according to the latest connection state change frequent degree parameter of the target virtual machine.
Since the embodiments of the apparatus portion and the embodiments of the method portion correspond to each other, the embodiments of the apparatus portion are referred to the description of the embodiments of the method portion, and are not repeated herein.
Example five
Fig. 4 is a schematic structural diagram of an information publishing control device of a virtual tunnel endpoint according to an embodiment of the present application.
As shown in fig. 4, an information release control device of a virtual tunnel endpoint provided in an embodiment of the present application includes:
a memory 410 for storing a computer program 411;
a processor 420, configured to execute a computer program 411, where the computer program 411 when executed by the processor 420 implements the steps of the method for controlling information distribution of a virtual tunnel endpoint according to any one of the embodiments above.
Processor 420 may include one or more processing cores, such as a 3-core processor, an 8-core processor, etc., among others. The processor 420 may be implemented in at least one hardware form of digital signal processing DSP (Digital Signal Processing), field programmable gate array FPGA (Field-Programmable Gate Array), programmable logic array PLA (Programmable Logic Array). Processor 420 may also include a main processor, which is a processor for processing data in an awake state, also referred to as central processor CPU (Central Processing Unit), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 420 may be integrated with an image processor GPU (Graphics Processing Unit), a GPU for use in responsible for rendering and rendering of the content required to be displayed by the display screen. In some embodiments, the processor 420 may also include an artificial intelligence AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 410 may include one or more computer-readable storage media, which may be non-transitory. Memory 410 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 410 is at least used for storing a computer program 411, where the computer program 411, after being loaded and executed by the processor 420, can implement relevant steps in the information release control method of a virtual tunnel endpoint disclosed in any one of the foregoing embodiments. In addition, the resources stored in the memory 410 may further include an operating system 412, data 413, and the like, where the storage manner may be transient storage or permanent storage. The operating system 412 may be Windows. The data 413 may include, but is not limited to, data related to the above-described method.
In some embodiments, the information release control device of the virtual tunnel endpoint may further include a display 430, a power supply 440, a communication interface 450, an input-output interface 460, a sensor 470, and a communication bus 480.
Those skilled in the art will appreciate that the structure shown in fig. 4 does not constitute a limitation of the information distribution control apparatus of the virtual tunnel endpoint, and may include more or less components than illustrated.
The information release control device of the virtual tunnel endpoint provided by the embodiment of the application comprises the memory and the processor, wherein the processor can realize the information release control method of the virtual tunnel endpoint when executing the program stored in the memory, and the effects are the same as the above.
Example six
It should be noted that the apparatus and device embodiments described above are merely exemplary, and for example, the division of modules is merely a logic function division, and there may be other division manners in actual implementation, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or modules, which may be in electrical, mechanical, or other forms. The modules illustrated as separate components may or may not be physically separate, and components shown as modules may or may not be physical modules, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated modules may be implemented in hardware or in software functional modules.
The integrated modules, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. With such understanding, the technical solution of the present application, or a part contributing to the prior art or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium, performing all or part of the steps of the method described in the various embodiments of the present application.
To this end, the embodiments of the present application also provide a computer-readable storage medium having a computer program stored thereon, which when executed by a processor, implements steps of an information distribution control method, such as a virtual tunnel endpoint.
The computer readable storage medium may include: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (ram) RAM (Random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The computer program included in the computer readable storage medium provided in this embodiment can implement the steps of the information distribution control method of the virtual tunnel endpoint as described above when executed by the processor, and the same effects are achieved.
The above describes in detail the method, the device, the equipment and the computer readable storage medium for controlling information release of the virtual tunnel endpoint provided by the application. In the description, each embodiment is described in a progressive manner, and each embodiment is mainly described by the differences from other embodiments, so that the same similar parts among the embodiments are mutually referred. The apparatus, device and computer readable storage medium of the embodiments are described more simply because they correspond to the methods of the embodiments, and the description thereof will be given with reference to the method section. It should be noted that it would be obvious to those skilled in the art that various improvements and modifications can be made to the present application without departing from the principles of the present application, and such improvements and modifications fall within the scope of the claims of the present application.
It should also be noted that in this specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.

Claims (12)

1. The information release control method of the virtual tunnel endpoint is characterized by comprising the following steps:
when a state change event occurs in a target virtual machine connected with a target virtual tunnel endpoint, acquiring historical state change data of the target virtual machine;
determining a connection state change frequency parameter of the target virtual machine according to the historical state change data;
if the connection state change frequent degree parameter of the target virtual machine accords with a preset state change frequent standard, prohibiting the target virtual tunnel endpoint from issuing a state update message of the target virtual machine to a border gateway protocol neighbor node;
and if the connection state change frequency degree parameter of the target virtual machine does not accord with the state change frequency standard, allowing the target virtual tunnel endpoint to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
2. The information distribution control method according to claim 1, wherein the determining the connection state change frequency parameter of the target virtual machine according to the history state change data specifically includes:
when the target virtual machine performs one online action or one offline action on the target virtual tunnel endpoint, adding one to a first penalty coefficient corresponding to the target virtual machine;
If the target virtual machine does not have the online action or the offline action after the first attenuation period is spaced, subtracting one from the first penalty coefficient corresponding to the target virtual machine;
wherein the first penalty coefficient is an integer not less than zero.
3. The information distribution control method according to claim 2, wherein the status change frequent criterion is specifically:
the first punishment coefficient corresponding to the target virtual machine is larger than a first preset number of times.
4. The information distribution control method according to claim 2, wherein the status change frequent criterion is specifically:
the first penalty coefficient corresponding to the target virtual machine is greater than a first preset number of times, or the first penalty coefficient corresponding to the target virtual machine does not fall below a second preset number of times after being greater than the first preset number of times last time.
5. The information distribution control method according to claim 1, wherein the determining the connection state change frequency parameter of the target virtual machine according to the history state change data specifically includes:
when the target virtual machine performs one-time action of changing the connected virtual tunnel endpoint, adding one to a second penalty coefficient corresponding to the target virtual machine;
If the target virtual machine does not change the connected virtual tunnel endpoint after the second attenuation period is spaced, subtracting one from the second penalty coefficient corresponding to the target virtual machine;
wherein the second penalty coefficient is an integer not less than zero.
6. The information distribution control method according to claim 5, wherein the status change frequent criterion is specifically:
the second punishment coefficient corresponding to the target virtual machine is larger than a third preset number of times.
7. The information distribution control method according to claim 5, wherein the status change frequent criterion is specifically:
the second penalty coefficient corresponding to the target virtual machine is greater than a third preset number of times, or the second penalty coefficient corresponding to the target virtual machine does not fall below a fourth preset number of times after the second penalty coefficient corresponding to the target virtual machine is greater than the third preset number of times last time.
8. The information release control method according to claim 1, applied to a monitoring server, wherein the monitoring server is a server connected to each virtual tunnel endpoint in a cluster where the target virtual tunnel endpoint is located.
9. The information distribution control method according to claim 8, characterized by further comprising:
And presetting feedback time with each virtual tunnel endpoint so that when the target virtual tunnel endpoint does not receive the connection state change frequent degree parameter of the target virtual machine in the feedback time after reporting the state change event, determining a release strategy of the state update message of the target virtual machine according to the latest connection state change frequent degree parameter of the target virtual machine.
10. An information distribution control device of a virtual tunnel endpoint, comprising:
the state monitoring unit is used for acquiring historical state change data of a target virtual machine connected with a target virtual tunnel endpoint after a state change event occurs to the target virtual machine;
the parameter determining unit is used for determining a connection state change frequency parameter of the target virtual machine according to the historical state change data;
the release control unit is used for blocking the target virtual tunnel endpoint from releasing the state update message of the target virtual machine to the border gateway protocol neighbor node if the connection state change frequency parameter of the target virtual machine accords with a preset state change frequency standard; and if the connection state change frequency degree parameter of the target virtual machine does not accord with the state change frequency standard, allowing the target virtual tunnel endpoint to issue a state update message of the target virtual machine to the border gateway protocol neighbor node.
11. An information distribution control apparatus of a virtual tunnel endpoint, comprising:
a memory for storing a computer program;
a processor for executing the computer program, which when executed by the processor implements the steps of the information distribution control method of a virtual tunnel endpoint according to any of claims 1 to 9.
12. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the information distribution control method of a virtual tunnel endpoint according to any one of claims 1 to 9.
CN202210761043.6A 2022-06-30 2022-06-30 Information release control method, device and equipment for virtual tunnel endpoint Active CN115174415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210761043.6A CN115174415B (en) 2022-06-30 2022-06-30 Information release control method, device and equipment for virtual tunnel endpoint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210761043.6A CN115174415B (en) 2022-06-30 2022-06-30 Information release control method, device and equipment for virtual tunnel endpoint

Publications (2)

Publication Number Publication Date
CN115174415A CN115174415A (en) 2022-10-11
CN115174415B true CN115174415B (en) 2023-07-14

Family

ID=83489419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210761043.6A Active CN115174415B (en) 2022-06-30 2022-06-30 Information release control method, device and equipment for virtual tunnel endpoint

Country Status (1)

Country Link
CN (1) CN115174415B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101133596A (en) * 2005-04-13 2008-02-27 思科技术公司 Method and apparatus for accelerating border gateway protocol convergence
CN103780683A (en) * 2014-01-08 2014-05-07 同济大学 Method for virtual machine online migration between XIA islands
CN106775936A (en) * 2016-11-30 2017-05-31 华为技术有限公司 The management method and device of a kind of virtual machine
CN111679885A (en) * 2020-05-29 2020-09-18 泰康保险集团股份有限公司 Method, device, medium and electronic equipment for determining virtual machine drift
CN113495777A (en) * 2020-04-03 2021-10-12 中移动信息技术有限公司 Virtual machine online method, device, equipment and medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101133596A (en) * 2005-04-13 2008-02-27 思科技术公司 Method and apparatus for accelerating border gateway protocol convergence
CN103780683A (en) * 2014-01-08 2014-05-07 同济大学 Method for virtual machine online migration between XIA islands
CN106775936A (en) * 2016-11-30 2017-05-31 华为技术有限公司 The management method and device of a kind of virtual machine
CN113495777A (en) * 2020-04-03 2021-10-12 中移动信息技术有限公司 Virtual machine online method, device, equipment and medium
CN111679885A (en) * 2020-05-29 2020-09-18 泰康保险集团股份有限公司 Method, device, medium and electronic equipment for determining virtual machine drift

Also Published As

Publication number Publication date
CN115174415A (en) 2022-10-11

Similar Documents

Publication Publication Date Title
CN109309618B (en) Next hop selection based on service level agreement
US10412012B2 (en) Intelligent, load adaptive, and self optimizing master node selection in an extended bridge
US9705735B2 (en) System and method using RSVP hello suppression for graceful restart capable neighbors
EP2720418B1 (en) Lacp link switching and data transmission method and device
CN101304340B (en) Method and apparatus for monitoring resource condition as well as communication network
EP2157746B1 (en) Routing control system for L3VPN service network
US20090010171A1 (en) Scaling BFD sessions for neighbors using physical / sub-interface relationships
KR20130066679A (en) Method and apparatus for protocol event management
US10158500B2 (en) G.8032 prioritized ring switching systems and methods
JP2006229967A (en) High-speed multicast path switching
Giorgetti et al. Performance analysis of media redundancy protocol (MRP)
JP2013502779A (en) Bandwidth information notification method, service processing method, network node, and communication system
WO2018103665A1 (en) L2tp-based device management method, apparatus and system
KR20180122513A (en) Method and framework for traffic engineering in network hypervisor of sdn-based network virtualization platform
CN114900526B (en) Load balancing method and system, computer storage medium and electronic equipment
EP2677702A2 (en) A method and apparatus for load balance
US9112791B2 (en) Methods and apparatus for protecting a communications network
US7864763B2 (en) Method and device for implementing layer 1 virtual private network
EP1758316B1 (en) Method for ensuring reliability in a network including a separate bearer control layer
CN100559792C (en) Spanning-Tree Protocol address renewing method and switch
WO2021073367A1 (en) Data processing method, device, and system
CN115174415B (en) Information release control method, device and equipment for virtual tunnel endpoint
US8966063B2 (en) Operating a sleep management service
WO2015147860A1 (en) Rescheduling a service on a node
EP1983713A1 (en) Method for operating a network element and according device as well as communication system comprising such device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant